Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/26/2008
07:40 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Catalyst Conference 2008: GRC Is A Four Letter Word

If you work anywhere near the risk management functions within your company, whether it be as an executive, manager, auditor, or IT security practitioner, you've probably heard from many vendors trying to sell you a "GRC solution." Burton Group analysts say you just may be better off covering your ears.

If you work anywhere near the risk management functions within your company, whether it be as an executive, manager, auditor, or IT security practitioner, you've probably heard from many vendors trying to sell you a "GRC solution." Burton Group analysts say you just may be better off covering your ears.During a presentation today at Burton Group's Catalyst Conference 2008, Bob Blakley, VP and research director at Burton Group, said that the primary goal of any governance program should be "round-trip" management, meaning a continuous feedback loop between the business and management. And while G(overnance), R(isk management), and C(ompliance) are each important organizational categories, Blakley said, they are not an IT product market or a solution.

If Blakley is right, and I believe to a large extent he is, then that would make it challenging for vendors such as BWise, CA, and Oracle to make inroads with their GRC applications. These applications aim collect data throughout an organization, and help them to be able to monitor how well risk is being managed, whether that be IT security risks, regulatory compliance risks, or other sorts of business risk, such as that from natural disasters, and how well the business continuity and disaster recovery plans have the company prepared.

However, Blakley argued that governance, risk management, and compliance, as a whole, can't be automated -- that these are fundamentally human responsibilities and tasks, tools that can be used to automate certain tasks within the separate GRC functions, and that they should be maintained -- and thought about -- as individual silos.

There are many tools that help organizations manage and automate IT security related risks, from identity and provisioning management to vulnerability scanners and patch managers, and it's also gotten easier to attain the data from those security tools, application logs, provisioning reports, and financial systems to better manage all aspects of regulatory compliance and audit survival.

However, there's not been the same headway in the governance part of GRC. Here's how Blakley defined what needs to be done to achieve proper governance:

  • Define organizational risk appetite
  • Define corporate policy
  • Assign responsibilities to specific people
  • Review regular risk management reports
  • Measure risk managers on value creation
  • Define organizational compliance targets
  • Review variance and time-to-remediate reports
  • Measure compliance officers on time-to-remediate and compliance effectiveness

While some of these governance activities could be reduced down to a dashboard view, by the time the data and metrics for both regulatory compliance and IT security are pushed up to the executive level, so much detail will have been lost the report would be meaningless.

I also agree with Blakley that GRC should not be used as a "catch-all" term. Security, compliance managers, and business leaders need to say exactly what they mean: governance, risk, or compliance when discussing risk management. And you need to make sure you force your vendors to do the same.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2005-0394
PUBLISHED: 2021-06-18
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2007-3733
PUBLISHED: 2021-06-18
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2021-21997
PUBLISHED: 2021-06-18
VMware Tools for Windows (11.x.y prior to 11.3.0) contains a denial-of-service vulnerability in the VM3DMP driver. A malicious actor with local user privileges in the Windows guest operating system, where VMware Tools is installed, can trigger a PANIC in the VM3DMP driver leading to a denial-of-serv...
CVE-2021-26834
PUBLISHED: 2021-06-18
A cross-site scripting (XSS) vulnerability exists in Znote 0.5.2. An attacker can insert payloads, and the code execution will happen immediately on markdown view mode.
CVE-2021-26835
PUBLISHED: 2021-06-18
No filtering of cross-site scripting (XSS) payloads in the markdown-editor in Zettlr 1.8.7 allows attackers to perform remote code execution via a crafted file.