SlideShare a Scribd company logo
Establishing the Core of an Effective
Technology Risk Management Program
Director, Security Development and Engineering
Effective risk
management
helps a company
pursue
opportunity
within the firm’s
risk appetite in a
controlled way
Risk and value are two sides of the same coin
Risk appetite is the level of risk that an organization is willing to accept while
pursuing its objectives, and before any action is determined to be necessary in
order to reduce the risk.
Risk is an opportunity
Begin with the end in mind
➢Effective and efficient risk management
➢Continuous demonstration of compliance
status
➢Minimal out of the business-as-usual
effort by operational and risk
management teams
“We may be very busy, we
may be very efficient, but
we will also be truly
effective only when we
begin with the end in mind.”
Steven Covey
What laws and regulations apply to your company or your
upstream partners and customers?
The fog can be lifted –
excellent resources are already available!
Research and Whitepapers
▪ The core / intent of technology and security controls are similar among
regulations
▪ Leverage existing frameworks and control mapping crosswalks to
deduplicate, and gets single set of required applicable controls
Control
Testing
(Pass/Fail)
Issue
(Open/
Close)
Action
Plan
(Complete/
Incomplete
Control
Effective or
Ineffective
Process Level
Risk
Mitigated or
Not Mitigated
Risk Category
Rating
Regulatory and
Compliance
Requirements
Board
Regulators / Audit / Customers
Regulations
Internal
Compliance
Contracts
Policies and
Standards
Requirements
GRC Overview
Process Risk Control
Process Owner
Risk Acceptance
Prerequisites to Success:
Standardization - Save the user creativity for art class
• Correct mapping for laws > requirements > processes > risks > controls
• Lock down process, risk, control libraries and instantiate with limited flexibility
• Mandatory fields with standardized response options
Build infrastructure and guardrails from the start – An ounce of prevention
• Approval workflows for changes to key fields (dates, ratings, etc.)
• Preventative controls for data quality and integrity
• Access control
Clarify roles, responsibilities, and educate - No time for guesswork
• Control owner identification and education
• Automated system notifications for key actions and dates
• Leadership reporting with consequences
✓ Standardization
✓ Governance
✓ Accountability
ISO 31000
Now that you have a strong core:
use it to support the overall risk management process
Action Item for Today:
Identify the (top) 3 regulatory oversight
agencies, or regulations / standards that
impact your company.

More Related Content

Similar to Establishing the Core of an Effective Technology Risk Management Program

Cyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxCyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptx
koushikDutta62
 
Transforming compliance and audit management with ServiceNow
Transforming compliance and audit management with ServiceNowTransforming compliance and audit management with ServiceNow
Transforming compliance and audit management with ServiceNow
Iceberg Networks Corporation
 
Agile Network India | Risk Management in VUCA World | Ashwinee Singh
Agile Network India | Risk Management in VUCA World | Ashwinee SinghAgile Network India | Risk Management in VUCA World | Ashwinee Singh
Agile Network India | Risk Management in VUCA World | Ashwinee Singh
AgileNetwork
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
Process Safety Bulletin Sep 2015
Process Safety Bulletin Sep 2015Process Safety Bulletin Sep 2015
Process Safety Bulletin Sep 2015Aamish J. Khan, CSP
 
Risk management & compliance with xyea october 2012
Risk management & compliance with xyea october 2012Risk management & compliance with xyea october 2012
Risk management & compliance with xyea october 2012Xyea
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual ciso
Michael Ball
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
John D. Johnson
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
dotco
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department
Sandeep S Jaryal
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
pchronis
 
Build a business case for compliance March 2022
Build a business case for compliance March 2022Build a business case for compliance March 2022
Build a business case for compliance March 2022
Nimonik
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
EnclaveSecurity
 
Quality management processes
Quality management processesQuality management processes
Quality management processesselinasimpson0701
 
How to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8DHow to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8D
Stefan Kovacs
 
Monitoring
MonitoringMonitoring
Monitoring
WajahatAli810625
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
JunaidAhmed976315
 
Acm enterprise complianceandriskmanagementsolved-0117-final
Acm enterprise complianceandriskmanagementsolved-0117-finalAcm enterprise complianceandriskmanagementsolved-0117-final
Acm enterprise complianceandriskmanagementsolved-0117-final
Neil Visnapuu
 

