IT risk management is the process of managing cybersecurity risks through systems, policies, and technology. This process consists of three primary stages - identification, assessment, and control to mitigate vulnerabilities threatening sensitive resources.
The terms IT risk and information risk are often used interchangeably. They both refer to risk that threatens the protection of sensitive data and intellectual property.
Information Technology risks, both inherent and residual, are present in every organization. IT risk management is, therefore, an essential practice for every business.
Risk refers to decision-making situations where all potential outcomes, and their likelihood of occurrence, are known. On the other hand, uncertainty refers to decision-making situations where nothing is known - neither their potential outcomes nor their likelihood of occurrence.
A successful IT risk management plan reduces uncertainly and empowers decision-makers to be completely aware of all information risks in their digital landscape.
An IT risk management program minimizes the impact of data breaches, which could translate to considerable costs savings. The global average cost of a data breach in 2020 was US$3.86 million.
In addition to cost savings, an IT risk management plan has the following benefits:
The Virginia Mason Medical Center in Seattle, Washington secured their patient safety department with an IT Risk Management plan in 2006. The resulting program was called the Virginia Mason Production System (VMPS).
Since implementing VMPS, Virginia Mason has increased transparency in patient risk mitigation, disclosure, and reporting. This resulted in a significant drop in hospital professional premiums.
An IT risk management (IRM) framework must account for an evolving threat landscape. As a result, a single set of policies or strategies will not suffice. Because cyberattack tactics are constantly changing, risk management frameworks must be capable of addressing multiple cyber threats through a combination of different control strategies.
When used harmoniously, these strategies should help decision-makers confidently answer the following questions:
The essential requirement of an IRM program that will help answer the above questions include:
These essential requirements can be met with the following 7 risk management strategies
All risks that could be potentially detrimental to processes and information security must be identified. Digital transformation has made this task exceedingly difficult since most company data is now stored in the cloud.
The inexorable proliferation of digital solutions obfuscates digital footprints making it difficult to identify assets and map their relationship to specific processes. This lack of transparency results in many attack vectors being overlooked, placing cloud-based platforms at a higher risk of cyberattacks.
The first step to unmitigated risk transparency is to identify all of your assets and their locations. This can be achieved through digital footprint mapping.
An attack surface monitoring solution could also identify all of your corporate assets and surface potential risks and vulnerabilities.
After identifying all assets and their locations, the level of risk of the data stored in them needs to be quantified.
Not all sensitive data is equal in the eye of a cybercriminal, some categories are more coveted than others.
A study by IBM and Ponemon found that 80% of assessed data breaches involved customer Personal Identifiable Information (PII).

Sensitive data that offers compounding financial returns to cyber criminals are at the highest risk of being targeted. When customer data is stolen, each victim is targeted in phishing attacks. Each phishing campaign then uncovers new victims that can then be targeted in new phishing attacks, extending the pernicious attack cycle.
The level of risk for each data type can then be calculated with a risk formula.
A simple formula for calculating risk levels is as follows:
Risk Level = Likelihood of a data breach X Financial impact of a data breach.
Probability analysis is used to then calculate the potential of each identified risk occurring. This is can be evaluated with a risk matrix.
To keep the costs of internal security operations lean, response efforts must be efficiently distributed so that the most critical IT risk are addressed first.
This can only be achieved if critical risks are correctly classified. Though some risk calculations are quite accurate, their evaluation involves a lengthy manual process.
Besides accuracy, speed is another critical variable in IT rIsk analysis because it affects the impact level of a data breach if risks are exploited by cybercriminals.
Victims that respond to data breaches in less than 200 days save an average of $1.12 million.
The idea solution should be capable of correctly classifying security vulnerabilities and prioritizing them for efficient remediation.
The UpGuard platform meets these two requirements. Users can see a list of all unaddressed vulnerabilities (both internally and in the vendor network) ordered by criticality. Each risk can then be rapidly addressed through the platform's remediation management feature.
With all IT risk and their likelihood of exploitation known, a risk appetite needs to be established. Risk appetites help organizations decide which control measures should be assigned to each risk factor. There are 5 control options:
.png)
A risk appetite (or risk tolerance) sets the maximum level of risk that can be accepted before mitigation efforts are implemented.
