Risk Management
Importance of Risk Management
Information assurance and cybersecurity are key for risk management. The required cybersecurity level is determined by the entity's risk tolerance.
- Assess and evaluate risks, and then implement security controls
- To prioritize risk based on their impact
Managing Risks
Risk Register
To manage the different types of risks, we can use a Risk Register
- One or more risk register per organization
- Centralized list of risks, severities, responsibilities, and mitigations
- Also known as risk log
Components:
-
Risk Owners Individuals or teams responsible for managing specific risks, including monitoring, mitigation, and reporting on risk status.
-
Key Risk Indicators Measurable metrics suggesting when a risk may be increasing or approaching a critical point.
-
Risk Description A summary of a risk, outlining its nature, causes, and potential consequences if it occurs.
-
Risk Impact The potential consequences if risks materialize, usually measured in number of losses.
-
Risk Likelihood The probability that a risk event will occur, often categorized as high, medium, or low based on historical data or expert judgment.
-
Risk Outcome The result or effect after a risk event occurs, which can be positive or negative.
-
Risk Thresholds Predefined limits or levels at which a risk triggers specific actions or responses, indicating when a risk requires attention or mitigation.
-
Risk Level A combined measure of risk likelihood and impact, often used to categorize risks into priority levels for management and response.
-
Cost The financial resources required to manage, mitigate, or transfer a risk, including expenses for controls, insurance, and other risk-reduction measures.
Example:

Risk Heat Map
Take risk severity levels and map visually by colors.

Risk Matrix
Centralized table containing all the risk details.

Prioritizing Risks
The highest priority should be given to risks estimated to high impact and low probability over high probability and low impact value.
- Low frequency of occurrence
- High expected impact
Risk Analysis
Risk analysis is the process of identifying and evaluating potential threats to assets. There are two main types:
-
Qualitative Risk Analysis
- Based on expert judgment, experience, or scoring systems
- Uses categories like high, medium, or low risk
- Helps prioritize risks quickly without needing numerical data
-
Quantitative Risk Analysis
- Based on measurable data and statistical methods
- Calculates risk using numbers like cost, frequency, and impact
- Helps determine the financial effect of risks more precisely
In qualitative risk analysis, the 'expected probability of occurrence' and the 'frequency of occurrence' refer to the same thing.
Risk Tolerance
Likened to the entity's risk acceptance, risk tolerance varies across organizations and departments.
-
Management's Role
- Executives or the Board sets acceptable risk levels.
- Security professionals align risks with management's tolerance.
-
Geographic Influence
- Risk tolerance often dictated by location.
- Example: Volcano-prone areas plan for related risks.
- Calculating downtime likelihood defines risk tolerance.
-
Power Outage Example
- Risks vary by location.
- Low tolerance leads to generator investment.
- Higher tolerance involves multiple generators for increased assurance.
Geographic Dispersion refers to spreading important systems and data across different locations to prevent a single event, like a natural disaster, from causing a total loss. This helps keep the business running smoothly.