Research debunks common myths associated with IT risks
Posted on 01 February 2008.
Symantec IT Risk Management Report Volume II reveals that awareness of the importance of IT risk management is increasing, however several myths persist. Despite the finding that practitioners are embracing a more balanced approach that encompasses security, availability, compliance and performance risks, misunderstandings of IT risk management can lead to potential IT system failures, and ultimately impact business continuity. The report also indicates process issues cause 53 percent of IT incidents, while IT often underestimates the frequency of data loss incidents.



Myth One: IT Risk is Security Risk

Despite traditional perceptions associating IT risk primarily with security risks, survey results indicate the emergence of a broader view among IT professionals. Of the survey respondents, 78 percent gave “critical” or “serious” ratings to availability risk as opposed to security, performance and compliance risks, with 70, 68 and 63 percent respectively. The fact that only 15 percent separate the highest and lowest scoring risk-types indicates that IT professionals are adopting a more balanced, less security-centric view of IT risk.

The report findings confirmed that security and compliance risks often attract attention because of their high visibility and impact—63 percent of respondents rated data loss incidents as having a serious impact on their business. However, increased emphasis is being placed on availability risks, which the report shows can flow through the value chain and create impacts measuring in millions of dollars, even from minor performance issues.

Myth Two: IT Risk Management is a Project

The myth that IT risk management can be addressed in a single project, or even as a series of point-in-time exercises across budget periods or years, ignores the dynamic nature of the internal and external IT risk environment. IT risk management should be approached as an ongoing process in order to keep pace with the changing landscape businesses face today. IT security, availability, compliance and performance incidents can impact the modern organization at an alarming rate.

The report revealed the following regarding the frequency of different types of IT incidents:
  • 69 percent expect a minor IT incident once a month;
  • 63 percent expect a major IT failure at least once a year;
  • 26 percent expect a regulatory non-compliance incident at least once a year;
  • 25 percent expect a data-loss incident at least once a year.
The report shows that the most effective organizations take a more holistic approach. However, many organizations appear to be failing to implement some fundamental risk management controls, such as asset classification and management, where only 40 percent of participants rate their performance as 75 percent effective or higher. In addition, only 34 percent of participants believe that they have an up-to-date inventory for their wireless and mobile devices, which are essential in today’s business world.

Myth Three: Technology Alone Mitigates IT Risk

While technology plays a critical role in risk mitigation, the people and processes supported by technology also determine the effectiveness of an IT risk management program. According to the report, process issues cause 53 percent of IT incidents. Several controls also showed a decline in ratings from the previous report one year ago, causing increasing concerns. For instance, process controls such as training and awareness decreased from nearly 50 percent in Volume I to only 43 percent of respondents rating their training and awareness programs as more than 75 percent effective.

Similar to Volume I, the new report also shows very little improvement for the low rating of the asset and inventory classification control. Finally, only 43 percent of participants rate data lifecycle management “greater than 75 percent” effective, a 17 percent decline from Volume I. Weakness of these controls suggests that assets will be treated equally, so that some systems, processes and objects will be overprotected and others under protected from IT risk, resulting in cost and service inefficiencies.

Volume II of the IT Risk Management Report highlighted a 10 percent improvement in the number of participants rating secure application development “more than 75 percent effective.” The report also signals that problem management is rising on the agenda.

Myth Four: IT Risk Management Has Already Become a Formal Discipline

The report makes it clear that IT risk management is an evolving business discipline, rather than a precise science, due to reliance on the experience accumulated by individuals and organizations as they keep pace with a changing business and technology environment. There is a growing understanding that IT risk management incorporates elements of operational risk management, quality control and business and IT governance. In addition, practitioners may come to see IT risk management as a set of fixed principles and relationships, universally applicable across industries and geographies.

Industry Differences

The report also sheds light on the state of IT risk management within particular industries. Highlights include that healthcare participants expected the most IT incidents of any industry sector. Given the complexity and highly personal nature of healthcare services, as well as stringent compliance requirements, this is cause for some concern.

Telecommunications ranked highest in deploying IT risk management controls, followed closely by banking and financial services. This success is likely driven by increased governance and compliance scrutiny of these sectors and concerns over the protection of personal data.





Spotlight

Using Hollywood to improve your security program

Posted on 29 July 2014.  |  Tripwire CTO Dwayne Melancon spends a lot of time on airplanes, and ends up watching a lot of movies. Some of his favorite movies are adventures, spy stuff, and cunning heist movies. A lot of these movies provide great lessons that we can apply to information security.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //