×
Blogs

Thrive on Risk and Build Resilience with an Agile and Integrated Risk Management Program

Thrive-on-Risk-and-Build-Resilience
3 min read

Introduction

As the uncertain business environment continues to linger in the wake of the COVID-19 pandemic, organizations must boost their preparedness for the unknown unknowns to ensure uninterrupted business operations.

Work has moved home due to the pandemic but has not slowed down. To understand the state of risk management and how risk professionals are approaching this critical business function in the new normal, MetricStream conducted a survey of chief risk officers (CROs) and risk managers spanning multiple geographies and industries. The survey results have been compiled in The State of Risk Management Survey Report 2021. Here are some of the key takeaways from the survey:

  • 48.91% of respondents identified cybersecurity as the top risk faced by organizations.
  • 58.70% of respondents said that aligning risk priorities with business strategy is a key challenge faced by organizations when it comes to enterprise and operational risk management.
  • 61.96% of respondents said that determining the effectiveness of cybersecurity risk management is a top priority for risk professionals in the post-pandemic world.
  • All the companies that have deployed an integrated risk management (IRM) solution use it primarily to create a centralized risk repository. Other uses for which companies leverage IRM solution include aggregating risks based on various parameters and dimensions, automating workflows for risk control self-assessment (RCSA), providing risk insights, and tracking and monitoring key metrics.
  • Organizations are willing to dedicate resources to upskill risk managers on emerging risks and cutting-edge technologies.

Agile, Integrated, Responsive…

Risk management is no longer seen as an annual or half-yearly “tick-box” exercise. The crisis has particularly highlighted the importance of competent risk managers and an effective enterprise risk management (ERM) strategy for business continuity and resilience.

To keep up with the evolving operational environment and risk landscape, it’s imperative that the top management and leadership are aware of the organization’s risk profile, tolerance, and appetite to make informed business decisions. A data-driven, technology-based IRM program can better equip risk teams to provide risk intelligence to the senior management in real-time, thereby improving an organization’s agility and responsiveness.

The survey, in fact, affirmed that IRM is key for ensuring operational resilience as more than half of the organizations (52.63%) that had already deployed an IRM solution did not alter their risk programs, approaches, or activities due to the pandemic. That said, a significant number of organizations still depend on basic office productivity software for risk management activities, which hampers their risk identification, reporting, assessment, and mitigation capabilities.

In these unprecedented times, companies can position themselves as trailblazers and gain a competitive edge by their ability to thrive on risk. It is important to note here that implementing a technology solution alone to meet risk management needs is not enough. For an IRM program to be successful, organizations must transition to a matured framework—one that strikes the right balance between people, processes, and technology. This approach is not a silver bullet but can greatly enhance an organization’s resilience to risk events.

“Beyond financial risks and cyber risks, we now must pay very critical attention to HR and operational resilience of our organizations as well. Unfortunately, this is going to be part of the new normal for years to come as we have to be ready to deal with the pandemics—the current one and perhaps other incarnations of these kinds of pandemics into the future. We have to learn how to deal with crisis and emergency events and other wartime scenarios that are the ‘Unknown Unknowns’ that the GRC industry must learn to tackle,” said Gunjan Sinha, Executive Chairman, MetricStream.

MetricStream offers a suite of products and solutions that enable organizations to enhance and streamline risk management activities and processes. The MetricStream Integrated Risk Solution empowers organizations to manage both existing and emerging risks across geopolitical, digital, strategic, third-party, cybersecurity, and compliance areas. In addition, some key enhancements have also been made to the MetricStream Platform with the Arno release to enable better business configurability, improve mobile capabilities and enhance user experience.

To download the complete report, click here. To request a demo, click here.

Sumith-Sagar

Sumith Sagar Associate Director, Product Marketing

Sumith Sagar is a proven product marketing professional, specializing in software product positioning, product-led growth marketing, presales and sales enablement. With over 12 years of risk management solutioning experience ranging from Governance, Risk and Compliance (GRC), Commodity Trading & Risk Management (CTRM) and cybersecurity, she has been instrumental in driving BusinessGRC product marketing at MetricStream.

 
Blogs

The Art and Science of Risk Aggregation: Harvesting Different Metrics Across Multiple Dimensions

blog
5 min read

Introduction

What is Risk Aggregation

Risk aggregation is a process used by organizations of all sizes to get a complete view of the total risk exposure across various processes, business lines, and risk types using multiple risk data aggregation methods. Risk aggregation is vital for informed decision-making.

The credit and financial crises have proved that looking at risk management through the rearview mirror is dangerous. Since then, organizations – especially banks and financial services institutions – have recommended adopting a forward-looking approach to risk management. Organizations of all sizes now want to assess and aggregate risks across various processes, business lines, and risk types using multiple methods.

