IT Risk Management Program Manual
IT Risk Management Program Manual
To use this template, simply replace the text in dark grey with information customized to your organization. When
complete, delete all introductory or example text and convert all remaining text to black prior to distribution.
1
Research Group
Table of Contents
Introduction: How to Use This Template ...................................................................................................................... 1
I. Introduction ........................................................................................................................................................... 4
1.1 Document Version .............................................................................................................................................. 4
1.2 Document Revision History ................................................................................................................................ 4
1.3 Executive Brief ................................................................................................................................................... 5
II. <Insert Organization Name>’s IT Risk Management Program............................................................................. 6
2.1 Program Overview .............................................................................................................................................. 6
2.2 <Insert Organization Name>’s Current IT Risk Management Maturity .............................................................. 7
2.3 Success Factors ................................................................................................................................................. 8
2.4 Goals and Objectives ......................................................................................................................................... 8
2.5 Metrics ................................................................................................................................................................ 9
III. IT risk council Charter .................................................................................................................................... 10
3.1 IT risk council Mandate .................................................................................................................................... 10
3.2 Agenda and Responsibilities ............................................................................................................................ 10
3.3 Meeting Schedule ............................................................................................................................................. 10
3.4 Membership ............................................................................................................................................... 11
3.5 Executive Signatures ................................................................................................................................. 11
IV. Accountabilities and Responsibilities of IT Risk Management ...................................................................... 12
4.1 Accountabilities and Responsibilities of Key Stakeholders .............................................................................. 12
V. Schedule of Activities ..................................................................................................................................... 13
5.1 Identifying Risk Events ..................................................................................................................................... 13
Engage Key Stakeholders .................................................................................................................................. 13
Review Risk Categories...................................................................................................................................... 13
Augment Risk Identification with COBIT 5 Processes ........................................................................................ 14
Responsible Party ............................................................................................................................................... 14
Timing and Frequency ........................................................................................................................................ 14
5.2 Cataloguing Risk Events .................................................................................................................................. 14
Responsible Party ............................................................................................................................................... 14
Timing and Frequency ........................................................................................................................................ 15
5.3 Assessing Risk Severity ................................................................................................................................... 15
Unacceptable Risk Threshold ............................................................................................................................. 15
Probability and Impact Severity Thresholds ....................................................................................................... 15
Proximity Considerations .................................................................................................................................... 16
Frequency Considerations .................................................................................................................................. 16
2
Research Group
Responsible Party ............................................................................................................................................... 16
Timing and Frequency ........................................................................................................................................ 16
5.4 Risk Event Accountabilities and Monitoring Responsibilities ........................................................................... 17
Responsible Party ............................................................................................................................................... 17
Timing and Frequency ........................................................................................................................................ 17
5.5 Selecting Risk Responses................................................................................................................................ 17
Cost-Benefit Analysis (CBA) ............................................................................................................................... 17
Responsible Party ............................................................................................................................................... 18
Timing and Frequency ........................................................................................................................................ 18
5.6 Risk Reporting .................................................................................................................................................. 18
Responsible Party ............................................................................................................................................... 18
Timing and Frequency ........................................................................................................................................ 18
Appendix A: Risk Catalog .......................................................................................................................................... 19
IT Operations Risks ............................................................................................................................................ 19
Hardware Risks .................................................................................................................................................. 20
Software Risks .................................................................................................................................................... 21
Data Risks .......................................................................................................................................................... 22
Vendor Risks ...................................................................................................................................................... 23
Project Risks ....................................................................................................................................................... 24
Personnel Risks .................................................................................................................................................. 25
Disaster and Continuity Risks ............................................................................................................................. 26
Compliance & Security Risks ............................................................................................................................. 27
Appendix B: Risk Event Action Plan .......................................................................................................................... 28
Introduction: How to Use This Template ............................................................................................................ 28
Appendix C: Risk Report Template ........................................................................................................................... 31
Introduction: How to Use This Template ............................................................................................................ 31
Appendix D: Job Description – Chief Risk Officer ..................................................................................................... 37
Appendix E: Risk Management Program Improvement Plan .................................................................................... 39
Introduction: How to Use This Tool .................................................................................................................... 39
3
Research Group
I. Introduction
1.1 Document Version
Document Number IT25
Revision Number 1
4
Research Group
1.3 Executive Brief
The Risk Management Program Manual serves to describe the processes, procedures, and activities that are
necessary to maintain risk governance, identify IT-related business risks, assess risk severity, and determine
appropriate risk responses for <Insert Organization Name>. The program manual and its supporting documents
(see Appendix) will be used to document detailed information regarding key risks and provide appropriate
mechanisms for reporting these risks to the Enterprise Risk Manager (ERM) at <Insert Organization Name>. The
Risk Management Program Manual was developed through the completion of ’s IT Risk Management Program
blueprint.
The Risk Register Tool and Risk Costing Tool will be used to track risks and determine appropriate risk responses,
and the blueprint will walk you through how to effectively employ these tools, as well as exercises to optimize IT
risk management processes. The Program Manual should be updated after completing each phase of the blueprint.
The Risk Management Program Manual will exist as a digital copy and a hard copy, located in <Insert a Central
Location>.
