• Support
  • Login
  • Contact
  • Blog
  • Support
  • Login
  • Contact
  • Blog
SecurityScorecard SecurityScorecard
  • Products
    PRODUCTS
    • Security Ratings
      Identify security strengths across ten risk factors.
    • Security Data
      Get actionable, data-based insights.
    • Security Assessments
      Automate security questionnaire exchange.
    • Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
    • Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    • Cyber Risk Quantification
      Translate cyber risk into financial impact.
    • Reporting Center
      Streamline cyber risk reporting.
    • SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
    SERVICES
    • Active Security Services
      Test your security controls.
    • Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
    • Digital Forensics & Incident Response
      Prepare to respond to any threat.
    • Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    BUY NOW
    • Compare All Plans
      Choose a plan that's right for your business.
    • Try Free Account
      Make informed decisions with confidence.
    • Buy Pro Now
      Add automated event responses.
    • Buy Business Now
      Expand on Pro with vendor management and integrations.
    • Request Enterprise Demo
      See the capabilities of an enterprise plan in action.
    icon__SSClogoMark icon__SSClogoMark

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Solutions
    BY USE CASE
    • Compliance
    • Cyber Insurance
    • Digital Forensics
    • Due Diligence
    • Enterprise Cyber Risk
    • Executive-Level Reporting
    • Incident Response
    • Regulatory Oversight
    • Third-Party Risk
    BY INDUSTRY
    • Enterprise
    • Financial Services
    • Government
    • Healthcare
    • Insurance
    • Retail & Consumer
    • Technology
    Help your organization calculate its risk
    View All Solutions
  • Customers
    OUR CUSTOMERS
    • Customer Overview
      Trusted by companies of all industries and sizes.
    • Peer Reviews
      Find out what our customers are saying.
    SUCCESS AND SUPPORT
    • Customer Success
      Receive award-winning customer service.
    • Support
      Get your questions answered by our experts.
    COMMUNITY
    • SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    • Connect Login
      Join our exclusive online customer community.
    icon__SSClogoMark icon__SSClogoMark
    Understand and reduce risk with SecurityScorecard.
    Free account sign up
  • Partners

    Partner Program Overview

    Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business.

    Learn more
    • Locate a Partner
      Access our industry-leading partner network.
    • Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    • Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    • ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
    • Technology Alliances
      Access innovative solutions from leading providers.
    • SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    • SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Resources
    RESOURCES
    • Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    • SecurityScorecard Blog
      Read the latest blog posts published weekly.
    • Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    • SecurityScorecard Academy
      NEW
      Complete certification courses and earn industry-recognized badges.
    TOOLS AND DOCUMENTATION
    • Free Security Rating
      Get your free ratings report with customized security score.
    • Product Release Notes
      Visit our support portal for the latest release notes.
    • Free Account Signup
      Start monitoring your cybersecurity posture today.
    • Chrome Extension
      NEW
      Show the security rating of websites you visit.
    • Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
    Trust begins with transparency. Take a look at the data that drives our ratings.
    Learn more
  • Company

    Working at SecurityScorecard

    Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it.

    Join our team
    • About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    • Leadership
      Meet the team that is making the world a safer place.
    • Press
      Explore our most recent press releases and coverage.
    • Events
      Join us at any of these upcoming industry events.
    • Policy Insights
      Raising the bar on cybersecurity with security ratings.
    • Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    • Contact Us
      Contact us with any questions, concerns, or thoughts.
    • Trust Portal
      Take an inside look at the data that drives our technology.
    • Help Center
      We are here to help with any questions or difficulties.
Request a demo
SecurityScorecard SecurityScorecard
  • Support
  • Login
  • Contact
  • Blog
  • Support
  • Login
  • Contact
  • Blog
SecurityScorecard SecurityScorecard
  • Products
    PRODUCTS
    • Security Ratings
      Identify security strengths across ten risk factors.
    • Security Data
      Get actionable, data-based insights.
    • Security Assessments
      Automate security questionnaire exchange.
    • Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
    • Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    • Cyber Risk Quantification
      Translate cyber risk into financial impact.
    • Reporting Center
      Streamline cyber risk reporting.
    • SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
    SERVICES
    • Active Security Services
      Test your security controls.
    • Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
    • Digital Forensics & Incident Response
      Prepare to respond to any threat.
    • Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    BUY NOW
    • Compare All Plans
      Choose a plan that's right for your business.
    • Try Free Account
      Make informed decisions with confidence.
    • Buy Pro Now
      Add automated event responses.
    • Buy Business Now
      Expand on Pro with vendor management and integrations.
    • Request Enterprise Demo
      See the capabilities of an enterprise plan in action.
    icon__SSClogoMark icon__SSClogoMark

