SlideShare a Scribd company logo
Establishing the Core of an Effective
Technology Risk Management Program
Director, Security Development and Engineering
Effective risk
management
helps a company
pursue
opportunity
within the firm’s
risk appetite in a
controlled way
Risk and value are two sides of the same coin
Risk appetite is the level of risk that an organization is willing to accept while
pursuing its objectives, and before any action is determined to be necessary in
order to reduce the risk.
Risk is an opportunity
Begin with the end in mind
➢Effective and efficient risk management
➢Continuous demonstration of compliance
status
➢Minimal out of the business-as-usual
effort by operational and risk
management teams
“We may be very busy, we
may be very efficient, but
we will also be truly
effective only when we
begin with the end in mind.”
Steven Covey
What laws and regulations apply to your company or your
upstream partners and customers?
Establishing the Core of an Effective Technology Risk Management Program
The fog can be lifted –
excellent resources are already available!
Research and Whitepapers
▪ The core / intent of technology and security controls are similar among
regulations
▪ Leverage existing frameworks and control mapping crosswalks to
deduplicate, and gets single set of required applicable controls
Control
Testing
(Pass/Fail)
Issue
(Open/
Close)
Action
Plan
(Complete/
Incomplete
Control
Effective or
Ineffective
Process Level
Risk
Mitigated or
Not Mitigated
Risk Category
Rating
Regulatory and
Compliance
Requirements
Board
Regulators / Audit / Customers
Regulations
Internal
Compliance
Contracts
Policies and
Standards
Requirements
GRC Overview
Process Risk Control
Process Owner
Risk Acceptance
Prerequisites to Success:
Standardization - Save the user creativity for art class
• Correct mapping for laws > requirements > processes > risks > controls
• Lock down process, risk, control libraries and instantiate with limited flexibility
• Mandatory fields with standardized response options
Build infrastructure and guardrails from the start – An ounce of prevention
• Approval workflows for changes to key fields (dates, ratings, etc.)
• Preventative controls for data quality and integrity
• Access control
Clarify roles, responsibilities, and educate - No time for guesswork
• Control owner identification and education
• Automated system notifications for key actions and dates
• Leadership reporting with consequences
✓ Standardization
✓ Governance
✓ Accountability
ISO 31000
Now that you have a strong core:
use it to support the overall risk management process
Action Item for Today:
Identify the (top) 3 regulatory oversight
agencies, or regulations / standards that
impact your company.

More Related Content

PPT
Risk assessment and compliance 151119
PPTX
Risk - IT Services
PPT
Qpr 8 Risk Management And Compliance Solution
PPT
Beyond Compliance
PPTX
Risk Technology Strategy, Selection and Implementation
PDF
AI for control and risk management Scope, integration, use cases, challenges ...
PPTX
2. Risk Management.pptx
PPTX
mr neeraj - day 1 - compliance
Risk assessment and compliance 151119
Risk - IT Services
Qpr 8 Risk Management And Compliance Solution
Beyond Compliance
Risk Technology Strategy, Selection and Implementation
AI for control and risk management Scope, integration, use cases, challenges ...
2. Risk Management.pptx
mr neeraj - day 1 - compliance

Similar to Establishing the Core of an Effective Technology Risk Management Program (20)

PDF
Security Governance by Risknavigator 2010
PPT
Key Slides
PDF
SymEx 2015 - Turning Risks Into Results, A Wider Perspective to Understand P...
PPTX
2016 - IQPC - Understanding and Assessing Corruption Risk
PPTX
How to Drive Value from Operational Risk Data - Part 2
PPTX
Card Processing Risks.pptx
PDF
Banking & Financial Services Strengthening GRC In The Banking & Financial Ser...
PPTX
1-.Teklay-EFFORT (PPT) -April-2025- Risk Mgnt Top Mgmnt -Breifing.PPTX
PPTX
GMFI Conference (3)
PPTX
Risk Management Strategy (RMF v2)
PPTX
Creating Value Through Enterprise Risk Management
PDF
Risk Health Check
PDF
Risk Mgt
PPT
Manajemen Risiko Menurut COSO
PPT
Coso erm
PDF
Enterprise Risk Management.pdf
PPTX
Application Risk and Reward: Protect the value you create
PDF
Risk management is changing_Final LR
DOCX
Risk management
Security Governance by Risknavigator 2010
Key Slides
SymEx 2015 - Turning Risks Into Results, A Wider Perspective to Understand P...
2016 - IQPC - Understanding and Assessing Corruption Risk
How to Drive Value from Operational Risk Data - Part 2
Card Processing Risks.pptx
Banking & Financial Services Strengthening GRC In The Banking & Financial Ser...
1-.Teklay-EFFORT (PPT) -April-2025- Risk Mgnt Top Mgmnt -Breifing.PPTX
GMFI Conference (3)
Risk Management Strategy (RMF v2)
Creating Value Through Enterprise Risk Management
Risk Health Check
Risk Mgt
Manajemen Risiko Menurut COSO
Coso erm
Enterprise Risk Management.pdf
Application Risk and Reward: Protect the value you create
Risk management is changing_Final LR
Risk management
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
KodekX | Application Modernization Development
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KodekX | Application Modernization Development
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Ad

Establishing the Core of an Effective Technology Risk Management Program

  • 1. Establishing the Core of an Effective Technology Risk Management Program Director, Security Development and Engineering
  • 2. Effective risk management helps a company pursue opportunity within the firm’s risk appetite in a controlled way Risk and value are two sides of the same coin Risk appetite is the level of risk that an organization is willing to accept while pursuing its objectives, and before any action is determined to be necessary in order to reduce the risk. Risk is an opportunity
  • 3. Begin with the end in mind ➢Effective and efficient risk management ➢Continuous demonstration of compliance status ➢Minimal out of the business-as-usual effort by operational and risk management teams “We may be very busy, we may be very efficient, but we will also be truly effective only when we begin with the end in mind.” Steven Covey
  • 4. What laws and regulations apply to your company or your upstream partners and customers?
  • 6. The fog can be lifted – excellent resources are already available! Research and Whitepapers ▪ The core / intent of technology and security controls are similar among regulations ▪ Leverage existing frameworks and control mapping crosswalks to deduplicate, and gets single set of required applicable controls
  • 7. Control Testing (Pass/Fail) Issue (Open/ Close) Action Plan (Complete/ Incomplete Control Effective or Ineffective Process Level Risk Mitigated or Not Mitigated Risk Category Rating Regulatory and Compliance Requirements Board Regulators / Audit / Customers Regulations Internal Compliance Contracts Policies and Standards Requirements GRC Overview Process Risk Control Process Owner Risk Acceptance
  • 8. Prerequisites to Success: Standardization - Save the user creativity for art class • Correct mapping for laws > requirements > processes > risks > controls • Lock down process, risk, control libraries and instantiate with limited flexibility • Mandatory fields with standardized response options Build infrastructure and guardrails from the start – An ounce of prevention • Approval workflows for changes to key fields (dates, ratings, etc.) • Preventative controls for data quality and integrity • Access control Clarify roles, responsibilities, and educate - No time for guesswork • Control owner identification and education • Automated system notifications for key actions and dates • Leadership reporting with consequences ✓ Standardization ✓ Governance ✓ Accountability
  • 9. ISO 31000 Now that you have a strong core: use it to support the overall risk management process
  • 10. Action Item for Today: Identify the (top) 3 regulatory oversight agencies, or regulations / standards that impact your company.