As part of good risk management practices, the Program Manual must be reopened during every meeting of the IT
risk council.
Any changes to the Risk Management Program Manual should be documented in Section 1.2.
5
Research Group
II. <Insert Organization Name>’s IT Risk Management Program
2.1 Program Overview
The intention of the IT risk management program at <Insert Organization Name> is to instill best-practice risk
management activities that allow us to proactively identify, assess, and respond to IT risks. The program formalizes
risk management by encouraging the regular tracking of risks, assigning responsibility to individuals for monitoring
and managing risks instead of leaving it to chance, and establishing risk responses to identified threats and
vulnerabilities.
In addition, the risk management program at <Insert Organization Name> aims to foster further communication
between IT and business stakeholders, and within the IT department itself. Central to <Insert Organization
Name>’s IT Risk Management Framework is the continuous monitoring and communication of IT risk with
appropriate business stakeholders.
<Insert Organization Name>’s IT Risk Management Framework is composed of four major pillars that govern risk
management practices.
1) Risk Governance – Ensure that IT’s risk management practices are aligned to organizational risk
management standards and that business stakeholders are aware of and accountable for severe IT
risks.
2) Risk Identification – Ensure that all IT risks are identified through comprehensive stakeholder
participation and the use of the top-down risk identification methodology.
3) Risk Assessment – Ensure that all IT risks are evaluated based on probability, impact, and proximity
to understand the severity of IT’s risk portfolio. Prioritize risks based on their respective severity.
4) Risk Response – Ensure that key risks are responded to appropriately. Cost-benefit analysis is used
to determine which risk response to implement.
6
Research Group
2.2 <Insert Organization Name>’s Current IT Risk Management Maturity
Populate the table below with maturity levels generated in Activity 1.2.1.
Risk Management
Current Process Practices Maturity Level
Process
Risk Governance 1. A dedicated committee or council exists to consider IT risk. Current: Optimized
2. The council meets at regular intervals.
3. Risk events are owned and monitored by specific individuals.
4. Business stakeholders participate in council meetings and
are always consulted.
5. Senior leadership signs off on all action plans for non-
negligible IT risk.
6. Accountability for executing the risk management program is
held by the CIO.
7. Accountability for IT risk decisions is held by the CEO.
Risk Identification 1. IT possesses a risk register that is updated to reflect IT’s Current: Optimized
overall risk portfolio.
2. Risk identification exercises are conducted bi-annually.
3. The IT risk list is developed and updated collaboratively with
key business stakeholders.
4. Risk events are brainstormed using high-level IT risk
categories and then refined using COBIT 5 IT processes.
Risk Assessment 1. Formal risk assessment exercises are conducted bi-annually. Current: Optimized
2. Unacceptable risk thresholds are dictated by the senior
leadership team.
3. All identified risk events are assigned a severity level based
on probability and impact assessments.
4. Top risks are reassessed for expected cost.
5. Key business stakeholders participate in risk assessment
exercises.
6. Alternative risk assessment methodologies are employed to
create accurate expected cost values.
Risk Response 1. Response options are brainstormed for all risks exceeding Current: Optimized
thresholds for acceptable risk.
2. Each risk event is reassessed for residual risk.
3. Residual expected cost values are determined for top risks.
4. Costs and benefits for each response are analyzed over
multiple years.
5. Responses are selected based on cost-benefit analysis and
IT’s capabilities to implement the projects.
6. All risk response recommendations are presented formally to
the senior leadership team for approval.
Risk Monitoring & 1. Risk owners are assigned to each risk event. Current: Optimized
Reporting 2. Key risk indicators (KRIs) and thresholds are developed to
track changes in risk severity.
3. Protocols have been established to escalate risks when
thresholds have been breached.
4. Risks are reported according to an enforced reporting
schedule.
5. KRIs, thresholds, and reporting schedules have been
approved by senior leadership.
7
Research Group
2.3 Success Factors
The success of the IT Risk Management Program at <Insert Organization Name> is dependent upon the IT risk
council’s ability to align and communicate with the business’s core risk management function. Success factors for
<Insert Organization Name>’s Risk Management Program are therefore driven by the business’s awareness and
support of the IT Risk Management Program. <Insert Organization Name>’s Risk Management success factors are
as follows:
Ensure that <Insert Organization Identify and assess all risks that [Notes]
Name>’s exposure to risks that affect expose the organization.
the continuity of our customer value Mitigate severe risks.
proposition is minimized. Monitor key risks that have potential to
become severe.
8
Research Group
Goal Objectives/Initiatives Additional Notes
Ensure that information and data are Limit frequency and severity of security [Notes]
secured within the organization. breaches.
Ensure that IT services are delivered Identify and mitigate critical risks that [Notes]
in line with business requirements. may disrupt business-critical IT
services.
Ensure IT projects are completed on- Limit the impact of unforeseen risks [Notes]
time, within scope, and on-budget. associated with over-budget projects.
2.5 Metrics
The Risk Management Council has developed the following metrics to measure the success of <Insert
Organization Name>’s IT Risk Management Program. Revise the metrics as needed and insert your own SMART
metrics developed in Activity 1.2.5.
