أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.
By proper mapping and tagging of indents that have been reported..
To go through the process and try to identify the vulnerable objectives of specific department/ process. All such vulnerable objectives will derive KRIs which will be monitored on monthly basis for monitoring.