5 Core Steps in the Risk Management Process
5 Core Steps in the Risk Management Process
5 Core Steps in the Risk Management Process
com/searchcio/feature/Risk-management-process-What-are-the-5-steps
By
Risk represents any kind of uncertainty that can affect an organization's ability to
achieve its business objectives. There are many forms of business risk, including
ones that involve projects, finances, cybersecurity, data privacy, regulatory
compliance and environmental factors. Such risks aren't all negative -- there are
also positive ones that present business opportunities. For both, you need a
planned, purposeful approach to understand and then manage the balance
between risk and reward.
Risk factors can have a big impact on how businesses operate -- and whether
they can continue to do so in an effective way. The ability to navigate risk better
than competitors will certainly contribute to a company's success. Failure to do
so could spell disaster, perhaps beyond recovery. For these reasons, applying a
proven and consistent process for managing risk, built on a solid enterprise risk
management (ERM) foundation, is a must.
Perhaps the best-known risk management process is the one outlined by the
International Organization for Standardization, or ISO as a common acronym
across different languages. ISO 31000, its risk management standard, includes
extensive information on how to communicate about, manage and report on
various risks. The process is essentially the same for any type of entity and
includes the following five core steps for documenting, assessing and managing
risks.
1. Identify risks
The first step in the risk management process is to determine the potential business
risks your organization faces. That requires some context: To consider what
could go wrong, one needs to begin with what must go right. Start the risk
identification phase with a review of business goals and objectives and the
various resources or assets that enable them. Risk management practitioners
often apply a top-down, bottom-up approach to thinking about what might
impede those objectives.
A potential risk is only a real risk if it would have a business impact. For
example, NISTIR 8286A -- part of a series of reports on integrating cybersecurity
risks into ERM programs published by the National Institute of Standards and
Technology (NIST) -- listed the following four elements that must be present to
describe a negative cyber-risk:
With building blocks of that sort, risk managers can create a broad set of risk
scenarios to be analyzed, prioritized and treated later in the process. An
example risk scenario might be, "The manufacturing plant is affected by a power
outage resulting from a tropical storm, disrupting plant operations for several
days." Such scenarios provide useful insight into what risk events might occur in
the future.
An effective
risk management process requires these five steps.
As part of identifying risks, it can also be helpful to review news headlines and
other available information about risks that similar businesses have faced. In
addition, various types of risk can be organized into categories. That enables
each type to be considered and tracked by individuals or teams familiar with the
particular issues that are involved. For example, categories could include
strategic risk, financial risk, compliance risk, operational risk, people risk and
technology risk, among others.
For each risk category, a defined process for developing risk scenarios will
ensure that the resulting list of identified risks is sufficiently comprehensive.
Many tools are available to help visualize the scenarios. Examples include the
following:
A risk breakdown structure, which is a type of chart for listing project risks in
a hierarchical way.
Value stream mapping and affinity diagrams for visualizing critical business
assets and relationships -- for example, as part of Carnegie Mellon's OCTAVE
Forte risk management methodology.
The final component of the risk identification step is to record the findings in a
risk register. It provides a means of communicating and tracking the various
risks throughout subsequent steps. The NIST report series cited above includes
an example of a risk register, along with a sample risk detail template in which
many of the results of the risk management process can be recorded for an
individual risk.
Many organizations express the level of risk found during an analysis in general,
or qualitative, ways. Terms such as high risk or low probability are often used, or
red-yellow-green color schemes. Organizations might also benefit, though, from
a more quantitative approach to risk analysis. For example, the Factor Analysis
of Information Risk (FAIR) model, documented in the Open Group's Open FAIR
standard, can be used to perform detailed cyber-risk calculations that could be more
helpful in assessing risks than color-coding.
There are dozens of methods available for both qualitative and quantitative risk
analysis. Many of them are described in IEC 31010, a standard on risk
assessment techniques that is jointly developed and published by ISO and the
International Electrotechnical Commission (IEC) as a complement to ISO 31000.
Risk sharing or transfer. This involves sharing some of the potential impact
of a risk with another entity, such as an insurance firm or an external service
provider -- or, if possible, completely transferring responsibility for the risk to
that entity.
Risk avoidance. If none of the other options are feasible, risk managers
must implement risk avoidance measures to eliminate the activities or
exposures that would enable a particular risk scenario.
Be sure, though, that the risk treatment methods being applied are both effective
and cost-effective. The resources required to treat the risk should be
commensurate with the assets being protected. That's why a bank might use a
20-cent chain to protect an ink pen and a million-dollar vault to protect its cash
reserves.
Also, keep in mind that the goal of the risk management process, in the context
of a broad framework, is not to completely eliminate all risk but to determine
acceptable levels of it and then work to keep individual risk factors within
agreed-upon boundaries. Doing so should be based on business objectives and
a balance between business opportunities and the limits spelled out by
executives in risk appetite and risk tolerance statements.
With that as a foundation, organizations can use the five steps detailed here to
consistently identify and prioritize the risks that are likely to have a harmful
business impact; apply risk mitigation and control strategies or adopt other treatment
methods; and monitor the results for continual improvement and success.
Greg Witte is a senior security engineer at Huntington Ingalls Industries Inc. His
work includes helping organizations integrate cybersecurity risk considerations
into enterprise risk management programs.