The Key(s) to Writing Good Risk Statements (2024)

To effectively manage risk at an organization, risk must be identified and analyzed by an information systems professional. Risk factors should be communicated in a clear and concise manner so that they can be understood by all stakeholders. This can be achieved by writing an effective risk statement.

Indicators of a good, quality risk statement are that it can answer the following questions:

  • What could happen?
  • Why could it happen?
  • Why should an enterprise care?

Summarizing risk identification and analysis in a statement is not a science and there is no specific formula to get it right. However, there is guidance provided in the International Organization for Standardization (ISO) standard ISO 31000:2009 Risk management—Principles and guidelines that can help to better articulate risk.

The key to writing a good risk statement is having a foundational understanding of risk components and their interrelationships. Understanding key risk-related terms, their definitions, the business and its objectives will result in more impactful risk articulation.

The key to writing a good risk statement is having a foundational understanding of risk components and their interrelationships.

Risk Terms and Definitions to Understand

To illustrate the application of risk terms and definitions in practice, one can consider a fictional bank with an objective to keep confidential customer information secure that is implementing a change to a highly complex customer account management system that handles customer information.The key definitions are:

  • Risk—The effect of uncertainty on objectives1
  • Effect—A deviation from the expected.2 The effect in the example is the deviation from the expected condition of customer information being kept secure. Expected conditions are those conditions that are expected by the bank’s stated objectives and policies.
  • Uncertainty—The state, even partial, of deficiency of information related to understanding or knowledge of an event, its consequence, or likelihood.3 Uncertainty in the example is from not fully understanding the consequences of the change due to the customer account management system being highly complex and inherently difficult to understand. The greater the complexity of the at-risk area, the greater the inherent uncertainty. The objective in the example is for the bank to keep confidential customer information secure.
  • Event—An occurrence or change of a particular set of circ*mstances and can have several causes.4 In the example, the event may appear to be the system change itself, but there is no direct effect on objectives if the change goes through without a problem. An event must have an effect on objectives. Data leakage related to problems with the change would be an event, as this directly affects the objective to keep confidential customer information secure.
  • Cause—That which gives rise to any action, phenomenon or condition.5 It is important not to mistake the cause for the event. In the example, defective changes, such as encryption algorithms not encrypting data as expected, cause data leakage. Defective changes do not have a direct effect on the objective of safeguarding customer information in and of themselves, and so should not be seen as an event in this case, but rather a cause. Data leakage, on the other hand, does have a direct impact on objectives so it would not be a cause in this scenario. A risk statement can contain multiple causes when applicable.
  • Consequence—The outcome of an event affecting objectives.6 This element of the risk statement is important because it highlights why one should care about the risk. It is crucial that this is relevant, plausible and, ideally, quantified to give this element meaning in real terms. A vague statement of “damage to reputation” is not enough. How will this damage to the organization’s reputation impact the organization? If the organization is an effective monopoly, reputational damage may not be an issue. The consequence ideally needs to be quantified using industry research data, internal management information or known cause-and-effect relationships, such as known fixed fines levied by regulators or known customer impacts for instances of customer data leakage. A good example of this is the maximum fine of UK £500,000 that can be levied by the UK Information Commissioner’s Office for confidential customer data leakage incidents or alternatively customer churn of 6.4% derived from industry research reports.
  • Likelihood—The chance of something happening; risk is a combination of potential events and consequences along with the associated likelihood of occurrence.7 In the example, “something” refers to the combination of potential events and consequences. Likelihood can be reasonably estimated through frequency analysis of similar events in the industry, specific technology from internal organization incident or issue databases and consultation with subject matter experts. So, considering the example, the risk analyst might look at the number of loss events in the past 12 months registered in an internal loss event database, an external database such as the Privacy Rights Clearinghouse, or a media scan, where causes related to poorly controlled changes are recorded. Looking at the frequency of these events over the total number of changes made would give a basic estimation of the likelihood of the event recurring.

Based on these definitions, a risk statement should look something like:

(Event that has an effect on objectives) caused by (cause/s) resulting in (consequence/s).

An alternative version reads:

(Event that has an effect on objectives) caused by (cause/s). This may result in (consequence/s).

The latter version is better to use if the risk statement sentence would be too long and needs to be broken up to improve clarity. This might happen, for example, if there are many key risk causes.

