A key role of risk management is helping organisations decide how limited resources can be most effectively used to address the most pressing business issues, e.g., threats to information security. Where current resources are insufficient, risk management can help management decide on what extra budget or resources (including seeking help from third-party specialists) are required. As such, it is critical that you ensure your risk management process is robust and produces consistent and repeatable results, which can be defended and which ultimately focuses on practical actions. We’ll look at how you can ensure your risk management process meets these different requirements
Consistent and repeatable results
Each risk within your risk register should make sense when viewed individually or in comparison with other risks e.g., a red information security risk should be comparable to a red financial risk. In other words, you need to have defined scales for each aspect of your assessment framework (e.g., impact and likelihood). A risk matrix and defined risk appetite will encourage consistency. In larger organisations, a risk function can help ensure consistency within a range of risk workshops or help risk owners reassess risks where required.
Defendable process
Your risk management process will come under scrutiny by senior management, internal audit and external auditors, and you will have to be able to defend the analysis you’ve conducted. This means that whilst a wide range of input may have been gathered to assess each risk, an adequate amount of this detail needs to be recorded and documented so that the debates (and logic!) of each risk assessment workshop can be recalled.
Focus on actions and improvements
We often come across risk assessments that take a very analytical approach to risk analysis. Now, whilst this approach works when you have reliable data available for these calculations, it typically falls down with new or emerging risks. Let us take the example of trying to assess the risk of a new system failing to adequately protect personal data. This will not be an easy exercise if relying on data alone. However, if you engage relevant and knowledgeable stakeholders within the risk assessment process, you will have an effective and practical mechanism for identifying potential weaknesses. Once these risks are identified, the risk management process should focus on managing actions through to completion rather than artificially manipulating risks into slightly lower risk scores.
URM can help you achieve ISO 27001 certification
URM can provide a range of ISO 27002:2022 transition services including conducting a gap analysis, supporting you with risk assessment and treatment activities as well as delivering a 2-day transition training course.
If you want to learn more about ISO 27002:2022 and how to implement the new controls and the new attributes, you can attend URM’s ISO 27001:2022 Control Migration Course.
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/663395d3790b636e6eefc80f_Blog-Thumb-Homeworking.jpg)
In this blog, we aim to provide 10 top tips to enable you to keep important information assets safe and secure whilst working remotely.
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/663395d3790b636e6eefc586_Blog-ISO27001-1.jpg)
ISO 27001 is the International Standard for Information Security Management. It provides organisation with a framework and an approach to protecting assets
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/663395d3790b636e6eefc80b_Blog-Thumb-Umbrella.jpg)
In this blog, we’re going back to basics and looking at some of the fundamentals of information security and ISO 27001.