9
Research Group
III. IT risk council Charter
The IT risk council serves as a formalized task force that is responsible for ensuring that the risk management
program is initiated, optimized, and maintained through regular meetings.
The IT Risk Management Program is responsible for integrating risk management into regular IT practices. <Insert
Organization Name>’s IT risk council integrates IT Risk Management into IT’s agenda and priorities.
1. Provide risk management leadership for IT through the alignment of IT strategic objectives and processes
with enterprise strategic objectives and processes.
2. Prioritize all IT risk exposures and thresholds, and resolve resource allocation issues based on risk
prioritization.
3. Ensure optimal risk management through measurement of key success metrics.
4. Ensure open communication between the IT department and other functional units of <Insert Organization
Name> so as to promote collaborative risk management.
The IT risk council is not responsible in any way for the IT department’s operating budget, IT department staff, or
any other aspect of day-to-day IT operations.
10
Research Group
3.4 Membership
All permanent members of the IT risk council should be very familiar with the IT department’s policies, procedures,
and practices. Additionally, all permanent members should have the authority to make decisions, and take actions
on behalf of the business unit they represent.
If any member is unable to attend the majority of IT risk council meetings, then the Council Chair will designate a
replacement. If the IT risk council Chair is unable to attend the majority of IT risk council meetings, then the Council
itself will designate a replacement.
11
Research Group
IV. Accountabilities and Responsibilities of IT Risk Management
4.1 Accountabilities and Responsibilities of Key Stakeholders
The success of the IT Risk Management program relies on clear articulation of risk management accountabilities
and responsibilities. The IT risk council will be responsible or accountable for the bulk of activities but success will
also be dependent on buy-in and endorsement by external stakeholders beyond the IT risk council. These
stakeholders must be aware of the IT Risk Management Program and are often consulted or informed about
important risk management activities.
Revise the RACI chart below as needed, and insert your own accountabilities and responsibilities developed in
Activity 1.2.8.
Cost- Risk
Stakeholder Risk Risk Risk Identify Decision-
Stakeholder Benefit Monitoring
Coordination Identification Thresholds Assessment Responses Making
Analysis
ITRC A R I R R R A C
ERM C I C I I I I C
CIO I A A A A A I R
CRO I R C I R
CFO I R C I R
CEO I R C I A
Business I C C C
Units
IT I I I I I I R C
PMO C C C
Legend:
R – Responsible
A – Accountable
C – Consulted
I – Informed
12
Research Group
V. Schedule of Activities
The IT Risk Management Program is made up of a number of separate but mutually reinforcing processes – some
of which are conducted periodically, and others that are ongoing throughout the year. The following schedule
outlines the timing and frequency for IT risk management processes, as well as their specific activities and tasks.
1. IT Operations Risks
a. Enterprise Architecture
b. Technology Evaluation and Selection
c. Capacity Planning
d. Operation Errors
2. Hardware Risks
a. Hardware Implementation Errors
b. Hardware Configuration Errors
c. Hardware Maintenance Errors
d. Hardware Performance
e. Hardware Theft
f. Hardware Damage/Destruction
13
Research Group
g. Hardware Obsolescence
3. Software Risks
a. Software Implementation Errors
b. Software Configuration Errors
c. Software Maintenance Errors
d. Software Performance
e. Software Obsolescence
4. Data Risks
a. Data Theft
b. Data Integrity (Damage/Destruction)
5. Vendor Relation Risks
a. Vendor Selection
b. Vendor Management
c. Contract Termination
6. Project Risks
a. Project Scoping
b. Project Quality
c. Project Time Over-Runs
d. Project Cost Over-Runs
7. Personnel Risks
a. IT Staffing
b. IT Skills and Experience
8. Disaster and Continuity Risks
a. Acts of Nature
b. Utility Performance
c. Industrial Actions
d. System Failure
9. Compliance & Security Risks
a. Regulatory Compliance
b. Malware
c. Externally Originated Attack
d. Internally Originated Attack
Responsible Party
Risk events will be identified by the IT risk council.
Responsible Party
Risk events will be documented and tracked in the Risk Register Tool by the IT risk council.
14
Research Group
Timing and Frequency
Risk events will be cataloged on an <Insert Frequency> basis and realized risk events will be documented as they
occur.
A Risk Severity Level Assessment is conducted by creating scales for risk probability and financial impact, which
inform an overall severity rating. Expected Cost Assessment calculates precise expected cost values, reflecting
more specific estimates for probability and impact. Expected cost is useful for illustrating the financial severity of
key risks to the business. These values are calculated using the Risk Costing Tool.
Level 1 – Negligible < $10,000; Internal IT stakeholders aware of risk event occurrence
Level 2 – Very Low $10,001 – $25,000; IT directors aware of risk event occurrence
Level 4 – Moderately Low $50,001 – $100,000; Business customers aware of risk event occurrence
Level 5 – Moderate $100,001 – 200,000; Business executives aware of risk event occurrence
Level 6 – Moderately High $200,001 – $350,000; Board of directors aware of risk event occurrence
Level 7 – High $350,001 – $500,000; External customers aware of risk event occurrence
Level 8 – Very High $500,000 – $1,000,000; Media aware of risk event occurrence
Level 9 – Extreme > $1,000,000; Regulatory body aware and investigating risk event
15
Research Group
The IT risk council uses the probability scale to assess the likelihood that IT risk events will occur over the course
of the following year:
Occurrence Criteria
Probability Level
(Classification; probability of risk event within one year)
Level 1 – Negligible Negligible; <5%
Proximity Considerations
The severity of a risk event can fluctuate over time. This characteristic of risk is called risk proximity. These
fluctuations are often unpredictable; however, when possible, information about how time will impact the risk will be
documented in the Risk Register Tool.
