Get Instant Access
to This Blueprint

Cio icon

Build an IT Risk Management Program

Mitigate threats with a cost-focused approach to IT risk management.

  • Risk is an unavoidable part of IT. And what you don't know, can hurt you. The question is, do you tackle risk head-on or leave it to chance?
  • Get a handle on risk management quickly using Info-Tech's methodology and reduce unfortunate IT surprises.

Our Advice

Critical Insight

1. IT risk is business risk.

Every IT risk has business implications. Create an IT risk management program that shares risk accountability with the business.

2. Risk is money.

It’s impossible to make intelligent decisions about risks without knowing what they’re worth.

3. You don’t know what you don’t know.

And what you don’t know can hurt you – so find out. To find hidden risks, you need a structured approach.

Impact and Result

  • Stop leaving IT risk to chance. Transform your ad hoc IT risk management processes into a formalized, ongoing program and increase risk management success by 53%.
  • Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s greatest risks before they happen.
  • Involve key stakeholders including the business senior management team to gain buy-in and to focus on IT risks that matter most to the organization.
  • Share accountability for IT risk with business stakeholders and have them weigh-in on prioritizing investments in risk response activities.

Build an IT Risk Management Program

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should build a business-driven IT risk management program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

1. Review IT risk fundamentals and governance

Assess the current maturity of IT risk management, identify key stakeholders, and establish a governance framework.

3. Monitor, communicate, and respond to IT risk

Establish monitoring responsibilities, identify risk responses, and communicate priorities to the business.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

6.0/10


Overall Impact

$20,500


Average $ Saved

23


Average Days Saved

Client

Experience

Impact

$ Saved

Days Saved

Massey University

Workshop

3/10

N/A

N/A

Desert Lime Ltd

Guided Implementation

9/10

$20,500

23

The University of Alabama at Birmingham

Guided Implementation

10/10

$2,479

5

The Government of the Northwest Territories

Workshop

10/10

$22,000

50

University of Exeter

Guided Implementation

9/10

N/A

N/A

City of Carlsbad

Workshop

10/10

N/A

20

Integris Credit Union

Guided Implementation

9/10

$10,000

10

Dropbox

Guided Implementation

8/10

N/A

5

Pegasus Business Intelligence, LP d/b/a Onyx CenterSource

Guided Implementation

10/10

N/A

N/A

UMG RECORDINGS, INC.

Guided Implementation

10/10

N/A

N/A

AARP Inc

Guided Implementation

10/10

N/A

N/A

Fernco Inc

Workshop

10/10

$30,999

20

RPC Inc.

Guided Implementation

10/10

$2,546

10

CFA Institute

Guided Implementation

8/10

N/A

N/A

Central Bank of Trinidad & Tobago

Guided Implementation

9/10

N/A

N/A

Kentucky Housing Corporation

Guided Implementation

10/10

$1,782

5

Trinidad and Tobago Unit Trust Corporation

Guided Implementation

10/10

$3,820

20


Risk Management

"Hope" is not a risk management strategy.
This course makes up part of the Security & Risk Certificate.

Now Playing: Academy: Risk Management | Executive Brief

An active membership is required to access Info-Tech Academy
  • Course Modules: 4
  • Estimated Completion Time: 2-2.5 hours
  • Featured Analysts:
  • David Yackness, Sr. Research Director, CIO Practice
  • Gord Harrison, SVP of Research and Advisory

Onsite Workshop: Build an IT Risk Management Program

Onsite workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost onsite delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

Module 1: Establish a Risk Governance Framework and Identify IT Risks

The Purpose

  • To assess current risk management maturity, develop goals, and establish IT risk governance.

Key Benefits Achieved

  • Identified obstacles to effective IT risk management.
  • Established attainable goals to increase maturity.
  • Clearly laid out risk management accountabilities and responsibilities for IT and business stakeholders.

Activities

Outputs

1.1

Assess current program maturity.

