IT Examiner School eBook
Internal Use Only
Risk Mitigation “Tools” • Properly identified risks prioritized for importance/criticality • Independent Audits • Appropriate IT policies, procedures, and standards • Appropriate IT system & application security controls and timely monitoring • Vulnerability Assessment and Pen Tests • Dual controls/separation of duties • Cybersecurity reviews/audits • Strong vendor management controls
19
Internal Use Only
Risk Assessment from a Management Component Perspective The Board is responsible for communicating their risk tolerance to management Management is responsible for performing the risk assessment, ensuring that the RA is complete, accurate, and reasonable, and reporting the results to the Board Risk acceptance decisions should be made at the Board level Review Board minutes for support for answers provided by management during discussions (approval/discussion of risk assessment findings, risk acceptance decisions, etc.)
Made with FlippingBook - Online magazine maker