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Solutions
    BY USE CASE
    • Compliance
    • Cyber Insurance
    • Digital Forensics
    • Due Diligence
    • Enterprise Cyber Risk
    • Executive-Level Reporting
    • Incident Response
    • Regulatory Oversight
    • Third-Party Risk
    BY INDUSTRY
    • Enterprise
    • Financial Services
    • Government
    • Healthcare
    • Insurance
    • Retail & Consumer
    • Technology
    Help your organization calculate its risk
    View All Solutions
  • Customers
    OUR CUSTOMERS
    • Customer Overview
      Trusted by companies of all industries and sizes.
    • Peer Reviews
      Find out what our customers are saying.
    SUCCESS AND SUPPORT
    • Customer Success
      Receive award-winning customer service.
    • Support
      Get your questions answered by our experts.
    COMMUNITY
    • SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    • Connect Login
      Join our exclusive online customer community.
    icon__SSClogoMark icon__SSClogoMark
    Understand and reduce risk with SecurityScorecard.
    Free account sign up
  • Partners

    Partner Program Overview

    Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business.

    Learn more
    • Locate a Partner
      Access our industry-leading partner network.
    • Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    • Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    • ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
    • Technology Alliances
      Access innovative solutions from leading providers.
    • SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    • SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Resources
    RESOURCES
    • Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    • SecurityScorecard Blog
      Read the latest blog posts published weekly.
    • Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    • SecurityScorecard Academy
      NEW
      Complete certification courses and earn industry-recognized badges.
    TOOLS AND DOCUMENTATION
    • Free Security Rating
      Get your free ratings report with customized security score.
    • Product Release Notes
      Visit our support portal for the latest release notes.
    • Free Account Signup
      Start monitoring your cybersecurity posture today.
    • Chrome Extension
      NEW
      Show the security rating of websites you visit.
    • Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
    Trust begins with transparency. Take a look at the data that drives our ratings.
    Learn more
  • Company

    Working at SecurityScorecard

    Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it.

    Join our team
    • About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    • Leadership
      Meet the team that is making the world a safer place.
    • Press
      Explore our most recent press releases and coverage.
    • Events
      Join us at any of these upcoming industry events.
    • Policy Insights
      Raising the bar on cybersecurity with security ratings.
    • Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    • Contact Us
      Contact us with any questions, concerns, or thoughts.
    • Trust Portal
      Take an inside look at the data that drives our technology.
    • Help Center
      We are here to help with any questions or difficulties.
Request a demo
SecurityScorecard SecurityScorecard
BLOG

How Do You Develop an Enterprise Risk Management Framework?

Kasey Hewitt
08/10/2020

Nearly all cybersecurity regulations and industry standards start with a risk assessment process. However, for many organizations, formalizing their series of risk reviews into an enterprise cyber risk management framework can feel overwhelming. Operationalizing your security risk by developing an enterprise risk management framework can provide a more effective strategy for the long term.

What is an enterprise cyber risk management framework?

Before developing an enterprise risk management (ERM) framework, you need a strong understanding of the benefits it gives to your organization.

An enterprise risk management framework referred to as an integrated framework by some regulations and industry standards, requires you to identify known risks, review any changes made to your IT portfolio, assess new risks, and work with management to determine how to improve the risk reporting.

Functionally, by continuously iterating this series of steps, you create an overarching program with repeatable actions that more proactively address risks and enhance risk response activities.

How to establish organizational objectives

The first step to developing a successful ERM framework is to create a cross-functional team and determine the organization’s most imperative business goals. In many organizations, this team includes the IT department, line of business leadership, and senior executive leadership.

For example, if your company is moving towards a cloud-first or cloud-only strategy, the team should include:

  • Chief Information Officer: to assess new technologies such as Software-as-a-Service (SaaS) tools
  • Chief Information Security Officer: to review the technology’s security posture
  • Chief Executive Officer: to align technology decisions with business strategies
  • Chief Financial Officer: to review costs associated with strategies and technologies
  • Chief Compliance Officer: to ensure compliance with standards and regulations
  • IT Auditor: to provide insight into controls and security documentation
  • Relevant Department Directors: to explain how their technology choice increases their departments’ effectiveness and revenue generation

Each internal stakeholder has different needs and concerns so by bringing them together your organization can make more informed decisions.

Why you need to start by identifying risks

As part of developing an ERM framework, you need to identify risk across your current IT portfolio. The basic premise underlying this step is that you can’t secure everything, but you definitely can’t secure the locations that you don’t know exist. As your organization builds out its digital transformation strategy, you expand the attack surface.

