Page 130 - COSO Guidance Book
P. 130

14    |   Managing Cyber Risk in a Digital Age







        For organizations looking to evolve and implement new   Organizations must operationalize governance processes
        technologies, cyber risk avoidance may not be an effective   to capture and evaluate potential changes that may alter
        strategy. Management must therefore implement effective   their cyber risk profile. This includes—at a minimum—
        cyber risk strategies to become more vigilant (e.g.,   capturing prospective new and changing products and
        comprehensively monitor the extensive threat landscape).   services, information technology and evolving digital
        Feedback from comprehensive risk monitoring should feed   strategies, business processes, mergers, acquisitions, and
        into the risk assessment process.                 reorganizations, and laws and regulations. Each of these
                                                          items must be evaluated by qualified key stakeholders
        New technological advances, feedback from the cyber   operating within a broad cyber risk management program.
        security assessment, organizational changes, review   In addition, the importance of key indicators and control
        of risk appetite, improved communication processes,   testing in monitoring for changes in the organization’s
        and comparisons to other industries and competitors   cyber risk profile must remain a top priority.
        are examples of inputs that can help improve the risk
        management process. For example, a manufacturing   The Review & Revision component is key as the constantly
        organization planning to implement smart factory solutions,   evolving cyber world disruption and digitization continue
        which use artificial intelligence and networked sensors,   to drive the need for changes and enhancements to cyber
        may not have considered the impact of cyber breaches   risk management.
        in connected devices as part of prior risk assessments.
        However, changes in technology and changes in business
        objectives require improvements to the risk assessment
        processes to factor in new cyber risks.




















































           c oso . or g
   125   126   127   128   129   130   131   132   133   134   135