Frequency Considerations
A risk event may be expected to occur more than once within the specified time frame. Frequency is reflected in the
financial impact of the risk event. This is accounted for by multiplying the number of expected occurrences by the
expected financial impact of the risk event.
Responsible Party
The organization’s threshold for (un)acceptable IT risk is determined or approved by the senior leadership team.
Probability and impact scales are determined by the IT risk council, and then transferred to the Risk Register Tool.
High-severity risks are assessed for expected cost by the IT risk council using the Risk Costing Tool.
16
Research Group
5.4 Risk Event Accountabilities and Monitoring Responsibilities
Every risk event in the Risk Register Tool must be assigned to a member of the IT risk council who is responsible
for monitoring the risk event’s severity and reporting changes at ITRC (IT risk council) meetings. Risk owners are
selected based on their:
Familiarity with the process, project, or IT function related to the risk event.
Ability to access the necessary data to monitor and measure key risk indicators (KRIs).
• Monitor the risk event for changes in probability of occurrence and/or probable impact
• Monitor changes in the market and external environment that may alter the severity of the risk event
• Monitor changes of closely related risks that may have interdependencies
• Develop and use KRIs to measure changes in risk severity
• Regularly report changes in risk severity to the IT risk council
• If necessary, escalate the risk to other IT risk council personnel or senior management for reassessment
• Monitor risk severity levels for risk events after a risk response project is implemented
Severe risk events that exceed the (un)acceptable risk threshold must be closely monitored and regularly reported
on. Use ’s Risk Event Action Plan (Appendix B) to ensure that changes in risk severity are detected and reported.
Responsible Party
Risk Accountability will be assigned by the IT risk council.
1. Avoidance – Risk avoidance involves taking evasive maneuvers away from the risk event. Risk avoidance
targets risk probability, decreasing the likelihood of the risk event occurring.
2. Mitigation – Risk mitigation actions are risk responses that reduce the probability and impact of the risk
event. Risk mitigation actions can either be to implement new controls or enhance existing ones.
3. Transfer – Risk transfer is the exchange of uncertain future costs for fixed present costs. Often, the
uncertain future cost of an IT risk event can be transferred to a third-party insurer who assumes the risk in
exchange for insurance premiums.
4. Acceptance – Accepting a risk means absorbing the expected cost of a risk event. It is a conscious and
deliberate decision to retain the threat.
17
Research Group
Responsible Party
Risk responses will be generated and assessed by the risk owner and presented to the IT risk council for further
review.
Responsible Party
The risk report will be completed by the IT risk council. Specific reports on key risks will be completed by the risk
owner using personal knowledge and information documented in the Risk Event Action Plan.
Timing and Frequency
Risk reports will be completed on an <Insert Frequency> basis, as mandated by the senior leadership team.
18
Research Group
Appendix A: Risk Catalog
This risk catalog is provided as a guide to stimulate the process of developing a custom risk catalog appropriate to
an individual enterprise. This risk catalog is structured according to risk scenarios and risk categories and provides
some examples of appropriate risks in each but under no circumstances is it to be considered a complete risk
catalog since definitions of risk can be variable amongst different organizations.
IT Operations Risks
Enterprise Architecture
Listed risks are generic in nature; individual risk events will apply to each enterprise architecture event.
An enterprise architecture is improperly defined.
An enterprise architecture is improperly maintained.
Correlation of systems implementations with defined architecture is improperly tracked.
Systems are implemented that do not correlate with the defined enterprise architecture.
Technology Evaluation and Selection
Listed risks are generic in nature; individual risk events will apply to each technology evaluation and selection
event.
System use case is improperly defined.
Systems are improperly specified to meet defined use case.
Systems are improperly evaluated to demonstrate ability to meet defined use case.
Systems are improperly selected to meet the defined use case.
Capacity Planning
Listed risks are generic in nature; individual risk events will apply to each capacity planning event.
Systems are deployed with insufficient capacity to meet defined use case.
Systems are deployed with insufficient capacity to meet defined use case life.
Operations Errors
Listed risks are generic in nature; individual risk events will apply to each operations error event.
Scheduled jobs/processes are not defined.
Scheduled jobs/processes are defined insufficiently/inappropriately.
Scheduled jobs/processes are not revised as functional requirements are revised.
Scheduled jobs/processes fail to run.
Exceptional jobs/processes are not defined.
Exceptional jobs/processes are defined insufficiently/inappropriately.
Exceptional jobs/processes are not revised as functional requirements are revised.
Exceptional jobs/processes fail to run.
19
Research Group
Hardware Risks
Hardware Implementation Errors
Listed risks are generic in nature; individual risk events will apply to each hardware implementation event.