Similar to Establishing the Core of an Effective Technology Risk Management Program (20)

Cyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxCyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptx
 
Presentation_20110802213554
Presentation_20110802213554Presentation_20110802213554
Presentation_20110802213554
 
Transforming compliance and audit management with ServiceNow
Transforming compliance and audit management with ServiceNowTransforming compliance and audit management with ServiceNow
Transforming compliance and audit management with ServiceNow
 
Agile Network India | Risk Management in VUCA World | Ashwinee Singh
Agile Network India | Risk Management in VUCA World | Ashwinee SinghAgile Network India | Risk Management in VUCA World | Ashwinee Singh
Agile Network India | Risk Management in VUCA World | Ashwinee Singh
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Process Safety Bulletin Sep 2015
Process Safety Bulletin Sep 2015Process Safety Bulletin Sep 2015
Process Safety Bulletin Sep 2015
 
Risk management & compliance with xyea october 2012
Risk management & compliance with xyea october 2012Risk management & compliance with xyea october 2012
Risk management & compliance with xyea october 2012
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual ciso
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
 
Build a business case for compliance March 2022
Build a business case for compliance March 2022Build a business case for compliance March 2022
Build a business case for compliance March 2022
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Quality management processes
Quality management processesQuality management processes
Quality management processes
 
How to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8DHow to solve problems (or at least try) with 8D
How to solve problems (or at least try) with 8D
 
Monitoring
MonitoringMonitoring
Monitoring
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Acm enterprise complianceandriskmanagementsolved-0117-final
Acm enterprise complianceandriskmanagementsolved-0117-finalAcm enterprise complianceandriskmanagementsolved-0117-final
Acm enterprise complianceandriskmanagementsolved-0117-final
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Establishing the Core of an Effective Technology Risk Management Program

  • 1. Establishing the Core of an Effective Technology Risk Management Program Director, Security Development and Engineering
  • 2. Effective risk management helps a company pursue opportunity within the firm’s risk appetite in a controlled way Risk and value are two sides of the same coin Risk appetite is the level of risk that an organization is willing to accept while pursuing its objectives, and before any action is determined to be necessary in order to reduce the risk. Risk is an opportunity
  • 3. Begin with the end in mind ➢Effective and efficient risk management ➢Continuous demonstration of compliance status ➢Minimal out of the business-as-usual effort by operational and risk management teams “We may be very busy, we may be very efficient, but we will also be truly effective only when we begin with the end in mind.” Steven Covey
  • 4. What laws and regulations apply to your company or your upstream partners and customers?
  • 5.
  • 6. The fog can be lifted – excellent resources are already available! Research and Whitepapers ▪ The core / intent of technology and security controls are similar among regulations ▪ Leverage existing frameworks and control mapping crosswalks to deduplicate, and gets single set of required applicable controls
  • 7. Control Testing (Pass/Fail) Issue (Open/ Close) Action Plan (Complete/ Incomplete Control Effective or Ineffective Process Level Risk Mitigated or Not Mitigated Risk Category Rating Regulatory and Compliance Requirements Board Regulators / Audit / Customers Regulations Internal Compliance Contracts Policies and Standards Requirements GRC Overview Process Risk Control Process Owner Risk Acceptance
  • 8. Prerequisites to Success: Standardization - Save the user creativity for art class • Correct mapping for laws > requirements > processes > risks > controls • Lock down process, risk, control libraries and instantiate with limited flexibility • Mandatory fields with standardized response options Build infrastructure and guardrails from the start – An ounce of prevention • Approval workflows for changes to key fields (dates, ratings, etc.) • Preventative controls for data quality and integrity • Access control Clarify roles, responsibilities, and educate - No time for guesswork • Control owner identification and education • Automated system notifications for key actions and dates • Leadership reporting with consequences ✓ Standardization ✓ Governance ✓ Accountability
  • 9. ISO 31000 Now that you have a strong core: use it to support the overall risk management process
  • 10. Action Item for Today: Identify the (top) 3 regulatory oversight agencies, or regulations / standards that impact your company.