Who decides how much security risk to take for a specific system?
Chief Information Security Officer35%
Chief Information Officer34%
Chief Risk Officer12%
Chief Executive Officer6%
Board3%
System Owner4%
Others (Please specify)2%
As with expenses, anyone beyond the CEO / Board has a level of risk they are willing to take on in their role. Once that level is defined, their job is to deliver the best approach. I personally try to insulate the company from any risk where I can either solve it through negotiation in the contract, or by providing an alternative up front.
If I can’t see the way out clearly, I escalate and recommend.
I agree, the Board has to examine the risk and make a decision whether it's an acceptable to risk and what level it should be considered with input from the CISO. Been in that situation a few times.
I also found that odd, but to be fair there are more votes than posts. And it's much easier to click a button rather than type out your own thoughts.
It's clear that the risk level must be approved by the CEO / Boards. They in the end have to answer to shareholders/owners if the risk becomes actualized.
I find it odd as well George and Justin - the votes do not match the comments.
The management of and acceptance of risk is ultimately a Business Decision, where depending on the level of risk and scope of exposure the review and action decisions are owned by a Business risk committee informed by the CIO and CISO.
Further with the new SEC rules looming on the horizon - the Risk Management and decisions will be owned by the Board of Directors and Risk Management Committee.
A recent example is the "Password Manager" breach where the CEO responded to communication criticisms (representing the business) and has committed to improvements in the business.
Great point. It’s important to develop policy that requires these types of changes to go through formal processes, including opening up a ticket and formal approval. If patching needs to be skipped for a month then it needs CISO approval. The process needs to be lightweight so it will be followed. Getting everyone trained up on how the policy applies to them is key. Risks can still be introduced but the more unobtrusive layers (SIEM alerts, patching dashboard…) the better.
You governance council should *always* be outside of the IT/IS organization, should include senior IT/IS, and should be aware of:
Risks
Risk level assigned
Ownership
Remediation plan if not an acceptable risk.
IS's job is to bring awareness to and correct the problem. We can tell the company how we would do things, but ultimately we are at the peril of the budget and corporate willingness.
IE - Info sec thinks that the company doesn't have a 3rd party phishing simulation and remediation program is a high risk that needs remediation in the next 6 months. Your Governance Council might feel that some basic awareness training delivered bi-annually is sufficient. Those are now on record and when you have to explain why a user was compromised, and gave away 5K in google play cards in $100 increments to ceo-email@ymail.com IS has their butt covered.
Content you might like
Less than or equal to 5%33%
Between 6% and 10%56%
Between 11% and 15%6%
Greater than 16%3%