Who should primarily own cyber risk?

Board9%

CEO32%

CISO/CSO49%

Chief risk officer (CRO)4%

Let me see the results3%

Other (comment below with your alternative)1%

355 PARTICIPANTS
3.2k viewscircle icon2 Comments
Sort by:
Director of Information Security in Finance (non-banking)5 months ago

It is essential that every Business Unit has full control over the infrastructure it is dependent on. The responsible manager of the business process owns all the risks the process has internally from a business and operational perspective. (Follow NIS2 or DORA e.g.)
The be able to do so, the following requirements need to be fulfilled:
1.) The full dependency tree from the process to all deliverables, internally and externally
2.) Derive all requirements from top down
3.) The ability to aggregate operational risk from bottom up

Risk management runs the framework and processes how risks are measured and reported and governance sets the frame for decision making regarding risks.

Director of IT in Energy and Utilitiesa year ago

The owner of the cyber risk depends on what it is.  

One example:  If the cyber risk is due to technology obsolescence, then the officer of the company whose function owns such system is the primary owner of the cyber risk with the CIO and CISO being informed.  As an example, if the obsolete system is an HR application.  The assumption is that HR is paying for having the system around and ensuring that technology investments are made in this HR system.  If the system continues to be obsolete, the HR leader owns all risks associated with that system, including cyber risks.  

Another example: If the cyber risk is due to phishing, such risk would be owned by the CISO/CSO.  It is the CISO/CSO's remit to put preventive and reactive measures in place around phishing for the organization.  This could mean phishing tests, spam filters, intrusion detection, intrusion prevention etc.

Content you might like

Executive Support10%

Projects vs. Operations68%

Building a culture of Security15%

Team Completeness5%

View Results

HashiCorp (Terraform, Vault, Packer, etc.)22%

Cloud infra automation (Ansible, Puppet, Chef, etc.)56%

APM (Datadog, AppD, SignalFX, NewRelic, etc.)10%

Others?10%

View Results
Who should primarily own cyber risk? | Gartner Peer Community