Hardware implementation requirements are improperly defined.
Systems deliver degraded functionality because hardware is implemented incorrectly.
Systems fail completely because hardware is implemented incorrectly.
Hardware Configuration Errors
Listed risks are generic in nature; individual risk events will apply to each hardware configuration event.
Hardware configuration requirements are improperly defined.
Systems deliver degraded functionality because hardware is configured incorrectly.
Systems fail completely because hardware is configured incorrectly.
Hardware Maintenance Errors
Listed risks are generic in nature; individual risk events will apply to each hardware maintenance event.
Hardware maintenance requirements are improperly defined.
Systems deliver degraded functionality because hardware is maintained incorrectly.
Systems fail completely because hardware is maintained incorrectly.
Hardware Performance
Listed risks are generic in nature; individual risk events will apply to each hardware performance event.
Hardware performance requirements are improperly defined.
Systems deliver degraded functionality because hardware fails to perform as expected/required.
Systems fail completely because hardware fails to perform as expected/required.
Hardware Theft
Listed risks are generic in nature; individual risk events will apply to each hardware theft event.
Systems deliver degraded functionality because hardware has been stolen.
Systems fail completely because hardware has been stolen.
Hardware Damage/Destruction
Listed risks are generic in nature; individual risk events will apply to each hardware damage/destruction event.
Systems deliver degraded functionality because hardware has been intentionally damaged/destroyed.
Systems deliver degraded functionality because hardware has been inadvertently damaged/destroyed.
Systems fail completely because hardware has been intentionally damaged/destroyed.
Systems fail completely because hardware has been inadvertently damaged/destroyed.
Hardware Obsolescence
Listed risks are generic in nature; individual risk events will apply to each hardware obsolescence event.
Systems deliver degraded functionality because hardware has become obsolete.
Systems fail because component hardware has become obsolete.
20
Research Group
Software Risks
Software Implementation Errors
Listed risks are generic in nature; individual risk events will apply to each software implementation event.
Software implementation requirements are improperly defined.
Systems deliver degraded functionality because software is implemented incorrectly.
Systems fail completely because software is implemented incorrectly.
Software Configuration Errors
Listed risks are generic in nature; individual risk events will apply to each software configuration event.
Software configuration requirements are improperly defined.
Systems deliver degraded functionality because software is configured incorrectly.
Systems fail completely because software is configured incorrectly.
Software Maintenance Errors
Listed risks are generic in nature; individual risk events will apply to each software maintenance event.
Software maintenance requirements are improperly defined.
Systems deliver degraded functionality because software is maintained incorrectly.
Systems fail completely because software is maintained incorrectly.
Software Performance
Listed risks are generic in nature; individual risk events will apply to each software performance event.
Software performance requirements are improperly defined.
Systems deliver degraded functionality because software fails to perform as expected/required.
Systems fail completely because software fails to perform as expected/required.
Software Obsolescence
Listed risks are generic in nature; individual risk events will apply to each software obsolescence event.
Systems deliver degraded functionality because software has become obsolete.
Systems fail because component software has become obsolete.
21
Research Group
Data Risks
Data Theft
Listed risks are generic in nature; individual risk events will apply to each data theft event.
Systems deliver degraded functionality because data has been intentionally stolen.
Systems deliver degraded functionality because data has been inadvertently lost.
Systems fail completely because data has been intentionally stolen.
Systems fail completely because data has been inadvertently lost.
Confidentiality is breached because data has been intentionally stolen.
Confidentiality is breached because data has been inadvertently lost.
Data Integrity (Damage/Destruction)
Listed risks are generic in nature; individual risk events will apply to each hardware damage/destruction event.
Systems deliver degraded functionality because data has been intentionally stolen.
Systems deliver degraded functionality because data has been inadvertently damaged/destroyed.
Systems fail completely because data has been intentionally damaged/destroyed.
Systems fail completely because data has been inadvertently damaged/destroyed.
22
Research Group
Vendor Risks
Vendor Selection
Listed risks are generic in nature; individual risk events will apply to each vendor selection event.
Use cases against which vendors must execute are improperly defined.
Vendors are improperly evaluated to demonstrate ability to meet defined use case.
Vendors are improperly selected to meet the defined use case.
Vendor Management
Listed risks are generic in nature; individual risk events will apply to each vendor management event.
Vendor performance requirements are improperly defined.
Vendor performance against defined performance requirements is improperly tracked.
Vendors fail to meet defined performance requirements.
Consequences for failed vendor performance are improperly defined.
Consequences for failed vendor performance are improperly applied.
Contract Termination
Listed risks are generic in nature; individual risk events will apply to each contract termination event.
Contract termination trigger events are improperly defined.
Contract termination processes are improperly defined.
Contract termination processes are improperly executed.
23
Research Group
Project Risks
Project Scoping
Listed risks are generic in nature; individual risk events will apply to each project scoping event.
Project requirements/specifications are improperly defined.
Projects are improperly scoped to meet defined requirements/specifications.
Project scope is insufficiently controlled to deliver only defined requirements/specifications.
Project Quality
Listed risks are generic in nature; individual risk events will apply to each project quality event.
Projects fail to meet original project requirements/specifications.