The process of identifying the impact of various risks on a business requires the ability to aggregate risks both vertically and horizontally. A robust aggregation mechanism enables risk officers not only to understand the total risk exposure, but to also make risk-aware decisions and define risk treatment plans that are in line with their organization’s risk appetite definitions.

Why Should You Aggregate Risks?

Managing risks across a large enterprise can be a challenge. The process of identifying the impact of multiple risks on an organization requires the ability to aggregate risks at multiple levels. The basic goal of risk aggregation is to collect several risks in order to arrive at a total risk exposure for all or a part of an organization. Risk aggregation allows grouping of similar risks from different perspectives to provide a complete picture of risk across the enterprise.

Basel Committee on Banking Supervision (BCBS) points out the need for risk aggregation in banking and financial services sectors as below:

“Naturally, the organization of risk management functions varies across firms. In some firms, risk management is a highly centralized function where the dedicated risk management function exercises substantial authority. In other firms, particularly in the insurance sector, local business units with a limited risk profile retain substantially greater autonomy over significant risk management decisions. Moreover, even in some firms with a bias toward centralized risk-management decision-making, the key decisions are made by a senior management committee, rather than by the risk management function itself. The organizational infrastructure of risk management decision-making varies considerably across firms, and it is difficult to conclude that any single approach is becoming dominant.”

Additionally, companies follow different organizational structures to support their nature of business. Some organizations might group risks as per organizational structure while others might group them by legal entities, geographical structure, processes, products or risk categories. Risks can be present at multiple levels within an organization. Risk owners at each level would want to easily identify their exposure as against the total exposure at enterprise level. There could be common risks between two functions or locations. Stakeholders at each level would want to view aggregated level of risk exposure for specific risks or risk types, for example, External Fraud, Attrition etc. This can be useful for monitoring changes in risk profile over time. Risk owners at various levels would want to look at top risks at their levels and take necessary actions to mitigate them. They would also want to easily identify if any risk or a group of risks are approaching risk appetite limits or have already breached those limits. To facilitate all these, organizations have to adopt risk aggregation methodologies that suits their risk management approach and business strategy.

Risk aggregation at multiple levels and also at enterprise level helps risk leaders understand the root cause of risks and take meaningful, remedial actions. Slicing and dicing of risk data by aggregating at different levels enables risk owners and organizations to make risk-based decisions and take advantage of market movements and conditions.

Key Challenges While Aggregating Risks:

Data Collection: 

Collection, quality, and applicability of data are a major challenge while rating and scoring risks. In the absence of a tool, data may be residing in multiple scattered locations. Collating this data is not only time consuming, but also affects the outcome if not collated properly.

Managing different criticality threshold limits: 

Risks are at different threshold limits based on their criticality. For example, a risk rated very high by a business unit may not have the same threshold limit assigned by another business unit or at an enterprise level, making it a medium or low risk. Considering this, there may be multiple thresholds e.g. financial, reputational etc. across an intersection of different hierarchies making the challenge further complicated. Hence, using the simple average method to aggregate risk may not give an accurate picture of risk exposure.

Combination of qualitative and quantitative data: 

A majority of the information is qualitative making it difficult to come to an exact risk score.

MetricStream’s Risk Aggregation Functionality To Solve These Challenges

MetricStream provides capabilities to manage an organization’s entire risk management requirement from risk identification to risk assessment, control evaluation, risk treatment, and risk and control continuous evaluation and reporting.

Given below are some of the core capabilities for risk assessment and aggregation:

  • Access advanced tools for planning, scheduling, and performing risk assessments at all levels to collect all relevant information about each risk, and once the assessments are complete, route the results for review and approval.
  • Perform assessments easily with a simple and intuitive user interface.
  • Enable both top-down and bottom-up approaches to risk assessments.
  • Easily configure rules to calculate risk scores. Define multiple parameters to collect information such as likelihood, impact, severity, velocity etc.
  • Manage simple assessments by rating a risk, or advanced assessments using multiple factors and advanced risk scoring to meet variations in the risk assessment methodology across business units, regions, and products.
  • Add or delete risks and controls while performing an assessment.
  • Assess the overall control environment based on multiple factors.
  • Define the logic for computing inherent and residual risk scores and analyze them through heat maps.
  • Aggregate the scores based on averages, worst-case scenarios (maximum), or best-case scenarios (minimum).
  • Aggregate risk scores using weighted average method where weights can be given to multiple dimensions including organization, objective, product, process, assessable item or risk hierarchy for improved and accurate risk visibility.
  • Easily configurable workflows that supports users to take necessary actions against risks that require immediate effect or preventive actions or are minor concerns. Review and respond accordingly.
  • Enable continuous monitoring with real-time update of risk scores and underlying workflows.

