You are on page 1of 12

FEATURE

Enterprise Risk Monitoring


Methodology, Part 2
An enterprise risk monitoring process requires the focus on process control rather than operational
involvement of all the internal processes in the control, even if at the expense of losing a bit of
organization but under different perspectives, due granularity in the risk analysis.
to the processing of data having different degrees
of granularity. This is generally considered a A different methodology is necessary to integrate
complex and time-consuming effort in linear the operational risk with the strategic risk and with
proportion to the size of the organization. The most any general control framework based on business
obvious goal is to contain the costs of managing outcomes’ evaluation.
the risk-monitoring process while seeking high-
quality outcomes, reducing the time, effort and the In this situation, it is necessary to change the
complexity of the operation. perspective and start from the operating rules of the
business instead of from the operating actions.
This methodological approach keeps the process Action is the implementation of the rule. The risk of
simple and doable even in very large and not being able to meet expectations is a function
complex organizations. calculated according to three indicators: maturity
level to implement the solution, expected loss
Enterprise Risk Assessment missing the expectations and worst-case
scenario likelihood.
There is a need to evaluate a broader set of risk
areas for the top-level of the organization, with a The level of implementation or enforcement of a
rule is the basis for its risk evaluation. The gap, with
respect to full implementation, is the metric to
evaluate the risk. Rules coming from all the control
frameworks adopted in the organization make up a
wide set of variables that will allow for the building
of a flexible method to evaluate all the risk factors
practitioners want if they use a suitable algorithm.

The Concept
The concept behind this methodology is that the
operating rules in an organization are issued to
achieve the business objectives and to highlight any
issue in opposition to objectives. So, indirectly,
evaluating the rules’ enforcement provides a basis
for calculating exposure to the risk. In other words,
Luigi Sbriz, CISM, CRISC, ISO/IEC 27001:2013 LA, ITIL v3,
it is similar to an evaluation of vulnerability.
UNI 11697:2017 DPO
Has been the risk monitoring manager at Magneti Marelli for more than
four years. Previously, he was responsible for information and The idea of building an appropriate set of rules is to
communications technology operations and resources in the APAC region split the organization into its basic constituent
(China, Japan, Malaysia) and, before that, was the worldwide information rules—a few hundred rules taken from policies,
security officer for more than seven years. For internal risk monitoring, he procedures, contractual constraints, regulations,
developed the described methodology, merging an operative risk analysis laws, standards and so on. For each rule selected, it
with a consequent risk assessment driven by the maturity level of the is necessary to assess its current level of
processes. Also, he designed the cybermonitoring tool. Sbriz was also a
implementation, and the assessment is provided by
consultant for business intelligence systems for several years. He can be
an accountable party or “expert” for that rule.
contacted directly at https://it.linkedin.com/in/luigisbriz or his current
contact information can be found at http://sbriz.tel. Reassembling the rules, singularly evaluated,

© 2019 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOL 2 1


following the controls (made of one or more rules) representing its severity—a colored label after the
of a chosen framework enables extracting a text of the control (figure 1). The relevance of the
complete risk estimation under that framework. severity flag is not only in the impact of its weight in
the consolidation, but also as a level of mandatory
Practically, this is possible by creating a relationship application of the rule for the organization. When
between the rules and the controls; for each control, severity is high, it means that the missing
all the rules having impact on it will be identified. compliance needs a mandatory remediation plan,
Aggregating the evaluations of the rules selected and completion as soon as possible is required.
for a control, it will be possible to assess the level of
implementation of that control. Appropriate weights It could happen that two or more risk assessors
per rule are used in the calculation or consolidation entitled to answer on the same rule/control have
of the risk for all the levels of the framework. different evaluations. In that case, only the worst
will be recorded.
Therefore, the first step of the methodology is to
identify the operating rules of the organization. A Maturity Level
practical approach could be reading the operating
procedures of the internal processes or The first step to be taken is the definition of a metric
departments and, for each of them, identifying the to measure the level of implementation of a rule.
actions necessary to perform their operations. Any The method requires a qualitative assessment but
action or group of them is a rule. Should it be with a hidden numeric twin to allow easy analytic
necessary, it is possible to split the action into sub- calculation and consolidation of the results. So, any
actions, but only if there is a realistic need to qualitative item should be able to be shown as a
manage them differently (i.e., separately in different number or vice versa. What is proposed is a seven-
contexts). Otherwise, the split is not necessary (to level ranking (figure 2). Each level is determined by
avoid exceeding the number of selected rules). weighting to address the different levels of severity
between the levels proposed from the risk
perspective.
Rule Enforcement Evaluation
Evaluation consists of an estimation of the level of Evaluation should not measure performance (how
maturity, the expected economic loss and the the rule has provided results in the past or at
likelihood of the worst outcome. The metrics present), but the prospect of addressing a risk in the
adopted are qualitative because, for each rule, it is future. In other words, if the result achieved can be
necessary to collect the feeling of the expert about improved, even when it is formally compliant, the
that rule. An analytic consolidation is automatically maximum answer is “Further attention” because,
provided by the system using a numerical from a risk perspective, improvements could be
conversion for each qualitative item. made to reduce the risk exposure. For example, a
rule such as “Payment of the software licenses is
The basic rule is called the “control statement” and mandatory” may exist. If the licenses of any
must be uniquely coded. At the end of its software acquired are paid, but no regular check on
descriptive text (narrative), there is also a label the already installed software is performed, the level
Figure 1–Maturity Level Assessment—Data Entry

2 ISACA JOURNAL VOL 2 © 2019 ISACA. All rights reserved. www.isaca.org


Figure 2–Rating of the Maturity Level

of compliance has not been reached because the


current control can be improved (with the
monitoring of the installed software). THE EVALUATION OF
THE EXPECTED LOSS
Loss Expectancy
MAKES SENSE ONLY
After evaluating the maturity level, it is necessary to
define the level of expected economic loss if WHEN THE PROBABILITY
compliance is not achieved. Even the expected loss OF ITS OCCURRENCE IS
is declared using a qualitative set of elements. Any
loss is weighted using a percent of the business CLEAR.
unit’s intrinsic value (I.V.), as shown in figure 3.
yearly turnover or relocation cost or total value of
The I.V. is the overall economic value assigned to
the main contracts or another value considered
the business unit (entity under assessment) to
representative for the specific business unit. This
establish its value in the event of its unavailability in
value can be reviewed during the budgeting process
order to achieve the objectives of the organization.
as a target for the business. From a risk analysis
Depending on the kind of business, it could be

Figure 3–Rating of the Expected Economic Loss

© 2019 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOL 2 3


perspective (as it is based on a future scenario), a to complete it. Neither the name of the person nor
target value for the future means better the overall the day are allowed because it is necessary to
reference value for the business. know the proper organization role leading the
solution, and a period is easier to estimate than
Worst-Case Likelihood a specific date.

The evaluation of the expected loss makes sense The second information area is an explanation and
only when the probability of its occurrence is clear. is always recommended when it is necessary to
As with other measures, the evaluation of the worst- understand the severity of the issue. Typically, the
case scenario is made with a qualitative indicator of explanation is addressed to a person (risk analyst,
likelihood matching a hidden analytics probability auditor) who does not know the process under
(figure 4). evaluation and, for this reason, the explanation
must be clear and essential.
The reason the maturity, loss and likelihood
measures are qualitative assessments, not
Risk Calculation
quantitative, is to ensure easier management of the
data entry by the end user. The consideration for Several methods can be adopted for the calculation
this decision depends on the events being of the risk, but the recommendation is to use the
managed; the events are in the future so the easiest. The method used here avoids complex
determination of a number is tougher to manage calculations by exploiting all the possible
with respect to a small set of qualitative items. How combinations (Cartesian product)1 of three input
many elements will be adopted (i.e., ternary scale, parameters (maturity, loss expectancy, likelihood)
five-value scale) is not so significant because a together and assigning a risk level for each. Risk
precise estimate is not expected as it is an estimate level is the output (figure 5).
made by a person for a potential event in the future.
It is random enough to not require great precision. The risk function is implemented by a small table of
three input parameters, three columns dedicated to
Remediation and Explanation maturity, loss expectancy and likelihood, while the
last column provides the output (risk level). With an
The assessment of the level of application of the SQL selected on this, a risk matrix is performed for
rule cannot miss two further information areas. the transformation of the maturity assessment in a
They are optional when the unit is compliant or risk level; this means great flexibility and minimal
mandatory if noncompliance is determined. The complexity. The management of the Cartesian
first area is a remediation plan, but reduced to the product is simple because the logical relationship
essential. The remediation plan is synthetically maturity/loss/likelihood with the risk level is kept in
summarized according to only two pieces of natural language and by an easy script that is
information: the organizational position having truncated and populated against the risk matrix
accountability to solve the problem and the period when anyone wants to update some risk level.

Figure 4–Rating of the Worst Scenario Likelihood

4 ISACA JOURNAL VOL 2 © 2019 ISACA. All rights reserved. www.isaca.org


Figure 5–Rating of the Risk Level

In any moment, the level of the risk can be viewed provided by the risk assessor can be changed by
either as qualitative data or as numerical data with the certifier. In this case, a suitable flag indicates
minimal effort by the use of the risk master file that this change and the answer becomes unchangeable
has stored the qualitative/quantitative relationship, for the risk assessor for a certain period.
the displaying styles, the labels and the weights for
the consolidation. So, in the same way, the three The auditor is independent relative to the entity or
input parameters are stored in master tables having the working process considered and acts on the
all the relationships needed in the calculation or in complete set of rules directly onsite. Three different
the presentation of the data switching between kinds of checks can be performed: interview of
analytical or textual or vice versa. This enables one involved people, analysis of documented
on-the-fly inquiry to extract the risk outcomes in information and observation. As the certifier, the
terms of value (qualitative/quantitative) and auditor can change any evaluation, which will block
presentation features (i.e., fonts, icons, colors). data entry for a certain period (a parameter defined
in the system) to the local risk assessor and to the
Self-Assessment Certification risk certifier. See figure 6 for a matrix reflecting the
different levels of assessment and certification of
Basically, the enterprise risk assessment process the statements.
described here is intended as a self-assessment
process. It is organized to gather information at the The assessment provided is kept valid for a fixed
entity level, involving all the local departments or period and then automatically placed in the expired
processes based on the experience of the status. A good choice as a value for the period is
managers involved in completing the checklist. Of the time interval between a revaluation and the
course, it is necessary to ensure harmonization and following. The auditing can be split if it has been
control of the answers provided. Recalling the certified using an interview (trust with the answer)
Responsible, Accountable, Supported, Consulted, and through an audit, i.e., if an independent test
Informed (RASCI) matrix, there are two additional (without data prepared by the interviewed person)
roles to perform the verification of the self- has happened.
assessment statements: the certifiers and
the auditors.
Integration Between RTP and ERA
The certifier is identified in the same working Now, it is time to again consider the risk treatment
process with respect to the rule considered, but plan (RTP) tool. The work carried out for the
with a role/position in an upper business level, such issuance of the RTP will not be lost if the
as the headquarters level, department-head level or information needs to be shared. The framework of
similar. The type of check envisaged is an offsite both is basically the same but with different levels
interview (i.e., by email, telephone call, video of detail management; so, it is possible to correlate
conferencing) with the local risk assessor, the risk analysis of one with the other. A logical
eventually supported by documented information sequence consists of executing before the RTP and,
sent by the interviewed person. Any answer consequently, all the involved controls in the

© 2019 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOL 2 5


Figure 6–Certification Status

enterprise risk assessment (ERA) are fed (LOSS) in ERA (figure 8). The granularity of the
automatically. Data entry in ERA will be blocked for impact on performance in RTP is less than the
all its impacted controls. monetary impact in ERA.

The conversion relationships RTP/ERA are elevated In the risk list in RTP, the probabilities are coded in
to the actions list and the risk list; both are one way the same way as ERA. In contrast, the rating for risk
(figure 7). In the actions list, there is the relationship assessment (RISK) in RTP relates to the rating of
between the domain of the progress of the actions the maturity level (MATURITY) in ERA (figure 9). The
(PROGRESS) in RTP with the domain of the rating of concept of acceptable risk in RTP is equivalent to
the maturity level (MATURITY) in ERA. The actions compliance in ERA, but the impact of a
on delay in RTP are evaluated anyway as a single in confidentiality, integrity, availability (CIA) objective
progress without distinctions in ERA. above the baseline will need further attention.

The actions list also illustrates the relationship Even the concepts are the same: The calculation
between the impact of missing the implementation functions of the risk in RTP and ERA must remain
objectives (IMPACT) in RTP and the expected loss distinct because the algorithms use logic and
weights differently.

Figure 7–Conversion RTP Progress in ERA Maturity

Figure 8–Conversion RTP Impact in ERA Loss

6 ISACA JOURNAL VOL 2 © 2019 ISACA. All rights reserved. www.isaca.org


Figure 9–Conversion RTP Risk in ERA Maturity

>

Control Frameworks At any time, it is possible to review this relationship


by adding new ERA controls, removing them or
Two different methods to collect information for a changing their weight in the consolidation by the
risk evaluation based on a bottom-up methodology shown data entry. Also, considering that the
(aggregating assessments of operating activities on calculation is done on the fly, any change is
the level of achievement of the assigned tasks) and immediately transposed in the reporting (figure 11).
on a top-down methodology (dividing the processes
into rules for their subsequent assessment) have
After this setup operation, it is possible to analyze
been mentioned herein. They are based only on the
the outcomes in the reporting area using tabular
enterprise organizational structure, its mission and
reports or charts to compare the controls between
objectives (tailored approach considering only the
them over time at any level of the organization. For
relevant phenomena) and are integrated at the
example, a tabular report could be used to get the
lowest level.
Statement of Applicability (in the International
Organization for Standardization [ISO] sense) for
If a new external control framework is adopted by the any base or consolidating entity with the evaluation
organization, it is not necessary to organize a new of the new controls and their basic components
data collection for each entity but only base it on the (derived from ERA checklist).
lowest level of ERA. Generally, the great detail and
availability of rules in ERA should allow the creation of
An immediate evaluation of the trend of the
its relationship with the new framework without
new controls can also be achieved with a chart
changing the ERA checklist. But, in this case, either a
(figure 12). The use of the charts is more effective
rule in ERA could be split or a new one could be
for analyzing qualitative phenomena.
added to better adhere to the lowest level of the new
framework adopted. For example, if the organization
In the same way, it is possible to continue the
wants to adopt a sustainability standard, the first step
analysis by changing the shape of the report,
is to establish relationships between each new
swapping the axis, selecting a different granularity
standard control with the internal control statements
of the data, comparing different levels of
of ERA (figure 10).
consolidation (by process, by geographical area, by

Figure 10–Relationship Between a Sustainability Control and the ERA Controls

© 2019 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOL 2 7


Figure 11–Sustainability Control: Tabular Outcome

Figure 12–Sustainability Control: Chart Outcome

8 ISACA JOURNAL VOL 2 © 2019 ISACA. All rights reserved. www.isaca.org


legal entity, by period) and so on for each assessments of the ERA controls. By rebuilding this
framework (figure 13). The different perspectives set differently with respect to the maturity level
help the identification of the weaknesses or the algorithm and adding some other information (e.g.,
areas that need further study. entity context, incidents occurred, performance of
the local business), it is possible to have the
The analytic approach is always possible using the availability of indicators to use as metrics for the
I.V. of the entity to transpose the qualitative auditability index (A) calculation. This index is a
outcome in a figure. That is, textual labels can be metric that provides a criterion for weighing entities
substituted by figures, but no advantage is gained and giving order to the audit sequence. Auditability
because more information is not being added. The index is calculated by the formula:
analysis is regarding the future (uncertain and
n n
undecided), so a qualitative approach is faster and
easier without losing accuracy.
A= ∑ ai * wi with ai , wi Є {0 ... 1} and ∑ wi = 1
i=1 i=1

