Why risk management?
Time-based model of Information Security
P > D + R
P = time it takes an attacker to break through the various controls that protect the organization’s information assets D = time it takes for the organization to detect that an attack is in progress R = time it takes to respond to and stop the attack
If the equation is satisfied (P > D + R is true), then the organization’s information security procedures are effective. Otherwise, security is ineffective.
The main purpose of monitoring and review process are:
Criticism on COSO ERM
Michael Power:
In particular, he observes that risk management did little to prevent or slow down the financial crisis.
•Nothing about systemic risks
•Nothing about comparability of risk across departments
•Tends to be based on risks that are easy to measure and record
•Real risks are about human decision:
Conclusions