Don’t have time to read everything? Spend five minutes scanning whatever is red.
Boiling Frog
We all have heard about the boiling frog analogy. The story is that when the frog is dropped into the boiling water, it will jump out. However, if the frog is put in warm water which is then slowly boiled, the frog will not perceive the danger soon enough and will be died.
This analogy when applied in the risk context refers a business situation where small changes in the context are not noticed or their significance not well understood. A somewhat relevant real life example can be found in the Westpac Advisory Panel Report into Board Governance of AML/CTF Obligations.
Observing trends can be helpful in identifying changes in the context which can help in updating organisation’s approach towards risk.
Technology Risk
I believe ISACA’s Risk IT Framework 2nd Edition outlines the Technology Risk scope really well.
The Risk IT Framework concerns the entire spectrum of I&T risk—any business or mission risk related to the use of, or dependence on, information and communications technology (ICT), operational technology (OT), network or internet of things (IOT), electronic data, and digital or electronic communications. The framework is founded on the core principle of serving stakeholders and enhancing business value through effective enterprise governance and management of all types of I&T-related risk. In this publication, information security, information assurance and cybersecurity are treated as subdomains of I&T-related risk.
ISACA Risk IT Framework Page 9 of 46
Trends in Technology Risk
I have observed below trends in relation to technology risk:
1. Industries have embraced digital transformation. The technology changes are rapid particularly in the banking and financial services industry. Dependency on technology in delivering the banking and financial services are increasing day by day. A cyberattack can result in prolonged disruption of business activities.
2. Information security incidents continue to rise. With increased use of IOT devices, operational security is gaining prominence. The financial cost of cyberattacks are rising.
3. The regulatory focus on information security in the financial services industry is increasing. APRA has mandated information security standard CPS 234 Information Security since July 2019. Australian privacy principles have been updated in 2019. NPP Australia and SWIFT has issued clear information security controls expectations.
4. Increasing expectations to meet “social license obligations” changing the “purpose” of the Bank from shareholders’ return maximisation to a broader set of stakeholders including employees, community, customers, suppliers and regulators. (Source: Westpac Advisory Panel Report into Board Governance of AML/CTF Obligations).
5. Increasing expectations about what boards can and should do evident by the larger and growing statement of duties of a director which poses a challenge for non-executive directors – how to cover large scope of matters that have to be addressed. (Source: Westpac Advisory Panel Report into Board Governance of AML/CTF Obligations)
Questions
Each business in unique. However, the below questions will help in identifying the need to revisit your technology risk and compliance strategy.
1. Has your technology risk and compliance team capability and capacity grown in proportion to the digital transformation projects pipeline? (If your organisation doesn’t have any digital transformation project then it may be a serious question 🤔.) When you hear your project managers complaining about the time taken by technology risk and compliance teams in various activities, it may be an indicator that your technology risk and compliance teams do not have sufficient resources or there is an uplift needed in capability.
2. Does your organisation have adequate risk framework which guides in taking effective risk based decisions for technology risk? I believe it is a fundamental step to recognise technology risk and compliance as a material risk in the risk framework. This will help in setting up appropriate risk appetite as well as policies and procedures to aid decision making. No organisation has unlimited budget for technology risk. Accordingly, it is important to set up risk framework which can help in decision making.
3. Has your technology risk policy framework operationalised effectively / embedded in IT activities? Effective implementation requires a balance of systems, processes, people along with empowerment and encouragement. A reliance on internal controls framework alone will have limited traction. When you see key technology risk indicators remaining Amber or Red for a prolonged time period, it may be an indicator that technology risk policies are not effectively implemented. Another indicator may be repetition of issues in technology risk and compliance space.
4. Does your third party risk program covers technology risk considerations effectively? Your business will be relying on your third party internal controls to manage technology risk. The performance of these controls are out of your control. Your third party may be your weakest link (e.g. SolarWinds Hack – it was a highly sophisticated one or recent website outage).
If your answer is yes to every question above, then either the technology risk has got its prominence in your organisation or there is a need to ask yourself is it really a resounding YES?