For example, you should ask:

  • What are the systems, software, and networks?
  • What types of data do you collect, transmit, and store?
  • Where do you collect, store, and transmit data?
  • What devices are connected to your networks?
  • Who connects to your networks and from where?

Understanding all the potential locations, data types, and users that can pose a risk to your information security posture means that you have a deeper understanding of potential threats and can create stronger risk mitigation strategies.

How to assess risks after identifying them

Once you identify the risks, you need to examine the level of risk associated with each one. Since not all assets are equally important, you need to think like a malicious actor and decide what resources are most important.

When assessing risk, you should start by looking at the highest risk data types, systems, networks, and software. Some questions to ask include:

  • Do you collect personally identifiable information (PII)?
  • Do you store PII?
  • Where do you collect, store, and transmit PII?
  • What devices are connected to your networks and systems?
  • What software are you using?
  • What cloud services are you using?

Depending on the sensitivity of data and the location where you store it, the risks can be set as low, medium, or high. For example, publicly available information stored in an on-premises database that doesn’t connect to the internet is a low risk. Meanwhile, PII stored in a cloud database might be high risk since misconfigurations can leave it exposed to the world, creating a data breach.

Why analyzing risks matters

Analyzing risk takes the identification and assessment steps and levels them up a bit. Now that you know what data you have, where it resides, who uses it, and the different types of risk involved, you can analyze the risk more effectively.

Just like not all risks are equal, the likelihood of a data breach varies and the impact a data breach has on your organization varies. The general equation for analyzing risk is:

Impact of Data Incident X Likelihood of a Data Incident/Costs Incurred

For example, if a database that doesn’t store any sensitive data is breached, the costs incurred and impact would be low. Therefore, even if a high likelihood of incident exists, the low costs and impact mean that the risk is low or medium. However, if you store cardholder data on a segmented network, the impact would be high – both financial and reputational – and so would the costs incurred. Thus, even if the likelihood is medium or low, this area of your IT portfolio is likely a high risk overall.

How to establish a risk tolerance

Once you’ve analyzed all risks, you need to determine your risk tolerance. Some risks might be refused, such as no longer collecting certain types of user data, because they provide too little value to the company compared to the level of risk involved. In some cases, you will accept the risk because the location, data type, or service is imperative to continued business operations. You might also choose to transfer risk by hiring a vendor or purchasing cyber risk insurance. Finally, many organizations set controls, such as encryption, to mitigate risks.

Once you’ve established your risk tolerance and discussed it with the internal stakeholders, you can put a plan into place.

How to continuously monitor and iterate your risk management processes

Even after deciding to transfer or mitigate risk, your organization needs to continuously monitor for new risks. IT portfolios, particularly with the ability to up- and down-scale cloud services, are no longer static. Whether you’re adding new applications or increasing processing power with workloads or containers, your IT ecosystem continues to evolve.

Similarly, malicious actors continue to evolve their threat methodologies. When developing your ERM, you need to incorporate continuous monitoring to protect the organization. As part of this process, you want to consider monitoring:

  • Network access for suspicious traffic
  • Vendors’ controls’ effectiveness
  • Encryption for data-in-transit and at-rest
  • Cloud locations such as databases, workloads, and containers
  • Web applications and access portals
  • Security updates for mission-critical software and services

Since malicious actors will be actively looking to exploit weaknesses across the ecosystem, you need to ensure that your ERM planning includes owned IT and vendor IT controls.

How SecurityScorecard enables the development of an ERM framework

SecurityScorecard’s security ratings platform makes it easier for organizations to assess risk across their connected IT ecosystems. Our platform provides easy-to-read scores using an A through F rating system for at-a-glance visibility into controls’ effectiveness.

For organizations developing an ERM framework, SecurityScorecard’s ten risk factors provide a starting point for looking at high-risk networks, services, and software. Then, by looking at the individual scores provided across the ten groups of risk factors, organizations can prioritize the areas that need strengthening.

With organizations rapidly moving to cloud-first IT infrastructures, SecurityScorecard enables them to accelerate their risk, security, and compliance strategies.

Return to Blog
Join us in making the world a safer place.
FREE ACCOUNT SIGN UP
Products
Solutions
Customers
Marketplace
Partners
Resources
Company
Trust Portal
Security Ratings
Login
Blog
Contact
Careers

SecurityScorecard
Tower 49
12 E 49th St
Suite 15-100
New York, NY 10017

[email protected]

United States: (800) 682-1701
International: +1(646) 809-2166
Social-linkedin Social-facebook Twitter Instagram Youtube