Metricstream Logo
×
Blogs

The New Reality of Risk

shutterstock
5 min read

Introduction

2016 has been a year of significant change; a year in which a sky full of hobbyist drones has become the norm; a year that has witnessed a new breed of terrorism that has shaken the world’s strongest governments; a year in which corporate governance scandals splash time and time again across the front-page news.

We continue to see a significant increase in the frequency of unpredictable external threats, and organizations are weathering the aftermath from incidents of corruption and non-compliance scandals. Even if we managed to learn from these developments quickly, today’s age of social media, with its fast-paced aggregation and reporting of facts and experiences, makes it feel like we are always playing catch-up. It is only by stepping back to view this New Reality in its entirety, that the business and leadership learnings become clear.
 

The Three Top Concerns for Leaders Around the World

There are three key trends that are capturing the attention of CEOs and government leaders, and fundamentally changing the way we live and do business – the introduction of left field disruptions, the risks and opportunities of global business ecosystems, and the rise of the digital universe.

Left field Disruption

In a recent survey of 25,000 plus CXOs conducted by a large public company, CEOs have come out with one common concern; “disruption from the left field.” Left field disruptions are the competitive threats that come from nowhere – they are the things that organizations did not predict or expect. Uber is a perfect example; in less than five years, Uber is now disrupting automotive, auto rental, transportation and even logistics industries. We also live in the era of left field cyberattacks, the rise of ISIS, the precipitous drop in oil prices. These left field disruptions are precisely what are keeping leaders up at night.

Risks and Opportunities of Global Business Ecosystems

Another topic that is top of mind for government leaders, boardrooms and CEOs is how to fully leverage the opportunities that exist in today’s global business ecosystems of partners, suppliers, and freelancers. McKinsey predicts that over $300 billion dollars’ worth of work will be freelanced in less than one decade. As our organizations go global and become more freelanced and outsourced, the question becomes this: how do we ensure that governance, risk management and compliance touches not just our employees, but extends across and embraces this entire ecosystem of partners and suppliers globally? In today’s global world, we are only as strong as our weakest link. Regulators are stepping up their focus on understanding an organization’s reliance on its networks of suppliers and partners, as well as the risks and vulnerabilities associated with global business ecosystems.

Rise of the Digital Universe

The other item that is top of mind for world leaders is how to harness the rise of the digital universe. We are living in exciting times, in an era where everything is being digitized and connected in the blink of an eye and at an unnerving pace. Nike recently announced their self-tying shoes with Internet of Things (IoT) sensors. Robots and drones are going to be the future for national defense and the new normal for logistics and manufacturing operations. Driverless cars are fast becoming a reality. IoT is connecting billions of devices. As new types of diverse data sources emerge, we have to know how to absorb that data and make sense of it.

The Power of Technology

Technology today seemingly has no limits. It is surprising to many just how much data is being generated at our very fingertips. For example, fitness wearables can collect data that could one day revolutionize the pharmaceutical industry. Analytics and big data can equip organizations and governments as they collect vast amounts of information, discover patterns and correlations, and understand behavior at scale. This may also be the key to mitigating today’s risks proactively, rather than the retroactive approach we have seen agencies and organizations put to practice in the past few years. Just imagine if federal agencies could design systems for this very purpose, with privacy in mind from the start, running behavior analytics to identify 1 billion people with the confidence that it does not pose a threat to our security. From there, agencies could focus their efforts on the other 6 billion people, and continue to sort through to find the bad actors. This system may seem radical, but when you consider that proactive checks like these already exist (i.e., TSA’s Precheck program), it becomes an increasingly logical option for the world as we know it today. At the moment, this is not happening. We are reactively firefighting in the dark; going after the bad actors when it is already too late. What we need to do, instead, is to proactively solve the problem by bringing in light, transparent, and sophisticated analytics. What we need to do is to push ourselves to anticipate challenges and implement effective solutions for risks that lie ahead; we need to make this our mission for the months and years ahead.

Looking Ahead

We are certainly on the brink of a new reality, living in a world of left field disruptions, global business ecosystems, and the rise of the digital universe. Leadership, no doubt, has an obligation to give this new reality special attention; to find new and improved ways of adapting, planning, and executing. Yes, there is a need, and expectation, to understand both the sides of the equation – the risks and the opportunities. We also need to avoid getting caught up in fear and panic due to the news and the headlines we read each morning.

