Session 1 2 3
Session 1 2 3
Cause
Probability of Occurrence
Consequence
How to write a risk statement?
“ Customer data leakage, corruption or unavailability caused by defective system
changes resulting in financial fraud losses of UK £1 million”
Risk Analysis
Risk
Evaluation
Risk
Treatment
Managing Risk
Step 1: Risk Identification
Generate a list of possible risks through brainstorming, problem
identification and risk profiling
Macro risks first, then specific events
Step 2: Risk Assessment
Scenario analysis for event probability and impact
Risk assessment matrix
Failure Mode and Effects Analysis (FEMA)
Probability Analysis
Decision trees, NPV, PERT
Semiquantitative scenario analysis
Managing Risk
Step 3: Risk Response Development
Mitigating Risk
Reducing the likelihood an adverse event will occur.
Reducing impact of adverse event.
Avoiding Risk
Changing the project plan to eliminate the risk or condition.
Transferring Risk
Paying a premium to pass the risk to another party.
Requiring Build-Own-Operate-Transfer (BOOT) provisions.
Retaining Risk
Make a conscious decision to accept the risk.
Managing Risk
Step 4: Risk Response Execution and Control
Risk Control
Execution of the risk response strategy.
Monitoring of triggering events.
Initiating contingency plans.
Watching for new risks
Establishing a Change Management System
Monitoring, tracking and reporting risk.
Fostering an open organization environment.
Repeating risk identification/assessment exercises
Assigning and documenting responsibility for managing risk
Risk Identification
The Risk Breakdown Structure (RBS) – for Projects
External
Technical • Subcontractors and suppliers
• Requirements • Regulatory
• Technology • Market
• Complexity and interfaces • Customer
• Performances and reliability • Weather
• Quality
Projec
Organizational
• Project dependencies
t Project Management
• Estimation
• Resources • Planning
• Funding • Controlling
• Prioritization • Communication
Risk Identification Methods
Evidence based methods, for example checklists and historical data
reviews
Systematic team approaches (a team of experts systematically identifies
risks by means of a structured set of prompts or questions – interviews,
brainstorming, Delphi method)
Scenario analysis (root -cause analysis, cause-consequence analysis)
Statistical methods (Monte-Carlo analysis)
Loss of information
Loss of premises and eqpt
Contingency Plan
Allow only high priority customer’s work to happen first. Others will
be considered only when free capacity is available.
ISO 31000 – ISO standard for Risk Management
A set of Risk Management Terms and their definitions
A set of Principles for guiding and informing effective risk management
for an Enterprise
An outline and process for creating a Risk Management framework
An outline and Process for creating a risk management process
The 11 Risk Management Principles
1. Risk management establishes and sustains value.
2. Risk management is an integral part of all organizational processes.
3. Risk management is part of decision making.
4. Risk management explicitly addresses uncertainty.
5. Risk management is systematic, structured, and timely.
6. Risk management is based on the best available information.
7. Risk management is tailored.
8. Risk management takes human and cultural factors into account.
9. Risk management is transparent and inclusive.
10.Risk management is dynamic, iterative, and responsive to change.
11.Risk management facilitates continual improvement of the organization
Risk Management Process – 3 broad areas
1. Risk Architecture – Roles,
Responsibilities - “Who”
2. Risk Strategy - Risk Appetite,
Philosophy - “What”
3. Risk Procedure - Rules and
Procedures, tools and
methodologies – “How”
ISO 31000 – What does it NOT cover?
Detailed instruction on how to manage the risk
A complete risk management framework
A complete risk management process
Templates
Guidance on how to identify risks
Advice on how to manage risks for a specific domain
The Basics…..
What is IT risk ?
What is “IT risk Management” ?
Is IT Risk within the IT department/Function ?
Types of IT risks
Artefacts of IT risk Management
Connection with Enterprise Risk Management
Some unspoken issues in IT risk management
Complementary topics – BCP/DRP, Incident management
IT Risk - Defined
“The business risk associated with the use, ownership, operation,
involvement, influence and adoption of IT, including its partners and service
providers”
IT Risk - Defined
“The business risk associated with the use, ownership, operation,
involvement, influence and adoption of IT, including its partners and service
providers”
IT Risk Management
“The process of applying Risk Management processes and procedures to
manage risks that arise while applying IT for business.”
Areas from which IT Risk arise and their impacts
Hardware Financial
Software HSSE
Communication Regulatory
Security Product Liability
Data Stock Market
People Fraud
Projects Customer Service
Process Reputation
Interfaces Credibility
Third Party Contractual
Outsourced services Competitive
Partners
Typical IT setup in a large organization
Compliance DR System p
-u
Development
data/software Cloud App a c k
, B / Testing
nce
Function a
form
New Tech Trials specific
Per Mobile
E-mail /
ny,
c
workflow a
dLegacy
n
MES
e du Websites
y ,R
or
Product
ulat Customers
Suppliers Lifecycle R eg On –premise ERP
,BI/
y
Mgmt l it
ntia Analytics Finance
d e Consolidation
onfi
Data , C
r i
centrety DRP User
u Communication
Sec Devices
Instances
Consider Infrastructure of an Organisation and Implementation of a new IT
system
What can stop us from achieving our strategic objectives and meeting
stake-holder requirements ?
Enterprise Risk Management
How IT Risk Management links to ERM
Example : Risk Model
Environmental Risks Process Risks
Capital Availability Operations Risk
Regulatory, Political & Legal Empowerment Risk
Financial Markets & Shareholder Relations Integrity Risk
Information for Decision Making Financial Risk
Operational Risk Information Processing/
Financial Risk Technology Risk
Strategic Risk
The importance of IT Risks in the overall ERM model has increased rapidly
Some artefacts in IT Risk Management
Asset register Data Dictionary/ x-references
Change management request Risk Reporting
Issues register Incident management document
Risk register
Enterprise Architecture
RACI charts
BCP / DRP Document
Access Control List
Check lists
Process Flow charts
One pager on Risk
One pager on Risk
Risk – Business view Vs IT view
Business View IT View
Impact on reputation /brand value Control on IT
Impact on customer life /business Own reputation
Legal Liabilities /regulations IT Costs / uptime
Impact on Financial Bottom-line Prefer safer options
Competitive position
Can not play too safe
Risk – Corporate view Vs Business view
Corporate View Business View
External obligations Competitive differentiation
M&A requirements Flexibility and speed
Experiment , innovation
Standardise, simplify
Revenue over costs
Procurement Leverage
No functional bureaucracy
Re-organisation / consolidation
Cross business synergies
Ease of Management / Control
To ponder………
Are Business Leaders comfortable talking about IT Risk?