  • Maturity Assessment
1.2

Create a stakeholder map.

  • Stakeholder Map
1.3

Complete RACI chart.

  • Risk Management Program Manual
1.4

Identify and engage key stakeholders.

1.5

Add organization-specific risk scenarios.

1.6

Identify risk events.

Module 2: Identify, Assess, and Prioritize IT Risks

The Purpose

  • To identify and assess all IT risks.

Key Benefits Achieved

  • Created a comprehensive list of all IT risk events.
  • Risk events prioritized according to risk severity – as defined by the business.

Activities

Outputs

2.1

Identify risk events (continued).

  • Finalized list of IT risk events
2.2

Augment risk event list using COBIT 5 processes.

2.3

Determine the threshold for (un)acceptable risk.

  • Risk Register
  • Risk Management Program Manual
2.4

Create impact and probability scales.

2.5

Select a technique to measure reputational cost.

2.6

Risk severity level assessment.

Module 3: Assess, Prioritize, and Monitor IT Risks and Develop Risk Responses

The Purpose

  • To prioritize risks, establish monitoring responsibilities, and develop risk responses for top risks.

Key Benefits Achieved

  • Risk monitoring responsibilities are established.
  • Risk response strategies have been identified for all key risks.

Activities

Outputs

3.1

Risk severity level assessment.

  • Risk Register
3.2

Document the proximity of the risk event.

3.3

Expected cost assessment.

3.4

Develop key risk indicators (KRIs) and escalation protocols.

  • Risk Event Action Plans
3.5

Root cause analysis.

3.6

Identify and assess risk responses.

Module 4: Monitor IT Risks, Develop Risk Responses, and Communicate IT Risk Priorities

The Purpose

  • Assess and select risk responses for top risks and effectively communicate recommendations and priorities to the business.

Key Benefits Achieved

  • Thorough analysis has been conducted on the value and effectiveness of risk responses for high severity risk events.
  • Authoritative risk response recommendations can be made to senior leadership.
  • A finalized Risk Management Program Manual is ready for distribution to key stakeholders.

Activities

Outputs

4.1

Identify and assess risk responses.

4.2

Risk response cost-benefit analysis.

  • Risk Report
4.3

Create multi-year cost projections.

4.4

Review techniques for embedding risk management in IT.

4.5

Finalize the Risk Report and Risk Management Program Manual.

  • Risk Management Program Manual
4.6

Transfer ownership of risk responses to project managers.

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

Member Rating

6.0/10
Overall Impact

$20,500
Average $ Saved

23
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Try Our Guided Implementations

Get the help you need in this 3-phase advisory process. You'll receive 8 touchpoints with our researchers, all included in your membership.

Guided Implementation #1 - Review IT risk fundamentals and governance
  • Call #1 - Assess current maturity and set risk management program goals.
  • Call #2 - Engage stakeholders and establish an IT risk council.

Guided Implementation #2 - Identify and assess IT risk
  • Call #1 - Understand risk categories, scenarios, and identification methodologies.
  • Call #2 - Review identified risks and establish assessment thresholds and scales.
  • Call #3 - Prepare for risk assessment by selecting tools and methodologies.

Guided Implementation #3 - Monitor, communicate, and respond to IT risk
  • Call #1 - Prioritize assessed risks and set up monitoring responsibilities.
  • Call #2 - Identify and assess risk response actions.
  • Call #3 - Communicate risk priorities to the business.

Contributors

  • Sterling Bjorndahl, Director of IT Operations, eHealth Saskatchewan
  • Ken Piddington, CIO and Executive Advisor, MRE Consulting
  • Tamara Dwarika, Internal Auditor
  • Michael Fossé, Consulting Services Manager, IBM Canada (LGS)
  • Steve Woodward, CEO, Cloud Perspectives
  • Anne Leroux, Director, ES Computer Training
  • Additional interviews were conducted but are not listed due to privacy and confidentiality requirements.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019