AuditRubric
gv-rm-3 high Govern / Risk Management Strategy

Cybersecurity risk management activities and outcomes are included in enterprise risk management processes

Cybersecurity risk that is managed in isolation from the broader enterprise risk program often fails to get adequate visibility at the board level and competes poorly for resources against financial and operational risks that are better quantified. Integrating cybersecurity into enterprise risk management (ERM) ensures that security risks are evaluated on the same scale as other business risks and that significant findings reach the decision-makers who can authorize responses.

Estimated effort: 4h
governancerisk-managemententerprise-riskermreporting
Complete first: gv-rm-1

Implementation steps

  1. 1

    Identify the existing enterprise risk management process and owners

    Locate your organization's ERM framework, risk register, or governance committee. Understand the format, risk scoring methodology, and reporting cadence they use. If no formal ERM process exists, this is an opportunity to establish one or at minimum create a shared risk vocabulary with finance and operations leadership.

    confluencegoogle-docsarcherservicenow
  2. 2

    Translate top cybersecurity risks into the ERM format

    Take the top ten to fifteen cybersecurity risks from your security risk register and reframe them in business impact terms (financial loss, regulatory penalty, reputational damage, operational disruption). Submit these to the ERM process using the same likelihood-impact scoring the business uses for other risk categories.

    jiragoogle-sheetsarcherservicenowconfluence
  3. 3

    Establish a recurring reporting mechanism to the ERM process

    Set up a quarterly or semi-annual submission of cybersecurity risk updates to the ERM team or risk committee. Include changes in risk posture, newly identified risks, and closed or mitigated risks. Ensure the CISO or security lead participates in ERM review meetings.

    confluencegoogle-docsjiraarcher

Evidence required

Cybersecurity risks included in the enterprise risk register

Evidence that cybersecurity risks appear in the organization's enterprise-wide risk register alongside operational, financial, and strategic risks.

  • · ERM risk register export showing cybersecurity entries with business impact scores
  • · Board risk report including a cybersecurity risk section
  • · Risk committee meeting minutes discussing cybersecurity risks alongside other enterprise risks

Recurring cybersecurity reporting to ERM process

Documentation showing that cybersecurity risk updates are regularly submitted to the enterprise risk management process.

  • · Quarterly cybersecurity risk report submitted to the risk committee
  • · Calendar invites or meeting records for cross-functional risk reviews
  • · ERM process documentation that explicitly includes cybersecurity as a risk domain

Related controls