Published: 12 February 2020
Summary
This governance process drives priorities and investments by outcomes with a direct line of sight to protection levels in a business context. CIOs should optimize cybersecurity capabilities for risk, value and cost and continuously update the capabilities.
Included in Full Research
- Follow These Steps to Implement an Outcome-Driven Approach
- Step 1: Develop Outcome-Driven Processes or Services
- Step 2: Define Operational Outcomes
- Step 3: Define Benefit Outcomes
- Step 4: Sharpen Outcomes in a Business Context
- Step 5: Determine Operational and Collateral Costs
- Follow These Steps to Continuously Execute an Outcome-Driven Approach
- Step 6: Identify Gaps for Prioritization and Investment
- Step 7: Set the Risk Appetite by Outcome-Driven Metrics
- Step 8: Drive Decisions on Priorities and Investments
- Step 9: Report Operational Outcomes and Benefit Outcomes in a Business Context
- An ODA Example for Managing Ransomware Risk