As risk continues to permeate through all levels of an organization, being able to gain a holistic view of risks will help build resilience and profitability. Risk aggregation could be a key pivot on which better risk-aware decisions can be made across the lines of the business, propelling organizations towards accelerated performance, thriving on risk.

Sumith-Sagar

Sumith Sagar Associate Director, Product Marketing

Sumith Sagar is a proven product marketing professional, specializing in software product positioning, product-led growth marketing, presales and sales enablement. With over 12 years of risk management solutioning experience ranging from Governance, Risk and Compliance (GRC), Commodity Trading & Risk Management (CTRM) and cybersecurity, she has been instrumental in driving BusinessGRC product marketing at MetricStream.

 
Blogs

Managing Risk from the Frontline in an Uncertain World

blog
2 min read

Introduction

The COVID-19 pandemic has highlighted how ill-prepared and ill-equipped businesses around the world really were to tackle a crisis of such magnitude. So, while digitization and automation have emerged as the major focus areas for organizations to be able to quickly adapt to the new normal, so has an agile, integrated, and technology-driven approach to risk management. In KPMG’s COVID-19 risk assessment survey of key managerial personnel, a majority of respondents (75%) said that they feel the need for the adoption of technology-based solutions to monitor key risks and their mitigation.

The pandemic has also brought conversations on frontline engagement to the forefront. Being closely engaged in daily business activities, it is the frontline that is more likely to identify emerging risks and vulnerabilities. As such, there is a growing call among risk and compliance leaders to make the frontline more agile and entrusting them with more risk management responsibilities—moving beyond the existing risk identification and management role in day-to-day activities to control ownership and accountability.

Frontline Taking the Lead Role

Delegating more risk management responsibilities to the frontline, making them risk-aware, and empowering them with proper training and tools has become critical for organizations to efficiently navigate today’s complex business risk environment. Companies are also increasingly engaging with the frontline in the designing phase of the risk management framework itself. Factoring in the frontline’s valuable insights on end-user perspectives, latent and emerging market trends, and more will enable organizations to ensure the relevancy and effectiveness of their risk and compliance programs.

In addition to owning and managing risk management decisions on a daily basis, the frontline today is also tasked with ensuring the effectiveness of controls. Risk and Control Self-Assessment (RCSA) is an important tool that the frontline can use to assess the operational risks associated with their activities and the efficacy of controls that address those risks. This way, RCSAs empower the frontline to make confident, informed decisions.

Bolstering the capabilities and responsibilities of the frontline, in turn, enhances the risk monitoring capabilities and oversight of the second line. A collaborative and synchronized effort of the three lines, in a way that is aligned with business strategy and goals, will help improve risk visibility and forecasting capabilities and make an organization nimbler and more responsive.

Organizations can leverage MetricStream Observation Management which simplifies capturing risk intelligence from the frontlines. The product helps bring GRC to the frontline with engaging platforms, widgets, browser plugins, conversational interfaces, chatbots, and intuitive web forms.

With the MetricStream Arno Release, the product now enables frontline users to capture risk and compliance observations, which can then be triaged and categorized as case and incident, loss event, or issue. AI-powered recommendations can be leveraged for categorizing the observations thereby increasing the efficiency and effectiveness of the triage team. Once triaged, the management and monitoring of actions to address them can be automated.

Admin_avatar_1498731489

BLOG ADMIN

Read more about the latest happenings in the GRC universe. MetricStream experts share their valuable insights on how organizations can turn risk into a strategic advantage and thrive on risk.

 
Blogs

The Third-Party Risk Perspective on Microsoft Hack

blog
3 min read

Introduction

Earlier this month, tech titan Microsoft reported a state-sponsored cyber breach which is said to have impacted thousands of businesses around the globe.

In a blog post, the Microsoft Threat Intelligence Center (MSTIC) attributed this breach with high confidence to HAFNIUM, a group assessed to be state-sponsored and operating out of China. The group was able to exploit vulnerabilities in the on-premises Exchange Server which enabled access to email accounts and allowed installation of additional malware to facilitate long-term access to victim environments.

In this hyper-connected business environment where we depend on multiple organizations to run our business smoothly, the cyberattack surface is continuously expanding and not limited to your infrastructure only. It is imperative that organizations continuously monitor the relevancy and effectiveness of their cyber risk management programs as well as of their partners with whom they are sharing sensitive information to identify and address any vulnerable areas or loopholes. The situation is further exacerbated by the growing interconnectivity of organizations resulting from the accelerated pace of digitalization. As such, organizations are left with an extremely short window of time to react to any emerging or existing risk event.