Projects fail to meet revised project requirements/specifications.
Project Time Over-Runs
Listed risks are generic in nature; individual risk events will apply to each project time over-run event.
Projects fail to complete within original time estimates.
Projects fail to complete within revised time estimates.
Project Cost Over-Runs
Listed risks are generic in nature; individual risk events will apply to each project cost over-run event.
Projects fail to complete within original budget estimates.
Projects fail to complete within revised budget estimates.
24
Research Group
Personnel Risks
IT Staffing
Listed risks are generic in nature; individual risk events will apply to each IT staffing event.
IT roles and responsibilities for IT staff have been improperly defined.
IT organization/management structure is improperly defined.
IT staff are insufficient to meet defined IT roles and responsibilities.
IT roles and responsibilities are being executed by non-IT staff.
IT roles and responsibilities are being executed by alternate IT staff.
IT Skills and Experience
Listed risks are generic in nature; individual risk events will apply to each IT skills and experience event.
IT staff do not have sufficient skills to meet defined roles and responsibilities.
IT staff do not have sufficient experience to meet defined roles and responsibilities.
25
Research Group
Disaster and Continuity Risks
Acts of Nature
Listed risks are generic in nature; individual risk events will apply to each act of nature event.
Organization experiences a flood.
Organization experiences a fire.
Organization experiences an explosion.
Organization experiences an earthquake.
Organization experiences a tsunami.
Organization experiences a tornado.
Organization experiences a hurricane.
Organization experiences a catastrophic impact.
Organization is exposed to a radioactive agent.
Organization is exposed to a chemical agent.
Organization is exposed to a biological agent.
Utility Performance
Listed risks are generic in nature; individual risk events will apply to each utility performance event.
Organization is impacted by degradation/loss of voice telecommunications connectivity.
Organization is impacted by degradation/loss of data telecommunication connectivity.
Organization is impacted by degradation/loss of electrical power delivery.
Organization is impacted by degradation/loss of heating energy delivery.
Organization is impacted by degradation/loss of water delivery.
Industrial Action
Listed risks are generic in nature; individual risk events will apply to each industrial action event.
Organization is impacted by industrial action on the part of its employees.
Organization is impacted by industrial action on the part of employees of a third party.
System Failure
Listed risks are generic in nature; individual risk events will apply to each system failure event.
Organization is impacted by degradation/loss of system functionality.
26
Research Group
Compliance & Security Risks
Regulatory Compliance
Listed risks are generic in nature; individual risk events will apply to each regulatory compliance event.
Organization fails to meet the specified requirements of an internal audit.
Organization fails to meet the specified requirements of an external audit.
Organization fails to meet a compliance requirement mandated by a third party.
Malware
Listed risks are generic in nature; individual risk events will apply to each malware event.
Organization experiences a malware incident.
Externally Originated Attack
Listed risks are generic in nature; individual risk events will apply to each external attack event.
Organization experiences a spam incident.
Organization experiences a phishing incident.
Organization experiences a wired network penetration/breach incident.
Organization experiences a wireless network penetration/breach incident.
Organization experiences a social engineering incident.
Internally Originated Attack
Listed risks are generic in nature; individual risk events will apply to each internal attack event.
Organization experiences an abuse of privileges incident.
Organization experiences an elevation of privileges incident.
27
Research Group
Appendix B: Risk Event Action Plan
Introduction: How to Use This Template
This template will help you establish and track accountability within your department and determine next steps for
managing IT risk. This form is used for all high-priority risk events.
Use Table 1 to list the risk event, details, owner, severity, and the monitoring and reporting schedule for the risk
event.
Use Table 2 to indicate the individual(s) accountable for monitoring the event, and the key risk indicators (KRIs)
used to monitor it.
Use Table 3 to track information regarding the organization’s response to the risk, including the project manager,
residual risk severity, and any other important details.
Obtain sign off from senior leadership at the bottom of the form to ensure that the business is aware of the
monitoring responsibilities and risk responses for each key risk.
Delete these guidelines prior to using the form.
Introduction
Risk management is an important part of our overarching IT strategy to support business objectives and drive value
for the business.
The purpose of this form is to establish and track accountability for managing and controlling specific risk events
impacting the organization. This information is to be collected in the tables below, and acted upon accordingly.
This information will be reviewed and signed off <Insert Frequency> or as otherwise indicated by senior
management.
28
Research Group
Table 2: Risk Event Accountabilities and Key Risk Indicators
Bob Smith,
Monitor stock
Security Financial health Stock price Falls below $X CIO
prices
Manager
Two or more
Bob Smith, Potential for
Indication from the Intel from vendor vendor staff
Security merger or CIO
vendor reps predicting
Manager acquisition
acquisition
Consult with
Bob Smith, Number of strategic Fewer than two
Dependence on
Security alternative sourcing/vendor alternative CIO
vendor
Manager vendors identified management vendors
personnel
Consult with
Bob Smith, Estimated cost to strategic
Dependence on
Security transition to new sourcing/vendor Greater than $X CIO
vendor
Manager vendor management
personnel
Risk Owner Bob Smith, Security Risk Reponses Project Alison Tim, Security
Manager Manager Analyst
29
Research Group
Residual Risk Severity $20,000
Executive Signatures
By signing below, you indicate that you:
a) Are aware of the above IT risk and its potential impact on business objectives.
b) Support the risk assessment conducted by the IT risk council.
c) Support the plan of action and monitoring responsibilities proposed by the IT risk council.
