Revive Your Risk Management Program With a Regular Health Check
Don’t get complacent and allow your risk management strategy to flatline.
- Having set up an IT risk management program that successfully mitigates key risks and raises the profile of IT risk in the eyes of the business, you have taken a significant step in your evolution as a strategic and proactive IT leader.
- Unfortunately, your risk assessment is already outdated. Perform regular health checks to stay on top of the key risks threatening the business – and your reputation.
- Our project seizes the momentum you created by building a robust IT risk management program, and creates a process for conducting periodic health checks and embedding ongoing risk management into every aspect of IT.
- Our approach keeps the business on board by stressing the financial impact of IT risks as well as opportunities for calculated risk taking revealed through a deep understanding of how IT-related risk impacts the business.
- Our focus is on using data to make IT risk assessment less like an art and more like a science. Ongoing data-driven risk management is self-improving and grounded in historical data.
- A false sense of security may be your greatest risk. The IT threat landscape is evolving rapidly and won’t wait for you to catch up.
- Risk management should be seen and heard. Communicate the dollar value of risk management to keep the business engaged.
- The first health check is pivotal. Successfully going through the risk management process the second time around is the difference between IT risk management being perceived as a one-off project and an ongoing program.
- Risk management is not checking boxes – you need to be constantly improving. Measuring the effectiveness of your risk management activities is crucial for ensuring that the program lives up to its mandate. It also allows you to communicate a compelling value proposition to senior leadership.
Impact and Result
- To prevent your IT risk management program from becoming an artifact, conduct quarterly, biannual, or annual health checks to reassess your risk portfolio and identify new threats and vulnerabilities.
- Develop and track metrics to measure the success of IT risk management and illustrate the value of the program to senior leadership.
- Create consultant-quality deliverables that inform senior leadership about IT’s risk recommendations, highlighting the potential cost of IT risks and the value created by IT risk projects.
- Get better at identifying and assessing IT risk and measure the improvement.
- Institutionalize the IT risk management program by consistently engaging key stakeholders within and outside of IT.
- Sterling Bjorndahl, Director of IT Operations, eHealth Saskatchewan
- Ken Piddington, CIO and Executive Advisor, MRE Consulting
- Tamara Dwarika, Internal Auditor
- Michael Fossé, Consulting Services Manager, IBM Canada (LGS)
- Steve Woodward, CEO, Cloud Perspectives
- Anne Leroux, Director, ES Computer Training
- Additional interviews were conducted but are not listed due to privacy and confidentiality requirements.
Want to Participate in Our Research?
- Analyst Interviews: Share your best practices, opinions, tools or templates with your peers.
- Webinars: Interactive session to keep us focused on topics you want to tackle.
- Upcoming Workshops: Accelerate your project with an onsite, expert analyst to facilitate a workshop for you. Contact us for more details.
Get the Complete Storyboard
See how all the steps you need to take come together, with tools and advice to help with each task on your list.Download Now
Get to Action
Start here – read the Executive Brief
Read our concise Executive Brief to find out why you should revive your risk management program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.
Refine IT risk management governance
Assess the maturity of the risk management program and build an improvement plan.
Reassess IT risk events and identify new threats
Reassess previously identified IT risk events and identify new threats.
Develop risk responses and communicate priorities to the business
Establish monitoring responsibilities, identify risk responses, and communicate priorities to the business.
Module 1: Refine IT Risk Management Governance
- To assess the maturity of the risk management program and build an improvement plan.
Key Benefits Achieved
- Perform a program retrospective to jump-start operational improvements and retain the involvement of keep stakeholders.
|1.1||Review IT risk fundamentals||
|1.2||Set workshop goals and expectations||
|1.3||Assess risk management process, and identify accomplishments and challenges||
|1.4||Build a Risk Management Program Improvement Plan||
Module 2: Reassess IT Risk Events and Identify New Threats
- To re-engage business stakeholders, re-assess IT risk events, and identify new risks.
Key Benefits Achieved
- Reassess your risk register and identify new risk events regularly to minimize the exposure of your organization.
|2.1||Review IT and business context changes||
|2.2||Consider how context changes impact organizational risk tolerance||
|2.3||Generate tactics to re-engage business stakeholders||
|2.4||Determine if implemented risk responses were successful||
|2.5||Re-assess the severity of previously identified risk events||
|2.6||Augment risk event list with capability maps||
|2.7||Assess the severity of newly identified risk events||
|2.8||Perform an expected cost assessment||
Module 3: Develop Risk Responses and Communicate Priorities to the Business
- Establish monitoring responsibilities and develop risk responses.
- Assess and select risk responses for top risks and effectively communicate recommendations and priorities to the business.
Key Benefits Achieved
- Turn risk priorities into fully funded projects that have the support of the business.
- Effectively deliver IT risk expertise to the business to guide risk-conscious decision making.
- Communicate the value and success of the program in a compelling way to ensure continued support and engagement.
|3.1||Perform a root cause analysis||
|3.2||Identify and assess risk responses||
|3.3||Identify and assess risk responses||
|3.4||Review a risk response cost-benefit analysis||
|3.5||Create multi-year cost projections||
|3.6||Customize the IT Risk Management Executive Brief||
|3.7||Finalize the Risk Report and Program Manual||
|3.8||Transfer ownership of risk responses to project managers||
Search Code: 79320
Published: December 11, 2015
Last Revised: June 9, 2016