An organization is only as strong as its weakest link. With the proliferation of an organization’s third-party network, the number of potential points of failure also grows. To successfully manage the vast network of suppliers, ensuring visibility into supply chain hierarchy and the mapping of the third parties to products, services, fourth and subsequent parties, and business units becomes critical.

The Growing Problem of Third-Party Breaches

Third Party breaches has been on the rise for quite some time. There has been more than 25 breaches because of third parties in just 3 months of 2021 including the big names like Facebook, Instagram, LinkedIn, Supply chain for Audi, BMW, Mercedes, Porsche, Saab, Volkswagen and Volvo across North America, Microsoft, Singapore Airlines, Qualys, Airbus, Air Caraïbes, ArcelorMittal, BT, PWC Russia, etc.

The most recent Microsoft hack has underscored how third-party risks can make multiple organizations susceptible to illicit actors.

In this incident, thousands of organizations worldwide using Microsoft Exchange Server—a mail and calendar server and collaboration solution—were impacted. While the Windows-maker said that it quickly deployed an update for the Hafnium exploits, it is estimated that the breach affected at least 30,000 organizations across the U.S., including small businesses, towns, cities, and local governments, and 60,000 computer systems in Germany. The full scale of the impact is expected to become clearer in the forthcoming weeks.

What makes this hack graver is the fact that organizations using the Exchange Server could not have prevented it as this was a zero-day exploit. The European Banking Authority (EBA) took its email systems offline following the incident. In a subsequent update on the matter, it said that the scope of the event was limited and that the confidentiality of the EBA systems and data has not been compromised. Meanwhile, U.S. Cybersecurity & Infrastructure Security Agency (CISA) has issued an emergency directive ordering all federal civilian departments and agencies running vulnerable Microsoft Exchange servers to either update the software or disconnect the products from their networks.

That said, organizations must not let their guard down when dealing with third-party risks. To thrive in today’s digital era, they need to implement a well-defined third-party risk management program that provides an integrated, real-time view of the extended enterprise. A robust, technology-driven program will help organizations automate the entire third-party risk management lifecycle, thereby improving visibility into the risks posed by the third and subsequent parties and accelerate responses to risk events. Also, organization should focus on having a robust business continuity program in place to help them running critical business function in case of these disasters.

MetricStream helps organizations effectively manage third-party risks with its Third-Party Risk Management product. With Continuous Third-Party Monitoring, Periodic Third-Party Due Diligence, Intuitive Dashboards and Reports, the product empowers organizations to protect their business from existing and potential threats from third parties, as well as strengthen resilience, contain costs, and optimize business performance.

To learn more about third-party risk management read MetricStream’s eBook, Boosting Third-Party Risk Management in a Time of Uncertainty, which delves into how third-party risks can expose organizations to a wider spectrum of risks if left unchecked. It also provides quick tips on how to review third-party risk management operating models and identify gaps or opportunities for improvement.

Admin_avatar_1498731489

BLOG ADMIN

Read more about the latest happenings in the GRC universe. MetricStream experts share their valuable insights on how organizations can turn risk into a strategic advantage and thrive on risk.

 
Blogs

Improving Business Performance with Integrated Risk Management

Blog-on-IRM-eBook
3 min read

Introduction

Today, business leaders and risk managers are required to navigate an increasingly complex risk landscape that is evolving at a rapid pace. Economic, environmental, geopolitical, technological, and other factors and their growing interdependencies are resulting in an ever-changing and expanding risk environment, making risk management extremely challenging.

The current volatile operating environment has questioned the very validity of the longstanding siloed approach to risk management. The situation has been further exacerbated by the COVID-19 pandemic which has amplified digital dependency and interconnectivity of people, processes, and organizations, thereby multiplying the points of intersections of different risks. Furthermore, siloed risk approach results in risk data being scattered across an organization, which acts as a major impediment to an organization’s decision-making capabilities.

To succeed in these uncertain times, organizations need to adopt an integrated approach to risk management, which will help create a single source of truth of all risk-related issues and data across different business units and functions. The integrated risk management (IRM) approach will considerably enhance an organization’s risk visibility and provide a better understanding of risk relationships and their cascading effects. In addition, by enabling prompt risk identification, organizations will be better equipped to reduce risk response time and take appropriate risk mitigation and remediation action.

It is encouraging to see that organizations are gradually embracing this forward-looking approach. The OCEG 2020 GRC Maturity Survey revealed that a number of businesses around the world are starting to integrate and standardize their governance, risk, and compliance (GRC) processes and technology.

