Risk is any event that may result in a significant deviation from a planned objective resulting in an unwanted negative consequence.
The planned objective could be any aspect of an enterprises strategic, financial, regulatory and operational processes, products or services.
The degree of risk associated with an event is determined by the
The most important step in risk management process is to identify the sources of risk, the areas from where risks can occur.
This will give information about the possible threats, vulnerabilitiesand accordingly appropriate risk mitigation strategycan be adapted.
Broadly, risk has the following characteristics:
Risk that would prevent an organization from accomplishing its objectives (meeting its goals).
Risk that could result in a negative financial impact to the organization (waste or loss of assets).
Risk that could expose the organization to fines and penalties from a regulatory agency due to non-compliance with laws and regulations.
Risk that could expose the organization to negative publicity.
Risk that could prevent the organization from operating in the most effective and efficient manner.
Risks that are insurable, such as natural disasters; various insurable liabilities; impairment of physical assets; terrorism etc.
Any risk remaining even after the counter measures are analyzed and implemented is called Residual Risk.
As Technology is transforming, the business processes and standards adapted by enterprises should consider these new set of IT risks and challenges:
Technology keeps on changing constantly and becomes obsolete very quickly. Hence, there is always a challenge that the investment in technology solutions may result in loss due to obsolescence.
Technology used today for services is quite complex. Hence, this requires the personnel to have knowledge about requisite technology.
Deployment of technology gives rise to new types of risks which needs to be mitigated by relevant controls.
Systems are aligned with business objectives and, in addition comply with legal/regulatory requirements.
System requires staff with specialized domain skills to manage IT deployed. Hence, these services could be outsourced to vendors and this gives rise to vendor risks which should be managed by proper contracts, controls and monitoring.
There may not be one but multiple vendors providing different services like network, hardware, system software and application software services these situations result in higher risks due to heavy dependence on vendors.
The Segregation of Duties as per organization structure should be clearly mapped.
For example, if a single employee can initiate, authorize and disburse a loan, the possibility of misuse cannot be ignored.
The system environment provides access to customers anytime, anywhere using internet. Hence, information system is open to be accessed by anyone from anywhere. Leads to risks of increased threats for frauds/crime.
Employees in a technology environment are the weakest link in an enterprise.
Fraudsters use social network to socialize with employees and extract information to commit frauds.
Senior management should be involved in directing how technology is deployed in and approve appropriate policies.
The high dependence on technology makes it necessary to ensure resilience to ensure that failure does not impact services.
Hence, a documented business continuity plan is required.
These include Physical access of data and Electronic access of data. (these are discussed in Chapter 3)
Explore All Chapters