While there are new risks cropping up all around us, for a business, it is essential that opportunities are identified from these risks. So, what kind of leadership can help lead us towards advancement within this new reality? Leaders, whether they are at the wheel of a technology company, a government agency, or a product reseller, must rethink their operating methods, and identify proactive steps that bring about transparency and opportunity in a world of risks. Leaders must take on the task of identifying and understanding risks, and at the same time not be burdened by fear – fear that cripples evolution and innovation. While the world continues to change right before our very eyes, our collective mission must be on strategies and solutions that help open new doors, and continue to break down barriers and boundaries.

Admin_avatar_1498731489

BLOG ADMIN

Read more about the latest happenings in the GRC universe. MetricStream experts share their valuable insights on how organizations can turn risk into a strategic advantage and thrive on risk.

 
Blogs

How to Mitigate Risk Exposure from Vendor Relationships

shutterstock
2 min read

Introduction

Outsourcing business activities to a vendor does not include outsourcing the risk and compliance responsibilities. Relying heavily on vendors, with low or limited visibility into the vendor networks, exposes organizations to high risks. Therefore, understanding and managing vendor risks is crucial to maintain sustainable businesses. With a strong Vendor Risk Management (VRM) program companies can anticipate inherent risks rather than simply reacting to adverse situations and incidents after they occur.

In many organizations, VRM programs are largely traditional. The focus is on managing vendor risk only when selecting a vendor or finalizing a vendor contract. However, for VRM to be truly effective, there is a need for continuous vendor monitoring which helps organizations be well-prepared for unexpected eventualities. That being said, it can be quite a challenging task to define and adopt an efficient VRM program, as multiple factors need to be considered, including dependency on the vendor, the location and financial stability of the vendor, as well as the scope of the vendor relationship. This is where technology can help by significantly automating and simplifying vendor risk assessments.

Companies are increasingly focusing on strengthening VRM through best practices such as:

  • Effective vendor selection process
  • Streamlined due diligence and continued oversight
  • Structured vendor risk assessment approach
  • Efficient vendor performance monitoring
  • Disciplined vendor governance framework

Technology embedded with these best practices can help companies manage vendor networks, associated risks, and compliance requirements. Here are some of the reasons why a robust VRM technology platform should be a top priority for any business:

  • Optimizes VRM processes
  • Consolidates vendor information
  • Centralizes contract management
  • Facilitates early detection and mitigation of risk
  • Makes Business Resilient
  • Enables Vendor Evaluation and Training
  • Provides robust analytics and reporting

An organization’s approach to VRM can significantly affect its ability to achieve its goals. There is a greater need to understand the risks posed by vendors as well as fourth parties, while also keeping pace with regulatory changes. Technology plays an important role in this effort by helping companies map vendor risks to the associated regulations, controls, internal stakeholders, and vendors, thereby improving risk transparency and accountability. It helps ensure that companies have all the information they need to meet the demands of a changing regulatory environment. And finally, it streamlines the flow of vendor risk and compliance data, so that the right information reaches the right stakeholders at the right time.

To view the details of best practices adopted by organizations for effective Vendor Risk Management and the role of technology, you can read more here

Jump to Topic
Admin_avatar_1498731489

BLOG ADMIN

Read more about the latest happenings in the GRC universe. MetricStream experts share their valuable insights on how organizations can turn risk into a strategic advantage and thrive on risk.

 
Blogs

Governance, Risk, Compliance and the Big Data Advantage

Governance
3 min read

Introduction

According to a leading IT firm research nearly 90 percent of the data in the world has been produced in just the last two years. Though a bit of a buzz phrase these days, big data is as important as the internet itself to many businesses today, for a number of reasons. The simplest explanation of how big data benefits businesses is this: It provides the insights needed to make more confident decisions, take faster actions, improve operational efficiencies, minimize risks, and reduce spending.

The sudden emergence of the whole phenomenon around the data explosion has been the result of the pervasive use of mobile devices and the large volumes of data generated from web based purchases, mobile activities, and social media interactions. As the massive volume of data and computing platforms continues to proliferate, the absence of thorough reassessments and thinking around information processing paradigms of the past will leave today’s enterprises ill-prepared to deal with this new (IT) normal.

Enterprises have to realize the obvious fact that big data is an immensely powerful concept, and information is a strong business asset. Managing large volumes of homogenous data is something that organizations of all kinds can benefit from; spanning retail, social networking, science and research, clinical trials, CRM, operational activities, transactions and more. The real challenge for organizations today is to move beyond the data volumes and data storage obstacles to assess the true value of available data to reduce overall internal audit or compliance field work costs. The vast majority of enterprise businesses are faced with the challenge of decoding large volumes of homogenous, inconsistent, or inaccurate data — often referred to as “bad data.”

Industry analyst Doug Laney encapsulated the characteristics of big data using the three Vs — volume (the quantity of data), velocity (the rate at which data is generated and changed) and variety (the number of different data sources and types). Many are also adding characteristics such as “complexity,” “veracity” and “variability” to their understanding of the concept.

