IT Risk Is Not About IT – It’s About the Business

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next IT Risk Is Not About IT – It’s About the Business-8 Next

Technology is essential in building a foundation for a flexible, but common, data model that supports the definition of organizational entities, as well as libraries of policies, risk, controls and assets that everyone shares. This is what we call achieving ‘a single version of the truth.’ Combined with role-based access that permits users to see only that which they are authorized to see, a governance, risk and compliance (GRC) technology platform consolidates and rationalizes information and processes in a way that single solutions cannot.

Information technology risk teams know well that the scope of IT risks can be very broad – ranging from technical security risk, to IT operations risk, through to operational risk and enterprise risk. IT risk teams typically have deep skills in risk identification and analysis of information technology components, and many are also quite skilled in making recommendations on risk treatment options. But their scope and point of view is typically limited to technology applications and infrastructure. As the enterprise becomes increasingly complex, and extends out with deep interlocks to customer and supplier eco-systems, IT risk teams' core competencies need to evolve.

When IT risk teams are effective, they’ve formed partnerships with other risk stakeholders across the organization – business leaders, the chief risk officer, internal audit, information and physical security teams, business resilience groups and vendor management. They understand how IT is linked up the stack to the business, press to get risk appetites defined, and are able to translate risk appetite into acceptable thresholds that IT operational teams can work with. 

Here are four critical core capabilities, identified by Yo Delmar, vice president of GRC solutions at MetricStream, that IT risk teams need to develop in order to be truly effective in working with the business.  


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.