Effective risk management

April 2005 Security Services & Risk Management

Operational risk and information security need to co-exist if businesses want to effectively manage risk.

A long time ago (about last Tuesday) organisations were able to put operational risk and information security into separate, watertight compartments. Operational risk sat in the audit department and probably reported to the CFO. While information security (if such a function existed) sat in the IT department and reported to the CIO (eventually).

Today, this approach is not a true solution to adequate risk management. Today's information dependent organisation requires these compartments to be broken down.

The most obvious reasons for breaking down the compartments, and the subsequent consequences of failure to do so, are easy to understand. In recent years we have been bombarded with legislation and regulation; such as Basel II (if you are a bank), the Turnbull report (if you are quoted on the London Stock Exchange) or the Sarbanes-Oxley Act (if you are quoted on the New York Stock Exchange). All of these effectively say that if you do not have in place adequate mechanisms for controlling and auditing the flow of information through your organisation; then your company will lose a lot of money, or someone important in it will go to jail - or both.

So operational risk people have woken up to the fact (if they did not realise it already) that the IT people are somewhat important in the process of information flow and audit. And the IT people (or at least some of them) have realised that to understand their job they ought to know a bit more about the business impact associated with the assets for which they are responsible.

As a result of this regulatory-inspired revolution therefore, the previously separate orbits of operational risk and information security have begun to overlap. If they have not yet done so in your organisation, then they soon will.

Unfortunately, each party seems to treat the other with mutual suspicion. Both seem to be defending their responsibility over the concept of 'risk'. Naturally, operational risk specialists feel that they are the experts in this area. But information security people in turn feel that operational risk people do not understand information security risk.

At this stage it might be useful to consider what we mean by operational risk and information security. Operational risk was defined by the Bank of International Settlements' Basel Committee in 1999 as: "the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events". Information security is defined in the international standard for information security management systems (ISO 17799) as: "preservation of confidentiality, integrity and availability of information".

So where is the conflict, or even overlap, between the two concepts? It seems clear that preserving the confidentiality, integrity and availability of information must involve people, processes and systems. And that failure of these would certainly serve to increase the risk of loss. Information security can therefore be seen to constitute an important factor in the control of operational risk. In this sense, information security might be seen as contributing to operational risk management, but playing a subordinate role.

However, information itself must be seen as fundamental to the operation of any business. It is impossible to run a successful business without detailed and specific information. Even digging a hole in the road requires information about local traffic conditions, the location and depth of the hole, the type of soil and rock that will be encountered and the likelihood of hitting water-pipes or electricity cables. Not to mention about the employees who will be doing the digging, their terms of employment and the tools they will be using. If you cannot trust the confidentiality and integrity of this information, you cannot be sure that you will be able to complete the job; and if the information is not available, you cannot even begin it!

In the wider sense, therefore, operational risk management is contingent on good information security. In turn, information security may be seen as conditioning operational risk. The problem lies in the understanding of 'risk'. Operational risk specialists spend their professional lives thinking about what it means to the business - in terms of its consequences and costs. Information security on the other hand has a poor track record of speaking meaningfully about risk in this way.

Historically, information security specialists have been familiar with networks and electronic threats and vulnerabilities. As a consequence, they have tended to live within the IT department; where they have thought a lot about the risk to the bits and bytes of networked assets, but not much about their criticality to the business as a whole. Whilst operational risk specialists have existed at a more rarified level, and have been unlikely to consider the consequences of the failure of the bits and bytes of information on which businesses now increasingly depend.

In the newly regulated world, these two levels of understanding must come together. To see how this could be done, let us look at possible controls for information security risk in a business. Such controls may be envisaged at a number of different levels in the business process. In the diagram below, five levels are considered; from operational security to strategic planning.

Information security risk control levels

Most business have put in place much of the technology that enables them to deal with operational security (firewall and anti-virus systems, for example). And successful businesses would quickly become unsuccessful if they failed to implement managerial and strategic planning controls. However, most businesses would admit that they have shortcomings in the intermediate levels between these two.

