Good Enough IT Risk Management

Risk assessments must align with business goals

[fa icon="calendar"] Monday, 16 December 2019 / by Jakob Holm Hansen

It is not just a huge help for general management when company risk assessments are based around concrete business goals. Business-based risk assessments also help information security managers to prioritise what scarce resources they have.

German language version Danish language version Norwegian language version


When information security managers undertake risk assessments, they quite often follow a fixed procedure. They base their approach around a range of systems and processes that have at some point been defined as critical. They go through the threat catalogue. If there are any known vulnerabilities in a system, they dive down into the details and develop a concrete threat assessment for that system – even if it doesn't play a central role in the overarching operations of the business.

"This approach has broadly worked well so far. Many vulnerabilities have been identified this way. But instead of assessing everything, our recommendation is that it is only necessary to carry out risk assessments that are directly related to the goals of the business," says Jakob Holm Hansen, CEO of Neupart.

"Instead of assessing everything, our suggestion is that
it is only necessary to carry out
risk assessments
that
are directly related to the goals of the business"

Jakob Holm Hansen, CEO of Neupart

Break down into sub-goals

No matter whether you are a public organisation that provides citizen services or a private company that sells a product, your company management will have defined a strategy in place. This strategy typically consists of business goals, enshrined values or something similar.

"As an information security manager, you need to break each overarching goal down into sub-goals and then carry out threat assessments on the systems and processes that support each sub-goal.

If, for example, a company has an overarching strategy to deliver the best customer service in the country, then the information security manager should assess threats to the communication channels that make it possible for customers to contact the company at all times."

Access to general management

Whenever information security managers carry out risk assessments based on business goals, this can help to strength their collaborative relationship with general management. It is not reasonable to expect general management to understand a technical risk assessment that covers the entire system landscape and all of its infrastructure. But it is easy enough for them to understand a security assessment based on business goals that they themselves have helped to shape.

"For example, it might be the case that a company's growth in the next two-to-three quarters is bound up with the launch of a new product. If the information security manager takes this product launch as their starting point, they can give management a goal-oriented risk assessment of the aspects that interest them the most. They understand very well what it means for the business if something such as a product launch has to be postponed because of IT security challenges."

Use common sense

Jakob Holm Hansen emphasises that information security managers do not need to totally reinvent their working methods in order to start basing their threat assessment work around business goals. It is primarily about flipping the traditional approach on its head.

"You still have to take a position on threats. The only difference is that the priority level is changed. It involves a great deal of common sense in that respect. It's about undertaking risk assessments in areas where the company most stands to benefit. That way you can save resources and streamline your own workflow."

Break the habit

Conducting risk assessments based on business goals may well mean an end to that typical 'what-we-always-do' mentality.

"A lot of risk assessments are repeatedly performed simply because they have always been done. This simply means that somebody once considered certain systems and processes to be critical to the business. But are they still critical?" asks Jakob Holm Hansen, concluding that:

"When you perform risk assessments based on business goals, you automatically put yourself more prominently into play and display an acute understanding of the business. This is a good way to come closer to management decisions."


Neupart's Secure ISMS tool can help you to perform efficient risk assessments. Read more here

 

More about Risk Assessment and Risk Treatment

How to carry out risk assessments (video 22:00)

Get direct access to the video and learn about risk management and how to carry out risk assessments. Neupart's Secure ISMS is used underway to demonstrate how tasks are carried out.

Get instant access here

Free guide on risk management

Download our guidance manual and learn how to base your information security on the actual risks facing your organisation. Just as ISO 27001 prescribes.

The guidance manual is based on risk management standard ISO 27005.

Download it here

Free guide on risk management

 

 

Emner: information security, Risk assessments, risk treatment

Good enough IT risk management

The Neupart blog offers advice and knowledge of effective information security management, security strategies, risk management, compliance with information security standards and other requirements, business continuity planning, ISO2700x, EU Data Protection Regulation, PCI DSS, etc.

Popular Posts