Managing individual business risks is difficult when silos exist. An enterprise risk management (ERM) framework consolidates risk management strategy across an entire organization, enabling better visibility, measurement, and management of business objectives.
With a unified focus on addressing risk, compliance teams can universally improve regulatory compliance, governance, and risk management processes.
This article covers the importance of ERM and how to implement a successful ERM framework in your organization.
Enterprise risk management (ERM) is a strategy that addresses the entirety of an organization’s risks, breaking down silos across each business unit. This centralized approach enhances enterprise decision-making processes towards risk.
Risks traditionally covered by ERM include:
With digital transformation driving most organizations, IT implementations that cover cybersecurity risk are now commonplace in ERM frameworks.
Organizations often focus on certain risks over others. For example, financial risk has a highly visible impact on business performance. The board of directors can easily interpret budgets, sales performance, and other monetary values. Cybersecurity risk is not often as transparent. CISOs are faced with the difficult task of translating complicated IT jargon into digestible executive reporting. While cyber risk may not be as easily presented, it can have a domino effect on other types of risk if realized.
Below is an example of how cybersecurity risk can increase other types of business risk:
A financial institution is operating its online banking service over an insecure network. A cybercriminal discovers and exploits this vulnerability through a man-in-the-middle attack, gaining unauthorized access to internal systems. The hacker exfiltrates customer data to sell on the dark web, causing the following risk events:
With an effective ERM framework in place, key stakeholders could have predicted the broader impact cybersecurity risk management has on the entire organization.
There are several ERM frameworks available, and finding the right one comes down to several factors, including an organization’s size and industry. For example, healthcare and financial services have strict regulatory compliance requirements surrounding data security and should implement ERM frameworks that prioritize mitigating cyber risk.
Other factors which may determine your choice of framework include:
Learn more about Third-Party Risk Management >
Below are popular examples of ERM frameworks that provide a robust foundation for IT implementation within a traditional risk management model.
The Control Objectives for Information and Related Technology (COBIT) is an IT Governance Institute and the Information Systems Audit and Control Association (ISACA) publication. COBIT 2019, the most recent version of the framework, helps organizations create, monitor, and maintain IT governance and practices.
COBIT is ideal for IT implementations because it promotes collaboration, agility, and short feedback loops.
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is an adaptable set of fundamental guidelines designed to mitigate organizational risks and strengthen overall organizational security. NIST CSF is based on existing standards, guidelines, and practices for private sector organizations in the United States to better manage and reduce cybersecurity risk.
In addition to helping organizations prevent, detect, and respond to cyber threats and cyber attacks, it was designed to improve cybersecurity and risk management communications among internal and external stakeholders.
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) published the Enterprise Risk Management—Integrating with Strategy and Performance. COSO updated the framework in 2017 to reflect ERM’s importance in driving effective objective setting, strategy setting, and performance within modern business models.
The COSO ERM framework is an ideal risk management approach for financial organizations due to its incorporation of the Sarbanes-Oxley Act (SOX).
Learn more about the COSO ERM framework.
ISO 31000:2018 provides risk management guidelines that organizations from all industries can customize to their specific contexts. Organizations can implement these guidelines to improve their risk identification, resource allocation for risk treatment, and as an industry benchmark for ERM processes.
Learn more about ISO 31000:2018.
ISO/IEC 27001 (also called ISO 27001) is a global security standard for regulating data security through a code of practice for information security management. ISO/IEC 27001 issues a set of standards covering several aspects of information security, including information security management systems (ISMS), information technology, information security techniques, and information security requirements. Organizations can leverage ISO/27001 to implement effective cybersecurity risk controls to mitigate risk.
It’s best practice to follow one or more widely-adopted frameworks to follow an industry benchmark and set a strong foundation for ERM in your organization. From here, you can customize your chosen framework to align with business objectives and drive strategic decision-making.
Below are eight steps to developing and implementing an effective ERM framework.
A robust ERM framework follows a top-down approach to risk management practices, starting with buy-in from the senior management team. Your ERM committee should be built upon a cross-functional team, engaging key stakeholders across all business units in the strategic planning process.
ERM committee members are responsible for several outputs in their area of expertise, including:
During Step 1, the ERM committee should achieve the following outcomes:
The ERM team needs to pinpoint all internal and external risks which could negatively impact your organization. Your risk profile and RAS will help identify risks specific to your business strategy.
During Step 2, the ERM committee should achieve the following outcomes:
Performing a risk assessment allows your organization to calculate risk probability and manage risk more effectively. The ERM team will need to select a risk assessment methodology guided by the use of a risk assessment tool or template.
Learn how to perform a cybersecurity risk assessment.
Two popular examples of risk assessment tools include a risk control self-assessment (RSCA) and a risk assessment matrix.
A risk control self-assessment (RCSA) process involves assessing and examining the effectiveness of current risk controls. RSCAs are commonly performed in a workshop setting, allowing stakeholders to identify and assess risks and controls in their area of expertise. An RCSA should increase awareness of organizational objectives and outline the role internal controls play in achieving them.
The main purpose of an RSCA is to demonstrate that business objectives will be met through the following assurances:
Risk assessment matrixes visualize the probability of risk occurrence against the severity of its potential impact. By allocating potential risks into a matrix quadrant, you can determine which risks you should prioritize.
Below is an example of UpGuard’s Vendor Risk Matrix feature, which maps vendors’ security ratings (risk level) against their tier level (business impact).

During Step 3, the ERM committee should achieve the following outcomes:
The risk treatment step puts the previous 3 steps into effect. The ERM team must devise an incident response plan to define the risk control environment and provide mitigating strategies in the event an identified risk takes occurs.
Learn how to create an incident response plan.
The risk control environment will include areas of overlap between separate business units, as well as unique risk controls. Risk owners should be allocated to their respective risk controls and assigned clear roles and responsibilities for risk response.
The risk treatment should align internal and external controls with compliance requirements, laws and regulations, governance strategy, and business processes and objectives.
An ERM framework typically covers the following four stages of risk response:
1. Accept: Accept the risk if its probability and severity are acceptable and the potential consequences are outweighed by the financial costs required for risk mitigation. Continue to monitor the risk.
2. Avoid: Avoid the risk if it has a high business impact, i.e., high likelihood and high severity.
3. Reduce: Reduce the probability and severity of a risk event if the opportunity of the risk outweighs the financial loss and other consequences.
4. Share: Share the risk by transferring (outsourcing) it to a third-party or purchasing insurance for the risk. Keep in mind that outsourcing presents another type of risk – third-party risk.
During Step 4, the ERM committee should achieve the following outcomes:
The final step involves monitoring and reviewing your ERM program through data analytics to create an ongoing feedback cycle. Aggregating and filtering data manually is a time-consuming and complicated process, with room for human error. Risk optimization tools can help provide meaningful, accurate insights for faster, better-informed decision-making.
When choosing risk optimization tool/s, there are several factors for consideration, including:
For example, reducing cybersecurity risk requires continuous security monitoring to identify cyber threats and vulnerabilities as they emerge. This task is near impossible without the use of an attack surface monitoring solution. Organizations would likely gain a return on investment shortly after purchase with the use of such software. Faster risk identification enables faster remediation, reducing cybercriminals’ chances of exploiting detected security issues.
By following a similar approach to other areas of risk, the ERM committee should be able to identify the most cost-effective and necessary tools to gain a greater understanding of risk across all business units. Specialized ERM software offers a centralized cloud-based dashboard to input all key risk metrics and track KPIs.
During Step 5, the ERM committee should achieve the following outcomes: