Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Education & TrainingCybersecurity News

Assess Cyber Risk Using the COBIT2019 Framework

By Fredric Greene
It's Time to Change Your Perception of the Cybersecurity Professional
July 18, 2019

The COBIT2019 framework includes a holistic approach to manage cyber risks. Although the framework consists of 40 objectives, in this article we will discuss the one objective most relevant to cyber risk management – ‘managed risk’ (APO12). We emphasize the need to leverage experienced cybersecurity professionals who fully understand risk in technology infrastructure.

The COBIT2019 objective on 'managed risk' includes detailed guidance on specific practices, metrics and information flows with inputs and outputs. This objective in the ‘Align, Plan & Organize’ (APO) domain of the framework, can be used specifically for managing cyber risk within an organization’s overall enterprise risk management (ERM).

Below we present the key risk management practices with suggestions for practical use in an organization.

‘Collect data’ (APO12.01) on risks to an organization’s information and technology. Data can be collected and organized using a cyber-threat taxonomy that facilitates a consistent risk analysis and a sustained cybersecurity roadmap. Two such taxonomies are the US NIST 800-30 Threat Event taxonomy and the European Union's ENISA Threat Taxonomy. These taxonomies can be scaled up or down in complexity depending on the organization, but we suggest to keep it simple for full adoption and added value.

To illustrate the collection of data, an organization may identify the most relevant NIST 'adversarial' threats (e.g. obtain unauthorized access, malware delivered to internal systems, exfiltration of sensitive information). The threat taxonomy can then be used to establish a set of scenarios for the consistent collection of data, period after period, with corresponding metrics (e.g. volume of security incidents and problems, endpoint systems infected with malware, externally facing systems). Relevant data should be accumulated that aligns with these threats.

‘Analyze risk’ (APO12.02) with supporting evidence for the risk assessment and associated decisions. Risk scenarios are analyzed by considering internal risk factors (e.g. vulnerability scan results, patch status, externally facing systems) and external factors (e.g. government and industry notifications on malware, trends in exploits and attacks). Analysis of specific scenarios (e.g. unauthorized 'insider' privileged access, ransomware attack, theft of intellectual property) should be customized within the organization's context (e.g. assets affected, repositories with sensitive data, critical business processes). Expand the analysis with estimated impact and probability of each scenario. The technical response to counter each threat should also be analyzed and documented.

In the analysis of risk, consult with cybersecurity professionals to understand the full capabilities of cyber-threat actors e.g. organized crime, nation-state hacking groups. It is also worthwhile to consider the full range of cyber tactics and techniques as documented in the Lockheed Martin ‘Cyber Kill Chain’ or MITRE Att&ck framework.

‘Maintain a risk profile’ (APO12.03) for a set of risk scenarios by category (cyber-threat), business line or functional area. Present worst case and most probable risk scenarios that will enable management to balance risk and mitigation. The risk profiles should be maintained with a quantitative approach that rates impact (1-5) and likelihood (1-5) to get a risk rating (high, normal, low) for each scenario. These profiles can then be prioritized and actioned. Note that the data collected, analyzed and aggregated into risk profiles as described above should yield actionable intelligence for decision making.

‘Articulate risk’ (APO12.04) through communication with relevant stakeholders. It may be worthwhile to consolidate this internal articulation of risk with third part assessments, internal audit reports or quality assurance reviews. We suggest using actual examples of cyber-attacks that are conceivable in the organization. An excellent source of such examples is the annual Verizon 'Data Breach Investigations' report which covers actual data breaches and security incidents in good detail. High profile breaches that reflect possible threats to an organization will get attention from senior management (e.g. Petya ransomware, data theft from Marriott, Equifax and others).

‘Define a risk management action portfolio’ (APO12.05) where each scenario has a corresponding control activity for mitigation. Specific mitigating actions should be documented e.g. compromise of privileged access is mitigated by granting only temporary and restricted access to system administrators; malware is prevented through scanning, patching and robust firewalls.

‘Respond to risk’ (APO12.06) by taking action in actual risk events. We suggest to prepare, maintain and test plans for the most significant risks. Develop scripts or runbooks of actions to take when a specific event occurs. Plan and run periodic exercises with realistic simulations of adverse events.

The practices described above in managing risk represent the COBIT2019 formal and methodical approach. Each practice can be customized and elaborated to match any organization. Managing risk is a continuous process that is most appreciated when risk becomes real with an actual adverse event.

KEYWORDS: cyber threats cybersecurity ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Fredic greene

Fredric Greene, CISSP is a director of IT Audit at UBS in New York. His experience is in audit and risk in information and cyber-security as well as the IT infrastructure, cloud services, systems, networks and databases. He has had several articles published in industry publications and provided training in cybersecurity and risk assessment.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity risk evaluation

    Using risk quantification to assess cyber risk

    See More
  • cyber security

    GAO: Cyber premiums rise as insurers struggle to assess risk

    See More
  • risk management freepik

    New York’s DFS publishes a Cyber Insurance Risk Framework

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing