Ingredients of a Winning Security Assessment and What It says about my Enterprise Risk Management (ERM) Approach
Outer Harbor, Hamburg, Germany - Photo by Jacob Meissner

Ingredients of a Winning Security Assessment and What It says about my Enterprise Risk Management (ERM) Approach

Modern businesses face a diverse set of risks and serious threats that can have adverse effects on its organizational assets and operations (i.e., missions, functions, image, or reputation), and individuals. In the past, business leaders viewed risk management as a balancing act between cost, schedule and performance. When well-executed, managers were rewarded for a job well done. But the risk landscape is constantly changing which demands that the evaluation and management of those risks adjust accordingly. Security is such an instance. With the rapid rise of asymmetric threats and constant attacks to computers and networks worldwide; Security must be added as a 4th pillar of the risk equation with equal emphasis to Cost, Schedule, Performance.

Figure 1 - NIST SP 800-39: Managing information Security Risk - Information Security Requirements Integration


Managing risk is a complex, multifaceted activity that requires the involvement of the entire organization—from senior leaders/executives providing the strategic vision and top-level goals and objectives for the organization; to mid-level leaders planning, executing, and managing projects; to individuals on the front lines operating the information systems supporting the organization’s missions/business functions. In my view, a winning security assessment would start with a winning cyber risk assessment. Some ingredients for a winning security assessment would be composed of the following: 1) Risk Framing,  2) Risk Assessment 3) Risk Response 4) Risk Monitoring.

Figure 2 - NIST SP 800-39: Managing Information Security Risk: Risk Management Process Tiers


Effective risk management requires that organizations operate in highly complex, interconnected environments using state-of-the-art and legacy information systems—systems that organizations depend on to accomplish their missions and to conduct important business-related functions. Leaders must recognize that explicit, well-informed risk-based decisions are necessary in order to balance the benefits gained from the operation and use of these information systems with the risk of the same systems being vehicles through which purposeful attacks, environmental disruptions, or human errors cause mission or business failure.

In my view, Software Security Assessment is the process of testing software to find threats and determining the measures to put in place to defend against them. A security risk assessment identifies, assesses, and implements key security controls in applications. It also focuses on preventing software security defects and vulnerabilities. Carrying out a risk assessment allows an organization to view the application portfolio holistically—from an attacker’s perspective. It supports managers in making informed resource allocation, tooling, and security control implementation decisions. Thus, conducting an assessment is an integral part of an organization’s risk management process.

A successful security assessment should look to identify by framing, analyze by assessing, mitigating by responding; and prevent by monitoring.

Risk Framing

The first ingredient of a winning security assessment is to frame the risk or establish a security profile - that is, to describe the environment in which risk-based decisions are made.

Figure 3 - NIST SP 800-39: Managing Information Security Risk, Risk Framing

The purpose of the risk framing component is to produce a risk management strategy that addresses how organizations intend to assess risk, respond to risk, and monitor risk—making explicit and transparent the risk perceptions that organizations routinely use in making both investment and operational decisions. The risk frame establishes a foundation for managing risk and delineates the boundaries for risk-based decisions within organizations. For example, to determine all critical assets of the technology infrastructure. Next, diagnose sensitive data that is created, stored, or transmitted by these assets.

Risk Assessment

The second ingredient of a winning security assessment is to assess the context of the organizational frame.

Figure 4 - NIST SP 800-39: Managing Information Security Risk, Risk Assessment Process


The purpose of the risk assessment component is to identify: (i) threats to organizations (i.e., operations, assets, or individuals) or threats directed through organizations against other organizations or a state; (ii) vulnerabilities internal and external to organizations; (iii) the harm (i.e., consequences/impact) to organizations that may occur given the potential for threats exploiting vulnerabilities; and (iv) the likelihood that harm will occur. For example, to administer an approach to assess the identified security risks for critical assets. After careful evaluation and assessment, determine how to effectively and efficiently allocate time and resources towards risk mitigation. The assessment approach or methodology must analyze the correlation between assets, threats, vulnerabilities, and mitigating controls.

