Page 126 - COSO Guidance
P. 126

10    |   Managing Cyber Risk in a Digital Age




        PERFORMANCE


         Principle                     Description
         10. Identifies Risk           The organization identifies risk that impacts the performance of strategy and
                                       business objectives.
         11. Assesses Severity of Risk  The organization assesses the severity of risk.
         12. Prioritizes Risk          The organization prioritizes risks as a basis for selecting responses to risks.
         13. Implements Risk Responses  The organization identifies and selects risk responses.
         14. Develops Portfolio View   The organization develops and evaluates a portfolio view of risk.



        Every organization faces a variety of cyber risks from   Organization’s Cyber Risk Assessment Program
        external and internal sources. Cyber risks are evaluated
        against the possibility that an event will occur and
        adversely affect the achievement of the organization’s
        objectives. Malicious actors, especially those motivated             Assumptions
        by financial gain, tend to operate on a cost/reward basis.
        The perpetrators of cyber attacks, and the motivations
        behind their attacks, generally fall into the following broad   Risk                  Risk
        categories:                                               Profile                   Appetite

        •  Nation-states and spies: Hostile foreign nations who              Risk Aware
          seek intellectual property and trade secrets for military           Decision
          and competitive advantage (e.g., those that seek to steal           Making
          national security secrets or intellectual property).
                                                                 Business                   Culture
                                                                 Context
        •  Organized criminals: Perpetrators that use sophisticated
          tools to steal money or private and sensitive information
          about an entity’s consumers (e.g., identity theft).                  Strategy

        •  Terrorists: Rogue groups or individuals who look to use
          the Internet to launch cyber attacks against critical
          infrastructure, including financial institutions.         Copyright © 2019, Deloitte Development, LLC.

        •  Hacktivists: Individuals or groups that want to make a   An organization’s cyber risk assessment should begin first by
          social or political statement by stealing or publishing an   understanding what information and systems are valuable
          organization’s sensitive information.           to the organization. The value should be measured against
                                                          the potential impact to the entity’s objectives (including the
        •  Insiders: Trusted individuals inside the organization who   potential impact of failed legal or regulatory compliance,
          sell or share the organization’s sensitive information.  which can have an indirect effect on accomplishing
                                                          business objectives). For example, companies in various
        While the results of the risk assessment should ultimately   industries (e.g., financial services, technology, healthcare)
        drive the allocation of entity’s resources toward risk   may be a prime target for cyber crime given their assets
        management responses designed to prevent, detect, and   and the highly automated nature of business transactions,
        manage cyber risk, investments must also be directed at the   processes, and systems.
        risk assessment process itself. An organization has finite
        resources and its decisions to invest in these responses
        must be made upon relevant, quality information that
        prioritizes funding to the information systems that are the
        most critical to the entity.








           c oso . or g
   121   122   123   124   125   126   127   128   129   130   131