The document discusses various risk mitigation strategies. Any change to a system represents a risk, so change management is implemented to evaluate changes and their effects on the system. Periodic reviews of user rights and permissions can also mitigate risk. Security audits should be performed regularly to reduce risks to systems and data. Effective incident management can limit damage from risk events and help prevent recurrences. Properly enforcing policies and procedures can prevent data loss or theft. Data loss prevention systems can further help prevent sensitive data from being lost or stolen.