• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

Redefining the Meaning of Operational Risk

The definition of “operational risk” is variable, but it generally covers the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events.

I, however, want to re-examine this general definition and so that the definition of operational risk takes into account all the cyber security related risks that are currently plaguing organizations today. With the current definition, one cannot quantify internal processes and people. So, for example, organizations can ask themselves a few questions. When is there an event that causes a disruption? What in the organization’s internal processes failed? What aspect relating to people needs to re-examined?

We know that operational risk exists in every organization and that size does not matter. What matters, however, are two critical areas that need to be included in the operational risk definition:

  • Internal Controls
  • User Awareness

We have seen (and are still seeing) how organizations (Again, size does not matter.) have experienced intrusion or losses due to lack (or oversight) of internal controls. Although various organization-style certifications exist that verifie all is in place, organizations are dynamic in nature, and internal controls as well as processes change in a little as a year.

Internal controls need to be constantly monitored by the CISO, CIO and internal audit personnel to ensure that changes are managed. Monitoring internal controls must be considered a Standard Operating Procedure (SOP), as this exposes an organization’s crown jewels to unwanted attacks. Now internal controls usually span a broad spectrum but can generally cover such areas as:

  • User Account Management
  • Access to key information based on a need to know basis
  • Defense in depth
  • Network Segmentation

The umbrella to the above consists of alert mechanisms. Knowing that alerts are being generated is one thing, but paying attention to these alerts, analyzing (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/risk-based-security-for-executives/redefining-meaning-operational-risk/

Tags: CISOOperational RiskRisk-Based Security for Executivessecurity
2 years ago
Tripwire Guest Authors

Related Post

  • Why Hackers Love the Pandemic

    The novel coronavirus pandemic has been a boon for cybercriminals seeking profit amid chaos. Tanium's…

  • 5 Reasons Why Mobile Application Security Fails

    Traditionally, large organizations and the enterprise have been the focus for hackers and malicious attacks,…

  • The CISO’s Dilemma: Balancing Security, Productivity With a Housebound Workforce

    How are CISOs managing the tug-of-war between IT security and worker productivity in this new,…

Recent Posts

  • Cybersecurity
  • Data Security
  • Featured
  • Incident Response
  • Network Security
  • News
  • Security Boulevard (Original)
  • Spotlight
  • Threats & Breaches

EU Vaccine Regulator Hacked for Pfizer/BioNTech Info

The European Medicines Agency (EMA) says it was hacked by persons unknown.

11 mins ago
  • Press Releases

NewDay Scores with TigerGraph Cloud to Fight Financial Fraud

Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…

1 hour ago
  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

3 hours ago
  • Security Bloggers Network

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

3 hours ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

4 hours ago
  • Network Security
  • Security Bloggers Network

Being a Defender

1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…

4 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t