products:ict:risk_management
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
products:ict:risk_management [2020/10/22 22:13] – wikiadmin | products:ict:risk_management [2023/10/30 17:45] (current) – wikiadmin | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== ICT Risk Management ====== | ||
+ | |||
+ | |||
+ | **IT Risk Identification** | ||
+ | |||
+ | Collect and review information, | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Identify potential threats and vulnerabilities to the organization’s people, processes and technology to enable IT risk analysis. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | |||
+ | Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Identify key stakeholders for IT risk scenarios to help establish accountability. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprisewide risk profile. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | **IT Risk Assessment** | ||
+ | |||
+ | Analyze risk scenarios based on organizational criteria (e.g., organizational structure, policies, standards, technology, architecture, | ||
+ | |||
+ | |||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment. | ||
+ | |||
+ | |||
+ | |||
+ | Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability. | ||
+ | |||
+ | [[https:// | ||
+ | THE THREE LINES OF DEFENSE IN EFFECTIVE RISK MANAGEMENT AND CONTROL]] | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | |||
+ | Communicate the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision making. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | |||
+ | Update the risk register with the results of the risk assessment. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | |||
+ | **Risk Response and Mitigation** | ||
+ | |||
+ | Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Consult with, or assist, risk owners on the development of risk action plans to ensure that plans include key elements (e.g., response, cost, target date). | ||
+ | |||
+ | [[https:// | ||
+ | Risk Management Planning]] | ||
+ | |||
+ | Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Ensure that control ownership is assigned in order to establish clear lines of accountability. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Assist control owners in developing control procedures and documentation to enable efficient and effective control execution. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Update the risk register to reflect changes in risk and management’s risk response. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | Validate that risk responses have been executed according to the risk action plans. | ||
+ | |||
+ | **Risk and Control Monitoring and Reporting** | ||
+ | |||
+ | Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance. | ||
+ | |||
+ | |||
+ | |||
+ | Monitor and analyze key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Review the results of control assessments to determine the effectiveness of the control environment. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||