Taking the previous example to illustrate this, if the bank’s objective is to “keep confidential customer information secure” and the event is customer data leakage, corruption or unavailability caused by defective system changes, the risk statement could be:

Customer data leakage, corruption or unavailability caused by defective system changes resulting in financial fraud losses of UK £1 million and an Information Commissioner’s Office fine of UK £500,000, customer churn of 6.4%, and regulatory sanction by the Prudential Regulation Authority.

Data leakage, corruption and unavailability are information security failure events. That is, keeping information secure (the objective) has deviated from (the effect). The unauthorized, defective or unfit changes are the causes of this effect on objectives, while the consequences are defined in terms of what happens if the organization fails to meet its objective.

Conclusion

Risk can be more effectively understood and managed if it is clearly articulated. This can be achieved by referring to risk definitions while writing risk statements. Understanding the objectives at risk is also key. IS audit and control professionals must create concise risk statements that are information-rich and relevant to the situation and the audience to ensure that the risk statements have an impact and support effective risk management.

Editor’s Note

This article is excerpted from an article that appeared in the ISACA® Journal. Read the full article, “Writing Good Risk Statements,” in vol. 3, 2014, of the ISACA Journal.

Endnotes

1 International Organization for Standardization, ISO 31000:2009, Risk Management—Principles and Guidelines, Switzerland, 2009
2 Ibid.
3 Ibid.
4 Ibid.
5 Oxford University Press, Oxford English Dictionary, UK, 2013
6 Op cit, International Organization for Standardization
7 Ibid.

Benjamin Power, CISA, CPA

Has worked in the IS audit, control and security field internationally for more than 10 years in the financial services, energy, retail and service industries, and government sectors. Power is an experienced risk and audit professional who has a practical background in IT development and management, enterprise governance and accounting.

The Key(s) to Writing Good Risk Statements (2024)
Top Articles
10 Resources to Make Money You Can Start Today
11 Smartphone Apps that Can Make You Extra Money
Skigebiet Portillo - Skiurlaub - Skifahren - Testberichte
Aberration Surface Entrances
Pixel Speedrun Unblocked 76
Compare Foods Wilson Nc
My E Chart Elliot
Mcfarland Usa 123Movies
Myhr North Memorial
The Realcaca Girl Leaked
Tap Tap Run Coupon Codes
Acbl Homeport
State Of Illinois Comptroller Salary Database
Nestle Paystub
Günstige Angebote online shoppen - QVC.de
Palace Pizza Joplin
Oppenheimer Showtimes Near Cinemark Denton
Colts seventh rotation of thin secondary raises concerns on roster evaluation
How Much Is Tj Maxx Starting Pay
Moonshiner Tyler Wood Net Worth
6813472639
Apne Tv Co Com
Dr Adj Redist Cadv Prin Amex Charge
Nine Perfect Strangers (Miniserie, 2021)
Morristown Daily Record Obituary
Persona 5 Royal Fusion Calculator (Fusion list with guide)
Breckie Hill Mega Link
Roane County Arrests Today
Jayme's Upscale Resale Abilene Photos
Is Poke Healthy? Benefits, Risks, and Tips
UAE 2023 F&B Data Insights: Restaurant Population and Traffic Data
*!Good Night (2024) 𝙵ull𝙼ovie Downl𝚘ad Fr𝚎e 1080𝚙, 720𝚙, 480𝚙 H𝙳 HI𝙽DI Dub𝚋ed Fil𝙼yz𝚒lla Isaidub
10 Best Quotes From Venom (2018)
Club Keno Drawings
October 19 Sunset
Wake County Court Records | NorthCarolinaCourtRecords.us
Most popular Indian web series of 2022 (so far) as per IMDb: Rocket Boys, Panchayat, Mai in top 10
A Small Traveling Suitcase Figgerits
M3Gan Showtimes Near Cinemark North Hills And Xd
Agematch Com Member Login
Nsav Investorshub
20 bank M&A deals with the largest target asset volume in 2023
Best Restaurants West Bend
Anderson Tribute Center Hood River
Dr Mayy Deadrick Paradise Valley
Martha's Vineyard – Travel guide at Wikivoyage
Ferhnvi
Workday Latech Edu
Okta Login Nordstrom
A Snowy Day In Oakland Showtimes Near Maya Pittsburg Cinemas
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5951

Rating: 4.6 / 5 (66 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.