Learn how to calculate the risk appetite for your Third-Party Risk Management program.
MIitgation controls should be implemented for each type of risk that surprises the risk threshold. These controls should assess the highest-ranked IT risk first.
These controls should be supported with Incident Response Plans (IRP) to help security teams respond to threats in a timely and controlled manner.
IT risk mitigation controls include:
Risk can also be mitigated through a cybersecurity framework. There are many information security risk management frameworks available. The most reputable are listed below.
In many instances, it's more efficient and less burdensome for internal security teams to transfer critical risks to either an outside party or a cyber insurance entity.
Partnering with data storage, or backup, solutions will transfer and mitigate the risk of service interruption in the event of a data breach. Such a partnership also mitigates the risk of internal threats since employees will not have access to all data resources; and natural disasters because there's little chance that the same environmental damage will occur at two dispersed locations.
IT monitoring methodologies should be implemented to track the progression of both mitigated risks and ignored risks within the risk appetite.
An example of an IT risk monitoring control is an attack surface monitor solution capable of scanning both in the internal and third-party network. Such a wide and deep level of transparency keeps organizations aware of the state of each risk, any related risk, and which vulnerabilities surpass the risk appetite.
Monitoring controls should also assess the effectiveness of mitigation controls. Cyberattackers are always adjusting their tactics to evade security defenses and mitigation strategies. A recent example the use of ransom software in a supply chain attack by cybercriminal group REvil.
Security ratings give security teams and stakeholders insight into the security posture of their organization, all of its subsidiaries, and vendors. This feature also instantly confirms the effectiveness of all remediation efforts.
When the immediate feedback functionality of security ratings is combined with attack surface monitoring controls, organizations are confidently aware of the likelihood of a data breach occurring, at any point in their IT environment, at any time.
Cybersecurity KPIs are the biding agents that ensure all IT risk monitoring efforts are supporting overall security objectives. They also facilitate meaningful reports for IT security teams and stakeholders.
Here are 14 important metrics that should be implemented in your IT risk management program.
1. Level of preparedness
2. Unidentified devices on internal networks
3. Intrusion attempts
4. Security incidents
5. Mean Time to Detect (MTTD)
6. Mean Time to Resolve (MTTR)
7. Mean Time to Contain (MTTC)
8. First party security ratings
9. Average vendor security rating
10. Patching cadence
12. Company vs peer performance
13. Vendor patching cadence
14. Mean time for vendors incident response
Learn more about cybersecurity KPIs
The proliferation of data breaches has placed a greater responsibility on organizations to secure their networks and protect customer data. These best security practices are enforced through regulatory compliance.
Industries at the highest risk of cyberattacks, such as financial services and healthcare, are bound to regulatory laws and the security frameworks that facilitate regulatory compliance.
Some examples of regulatory compliance standards are the General Data Protection Regulation (GDPR) for residents in the European Union and CPS 234 for APRA-Regulated organizations.
The chart below demonstrates the top 4 industries being targeted by cybercriminals in Australia. This also reflects global data breach trends.

Industries that are not regulated will still benefit from implementing regulatory frameworks to benefit from their advanced data breach protection controls.
The International Organization for Standardization (ISO) consists of a range of standards to suit all organizations and sectors. The most popular ISO standards for IT security are ISO 27001 and ISO 3100.
The ISO 27001 family offers requirements for data security management systems, and the ISO 3100 family can provide guidance of internal risk audits.
ISO has published over 22,700 standards to meet almost every information security requirement. The video below will provide some guidance on which ISO family is suitable for your business risk requirements.
The National Institue of Standards and Technology (NIST) has
Ensuring vendor compliance with regulatory standards is an essential component IT risk management since third-party breaches account for almost 60% of data breach events.
This can be achieved through risk assessments and security questionnaires. To support the efficient risk management of information systems, vendor security questionnaires should be managed via a security solution such as UpGuard. This will
This will alleviate the logistical nightmare of manually tracking the status of multiple risk assessments in spreadsheets.
The UpGuard platform supports the following security questionnaires:
For highly specific IT risks assessments UpGuard offers a custom security questionnaire builder. that allows existing questionnaires to be edited or completely custom questionnaires to be created.