Risk identification, likelihood × impact matrix, mitigation strategies, contingency planning, and RAID logs.