To learn how to assign fields to Risk Table columns in the Information Security Risk Manager, please continue reading the tutorial here.