An accurate analysis of big data helps enterprises with better insights into their customers, market opportunities, growth prospects, and corporate performance. This strategic analysis of large volumes of data enables organizations to achieve higher-quality results in their own internal audit and compliance processes, thus enabling them to establish more effective governance, controls, and monitoring mechanisms.

With the skyrocketing number of transactions and evolving compliance requirements and regulations, big data analysis offers endless opportunities for enterprises to mitigate key governance, risk, and compliance issues. Just as big data analytics can lead to more targeted marketing initiatives by analyzing marketing program responses, supplier activities, customer demographics, and sales patterns, effective analysis of massive volumes of structured and unstructured data can also enable organizations in the Governance, Risk and Compliance (GRC) space to:

  • Develop strong risk intelligence to strengthen risk management and streamline regulatory compliance
  • Identify high-risk vendors/persons with multiple fraud risk indicators in accounts payable
  • Display travel and entertainment expenses of local office employees
  • Identify the best practices in the industry to effectively mitigate risks
  • Determine if control procedures are working effectively

Big data analysis should become a core component of every organization’s operations, performed on a continuous basis, spanning areas such as payment or billing transactions, payroll, social media analysis, sales, operational processes, and compliance. For many organizations, especially in highly scrutinized and regulated industries such as healthcare, finance, and insurance, big data analysis can support Enterprise Risk Management (ERM) by helping monitor risks involving loans, claims, and patient care procedures.

Simply stated, integrating big data analytics into an organization’s GRC methodology will help pave the way for a truly data-driven organization.

Jump to Topic
Admin_avatar_1498731489

BLOG ADMIN

Read more about the latest happenings in the GRC universe. MetricStream experts share their valuable insights on how organizations can turn risk into a strategic advantage and thrive on risk.

 
Blogs

So, Where’s My IT-Risk (Or Threat) Library?

Information
2 min read

Introduction

We need a good information security risk and threat library. Rather than build one from scratch (and most internet searches do not yield meaningful results), we were wondering if MetricStream offers standard content for such a library.

That’s a question we’re frequently asked when we get a Customer up and running with MetricStream’s IT-Risk Management App. It’s an excellent question for sure because Customers, especially in the Governance, Risk, and Compliance space, require preloaded (and expert/industry-grade) content that can get them up and running on day one. The content ask is straightforward when it comes to in-depth content from authority documents (individual citations or sections and sub-sections), control statements, or even policy templates. Citations from an authority document wouldn’t change across Customers and control statements too are uniform especially if you leverage upon a harmonized control framework.

Information security risk content (threats, vulnerabilities, and risks) is, however, in a league of its own – perhaps in the league of extraordinary content. Prima facie, it’s pretty easy to be misled into believing that information security risks applicable for my business are exactly the same as those applicable for your business because, hey, come on, we’re both using information technology right?

In reality though that’s precisely where the differences arise. Information technology in the context of my business’ operating and technology environment are almost always completely different in the context of your business’ operating and technology environment. Here’s an example: Suppose we have two Customers, a Technology Infrastructure Provider and a Healthcare Provider. The Technology Infrastructure Provider is primarily concerned with risks around specific technologies being used (unpatched systems, insecure configurations, root or elevated access, availability and continuity, etc.), environmental factors (fire, flood, etc.) and such whereas the Healthcare Provider is primarily concerned with risks around identity and access management (patient data falling into the wrong hands), data integrity (patient data cannot be tampered with as it moves from system to system), and such.

A standard list of information security risks and threats is therefore not advised since that also allows for context bias to creep in – when we see a list our mental models are bounded by what we see on that list. As a best practice, MetricStream advises the following approach to building an information security risk and threat library:

  1. Identify the business stakeholders (publishers and consumers of a business process, business service, or business application). This step gives you a great idea of what exactly you’re trying to protect and why.
  2. Brainstorm possible causes (threat agents) and methods (threat factors) that can lead to business process/service/application disruption (vulnerabilities).
  3. Compare the outcomes from step 2 against popular threat catalogs. MetricStream advises picking from this list:CSA’s ‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

Once you’ve identified the information security risks and threats that are actually applicable to your business’ operating and technology environment you can leverage upon MetricStream’s content import mechanisms to easily bring this library into the MetricStream IT-Risk Management App for the purpose of risk assessment, risk analysis, and risk treatment.

Jump to Topic
Admin_avatar_1498731489

BLOG ADMIN

Read more about the latest happenings in the GRC universe. MetricStream experts share their valuable insights on how organizations can turn risk into a strategic advantage and thrive on risk.