This post was updated on January 27, 2020.
IT risk management is defined as the policies, procedures, and technology an organization adopts in order to reduce the threats, vulnerabilities, and consequences that could arise if data is not protected.
In this article, we’ll show you how the classic equation for risk can help you prioritize your IT risk management strategy and recommend best practices for doing so.
Understanding the IT risk equation
As mentioned in our working definition, IT risk management examines this classic equation for risk:
Threat x Vulnerability x Consequence
Threat is inherent in IT risk management, and most organizations assume that their vendors present at least some level of threat.
Vulnerability comprises the gaps in a protection program. Let’s say you have a really sensitive document and you put it in a safe, in a locked building, protected by guards; you likely feel confident that the document isn’t vulnerable to many threats. Now, if that same document was online in an open network where your organization stores all of its data, it’s easy to understand how the safety of the document is compromised. The moral of this story is to understand not only what vulnerabilities are in your protection program, but also how those vulnerabilities can be exploited. Once you parse through this information, you’ll gain a clearer idea of how to address your overall risk.
Consequence represents the harm caused to an organization by a cyberattack. An important element to consider here is the value of the information you’re trying to protect — something which can vary tremendously. For example, intellectual property data or pricing information may be of value to your organization. But data, such as personally identifiable information (PII), can also hold value because of the legal requirements to protect it. When determining risk, it’s important to ask what might happen if that data is compromised.
Properly managing IT information risk
Knowing what IT risk management is and what it entails, as outlined by the risk equation, is the first step to managing that risk. From here you can take the next step of establishing a clear strategy for information security and risk management.