Perhaps the majority of serious shortcomings are at control level three. Few businesses have clearly identified all their critical information assets, still less have they understood what they need to do to protect their availability, or how to identify if their confidentiality or integrity have been breached. From the discussion above, it will be appreciated that information security generally operates at levels one and two, whilst operational risk works at levels four and five. Failures at level three are probably no coincidence therefore - as no group has clear responsibility for this level of control.

This failure to take responsibility for the identification and protection of business-critical information assets has further consequences. In the diagram above, the control levels are shown as arrows. The implication of this is that information must flow from operational security controls to managerial and strategic planning, and vice versa. Operational controls cannot be effective unless they are sensitised to what is strategically important to the business, nor can strategic controls be effective if they do not have a baseline derived from day-to-day operational security information.

It follows that any break in the chain will result in the complete or partial failure of the system to transfer information up and down the chain of control. Such failures must impact on the ability of the business to control its information security, and thus its operational risk. Therefore, if businesses are not implementing level three controls effectively, they must be on course for failure to meet the demands of regulation.

The conclusion is obvious. Operational risk and information security cannot afford to engage in a battle for who owns the responsibility for business risk. They must agree to a contract of mutual support. Operational risk needs to know more about the threats to, and vulnerabilities of, those vital networked assets; and information security needs to understand more about how to determine the business criticality of the assets for which they are responsible. In short, they need to meet and shake hands over the level three controls.

Jeremy Ward, service development director at Symantec
Jeremy Ward, service development director at Symantec

For more information contact Jeremy Ward, service development director at Symantec. www.symantec.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is AI the game-changer for streamlining anti-money laundering compliance?
Financial (Industry) Security Services & Risk Management
In the aftermath of South Africa's recent grey listing, companies are now confronted with the imperative to address eight identified strategic deficiencies, while simultaneously reducing their financial crime risk through anti-money laundering compliance processes.

Read more...
Five ways to reduce your cyber insurance premiums
Security Services & Risk Management News
With the global costs of cybercrime expected to soar to $13 trillion within the next five years, cyber insurance is booming as organisations try to mitigate the risk of financial losses.

Read more...
Client satisfaction boosted by 85% at Thungela Mine
Thorburn Security Solutions News Security Services & Risk Management Mining (Industry)
Thorburn Security, a division of Tsebo Solutions Group, has announced its recent collaboration with Kwa-Zulu Natal security company, Ithuba Protection Services, as part of its Enterprise Supplier Development (ESD) initiatives across Africa.

Read more...
Migrating to the cloud? Beware the many hurdles
IT infrastructure Security Services & Risk Management
While there are undoubtedly many benefits, there are also numerous hurdles to cloud adoption. Some of the biggest challenges revolve around managing cloud spend, understanding the cost components of cloud infrastructure, and how those costs can scale.

Read more...
Key strategies for businesses in the face of cyber threats
Cyber Security Security Services & Risk Management
Businesses face severe financial and reputational consequences due to data breaches and daily website hacks, and not all organisations are adequately prepared to combat these escalating threats.

Read more...
Planning for the worst is key to success
Technews Publishing Security Services & Risk Management
Planning for the worst is key to success when disaster strikes. Amidst frequent load shedding and often unpredictable stages of power outages, many businesses are concerned about the possibility of a total blackout.

Read more...
Protecting South African systems through XDR cybersecurity
Cyber Security Security Services & Risk Management
Carlo Bolzonello, Country Lead for Trellix South Africa, discusses how the country can protect its valuable digital assets through the artificial intelligence-enabled Extended Detection and Response (XDR) cybersecurity approach.

Read more...
[Sponsored] Protecting Against Ransomware Attacks: Lessons from Recent POPIA Fine
Cyber Security Security Services & Risk Management
According to Sophos' most recent ransomware report, an alarming 78% of the South African organisations that Sophos surveyed experienced ransomware attacks in the past year.

Read more...
Kaspersky launches Professional Services Packages for SMBs
News Cyber Security Security Services & Risk Management
Kaspersky has announced the launch of a range of Professional Services Packages for SMBs, offering tailored support products that help customers get the most out of their cybersecurity resources.

Read more...
AI-driven drones unleash new opportunities and risks
IT infrastructure Security Services & Risk Management
As AI-driven technologies continue to evolve, the incorporation of AI in drone capabilities has become a significant point of interest for many drone operators.

Read more...