IT Risk Is Not About IT – It’s About the Business

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next IT Risk Is Not About IT – It’s About the Business-5 Next

It’s all about managing risks in the context of what the business is trying to achieve – launch or grow a new product or service line; gain consistency in the rollout to a new geographic region; lead a successful merger or acquisition. We have to make sure risk tolerances are mapped to policies that will ultimately govern the behavior of people, processes and systems. Policies, controls and analytics can be calibrated to feed the right key performance and risk indicators that will help leadership make decisions to avoid, treat or transfer risk efficiently and effectively.

What to do: Press leadership to set risk appetites, and get business leaders to help translate these into thresholds, policies and controls.

Information technology risk teams know well that the scope of IT risks can be very broad – ranging from technical security risk, to IT operations risk, through to operational risk and enterprise risk. IT risk teams typically have deep skills in risk identification and analysis of information technology components, and many are also quite skilled in making recommendations on risk treatment options. But their scope and point of view is typically limited to technology applications and infrastructure. As the enterprise becomes increasingly complex, and extends out with deep interlocks to customer and supplier eco-systems, IT risk teams' core competencies need to evolve.

When IT risk teams are effective, they’ve formed partnerships with other risk stakeholders across the organization – business leaders, the chief risk officer, internal audit, information and physical security teams, business resilience groups and vendor management. They understand how IT is linked up the stack to the business, press to get risk appetites defined, and are able to translate risk appetite into acceptable thresholds that IT operational teams can work with. 

Here are four critical core capabilities, identified by Yo Delmar, vice president of GRC solutions at MetricStream, that IT risk teams need to develop in order to be truly effective in working with the business.  

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.