Risk Response

The third ingredient of a winning security assessment is to respond to risk once that risk is determined based on the results of risk assessments.  Incident response is often established as the “why” of security. In my opinion, without cybersecurity incidents, there would be no need to have a security team. The purpose of the risk response component is to provide a consistent, organization-wide, response to risk in accordance with the organizational risk frame by: (i) developing alternative courses of action for responding to risk; (ii) evaluating the alternative courses of action; (iii) determining appropriate courses of action consistent with organizational risk tolerance; and (iv) implementing risk responses based on selected courses of action. For example, to define a mitigation approach and enforce security controls for each risk.

Risk Monitoring

The fourth ingredient of a winning security assessment is to monitor risk over time. The purpose of the risk monitoring component is to: (i) verify that planned risk response measures are implemented and information security requirements derived from/traceable to organizational missions/business functions, federal legislation, directives, regulations, policies, and standards, and guidelines, are satisfied; (ii) determine the ongoing effectiveness of risk response measures following implementation; and (iii) identify risk-impacting changes to organizational information systems and the environments in which the systems operate. For example, to implement tools and processes to minimize threats and vulnerabilities from occurring in your firm’s resources.


Finally, ERM is a company's approach to managing risk. It is the practices, policies, and framework for how a company handles a variety of risks its business faces.

Figure 5 - NIST SP 800-39: Managing Information Security Risk, Generic Risk Model


Enterprise Risk Management (ERM) is important because it helps prevent losses or unexpected negative outcomes. In my view, It’s important to understand that a winning security risk assessment isn’t a one-time security project. Rather, it’s a continuous activity that should be conducted at least once every other year. Continuous assessment provides an organization with a current and up-to-date snapshot of threats and risks to which it is exposed. As an organization makes, sells, and delivers goods to customers, it faces countless risks from numerous sources. To better plan for these risks, companies are turning to enterprise risk management, a company-wide, top-down approach of assessing risk and devising plans.

To view or add a comment, sign in

More articles by Paul M. Veillard, M. Eng

  • Implementing a Risk-Based Approach to Vulnerability Management

    Implementing a Risk-Based Approach to Vulnerability Management

    The modern cyber ecosystem is anything but static; it’s a constantly shifting, evolving entity that continually expands…

  • Elasticsearch is elastic, for real

    Elasticsearch is elastic, for real

    One of the most important aspects to modern software that is often overlooked in modernization projects is the ability…

    1 Comment
  • Data Privacy - A Shared Responsibility

    Data Privacy - A Shared Responsibility

    While Cloud Computing has been a major paradigm shift in Information Communications and Technology (ICT); it also…

  • Securing the Internet of Things in the era of cognitive computing

    Securing the Internet of Things in the era of cognitive computing

    Society is entering a period of radical transformation in which the use of different technologies will have the power…

  • The impact of applying business analytics

    The impact of applying business analytics

    Everyone makes decisions. Individuals face personal decisions such as choosing a college or graduate program, making…

  • The Essence of Reengineering

    The Essence of Reengineering

    To remain competitive in today’s economy, organizations must be innovative. And yet many organizations that should be…

  • Purpose in Innovation

    Purpose in Innovation

    How do we get to innovation? The process of innovation is design. Design makes ‘media’ suitable for behavior.

  • Stimulating Innovation and Change

    Stimulating Innovation and Change

    Today’s successful organizations must foster innovation and master the art of change, or they’ll become candidates for…

    1 Comment
  • Act with audacity

    Act with audacity

    The world is in perpetual motion, and we must invent the things of tomorrow by acting with audacity.The shores of…

  • The challenges of Big Data

    The challenges of Big Data

    Most data collected by organizations used to be transaction data that could easily fit into rows and columns of…

Insights from the community

Others also viewed

Explore topics