CRISC

Course
Time
6 hours 30 minutes
Difficulty
Advanced
CEU/CPE
7

Video Transcription

00:02
now. I mentioned something earlier that bears repeating. So, as a matter of fact, I'm gonna repeat it about eight million times. Throughout this course.
00:10
The purpose of information security in information technology and of technology is a whole and of people and their specific roles and responsibilities.
00:22
The purpose for all of us is to support the business to bring value to the business. Now, it may not be monetary value. You know, you're not gonna profit off of information security. Probably, but we can look at that value as a reduction and loss. Right?
00:40
Some values will be value. Might be
00:43
to maintain compliance, to improve customer service across customer perception but ultimately our jobs, or to deliver value to the business. And at the point in time when we no longer deliver value to the business, they were no longer NASA. Right? So this section talks about alignment
01:03
of technology and information, security
01:07
to businesses, a hole.
01:10
So if we're gonna line the i t strategy with the business strategy in relation to risk, then obviously that's going to require a lot of input from senior management. Because it's up the senior management to determine the approach or appetite for risks.
01:26
It's up the senior management to provide that alignment. Look at how certain risks affect the long term goals of the organization.
01:36
It's up to them to prioritize risk events and assets. So we're definitely going toe have tohave senior management involved here and for our I t folks, you got to get out of the basement for this one, right? Because we love our servers. We love our technology that they're really only relevant
01:55
in how they support the business
01:57
and how we lost that technology would create a loss for the business. So we gotta get out of the basement. As a matter of fact, on most of this test, you got to stay out of the basement. The Onley reason we have jobs. The only reason any of this is significant is how the business is impact.
02:15
So technology should help the business accomplish their goal. Shouldn't be there to hinder or, you know, provide resistance. So what we have to figure out is how we address risks in a manner that's consistent with the business that helps the business reach their goals.
02:34
Hey,
02:35
so when we talk about that again for full of point get out of the basement.
02:39
Communicate Senior Management said that understand the vision and strategy, Understand the organization, and I think you'll see several questions or you. You certainly could see several questions about
02:53
you've just been hired as a chief risk officer or is a risk practitioner or whatever you've been hired to do.
03:00
What is the first activity you should undertake?
03:04
Meet with senior management, meet with the heads of departments, understand the organization, understand how the organization functions, then understand how they approach risk before you ever jump right in and start collecting information
03:20
like you know what assets are and so on. We wanna understand the context. Remember how all those framework started with figure out the context or framed the risk? Well, that's what we're doing by meeting with other managers and understanding what the goals and objectives of the business are.
03:38
So
03:38
always start with the business and honestly, you know what always finish with business. We always start with the business. It wraps around to the decisions made with the business. It's all about the business. So if you're ever in a situation where
03:55
use a risk practitioner, recommend a B and C,
04:00
the business owner says those choices are too expensive and chooses not to implement any of them. Who wins the fight between you saying protecting him, saying now it's too expensive.
04:12
The business owner always wins that fight.
04:15
Now along with it, though, they have the liability. So if they make poor decisions, we get a compromise. They're the one's liable. They're the ones who are ultimately accountable for the protection of their assets.
04:29
All right, so making sure that our risks and our approach to risks are in alignment with the organization as a whole. Of course. So we have the same risk framework in I t that the rest of the organization works with. Ideally, we have the same lexicon. We have the same processes and methodology.
04:47
We want this to be a holistic,
04:49
complete or comprehensive approach to risk management.
04:56
All right, so, risk practitioner, that's us right now.
05:01
It depends on, you know, the very rarely in the company is a job title risk practitioner. So this might be your chief risk officer or, you know, whoever specifically responsible for information security risks.
05:21
First step
05:23
no, the business listen to the strategy because the business strategy will drive us to our risk strategy.
05:30
Seek out ways to secure our technologies and our processes,
05:36
analyze what's in place and determine if it's sufficient.
05:42
Build relationships between your business managers. You want those relationships to allow smooth communication.
05:49
Don't forget your chief financial officer. That's somebody you want to take out golfing one day because this is the person that signs the checks. And quite frequently we need funding in order to support the mechanisms that we want to put in place.
06:06
All right, so
06:09
a few more things be aware off and mitigate the risk of change.
06:15
There's only so much you could do about change. But being a forward thinking and understanding how changes on the horizon can impact our current risk profile and what we need to do about that sure, absolutely
06:29
create a culture that encourages the participation of risk management into business processes. That's really what we're ultimately working towards, right, an environment in which we make risk aware decisions were no longer making decisions for things like,
06:46
