Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Education & TrainingCybersecurity News

Assess Cyber Risk Using the COBIT2019 Framework

By Fredric Greene
It's Time to Change Your Perception of the Cybersecurity Professional
July 18, 2019

The COBIT2019 framework includes a holistic approach to manage cyber risks. Although the framework consists of 40 objectives, in this article we will discuss the one objective most relevant to cyber risk management – ‘managed risk’ (APO12). We emphasize the need to leverage experienced cybersecurity professionals who fully understand risk in technology infrastructure.

The COBIT2019 objective on 'managed risk' includes detailed guidance on specific practices, metrics and information flows with inputs and outputs. This objective in the ‘Align, Plan & Organize’ (APO) domain of the framework, can be used specifically for managing cyber risk within an organization’s overall enterprise risk management (ERM).

Below we present the key risk management practices with suggestions for practical use in an organization.

‘Collect data’ (APO12.01) on risks to an organization’s information and technology. Data can be collected and organized using a cyber-threat taxonomy that facilitates a consistent risk analysis and a sustained cybersecurity roadmap. Two such taxonomies are the US NIST 800-30 Threat Event taxonomy and the European Union's ENISA Threat Taxonomy. These taxonomies can be scaled up or down in complexity depending on the organization, but we suggest to keep it simple for full adoption and added value.

To illustrate the collection of data, an organization may identify the most relevant NIST 'adversarial' threats (e.g. obtain unauthorized access, malware delivered to internal systems, exfiltration of sensitive information). The threat taxonomy can then be used to establish a set of scenarios for the consistent collection of data, period after period, with corresponding metrics (e.g. volume of security incidents and problems, endpoint systems infected with malware, externally facing systems). Relevant data should be accumulated that aligns with these threats.

‘Analyze risk’ (APO12.02) with supporting evidence for the risk assessment and associated decisions. Risk scenarios are analyzed by considering internal risk factors (e.g. vulnerability scan results, patch status, externally facing systems) and external factors (e.g. government and industry notifications on malware, trends in exploits and attacks). Analysis of specific scenarios (e.g. unauthorized 'insider' privileged access, ransomware attack, theft of intellectual property) should be customized within the organization's context (e.g. assets affected, repositories with sensitive data, critical business processes). Expand the analysis with estimated impact and probability of each scenario. The technical response to counter each threat should also be analyzed and documented.

In the analysis of risk, consult with cybersecurity professionals to understand the full capabilities of cyber-threat actors e.g. organized crime, nation-state hacking groups. It is also worthwhile to consider the full range of cyber tactics and techniques as documented in the Lockheed Martin ‘Cyber Kill Chain’ or MITRE Att&ck framework.

‘Maintain a risk profile’ (APO12.03) for a set of risk scenarios by category (cyber-threat), business line or functional area. Present worst case and most probable risk scenarios that will enable management to balance risk and mitigation. The risk profiles should be maintained with a quantitative approach that rates impact (1-5) and likelihood (1-5) to get a risk rating (high, normal, low) for each scenario. These profiles can then be prioritized and actioned. Note that the data collected, analyzed and aggregated into risk profiles as described above should yield actionable intelligence for decision making.

‘Articulate risk’ (APO12.04) through communication with relevant stakeholders. It may be worthwhile to consolidate this internal articulation of risk with third part assessments, internal audit reports or quality assurance reviews. We suggest using actual examples of cyber-attacks that are conceivable in the organization. An excellent source of such examples is the annual Verizon 'Data Breach Investigations' report which covers actual data breaches and security incidents in good detail. High profile breaches that reflect possible threats to an organization will get attention from senior management (e.g. Petya ransomware, data theft from Marriott, Equifax and others).

‘Define a risk management action portfolio’ (APO12.05) where each scenario has a corresponding control activity for mitigation. Specific mitigating actions should be documented e.g. compromise of privileged access is mitigated by granting only temporary and restricted access to system administrators; malware is prevented through scanning, patching and robust firewalls.

‘Respond to risk’ (APO12.06) by taking action in actual risk events. We suggest to prepare, maintain and test plans for the most significant risks. Develop scripts or runbooks of actions to take when a specific event occurs. Plan and run periodic exercises with realistic simulations of adverse events.

The practices described above in managing risk represent the COBIT2019 formal and methodical approach. Each practice can be customized and elaborated to match any organization. Managing risk is a continuous process that is most appreciated when risk becomes real with an actual adverse event.

KEYWORDS: cyber threats cybersecurity ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Fredic greene

Fredric Greene, CISSP is a director of IT Audit at UBS in New York. His experience is in audit and risk in information and cyber-security as well as the IT infrastructure, cloud services, systems, networks and databases. He has had several articles published in industry publications and provided training in cybersecurity and risk assessment.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cybersecurity risk evaluation

    Using risk quantification to assess cyber risk

    See More
  • cyber security

    GAO: Cyber premiums rise as insurers struggle to assess risk

    See More
  • risk management freepik

    New York’s DFS publishes a Cyber Insurance Risk Framework

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing