Week 11: Identify And Understand Your Company’s Risk Management Process

Week 11: Identify And Understand Your Company’s Risk Management Process

Your company has been managing risk since its inception. OT cyber risk is not special. It’s one more risk, albeit often ignored until recently. One clear path to failure is to try to invent your own method for managing OT cyber risk that differs from your company’s existing risk management method.

Find out who is responsible for risk management at your company and ask them how it’s done. Are there documents defining the risk management process? Is there a risk register? Are risk management reports issued periodically or when risk decisions are required by the executives or board?

Go in with a beginner’s attitude and with the approach that you are trying to understand the process so you can provide risk management with the information they need on OT cyber risk.

Don’t expect risk management to tell you all the company’s risks in detail. This is often viewed as sensitive information.

Many organizations have a 5x5 matrix / heat map like shown in the two figures below. The best part of these matrices for your purposes are the consequence categories, broken down by the type of consequence. These consequence types and categories are independent of the cause. In the sample risk matrix below a loss of over $50M would be a high consequence event whether it was caused by financial fraud, product recalls, an OT cyber incident or any other cause.

In this risk matric example, a risk score of 16 and above could be considered an unacceptable risk by the board and executives. A risk score of 9 – 15 could require mitigation to reduce to an 8 or lower unless specifically accepted by the board and executives.

If your company doesn’t have a risk matrix, they may have a risk committee, risk register procedure, or some other process where risk is identified and determined if it’s acceptable or needs to be reduced.

It’s a sad fact that many organizations, even those that run and maintain critical infrastructure, do not have a formal risk management process. If this is your company, the task is harder and still worthwhile. Interview individuals across departments, ideally at an executive level, but take what you can access. Try to understand what they would view as a high consequence event and why.

For example, Finance might tell you a 2-week outage is not a high consequence event because you can purchase an alternate supply. Or they might tell you a 2-day outage would be a high consequence event because of penalties for non-delivery.

Don’t let the perfect be the enemy of the good. If you can better understand how your company manages risk this week is a success.


Department(s) and Role(s) responsible for managing risk:

Insert your company’s Risk Matrix or define what is considered a high consequence even

Monica Tigleanu, CISSP, GICSP

Cyber Strategy Director at BMS Group | Cyber Risk Aficionado | (Re)Insurance Evangelist |

1 天前

This weeks task is really the journey of defining risk appetite and therefore what tolerance a company has for taking risk. The ‘best’ security isn’t ultimately an objective but a way of travelling to the destination .. to arrive at the desired level of risk. ??

回复

要查看或添加评论,请登录

Dale Peterson的更多文章

  • Does CambiOS Academy Shake Up The OT Security Training Market?

    Does CambiOS Academy Shake Up The OT Security Training Market?

    There were 12 organizations at the OT Security Training Roundup at S4x25. The entry bar was low.

    7 条评论
  • Gartner's OT Visibility Magic Quadrant

    Gartner's OT Visibility Magic Quadrant

    Advisory services vendor Gartner put out their magic quadrant for "CPS Protection Platforms" on February 12th. (Right…

    23 条评论
  • Week 10: Understand What Success Means In Your Company

    Week 10: Understand What Success Means In Your Company

    It’s critical to know what your organization is trying to achieve and how success is measured if you are going to…

  • S4x25 Keynote: Your Value As An OT Security Professional

    S4x25 Keynote: Your Value As An OT Security Professional

    Here's the text version of my S4x25 keynote delivered on Feb 12th. Of course you don't get the seesaw that you have in…

    35 条评论
  • Week 9: Identify And Plan Your Career Growth Area

    Week 9: Identify And Plan Your Career Growth Area

    One last, but not least, task to complete your S4 month is to plan what area you will focus your career growth on over…

    1 条评论
  • The Impact Of US Government OT Security Firings

    The Impact Of US Government OT Security Firings

    Three notes at the start: There are many talented people in OT Security who have lost and are losing their US…

    45 条评论
  • Time For Action, We Have Plenty Of Advice

    Time For Action, We Have Plenty Of Advice

    Seth Godin manages to put a lot of wisdom in his short daily blogs. This one hit me last week (key excerpt below).

    10 条评论
  • Introduction Chapter From My New Book

    Introduction Chapter From My New Book

    This chapter from the book describes what it is, how to use it, and a bit of how I came to write it. I started reading…

    3 条评论
  • 25 Years, Same Question

    25 Years, Same Question

    Why don't we see more OT cyber incidents? My first exposure to OT security was a security assessment of a water SCADA…

    30 条评论
  • My New Book & 2025 Content Plan

    My New Book & 2025 Content Plan

    Some of you have asked where my weekly article went in November and December. The answer is I had to focus my writing…

    13 条评论