30
Research Group
Appendix C: Risk Report Template
Introduction: How to Use This Template
This template is designed to help you communicate the results of recent risk assessments to the senior leadership
team, and provides a summary of important IT risk management developments. The template provides an
executive summary of the risk assessment, recommendations from the IT risk council to address high-priority risks,
and summarizes funding requests for risk response actions.
Use the table in the Risk Identification section below to list the number of risk events under each major IT risk
category. Augment the presentation by inserting risk distribution graphics from the dashboards tab of the Risk
Register Tool.
Insert the “Risk Response Actions” graphic from the dashboards tab of the Risk Register Tool into the Risk
Assessment section of this report. Next, list high-priority risk events that must be reported to senior leadership.
Use the “Subsequent Risk Analysis” section of this document to demonstrate the expected costs of each risk event
and evaluated risk responses as calculated in the Risk Costing Tool. Provide recommendations to describe which
risk response is necessary, and use the expected costs, alternative risk response options, and five-year expected
costs to support your recommendations. Obtain sign-off from the senior leadership team. Copy and paste the
“Subsequent Risk Analysis” as needed to evaluate all high-priority risk events.
Delete these guidelines prior to using the form.
Executive Brief
On <Insert Date Here>, the IT risk council undertook its annual risk review. The IT risk council completed risk
identification and risk assessment exercises, and built risk responses for key risks that were above the
organizational unacceptable risk threshold. This risk report documents the results of the annual review as well as
numerous risk response mitigation actions for each risk event, and the IT risk council’s recommendations to
mitigate key risk events. The risk report was developed through the completion of ’s Build a Business-Driven IT
Risk Management Program blueprint.
The Risk Register Tool and Risk Costing Tool were used to track risks and determine appropriate risk responses.
IT Operations Risk 7
Hardware Risk 0
Software Risk 1
IT Project Risk 1
31
Research Group
IT Personnel Risk 1
Data Risk 1
IT Vendor Risk 0
2
1 1 1 1
0 0 0 0
0
IT Hardware Software IT Project IT Personnel Data Risk IT Vendor Diaster & Compliance
Operations Risk Risk Risk Risk Risk Continuity & Security
Risk Risk Risk
Risk Assessment
The IT risk council evaluated the severity of each IT risk event by assessing the probability of occurrence and
impact. The IT risk council evaluated probability and impact using a nine-scale categorization scale:
32
Research Group
Risk Severity Distribution
4
2 2 2
2
1 1
0 0 0
0
Negligible Very Low Low Moderately Moderate Moderately High Very High Extreme
Low High
Risk Responses
The IT risk council determined the necessary risk response for each identified risk event. There were four courses
of action to describe the most appropriate risk response:
0 0 0
0
Accept Risk Defer/Avoid Risk Mitigate Risk Transfer/Insure Risk
Numerous key risks require additional risk response analysis by executive stakeholders. These risk events and
their subsequent individual risk response analyses will be presented in the following section. However, key risk
events under consideration for further analysis are as follows:
33
Research Group
Risk Number Risk Events
Root Cause
Existing Controls
34
Research Group
Risk Response #1
Risk Response #2
Risk Response #3
Risk Response #4
35
Research Group
Supporting Graphics
$21.250
$20.000
Total Expected Cost ($)
$15.000 $14.525
$15.000
$12.500
$10.000
$5.000
$-
Risk Response #1 Risk Response #2 Risk Response #3 Risk Response #4
Recommendations
The above graph represents the annual expected cost of each risk response under consideration. Although
implementing a comprehensive spam firewall for all user accounts has a high initial capital expense, it reduces the
probability of occurrence to nothing. Therefore, Risk Response #4 is the recommendation of the IT risk council.
This project will cost approximately $12,000 to implement and thus, the IT risk council is requesting funding from
executive leadership to mitigate this risk.
Executive Signatures
Selected Risk Response: _____________________________________________________________________
36
Research Group
Appendix D: Job Description – Chief Risk Officer
Title
Chief Risk Officer
Description
The Chief Risk Officer’s role is to directly assess and holistically manage all aspects of risk brought to bear on the
enterprise by IT security and legislative/regulatory compliance issues. The purview of this role includes risk as it
manifests in the areas of technology, operations, and strategy. Achievement of balance between IT security
concerns and compliance mandates is a primary objective of this role. The ability to make clear decisions under
pressure is required.
Responsibilities
Strategy & Planning
Work with the executive and business managers to align the IT organization with business unit security and
compliance needs.
Develop and institute security and compliance goals and objectives.
Create and enforce security and compliance policies and standards.
Establish guiding principles for flexible, yet holistic, compliance management.
Review proposed projects to identify potential risks.
Classify and valuate enterprise data assets.
Project and track costs of risk management initiatives.
Create dedicated security and compliance roles with segregation of duties as a fundamental factor.
Identify and deploy standard risk assessment models or frameworks.
