Risk Management

Photo of tabletop with hands and notepads with overlaid illustration of the word risk linking out to other words (rules, strategy, analysis, policies, process and control).
shape image

Risk Management

Cyber security is often the subject of much hype. Cyber, however, is just another source of risk for an organisation to handle. Good risk management is essential for organisations who want to improve their cyber security.

Risk management is a mature field but many of the traditional approaches, when employed dogmatically, are not effective at managing risks arising from cyber. Many existing risk management initiatives are conducted for compliance reasons and often quickly become expensive tick-box exercises that do little to reduce risk.

We help you define what is valuable and then use techniques to explore how this could be negatively impacted. We avoid using measures of likelihood as these are problematic in cyber security. Instead we help you explore how feasible cyber incidents could impact your organisation’s critical assets. This understanding can then inform resilience, detection and security control investments.

Find out more here.

Risk management that works for cyber security

We employ a range of techniques to help you prioritise where to spend your finite cyber security budget. Our objective is for your organisation to gain a clear understanding of the cyber associated risks it faces.

Developed for cyber

Developed for cyber

Risk management approaches that are built around cyber security expertise

Risk visibility

Risk visibility

Understand what you value and plan how to protect it

Coherent processes

Coherent processes

Risks identified are compatible with your existing risk management system

Frequently asked questions

Traditional risk management processes often try to compare risks by assessing their likelihood. In some industries where there is a large body of statistically sound data (e.g. insurance) likelihood can be predicted accurately. Cyber security lacks this statistically sound data set and there are arguments that the dynamic nature of the environment will never see such a data set emerge.

Yes. Our risk management processes identifies risks that are consistent with ISO 31000 approaches. The main difference in our approach is that we do not use likelihood when analysing and evaluating risks. We instead focus on how cyber action could feasibly impact an organisation’s outcomes. The output of our work will be ISO 31000 defined risks, prioritised, and with mitigation actions recommended.

Photo of London skyline looking across the River Thames.
Photo taken looking up between modern skyscrapers and with a jet airliner flying overhead.
shape image
Trusted and experienced

Experts in cyber security

Book your free consultation today

Our privacy policy can be found here
shape image
shape image