Well, it ain't broke, don't fix it. We're no longer making decisions based on
06:51
good enough, no longer making decisions on the idea of, Well, we can't do this because nobody will support it or it's too hard or any of those ideas were making risk aware business decisions
07:06
and then also understanding past events. In order to understand the context of where we are today, it often helps to look backwards. So what's happened in the past? How if we've been compromised?
07:18
Uh, what are the lessons that we learned from those events? And how can we take that information, move forward better?
07:27
Another element that's gonna be required in order for me to effectively support the organization is toe have a set of clearly defined roles and responsibilities where folks we're employees, business unit leaders, end users understand their role in the organization
07:46
and making sure that we don't have any sort of
07:50
gaps and responsibility
07:53
now with particular projects or particular implementations
07:59
endeavors. Whatever you want to say, it's often helpful toe have what we refer to as a racy chart.
08:07
So racy stands for responsible, accountable consult and inform. And yeah, that's gonna come up a reasonable amount on this test, particularly the difference between responsibility and accountability.
08:22
So almost which it was called an Arky matrix because really at the top of the food chain is accountable.
08:30
I am the one you come to, the buck stops here
08:33
I am someone that has the authority and capability off addressing whatever issues come up of allocating funds of providing resource is it ultimately comes down to me.
08:50
And yet you're gonna see most of the time that accountability going to the steering committee senior management. Every now and then you'll see Goto another department. But
09:03
most of the time it's here with senior management, occasionally business owners or the department managers, but frequently senior management.
09:13
So I have the ultimate accountability for the organization as a whole.
09:18
If there is a security breach, choose ultimately accountable.
09:22
You know, we're not finding the head of production. It comes straight to senior management. So there's that accountability
09:31
now responsibility. Oh, and by the way, you should have on Lee one individual accountable.
09:37
Now, you may have multiple responsible Sze responsible. They're the ones that get the work done.
09:45
Okay, so you can see the risk practitioner here on the end. There gonna be collecting the data. They're gonna be delivering the risk report. So the doers, if you will, so accountable at the top. These air, the ultimate ones you go to in relation to a risk
10:05
responsible there the worker, the worker bees, if you will
10:09
C stands for consult. So consult before I make a decision, I'm gonna consult with you
10:16
Inform. After I made the decision, I'm gonna let you know we decided. So this isn't written in stone. This isn't a testable. You need to know that department managers get consulted on informed response. Don't worry with that.
10:33
But I would certainly understand the context in the significance and how very helpful
10:39
a racy chart is. And this is really helpful to make sure that we're organized. Like I said in such a way that we have comprehensive coverage and then ultimately that's gonna lead us to information security, risk management in such a way that we don't have conflicts of interest. And we have,
10:58
uh, checks and balances in place. So when we talk about that idea of checks and balances, we should have three lines of defense within our organization.
11:07
I always think of Line one management control, ownership. This is the front lines. These are the folks in the trenches day today. The business owners. These air the folks that air ultimately implementing the controls.
11:26
They're ultimately monitoring the seeing if the controls are meeting the requirements. So they're the ones looking at K R
11:31
eyes and KP eyes. They're making sure that the security controls are implemented. You know, people processes technology on and really they are ultimately the ones that get their hands dirty with this. Okay, so the risk practice, I'm sorry,
11:52
Management control.
11:52
Now
11:54
the risk management element really could also be called governments because the responsibility here is to make sure that we have the processes and the programs. You know that we have the elements in place that were aligned with strategic direction,
12:13
that we have the elements to ensure legal compliance.
12:16
This usually is much higher up. So where, as with management controller ownership line one, they're responsible for tracking K R eyes at level two for risk management. What were ultimately responsible here is determining what the k r I should be
12:35
and having the ultimate sign off on making sure that our tests are providing us with the information that we need so choosing a framework. So the way I think of it as the first line of defense is the business.
12:48
Second line is risk governance, and then the third line is all of it,
12:54
right. The third line of defense is internal. Audit sometimes could be external. But ultimately, internal audit is watching for the process,
13:05
making sure the framework is implemented properly, making sure that it's adequate
13:11
and, you know, ultimately providing reports. Remember, always auditors
13:18
all of it and report
13:20
an auditor never fixes a problem.
13:24
They never put the audit on hold while they get their wrench and screwdrivers out. That doesn't happen. They just document
13:35
all right, And by the way, I will mention
13:39
that
13:41
we will talk more about the various roles and responsibilities with risk management in just a little bit.

Up Next

CRISC

This course on Certified in Risk and Information Systems Control is for IT and business professionals who develop and maintain information system controls, and whose job revolves around security operations and compliance.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor