Page 127 - COSO Guidance
P. 127

Managing Cyber Risk in a Digital Age   |    11







                   Because the cyber risk assessment informs management’s   As an output of Principles 10 and 11, an organization should
                   decisions about how to deploy risk responses toward   have a clear understanding of the information systems
                   information systems that support an entity’s objectives,   critical to the achievement of its objectives.  Then, applying
                   it is important that senior management and other critical   Principle 12, risk assessment is taken deeper as the
                   stakeholders drive the risk assessment process to identify   organization assesses and prioritizes risks in relation to the
                   what must be protected in alignment with the entity’s   severity and likelihood of cyber risk events and outcomes.
                   objectives. Many organizations do not spend enough time   When led by senior management, through collaboration
                   gaining an understanding of what information systems   with business and IT stakeholders, an organization is
                   are truly critical to the organization; they also may have   positioned to evaluate the risks that could impact the
                   difficulty understanding where and how the information   achievement of its objectives across the entity.
                   is stored. This can lead to attempts to protect everything,
                   which may result in overprotecting certain information   During this stage of the risk assessment process, it is also
                   systems and under protecting others.              important to apply an industry lens to cyber risks versus
                                                                     just looking broadly at cyber risks. The perpetrators of
                   Placing a value on information systems requires a   cyber attacks have unique objectives that differ between
                   high degree of collaboration between business and IT   industry sectors. For example, in the retail sector,
                   stakeholders. Because organizations are not able to act   organized criminals are the most likely attackers, focused
                   on all risks, given the limited time, budget, and resources   primarily on exploiting vulnerabilities in systems that
                   available, management should also determine the levels of   contain information that can be used for profit (e.g., credit
                   risk tolerance acceptable to the organization and focus its   card data or Personally Identifiable Information (PII)).
                   efforts to protect the most critical information systems.  Alternatively, the oil and gas industry might be targeted by
                                                                     nation-states with a motive to steal strategic data about
                   Risk Assessment Prioritization                    future exploration sites. Chemical companies may find
                                                                     themselves targeted by hacktivists because of perceived
                                                                     environmental issues around their products.
                          High
                                                                     Through careful evaluation of the motives and likely attack
                                                                     methods and the techniques, tools, and processes the
                                                                     attackers may use, the organization can better anticipate
                                                                     what might occur and be in a position to design controls
                            Severity  Risk Prioritization            and other risk responses that are highly effective in
                                                                     minimizing the disruption of potential cyber attacks and
                                                                     keeping highly valued assets secure.

                                                                     The portfolio view of risks should be updated on a
                                                                     continuous basis to reflect changes that could impact
                                                                     an organization’s deployment of cyber risk management
                          Low                          High
                                Likelihood of Occurrence             activities to protect its most critical information systems.
                                Copyright © 2019, Deloitte Development, LLC.  As information is generated from the vigilant monitoring
                                                                     of the changing threat landscape and the risk assessment
                                                                     process, senior executives and other stakeholders must
                                                                     share and discuss this information to make informed
                                                                     decisions on how to best protect the organization against
                                                                     exposure to cyber risks.

















                                                                                                          c oso . or g
   122   123   124   125   126   127   128   129   130   131   132