Risk Monitoring Used for the Internal Audit Plan Each ai is a component of the auditability and wi, its
Periodically, the internal audit process needs to weight. Evaluating the auditability index (figure 14)
issue a new plan to audit the entities. Prioritization for each entity and sequencing it from highest to
of the entities to be visited is answered by using the lowest will provide the list of eligible candidates for

Figure 13–A Chart of a Consolidated Process Per Quarter

© 2019 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOL 2 9


Figure 14–Dashboard of the Auditability Index

the audit on top. The decision of how many and declaration of problems or unaddressed problems.
which indicators to use depends on the type of
business and the risk analyses. A good heuristic is This concept is represented by higher scores for
to choose an indicator for each critical factor distrust situations and lower for others. The
identified in the achievement of the business answers are, consequently, also weighted if they are
objectives. The following example shows the 12 certified or audited compared to those that are only
critical factors evaluated using, partially or totally, self-assessed. So, the outcome is an indicator of
specific groups of ERA controls. distrust obtained by applying a formula with a
different logic than the maturity level. This is easily
Two indicators show the impact of the relationship possible by changing only the weights used for
with ERA. The first indicator (called untrusted ERA) each rating in the calculation algorithm and
is fully based on the ERA outcomes but with a nothing else.
different perspective of the maturity level. An
indicator of confidence in risk assessments has to As a second example of an indicator impacted by
be considered in the same way when all is declared the ERA process, consider the measure of the level
perfect (but without evidence) and when all is of insecurity of the data (figure 15). It is similar to
declared wrong (but without remediation plan). the indicator of the information security level, but is
These answers are more worrying than situations of obtained with a different logic.
declared issues with remediation plan (negative
situation but supposed under control). In other Both are obtained by mixing information from ERA
words, there is more confidence in situations where to build the evaluation of a few ISO 27001 controls,
problems are faced than situations without plus information gathered by the mapping of the

10 ISACA JOURNAL VOL 2 © 2019 ISACA. All rights reserved. www.isaca.org


Figure 15–Information Security Dashboard

entity (e.g., operative information from RTP). The repeatedly required same data (for different
outcome could be strange if it is considered that both frameworks), and only the right people are involved
are quite high, but there are two different types of (i.e., those who deal with the topic operationally for
logic. Information security is a formal evaluation of their working position).
compliance of the applied controls in the data
protection. Data insecurity is the lack of confidence in Other significant benefits include the ease of
the consistency of the answers used in the managing the structure without a post process to
information security KPI evaluation. In the example, realign the database and the absence of a massive
an inconsistency is a declaration of business impact training of risk assessors (self-explanatory forms
analysis (BIA) compliant when the parameter tailored to daily work). The people involved will have
Maximum Tolerable Downtime (MTD) is missing. It is to evaluate only their own job, and this operation
a clear indication of distrust in the answers; there is contributes quality to the answers gathered. Of
no trust in an analysis when the main parameter course, many people are involved, but only for a very
addressing the analysis itself is missing. small and consistent activity with their own work.

Conclusions The automatic integration of the RTP and ERA data


collection ensures a solid mechanism to get the
Two distinct but integrated approaches are used to necessary consistency in the outcomes. The
provide an overall monitoring of enterprise risk. The automatic data transferring, without human effort,
first advantage of this methodology is the reduction means no typos or contradictory assessments on
of the effort required to keep the management the same topic.
system updated. There is no data redundancy or

© 2019 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOL 2 11


The basic mechanism feeds the system with the Endnotes
self-assessment, but the steps that follow—of
certification offsite and auditing onsite—result in a 1 Wolfram Alpha, “Cartesian Product,”
high level of harmonization and quality in the data. https://www.wolframalpha.com/input/?i=
An additional advantage, and certainly not the least cartesian+product
significant, is the flexibility to introduce a new
framework with a minimal impact on end users.

12 ISACA JOURNAL VOL 2 © 2019 ISACA. All rights reserved. www.isaca.org

You might also like