Strategic Management of IT Risk SIM ACADEMIC Saturday December 11, 2004

advertisement
Strategic Management of IT Risk
SIM ACADEMIC
Saturday December 11, 2004
This research was made possible
by the support of CISR sponsors
and, in particular, CISR patrons
Gartner and DiamondCluster.
George Westerman
Center for Information Systems Research (CISR)
MIT Sloan School of Management
Phone: (617) 253-2939, Fax: (617) 253-4424
georgew@mit.edu, http://mitsloan.mit.edu/cisr/
Four key enterprise IT risks
Objective
Definition
Continuity
Keeping existing processes running and recovering from
interruptions
Ensuring that people have appropriate access to
Access
information and facilities they need, but that unauthorized
Management
people do not gain access
Integrity
Ensuring that information is accurate, timely and complete,
and meets the requirements of internal and external
stakeholders
Strategic
Change
Ensuring that new strategic initiatives, such as acquiring a
firm, conducting a major business process change, or
launching a new product / service, can be successfully
implemented when needed
© MIT Sloan Center for Information Systems Research 2004 - Westerman
Center for Information Systems Research
1
Key drivers of IT risk*
1.
2.
3.
4.
5.
6.
7.
8.
9.
*
Old/complex infrastructure
Non-standardized infrastructure or applications
Poor infrastructure management (patches, backup, etc.)
Knowledge of legacy or new skills missing
Over reliance on contractors or key employees
Poorly understood systems and processes
Applications do not meet business or
regulatory requirements
Major change underway or recently completed
Lack of RM process and awareness (will discuss later)
These drivers had statistically significant correlations with two or more of continuity, access management,
integrity and/or strategic change risk, based on 119 survey responses. Drivers listed here are summary level
combinations of multiple items from the survey.
© MIT Sloan Center for Information Systems Research 2004 - Westerman
Center for Information Systems Research
Hierarchy of IT risk factors
Poor IT/Business relations
Customers demand integrated service
Missing skills for new initiatives
STRATEGIC
CHANGE
Apps do not meet business requirements
Big implementation underway
(or recently complete)
Manual data integration required
Applications need standardization
Network not reliable to all locations
Lack of internal controls Non-compartmentalized data
Infrastructure not standardized
Old technology
Ineffective patch management
Poor backup/recovery
Over reliance on key employees or contractors
Poorly understood processes and applications
INTEGRITY
ACCESS
MANAGEMENT
CONTINUITY
Each factor in a category (level) of the IT risk pyramid is statistically significantly correlated with the
amount of risk in that category, and with one or more levels above it, based on 119 survey responses.
© MIT Sloan Center for Information Systems Research 2004 - Westerman
Center for Information Systems Research
2
Three elements of effective IT risk management
Risk Governance
Complete & effective risk-related
policies combined with a mature,
consistent process to identify,
assess, prioritize, & monitor risks
over time.
IT Installed Base
Simplification
IT infrastructure
and applications
that have inherently lower risk
because they are well-architected
and well-managed.
Risk Expertise and Awareness
Skilled group of people who know how
to identify and assess threats and
implement effective risk mitigation.
The rest of the staff is risk-aware.
Center for Information Systems Research
© MIT Sloan Center for Information Systems Research 2004 - Westerman
Good process enables clearer decisionmaking
Security Risk Map from EquipCo (2002)
Risk
 DOS Safeguards
High
 Disaster Recovery /Continuity
 Infrastructure vulnerabilities
 Anti-virus
Business Impact
 User education
 Cyber crime
 Information privacy
 Access Management
 Supply chain security
 Application security
 Web Services
 PKI -Key Management
 Wireless LAN’s
 Email encryption
 PDA / Handheld’s
 Secure IM application
Low
Low
Probability of Threat
© MIT Sloan Center for Information Systems Research 2004 - Westerman
High
Center for Information Systems Research
3
Conclusion: Strategic Management of IT Risk
 IT risks are complex (and can be very costly)
• IT threats and vulnerabilities drive four key enterprise
risks
• Risk factors are inter-related
• Risk factors form a hierarchy
 Process is a critical component of risk management
capability
 IT risk management can be a strategic tool
• Avoiding surprises
• Reducing fire-fighting (increasing focus on valueproviding activities)
• Improving IT’s ability to do strategic change
• Better relationships between business and IT
© MIT Sloan Center for Information Systems Research 2004 - Westerman
Center for Information Systems Research
4
Download