Integrated Risk Program of the Future

A future-ready integrated risk program builds upon the existing risk management infrastructure and reconfigures it to make it more agile, unified, structured, and coordinated. This approach provides C-suite executives and board of directors with real-time actionable risk insights for improved decision-making and business performance. It puts in place a comprehensive integrative layer that provides deep visibility into an organization’s risk profile and risk relationships, along with an integrated issue and action management strategy that enables risk mitigation in real-time.

With the growing labyrinth of risks, companies are increasingly looking to tap technology-driven IRM tools that can significantly streamline and simplify risk management that is tied with business objectives and goals. These solutions, which leverage artificial intelligence (AI), robotic process automation (RPA), and such advanced and innovative technologies, seamlessly integrate with the larger IT infrastructure, dramatically improving an organization’s risk identification and mitigation capabilities, risk preparedness, and overall operational resilience and efficiency.

By 2021, Gartner expects more than 50% of large organizations to use an integrated risk management solution and projects the IRM solutions market to grow to $8 billion.

MetricStream offers a range of products and solutions that aim to enhance and streamline risk management activities and processes. The MetricStream Integrated Risk Solution enables organizations to manage both current and emerging risks across geopolitical, digital, strategic, third-party, cybersecurity, and compliance areas. It cuts across organizational silos by standardizing risk and control taxonomies and enabling stakeholders to effectively coordinate and unify risk management activities across all business functions.

Conclusion

Adopting a mature, technology-driven IRM approach is increasingly being viewed as a core competency for organizations to achieve their business goals. Once implemented, organizations should proactively conduct routine assessments to ensure the program’s effectiveness. In the long run, this will help an organization to better understand its risk posture, improve its risk appetite, and make well-informed decisions.

An effective IRM program needs to be complemented with a “risk-aware” culture across an enterprise along with well-defined roles, responsibilities, and accountability for employees. Educating employees on emerging risks and upcoming trends in the market, industry, and economy will help broaden the outlook of the workforce and boost their risk identification capabilities.

For diving deeper into IRM you can read MetricStream’s eBook, The Future of Integrated Risk Management, which details the best practices for a future-ready IRM program, provides quick tips for preparing an organization to adopt IRM, and delves into the organizational challenges involved in managing unknown-unknown risks, as well as the strategic direction of the financial services industry as it prepares for these risks and their domino effect.

Jump to Topic
Sumith-Sagar

Sumith Sagar Associate Director, Product Marketing

Sumith Sagar is a proven product marketing professional, specializing in software product positioning, product-led growth marketing, presales and sales enablement. With over 12 years of risk management solutioning experience ranging from Governance, Risk and Compliance (GRC), Commodity Trading & Risk Management (CTRM) and cybersecurity, she has been instrumental in driving BusinessGRC product marketing at MetricStream.

 
Blogs

Lessons Learned from the FireEye Breach

MS_ResilienceSpotlight
4 min read

Introduction

The recent FireEye breach is perhaps the most significant cybersecurity headline of 2020, with one of the leading advanced threat detection vendors falling victim to an apparent state-sponsored attack. As new details of the breach unfold, the nexus between cybersecurity and risk management become increasingly evident, forming the basis of several lessons learned.

Third Party IT Vendors – Your Weakest Link in Security

Over the last 10 years, IT departments have gained undeniable advantages and realized significant business benefits by utilizing third-party IT solutions. Rather than building costly on-premise IT infrastructure and services, agile businesses have reliably turned to third-party vendors, such as Amazon AWS, Salesforce, Microsoft and others to effectively and efficiently host, manage and provide mission-critical business and IT services. 

Following in this practice, FireEye reportedly used the third-party network performance, management and monitoring software from SolarWinds, which appears to be the crux of the breach. However, the fact that the breach potentially stemmed from SolarWinds is irrelevant. The fundamental issue here is that supply chain and third-party IT solutions present real risks to enterprise security architectures.

Lesson Learned – Implement Third-Party Risk Management Solutions

The proverbial ship has sailed when it comes to outsourcing IT services, and despite recent attacks, businesses have much to gain (e.g. cost savings, agility, flexibility, productivity, etc.) by using outsourced and cloud-based services. Knowing this, the prudent course of action is to implement a solution that reduces risk associated with third-party vendors.

One such solution is the MetricStream Third-Party Risk Management offering, which protects businesses from existing and potential third-party threats. Built on the MetricStream M7 Integrated Risk Platform, MetricStream’s Third-Party Risk Management product provides an integrated, real-time view of the extended enterprise. It strengthens resilience, contains costs and optimizes business performance by automating the end-to-end processes for information gathering, onboarding, real-time monitoring, risk, compliance and control assessments and risk mitigation.

Policy – Without Policy Security is Toothless

In the cybersecurity world, policy and policy management is often overlooked and undervalued. However, without policy, enforcement of enterprise security programs is futile and inefficient. We see this every day in society. We have laws to protect citizens, but without the police (policy enforcement), we would live in a lawless society. 

Every breach is an opportunity to learn, strengthen security and become more resilient. Policy factors into this, and should be included as part of a post-breach review. In fact, most breaches are not nearly as sophisticated as the FireEye breach, but are instead the result of employees not following security policies. For example, a spear-phishing campaign often succeeds because an employee clicked on a link embedded in a suspicious external email, even though corporate policy states not to do so. 

Lesson Learned – Review Policy Management to Strengthen Security

MetricStream Policy and Document Management built on the M7 Integrated Risk Platform, streamlines and simplifies the creation and communication of organizational policies, while providing a centralized policy portal to store and access the latest policies. It delivers a contextual view to policies by mapping policies to regulations, risks and controls, thereby strengthening compliance while highlighting potential risks. Policy and Document Management raises awareness throughout an organization and brings policies to everyone, including first line employees, who are often the targets of cyberattacks. 

Communications – Transparency is Critical to Recovery

One observation noted from the FireEye attack is the speed and transparency of their communications. Kudos to those involved, as often a breach is solely managed by Legal and/or IT. Whenever a substantive breach occurs, businesses face damage to their brand, sales efforts, customer success and partner base. 

Not only do breaches potentially trigger lawsuits, but for many corporations, a material breach can also trigger SEC Regulation FD (Fair Disclosure) consequences. Cybersecurity incidents are often listed as part of corporate governance documentation relating to Regulation FD. 

For those not in Legal or Corporate Communications, Regulation FD basically states that a corporation must prevent the selective disclosure of material, non-public information that could be used in the decision-making process of buying or selling a security. Depending on the severity of a cybersecurity incident, Regulation FD may apply.

Lesson Learned – Incident Response Must be Documented

As FireEye has shown, clear, quick and transparent communications is the way to best manage brand-challenging situations. Learning from their experience and response, every organization should have a PSIRT (Product Security Incident Response Team) policy in place BEFORE a breach or serious incident occurs. Response teams are usually comprised of different members within the enterprise, including representatives from Corporate Communications, Legal, IT/Security and the C-Suite. With MetricStream Policy and Document Management, creation of a PSIRT policy and process is simple and intuitive – a must have for any organization. 

In conclusion, the FireEye breach will continue to dominate headlines as more information is revealed about the attackers, their processes, tools and techniques. As well, we hope to gain insights from what has transpired to find new and better ways to strengthen security and improve resilience. Clearly, more lessons are to be learned.

Admin_avatar_1498731489

BLOG ADMIN

Read more about the latest happenings in the GRC universe. MetricStream experts share their valuable insights on how organizations can turn risk into a strategic advantage and thrive on risk.

 
Blogs

What to Know about California’s New Privacy Act

CCPA-8
3 min read

Without question, 2020 has been an interesting year, and with so much attention paid to the recent U.S. Presidential election, it is easy to overlook an important ballot initiative, Proposition 24, which effectively replaces the relatively new California Consumer Privacy Act (CCPA). For businesses that buy, share or utilize California resident data, this is big.

Consumer demand for privacy rights and protection of personal information continues to drive regulatory reform worldwide. For example, the General Data Protection Regulation (GDPR) mandate in Europe has redefined privacy and data protection efforts, leaving many jurisdictions, including the United States to follow suit.

California is no different. Seeking to enhance and improve on the existing CCPA, Proposition 24, also known as the Consumer Privacy Rights Acts (CPRA), gives consumers greater powers over corporate use of their sensitive personal information. Furthermore, the Act establishes a new regulatory body, the California Privacy Protection Agency, which has oversight and enforcement duties in parallel with the California Department of Justice.

There are many notable provisions in the CPRA; too many to list. However, several novel features move the CPRA closer in line to Europe’s GDPR. Some of the standout provisions include: 
 

  • Children’s Privacy – Fines of up to $7,500 per violation can be assessed for misuse of information of children under the age of 16.
  • Governance Requirements – New governance requirements will go into effect, including those that impact data storage, retention, distribution and processing of individual records.
  • Third-Party Relationships – Data protection provisions must now be disclosed with vendors and partners having access to personal data.
  • New Data Categories – The CPRA also creates a new category of data to be protected, “sensitive personal information,” which expands on personally identifiable information (PII) protections to include: individual geolocation data, content of private communications, as well as genetic, health and biometric data.

For many technology, financial and other organizations dealing with big data, CPRA compliance comes down to a three-part test:
 

  1. The business has annual gross revenues of $25,000,000 or more;
  2. Buys, sells or shares the personal information of at least 100,000 consumers a year;
  3. Makes more than 50% of its revenue from selling or sharing personal information.

Under the CPRA, affected businesses are required to submit an annual cybersecurity audit, as well as risk assessments. This means that now, more than ever, businesses need to move from cumbersome email and spreadsheet compliance practices to streamlined and integrated compliance management and risk platforms.

One such solution to this challenge is the MetricStream Compliance Management product that simplifies and strengthens compliance with regulations across organizations, while improving visibility into control effectiveness and ensuring timely issue remediation.

MetricStream Compliance Management, built on the MetricStream M7 Integrated Risk Platform – intelligent by design, helps manage a wide range of compliance requirements, including CCPA, in an integrated manner. Policies, standards, regulations and controls are aligned, eliminating inefficiencies and redundancies. Compliance processes with workflows, self-assessments, surveys, and issue remediation are widely supported.

Key features of MetricStream Compliance Management include:
 

  • Regulatory Intelligence – Capture, store, and monitor regulations with reliable and authoritative regulatory content sources. Map regulatory updates to risks, controls, and policies, and stay informed on these updates through automated notifications and alerts.
  • Compliance Environment and Process Design – Create a structured and logical internal control hierarchy, including processes, assets, risks, controls and control activities, along with appropriate linkages between these data elements.
  • Compliance Assessments and Surveys – Design and document the results of control tests or self-assessments, capture non-compliance issues, and certify the effectiveness of the controls.
  • Issue Management – Accelerate issue and remediation processes by automating workflows, notifications and reporting.
  • Dashboards and Reports – Gain comprehensive visibility into compliance management processes through graphical dashboards with drill-down capabilities.

CPRA, like GDPR, is here to stay, and for businesses around the world that touch California consumer data, they will have to make substantive changes to their compliance programs. Although the majority of the CPRA provisions do not go into effect until January 1, 2023 a one-year “look-back provision” will govern data collected starting January 1, 2022. As many compliance professionals know, this does not give much time for businesses to modify and update their workflows, policies and practices. Given this short time requirement to compliance, it is fair to say that indeed, we are living in interesting times.

Jump to Topic
Admin_avatar_1498731489

BLOG ADMIN

Read more about the latest happenings in the GRC universe. MetricStream experts share their valuable insights on how organizations can turn risk into a strategic advantage and thrive on risk.

 

Related Resources

Blogs

Moving From Risk to Resilience – Make Your Organization ‘Anti-Fragile’

blog
6 min read

Introduction

Moving from simple risk management to real resilience is a critical new capability that organizations are striving to attain. Teams seek to quickly mature resilience as we re-open our businesses, countries and economies in the post-COVID-19 world.  Organizations that do this well and become ‘anti-fragile’ will thrive – those that do not will find themselves being driven out and battered by new waves of change.

In our previous posts on Risk Quantification,  the Digital Impact Chain and how COVID-19 Has Changed The We Do Risk  – Forever – we focused on how to risk management is changing and becoming more aligned with scoring techniques based on multiple factors from both technology and business stakeholders.  This blog post takes Risk Quantification a step further and redefines resilience in terms of becoming anti-fragile.

What is Resilience? What is Anti-Fragile?

Traditionally, we think of resilience in terms of how quickly something can ‘bounce back’ from an impact.  Business continuity teams focus on metrics such as the number of days or hours to return to operations (RTO) or a recovery point (along a process) objective (RPO).  RTO and RPO are typically used to measure resilience goals through business impact assessments (BIAs). Disaster recovery teams execute playbooks that have been tested – often months back in a different environment – and struggle to bring processes back online after an incident.

But all that has changed with the COVID-19 pandemic and the ‘call for change’ that worldwide protests are demanding.  In a world where human speed is outflanked by digital transaction speed and decisions are made on real-time analytics – old approaches to business continuity and disaster recovery simply don’t cut it.

Developing real resilience means becoming ‘anti-fragile’ – a concept spearheaded by Nassim Taleb author of Fooled by RandomnessThe Black Swan and Antifragile.  Organizations and processes become anti-fragile by continually testing with small shocks to the integrated fabric of people, process and technology.  Why?  Because risks are interconnected.  Risks can cascade.  A COVID-19 hot spot can close access to a critical single-source supplier.  Creating greater diversity and fairness at work can mean reworking resource plans and partnerships – in a good and sustainable way.  In a world where rare events dominate the landscape because risks have cascaded in ways we’ve not anticipated, anti-fragile is the route to real resilience.

How Do We Develop Anti-Fragility?

If you have been able to incorporate Risk Quantification, with a the bottoms-up, top-down approach to score risks, by aligning operational, infotech, security and cyber teams, you can now start moving from risk to true resilience. But to develop anti-fragility, your teams must do more – and increase the scope of resilience across a digital environment – not only within your organization but also across your vendors and cloud service providers (CSPs). This means aligning processes such as incident response that now have a larger, wider-spread impact across many distributed, virtual stakeholder groups.  Anti-fragile as a goal, especially with increasing digital transformation, assumes your teams see where there can be a chain reaction across the technology and business process workflow – with upstream and downstream processes across CSPs connected to other third and fourth parties. 

The best way to start building anti-fragility into resilience programs is to start acting with agility, begin building a strong capability to quickly adapt, leverage early warning signals and have tested, executable plans to bounce back.

Let’s look at some general categories with examples of how our current reactive practice can be transformed by building anti-fragility into our GRC programs and technologies.

  • CONTROLS 

     

    • Reactive practice – Go through a (sometime long and protracted) remediation action plan as a result of a (sometime long and protracted) assessment or audit.
    • Anti-fragile practice  – Fix control/test failures faster and completely  – address it as a fix right away prior to it getting tied up in a prolonged process. Look across your environment and fix similar problems proactively:  Ask where else could this be happening with the same failed control?

       

  • ROOT CAUSE CANALYSIS (RCA)

     

    • Reactive practice – Fix an issuewith a BAND-AID due to resource and budget constraints.
    • Anti-fragile practice – Fix issues by going deep and wide:  Conduct a real RCA by asking the Five Whys involving the right people across the organization and CSPs. Use this a point of real learning.

       

  • WEAKNESSES 

     

    • Reactive practice m– Wait until an emerging risk shows up as a failure in order to get the remediation budget.
    • Anti-fragile practice – Be proactive on suspected weaknesses. Forexample: cyber controls are increasing with X-From Home (work, school, medical check-ups, news, recreation, social visits, advice….). XFH has pushed the envelope and hackers have upped the ante.  Also look at the infrastructure:  If there is a power outage. That’s critical if a doctor is WFH on a call with a patient! What risk can you transfer? Where does your accountability stop and where is it shared? Think through your way of responding.

       

  • CLOUD 

     

    • Reactive practice – Use your own data center with older apps to run portions of the business.
    • Anti-fragile practice – Be proactive on cloud modernization:  If you have 20 CSPs now, think about everything that could be improved with leading, safer, more secure scalable CSPs.  Proactively define your standardization strategy, such as, your SSO strategy across the cloud?  You’ll need this kind of standardization to scale as an enterprise.

       

  • REAL TIME SENSING AND MONITORING 

     

    • Reactive practice – Use continuous controls monitoring in isolated areas, not looking at the opportunity to automate the end-end process.
    • Anti-fragile practice – Up your game on monitoring and sensing mechanisms:  We’re seeing more and more utilities, cable operators and other providers using IOT and remote sensing technologies where real-time data is being pulled and continuously analyzed – and proactively avoiding risks.  This puts an entirely new view on resilience. Think about your business and technology processes. What needs to be digitalized and what can you continuously sense and monitor?

       

  • DATA ANALYTICS AND ARTIFICAL INTELLIGENCE (AI)

     

    • Reactive practice – Use metrics in isolated areas, not looking at the opportunity to build analytics into the end-end process.
    • Anti-fragile practice – Get proactive on predictive analytics where it makes sense.  Understand your ethical risks and put an AI governance program in place that provides visibility into common pitfalls. Test for bias of the creator or bias in your data. Your organization needs clean, relevant data, transparent algorithms for optimal decision-making.  

Summary and Call to Action

Remember, business continuity planning is not enough. Real resilience requires a commitment to developing anti-fragility across the entire fabric of your extended enterprise.  We are in an unprecedented age of change – more digitalization and greater diversity, in both people and technologies, transforming our third-party relationships and the way we work.  Anticipate and Be Ready to Embrace this Change! Build anti-fragile concepts into your resilience strategy and plans. 

Over the coming weeks, we will continue to explore more best practices and how security and cyber teams are adapting to COVID-19, beyond how risk quantification methods tie to the digital asset/impact chain, Moving from Risk to Resilience (this post), to Orchestrating Risk across IT, cyber, op risk, incident and crisis response and other disciplines. Stay tuned!

About the author:

Yo McDonald, Vice President, Customer Success and Engagement, MetricStream, is a seasoned executive in Governance, Risk and Compliance (GRC) consulting and product solutions. She drives customer engagement and retention, while fostering a culture of customer success at MetricStream.

Dr. Vidya Phalke is Chief Innovation and Cloud Officer.

Yo-McDonald

Yo McDonald Product Solutions

Yo McDonald, Vice President, Customer Success and Engagement, MetricStream, is a seasoned executive in Governance, Risk and Compliance (GRC) consulting and product solutions. She drives customer engagement and retention, while fostering a culture of customer success at MetricStream.

 

Related Resources