How To: Set Up Risk Management for IT

Table of Contents

Is IT in your business set up to be risk free? Do you have a risk management process set up? If no, this is something that requires your urgent attention. If you do are you sure it is fool-proof?

To capture the subject in its entirety, ISACA describes risk management for IT as “the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization.”

This blog post is a condensed version of an article in our latest eBook. Keen on further knowledge on how to manage IT in your business? Download: An essential guide to IT for SME business – Risk, Security and Productivity

Here’s how to set up a process for IT risk management (ITRM).

6 Questions to Ask When Setting Up IT Risk Management

1. Who

Who is going to implement the ITRM strategy? Who is going to action it when/if it is required? These need to be clearly set out in order for all personnel to understand what they have responsibility for – and this will ensure the procedures set out are effectively actioned when required.

There also needs to be the appropriate level of authorisation given to those in charge of risk management, so they are able to carry out decision-making for situations where there isn’t a defined path for resolution.

2. What

What are the risks you face as an organisation? Think about all possible internal and external threats, and then set guidelines around what level of risk they pose to your business – as well as tolerance benchmarks to identify what course of action to take to rectify the issue that has occurred.

3. Where

Every business and organisation needs to have a plan for ITRM, and it needs to be kept visible for all of those involved in its development and implementation. It is important to have alignment throughout the company, and for the ITRM to be worked alongside with other business policies and procedures.

4. When

Timings are critical for risk management response – so set up deadlines for when identified courses of action should be taken. And again, this can be separated out into each level of risk – to determine when a resolution should take effect, or when it needs to be escalated to a higher authority.

5. Why

As well as knowing what IT risks you f ace as a business, you should also be able to understand why they are an issue for your organisation. This can help with putting processes in place as to your course of action following risk infiltration.  For example, ‘Why would it matter that our data was compromised?’ Because it would mean private details of customers would be exposed.

6. How

So following on from the above, how do you mitigate that risk? Whether it is by enhancing security, or putting other protection processes in place.

——-

This blog post is a condensed version of an article in our latest eBook. Keen on further knowledge on how to manage IT in your business? Download: An essential guide to IT for SME business – Risk, Security and Productivity

Download the Online Security for New Zealand Businesses eBook
Other People Also Viewed These Articles

Leave a Comment