Skip to the content.

Risk Management

Importance of Risk Management

Information assurance and cybersecurity are key for risk management. The required cybersecurity level is determined by the entity’s risk tolerance.

Risk Management Terminologies

Risk Management Frameworks

CIS

Center for Internet Security (CIS) is known for its CIS Controls, a set of prioritized security practices to mitigate common cyber threats.

NIST RMF/CSF

The NIST Risk Management Framework (RMF) manages cybersecurity risks for federal systems, including categorization and security control selection.

ISO/IEC

ISO/IEC refers to standards developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

SSAE SOC 2

SSAE SOC 2 (Statement on Standards for Attestation Engagements) is an auditing standard designed for service organizations to assess their data security practices.

NIST SP-800

The NIST Special Publications (SP) 800 series contains cybersecurity guidelines, best practices, and technical standards from the National Institute of Standards and Technology.

Data Privacy Regulations and Standards

GDPR

The General Data Protection Regulation (GDPR) is a strict EU law governing the collection and handling of personal data.

HIPAA

HIPAA, or the Health Insurance Portability and Accountability Act, is a U.S. law regulating the protection of patient health information.

PCI DSS

Risk Management Process

Risk Identification

Risk Assessment

Risk Assessment is the process of identifying, estimating, and prioritizing risks to an organization’s operations, assets, individuals, and mission.

Risk Treatment

Risk treatment involves deciding on the most appropriate actions based on management’s risk attitude and the availability and cost of mitigation measures.

Risk Priorities

Risk Assessment Frequency

Refers to how often the risk assessment process is conducted within an organization.

Ad-Hoc

Risk assessments performed on an as-needed basis, typically in response to unexpected events or changes in the environment.

Recurring

Risk assessments scheduled at regular intervals, such as annually or semi-annually.

One-Time

A risk assessment carried out just once, often at the beginning of a project, implementation of a new system, or during an initial risk evaluation.

Continuous

An ongoing process of risk assessment that integrates risk monitoring into daily operations.

Risk Assessment Types

Quantitative Risk Assessment

Quantitative risk assessment is a risk analysis approach that uses numerical values and data to estimate risks.

Important terms:

Example:

Qualitative Risk Assessment

Qualitative risk assessment evaluates risks using descriptive, subjective factors instead of numerical data.

Managing Risks

Risk Register

To manage the different types of risks, we can use a Risk Register

Components:

Example:

Risk Heat Map

Take risk severity levels and map visually by colors.

Risk Matrix

Centralized table containing all the risk details.

Prioritizing Risks

The highest priority should be given to risks estimated to high impact and low probability over high probability and low impact value (ISC2 Study Guide, Chapter 1, Module 2).

In qualitative risk analysis, the ‘expected probability of occurrence’ and the ‘frequency of occurrence’ refer to the same thing.

Prioritize:

Risk Tolerance

Likened to the entity’s risk acceptance, risk tolerance varies across organizations and departments.

Risk Appetite

Signifies an organization’s willingness to embrace or retain specific types and levels of risks to fulfill its strategic goals.

Types of risk appetites:

Third-Party Risk Management

Measurement Systems Analysis

Measurement Systems Analysis (MSA) is a quality assurance metric that evaluates the accuracy and reliability of a measurement system or instrument.

Supply Chain Security Risks

Outsourced hardware and software from vendors:

Business Impact Analysis

A Business Impact Analysis (BIA) is a process used to identify and evaluate the effects of disruptions to business operations.

The goal of a BIA is to understand which functions and processes are critical to an organization’s success and how they would be impacted by disruptions, such as natural disasters, cyberattacks, or equipment failures.

To learn more, please see Business Continuity.

Agreement Types

Interconnection Security Agreement

An Interconnection Security Agreement (ISA) outlines the security requirements for two organizations that are connecting their information systems.

Used for:

Basic Contract

In risk management and vendor selection, a well-drafted basic contract is essential for defining the terms of engagement, protecting interests, and setting expectations between parties. It serves as the foundation for the business relationship, ensuring clarity and mutual understanding.

Service Level Agreement

A Service Level Agreement (SLA) is a contract that defines the performance expectations and service standards between a service provider and a customer.

MOU and MOA

Both are types of agreements used in various contexts, providing a basis for collaboration and establishing the foundation for future cooperation. MOAs are typically more structured and legally binding compared to MOUs.

Additionally:

Master Services Agreement

A Master Services Agreement (MSA) provides a standardized set of terms for all projects and services provided over time. It helps streamline interactions and ensure consistency across multiple engagements.

For recurring client relationships, the involved parties can use an MSA instead of drafting up a new contract for every project. These agreement will contain the overarchign terms, and can be supplemented with the individual work orders or a Statement of Work (SOW).

Statement of Work

The Statement of Work (SOW) is a critical document that details the specifics of a project or service engagement, clearly defining the scope, deliverables, and timeline to ensure all parties are aligned.

Non-Disclosure Agreement

A Non-Disclosure Agreement (NDA) is a legally binding contract that requires parties to keep certain information confidential.

Business Partnership Agreement

A Business Partnership Agreement (BPA) is a legally binding document that outlines the terms and conditions of a business relationship between two or more partners.

Risk Monitoring and Reporting

Risk Monitoring

Continuously tracking identified risks, assessing new risks executing response plans, and evaluating their effectiveness during a project’s lifecycle.

Risk Reporting

Process of communicating information about risk management activities, including the results of risk identification, assessment, response, and monitoring.


Back to main page