Posted by admin | Posted in Data Management, Information Security | Posted on 11-02-2013
Consider the phrase “information risk profile.” It sounds serious, important. It sounds like something most companies should have in the information age. Yet it’s risk-management strategy that’s easy to put off or ignore altogether.
For organizations with an outdated. insufficient or altogether nonexistent information risk profile, it helps to start with a basic question: Just what the heck is one?
“I look at it as conversation that discusses the organization’s tolerance for loss, disruption or availability issues regarding their data assets,” IP Architechts president John Pironti said in an interview. “When does it hurt when they lose something?
Having that conversation, as it were, can help companies define and prioritize smarter approaches to securing and safeguarding their information, no matter what that information might be. This is turn helps minimize the potential pain when things go wrong: financial loss, PR embarrassment, productivity drains and similar downsides.
Among the many reasons an information risk profile is an important tool in the digital age: a comprehensive one can help organizations clarify what is actually important versus what is perceived to be important. Failing to make that distinction often leads to wasted resources, ineffective strategies and poor decision making.
Pironti, who will chair the Information Security and Risk Management track at Interop, offered this advice on building effective, efficient information risk profiles.
1. Heed The Difference Between “Risk” And “Threat.”
2. Company Should ‘Own’ The Profile.
3. You Need The Right People In The Room.
4. The Goal Is Not To Include Everything.
Read more about Building Effective Information Risk Profiles
If there’s already a business continuity or disaster recovery plan in place, start there — a good one should have, in effect, already “ranked” the company’s data priorities, which can help smooth out any ruffled feathers.
“A lot of organizations have already gone through that process, versus doing a real risk profile,” Pironti said. “It’s an easy starting point to take control and build effective and efficient risk management profile.