APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • CXO Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Risk Management
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Risk Assessment Keeping Cyber Bully Away

    Paul Ernst, CIO, Sandler Capital Management

    Digitization Transforming Business in all Sectors

    Robert Aitken, CIO, Beyond Bank Australia

    Trend Micro: Nurturing Risk Management with Hybrid Cloud

    CEO & Co-founder

    Ensuring your Seat on the Leadership Table

    David Otte, CAO and CIO, Bingham Greenebaum Doll LLP

    Cyber Fraud - the Silent Killer

    Bill Murphy, SVP, CIO & CRO, Fidelity Bank of Florida N.A.

    All Roads Lead to Risk Assessment

    Christopher R. Barber, EVP & CIO, Commonwealth Business Bank

    Navigating the Dynamic Terrain of Modern Banking

    HenkySulistyo, Chief Risk Officer ,CIMB Niaga

    Getting the Most from Your Road Risk Management Programme

    Caroline Perry, Development Director at Brake

    right

    Cyber Enterprise Risk Management-What are Key Factors to Success?

    Kieran Stack, MD & ERM Practice Leader and Stephanie Snyder, National Cyber Sales Leader, Aon Risk Solutions

    Tweet
    content-image

    Kieran Stack, MD & ERM Practice Leader and Stephanie Snyder, National Cyber Sales Leader, Aon Risk Solutions

    “How well is my organization’s

    “How does adopting a holistic approach to cyber risk management help my organization better manage volatility risk associated with my cyber risk exposure?”

    “The strive for efficiency in organizations’ data management platforms can potentially be at odds with the desire to increase cyber risk management controls”

    Boards of Directors, senior management and risk leaders are being increasingly asked to respond to questions like those posed above. In today’s Internet of Things environment, cyber risk continues to grow and is becoming increasingly more complex.  The interconnected nature of cyber risk has been felt by many organizations as a multitude of data breaches in the past several years has in some cases resulted in an interruption to their business operations and eroded consumer trust in those organizations.

    Historically, we have seen cyber risk limited to the liability and expenses related to a breach of private information, such as personal information, healthcare information or credit card information.  Many view 2014 as the year of the retail breach and 2015 as the year of the healthcare breach.

    Given the evolving nature of technology, we have started to see network security breaches result in business interruption losses. When organizations suffer a network outage, there can be significant expenses related to computer forensics, remediation, changes of systems architecture, hardware replacement costs and additional costs to keep the organization operating, as well as the loss of net income. Many of these attacks have also resulted in losses to intangible (data) assets, in which hard drives have been wiped clean of data or employees have been unable to access servers.

    Cyber breaches have proved that there can be significant implications to an organization’s balance sheet and a potential impact on the Board of Directors. In fulfilling their fiduciary responsibility, Boards of Directors are recognizing that cyber breaches are a critical risk that can impact their organization’s ability to meet its strategic objectives and in response are reinforcing the application of advanced risk management practices to mitigate the potential impact to organizational performance during significant cyber risk events.

    For several years Aon, in close collaboration with the Wharton School of the University of Pennsylvania have been researching the importance of advanced risk management practices with the proper tools and techniques to empower results. The observations and finding of this research resonate closely with the application of advanced risk management practices to managing an organization’s cyber risk.  The Aon Risk Maturity Index Insight Report has consistently observed direct correlations between enhanced risk management practices and improved performance in the financial markets. Working with annual financial results from over 300 publicly traded companies around the world; researchers found a correlation between higher levels of risk maturity and improved market performance, profitability, and organizational resiliency. Examined through the lens of cyber risk, these findings continue to emphasize the importance of a robust, integrated, and holistic risk management program.

    By nature, organizations are incredibly complex; many operate with multiple subsidiaries around the world, across numerous business functions, with thousands of colleagues and processes. From a cyber risk standpoint such organizations have multiple risk owners spread across corporate functions and operating divisions. Cyber risk management also extends beyond the physical walls of an organization.  Increased corporate data aggregation will continue to drive engagement with cloud providers as organizations are forced to find more efficient ways to manage their data assets. The strive for efficiency in organizations’ data management platforms can potentially be at odds with the desire to increase cyber risk management controls. Some may argue that replacing data centers with cloud providers reduces the overall network security risk while others remain concerned about vendor engagements and the additional potential for breaches via an outsourced network.

    With such complexities, it becomes difficult for an organization to understand and respond to its integrated cyber risk profile. Cyber risk is constantly evolving within organizations, whether across the entire organization or at the individual business function level.  Responding to the constantly evolving nature of cyber risk in a siloed manner can therefore potentially have significant consequences.

    Recognizing that there is no ‘one size fits all’ solution to cyber risk, it is important to take a holistic view at the cyber risk that flows through an organization and build a cross-functional understanding of that risk.  Consideration should be given to the various stakeholders in senior management, information technology, legal, human resources and risk management. Aon and Wharton researchers have found three key factors that distinguish high and low risk management practices within organizations;

    1.Communication of risk management strategies, objectives, and practices 2.Collaboration in executing risk based practices across risk-based functions 3.Consensus on strategy for cross-functional risks

    Let’s consider this theme further.  What approaches can organizations take to differentiate their risk management practices and apply those practices to the management of cyber risk?

    •Awareness of the complexity of cyber risk •Agreement on strategy and action •Alignment to execute

    Increasing performance along these dimensions requires a robust process that focuses on:

    •the identification of strengths and weaknesses •strong communication of cyber risk and its management across functions and at all levels of the organization •buildingconsensus regarding the steps to be taken Effective cyber risk management is the result of having the appropriate people, tools and processes in place. It consists of having a clear understanding of an organization’s key cyber risk vulnerabilities, knowing who is responsible for managing those vulnerabilities, having an effective communication process in place and integrating key cyber risk concepts into strategic decision making. If history has taught us nothing else, it is that even robust network security may contain vulnerabilities and that when thinking about a network security breach, it is advised not to consider ‘if’, but rather ‘when’.

    Check out: Top Fraud And Breach Protection Companies
    tag

    Financial

    Data Management

    Information Technology

    Weekly Brief

    loading
    10 Most Promising Risk Management Solution Providers - 2017
    ON THE DECK

    Risk Management 2017

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://risk-management.apacciooutlook.com/views/cyber-enterprise-risk-managementwhat-are-key-factors-to-success-nwid-2007.html