IT Risk Is Not About IT – It’s About the Business

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Previous Next

Click through for four critical core capabilities IT risk teams need to develop in order to be truly effective in working with the business, as identified by Yo Delmar, vice president of GRC solutions at MetricStream.

Information technology risk teams know well that the scope of IT risks can be very broad – ranging from technical security risk, to IT operations risk, through to operational risk and enterprise risk. IT risk teams typically have deep skills in risk identification and analysis of information technology components, and many are also quite skilled in making recommendations on risk treatment options. But their scope and point of view is typically limited to technology applications and infrastructure. As the enterprise becomes increasingly complex, and extends out with deep interlocks to customer and supplier eco-systems, IT risk teams' core competencies need to evolve.

When IT risk teams are effective, they’ve formed partnerships with other risk stakeholders across the organization – business leaders, the chief risk officer, internal audit, information and physical security teams, business resilience groups and vendor management. They understand how IT is linked up the stack to the business, press to get risk appetites defined, and are able to translate risk appetite into acceptable thresholds that IT operational teams can work with. 

Here are four critical core capabilities, identified by Yo Delmar, vice president of GRC solutions at MetricStream, that IT risk teams need to develop in order to be truly effective in working with the business.  

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Risk9-190x128 Vendor Risk Management: Ten Frequently Asked Questions

As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well. ...  More >>

eCommerce9-290x195 How to Minimize Fraud this Holiday Season

Learn how your organization can improve its approach to fraud prevention and lower costs involved with fraud and ID theft this coming holiday season. ...  More >>

Security68-290x195 Five Common Data Encryption Myths

Data encryption seems to be the logical choice when it comes to implementing a sound security strategy, but there are still skeptics. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date