CHAPTER 3

Organize Your Program

Functions of an IT Risk Management Program

There are many authoritative sources that can guide you in the formation of your key program functions. Over the years, I have melded my personal experience as a consultant and seeing what works at companies across a variety of industries using noteworthy frameworks such as NIST and the International Organization for Standardization (ISO).

Figure 3.1 is an example of a program I have implemented and its mapping to the NIST Cybersecurity Framework, which can be accessed online at https://nist.gov/cyberframework.

You can certainly call your key program components whatever you would like but I prefer these terms as most business stakeholders can relate easier than some “technobabble,” ...

Get The Business-Minded CISO now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.