Select and deploy appropriate best practices governance frameworks, such as COBIT.
Create and communicate strategies for risk mitigation.
Operational Management
Track and measure the enterprise’s risk posture.
Review day-to-day management of IT security operations.
Oversee automation of internal controls and centralize logging and reporting.
Manage securing of all platforms and centralize security event management.
Liaise between internal and external audit teams.
Schedule and launch periodic audit reviews.
Plan and oversee risk mitigation and remediation projects.
Develop and deliver risk awareness training for key staff and stakeholders.
37
Research Group
Position Requirements
Formal Education & Certification
University degree in the field of law, computer science, or business administration, as well as […] years of
equivalent work experience.
Certifications in CISSP, CISA, CISM, or […].
Personal Attributes
Proven leadership and management skills.
Highest levels of personal and professional integrity.
Superior analytical and problem-solving abilities.
Ability to effectively prioritize and execute tasks in a high-pressure environment.
Proven experience in interfacing with executive teams, business management, and external firms.
Excellent written, oral, and interpersonal communication skills.
Ability to conduct research into existing and emerging security and compliance issues as required.
Ability to present ideas in both business-friendly and IT-friendly language.
Highly self-motivated and directed.
Keen attention to detail.
Team-oriented and skilled in working within a collaborative environment.
Work Conditions
On-call availability and periodic overtime to meet project deadlines.
[…]% travel required.
Sitting for extended periods of time.
Dexterity of hands and fingers to operate a computer keyboard, mouse, and other computer components.
38
Research Group
Appendix E: Risk Management Program Improvement Plan
Introduction: How to Use This Template
This template will help you jumpstart operational improvements to the IT risk management program based on the
challenges and successes of the program since the previous assessment period. It is intended to establish
accountability for each initiative as well as a timeline of completion. Tasks within each initiative should be reported
to the IT risk council as necessary. The improvement plan should also be communicated with the senior leadership
team through the IT risk management executive brief to demonstrate continuous commitment to risk management
enhancement.
Use the improvement plan to document challenges faced by the risk management program since the last
assessment period. Document initiatives generated and assign the liable action owner and the expected time frame
for completion.
Document your IT risk management program’s successes and accomplishments in the subsequent section.
Provide evidence to support each statement.
Obtain sign-off from senior leadership at the bottom of the form to ensure that the business is aware of the
monitoring and risk responses of each key risk.
Delete these guidelines prior to using the form.
Executive Brief
On <Insert Date Here>, the IT risk council undertook its <Insert Periodic Timeline> IT risk management program
review. The IT risk council completed a series of exercises to identify the successes and challenges of the IT risk
management program since the previous assessment period. The IT risk council built initiatives to mitigate key
operational challenges that were faced by the program. This risk management program improvement plan
documents the results of the <Insert Periodic Timeline> review as well as numerous successes and
accomplishments that the IT risk program capitalized on. The risk management program improvement plan was
developed through the completion of ’s Conduct a Regular Health Check for the IT Risk Management Strategy
blueprint.
Improvement Plan
The IT risk council does not have authority to Determine the correct escalation Apr. 30th 2016
act on all risk response actions. pathways for decision-making.
Some risk council members were not actively Implement performance metrics Apr. 30th 2016
involved in re-assessments. for risk council members.
The IT risk council did not have the expertise Select a member of the vendor Apr. 30th 2016
to identify vendor risks. management team to participate
in the IT risk council.
Identification of risk events does not follow a Methodologies will be reviewed Apr. 30th 2016
particular framework; therefore, risks were and internalized into our
potentially missed. program manual.
39
Research Group
Challenge Initiative Action Time Frame
Owner
Risk management activities are only Quarterly IT risk council July 31st 2016
executed once a year; risks identified meetings with a specific agenda
throughout the year are not addressed in a are to be scheduled.
timely manner.
No deadlines or action owners assigned for Project managers and timelines Sep. 30th 2016
mitigation actions. to be determined for all risk
responses.
Specific risk actions were not identified for all Risk thresholds are to be set for Sep. 31th 2016
risk events. determining when risk
responses are necessary.
The Risk Register Tool was not flexible and it Procure a new risk management Nov. 30th 2016
was difficult to use. tracking tool.
Internal IT risk management is frequently Generate a regular newsletter Dec. 15th 2016
viewed as an unnecessary responsibility and communicating success of the
as irrelevant. risk management program.
The leadership team is not engaged nor have Host a formal risk management Dec. 31st 2016
they bought into risk management activities. education session through the IT
risk management program.
40
Research Group
Successes and Accomplishments
Since the previous assessment period, the IT risk management program has had many successes and
accomplishments:
1. Risk management processes have been strictly followed as documented.
a. Risk management activities were documented in our risk management program manual.
2. The IT risk landscape is adequately covered.
a. No new risks have been identified.
3. Risks are tracked year over year.
a. An annual risk assessment takes place.
4. Risk severity ratings are tracked year over year.
a. Key risk events were monitored by independent risk owners.
5. <Insert number here> projects have been undertaken to mitigate IT’s severest risks.
a. E.g. data is backed up in the cloud system; competitors lost data when it was breached.
Executive Signatures
41
Research Group