Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Small Business

    How to Translate IT Risk Management into Competitive Advantage

    Written by

    Patrick Kerans
    Published June 25, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Every company has risk. In fact, risk can and should be construed as a good thing-no risk, no reward. What matters is how quickly a company can accurately identify current and future risk vectors and respond to them. In fact, risk management is becoming an increasingly important facet of how well a company executes, and companies that excel at it have discovered themselves with a newfound competitive advantage.

      Why aren’t more companies “competing on risk?” According to a 2007 McKinsey survey, “many companies design their approach to IT around what they do-not what they could be doing.” The survey goes on to reveal that leading companies approach IT investments as they would a personal finance portfolio-classifying IT purchases as low-risk (stay in the race), medium-risk (win the race), or high-risk (change the rules of the race).

      Another survey, by the IT Policy Compliance Group, found three categories of enterprise IT organizations: “leaders,” which they categorized as having an average of six compliance deficiencies, security-related business disruptions, or losses of sensitive data; the “norm” having an average of 17; and “laggards” averaging 65.

      These surveys indicate that today’s corporations are much more risk-aware than some (such as security vendors) would think, and that despite conflicting opinions about what sort of risk management metrics matter and why, there are benchmarks for measuring how effective a company’s IT risk management efforts are.

      So what distinguishes a leader from a laggard? Leaders are able to create the right mix of people, process and technology to implement clearly defined business processes that enable them to be more resilient amidst changing IT regulations and constantly evolving business requirements.

      While process is only as good as the people and technology behind it, a good process can bring out the best in the people and technology that execute on it. As security organizations continue to adopt a more business oriented role, well thought out processes will play a key role in shaping tomorrow’s risk management leaders. Below is one that’s been adopted by large, heavily regulated companies. It’s no panacea, but it can provide a solid starting point for any company looking to embrace a more risk-aware approach to IT:

      1) Prioritize the environment-In order to effectively manage risk, you need to know what your critical IT assets are-how many servers and applications, who uses and manages them, the type of data processed and stored. Some companies measure the assets’ relative importance to one another in terms of the business processes they support or the liability associated with the data they handle. Although many tools track this information, the trick is organizing it by business unit, geography, data center, product line, or some other groupings enabling analysts to use it on their terms, given how management may view risk or how an auditor may want to view compliance reports.

      Identifying risks…

      2) Identify risks and policies

      There are several ways to identify risks and the policies required to manage them. The first is to identify standard IT operational policy controls used to protect critical information and assets and test to ensure they work. The risk of control failure can be calculated based on knowing how sensitive the protected information is, and how likely the control is to fail. Regulatory requirements often specify controls, but should not be assumed comprehensive for most organizations.

      Another means to identify risks is to look at what others have already done to think through the problem. Organizations such as consultancies Deloitte Touche Tohmatsu and Protiviti have established IT-specific KRIs (key risk indicators) such as:

      • Third-party and system breaches
      • Changes resulting in production system disruptions
      • Unavailability of qualified IT staff

      Prioritizing risk (based on criticality) before policy control testing minimizes the amount of testing and the disruption caused when too many survey questions are posed to busy operations staff. It also provides IT operations with a basis for prioritizing the often complex task of fixing failed controls.

      3) Test controls and identify gaps

      For most organizations, control testing is typically a tedious, expensive process involving project management of questionnaires distributed to IT server and application owners, as well as gathering automated data from vulnerability scanners, security incident logs and network change management systems. From the mass of data gathered, gaps in the infrastructure are identified that require mitigation. Most organizations end up with “test fatigue” if they have no way of identifying what’s critical and what’s not, especially when testing is required for more than one regulation, like Sarbanes-Oxley 404 and PCI. Establishing a common set of critical controls that get tested once for multiple regulations is key to maximizing efficiencies and minimizing “burnout.”

      4) Optimize mitigation

      When hundreds of such control tests are performed, optimizing the work implied by the outcome requires application of risk scoring techniques. Risk scores are determined by asking key questions about the control, such as:

      • How critical, in terms of business continuity or data privacy and protection, is the protected system to the business or to customers, regulators, partners, or shareholders?
      • How much exposure does the protected system have to other systems, such as the Internet or partner systems, and how many users access the system?
      • How likely is this system to fail the control test based on past performance or other information?

      Once this is known, and risk scores are applied, priorities for IT operations can be established which leads to more productive and effective mitigation.

      Report and monitor…

      5) Continuously report and monitor

      How companies, auditors, and regulators structure how reporting is done-what is reported to who, how often, and why, will ultimately distinguish the leaders from the laggards. For example, The Federal Information Security Management Act and industry mandates such as PCI are quickly moving in the direction of determining of compliance as a function of whether proper controls were in place and working at the time of a violation, rather than at the time of the last audit.

      The practical logic of that approach makes a lot of sense in light of the first widely reported (possible) breach of personally identifiable information of by Geeks.com, which occurred despite a Scan Alert. “HackerSafe” certification displayed on its homepage. According to ScanAlert, there were several instances when Geeks.com was in fact out of compliance with their requirements for HackerSafe certification and the seal was revoked, and that it was during one of those instances when the breach most likely occurred. Just goes to show, compliance is a process-an ongoing process-not an event.

      Despite the fact that risk and compliance management leaders reap the benefit of lower costs and higher productivity than their peers, according the IT Policy Compliance Institute, 9 out of 10 firms struggle with high rates of annual compliance deficiencies, business disruptions, data losses and thefts that could be prevented with better implemented IT policy compliance, risk, and governance programs.

      In other words, “leaders” are still few and far between, and there is plenty of room for more. Ironically enough, if you follow the logic presented in these surveys, future leaders are going to be the ones with a high enough risk tolerance to make the people, process, and technology investments required to win the race. Is your company a leader or a laggard? Would it risk competing on risk? Can it afford not to?

      Patrick Kerans is vice president of marketing at Agiliance. His responsibilities include marketing communications, demand creation, analyst and press relations, product strategy, and product and channel marketing.

      Prior to joining Agiliance, Kerans served as head of marketing for Counterpane Internet Security (now BT Counterpane) in the managed security services market. Kerans has held management at Lotus/IBM and executive marketing positions at Altaway, which he co-founded, in the mobile data space. Prior to that, he held managing consultant roles at A.T. Kearney/EDS and Arthur D. Little, Inc.

      Kerans holds a Bachelor of Science degree in Engineering from the University of Massachusetts, Amherst. He can be reached at pkerans@agiliance.com.

      Patrick Kerans
      Patrick Kerans
      Patrick Kerans is vice president of marketing at Agiliance. His responsibilities include marketing communications, demand creation, analyst and press relations, product strategy, and product and channel marketing. Prior to joining Agiliance, Kerans served as head of marketing for Counterpane Internet Security (now BT Counterpane) in the managed security services market. Kerans has held management at Lotus/IBM and executive marketing positions at Altaway, which he co-founded, in the mobile data space. Prior to that, he held managing consultant roles at A.T. Kearney/EDS and Arthur D. Little, Inc.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×