What is a cyber security risk assessment?
A cyber security risk assessment is the process of identifying, analysing and evaluating risk. It helps to ensure that the cyber security controls you choose are appropriate to the risks your organisation faces.
Without a risk assessment to inform your cyber security choices, you could waste time, effort and resources. There is little point implementing measures to defend against events that are unlikely to occur or won’t impact your organisation.
Likewise, you might underestimate or overlook risks that could cause significant damage. This is why so many best-practice frameworks, standards and laws – including the GDPR (General Data Protection Regulation) and DPA (Data Protection Act) 2018 – require risk assessments to be conducted.
Minimise cyber security vulnerabilities in your organisation
Save time and avoid trial and error with IT Governance’s portfolio of risk assessment solutions.
Implement a risk management programme
Certified ISO 27005 ISMS Risk Management Training Course
This three-day training course develops competence in the key areas of information risk management; covering risk assessment, analysis, treatment and review.
Assess your cyber risk exposure
Cyber Health Check
Assess your cyber risk exposure with a four-phase cyber health check. This will help you identify your weakest security areas and recommend appropriate measures to mitigate your risks.
Streamline the risk assessment process
Created by industry-leading ISO 27001 experts and fully aligned with ISO 27001, vsRisk saves 80% of the time and significantly cuts the consultancy cost usually spent on risk assessments.
How do you conduct a cyber security risk assessment?
A cyber security risk assessment identifies the information assets that could be affected by a cyber attack (such as hardware, systems, laptops, customer data and intellectual property). It then identifies the risks that could affect those assets.
A risk estimation and evaluation are usually performed, followed by the selection of controls to treat the identified risks.
It is essential to continually monitor and review the risk environment to detect any changes in the context of the organisation, and to maintain an overview of the complete risk management process.
ISO 27001 and cyber risks
The international standard ISO/IEC 27001:2013 (ISO 27001) provides the specifications for a best-practice ISMS (information security management system) – a risk-based approach to information security risk management that addresses people, processes and technology.
Clause 6.1.2 of the Standard sets out the requirements of the information security risk assessment process. Organisations must:
- Establish and maintain specific information security risk criteria;
- Ensure that repeated risk assessments “produce consistent, valid and comparable results”;
- Identify “risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system” and identify the owners of those risks; and
- Analyse and evaluate information security risks, according to the criteria established earlier.
It is essential that organisations “retain documented information about the information security risk assessment process” so that they can demonstrate that they comply with these requirements.
They will also need to follow several steps – and create relevant documentation – as part of the information security risk treatment process.
ISO 27005 provides guidelines for information security risk assessments. It is designed to assist with the implementation of a risk-based ISMS.