Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?
Correct Answer: A
Managing cyber risk according to the organization's risk management framework is the best recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile, as it helps to integrate and align the cybersecurity risk management (CSRM) and the enterprise risk management (ERM) processes. A risk management framework is a set of principles, policies, and practices that guide and support the risk management activities within an organization. A risk management framework helps to establish a consistent, comprehensive, and coordinated approach to risk management across the organization and to the external stakeholders. Managing cyber risk according to the organization's risk management framework helps to ensure cyber risk is assessed and reflected in the enterprise-level risk profile by providing the following benefits: * It enables a holistic and comprehensive view of the cyber risk landscape and its interdependencies with the business processes and functions. * It facilitates the communication and collaboration among the business and IT stakeholders and enhances their understanding and awareness of the cyber risk exposure and control environment. * It supports the development and implementation of effective and efficient cyber risk response and mitigation strategies and actions that are aligned with the business risk appetite and objectives. * It provides feedback and learning opportunities for the cyber risk management and control processes and helps to foster a culture of continuous improvement and innovation. The other options are not the best recommendations to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile. Defining cyber roles and responsibilities across the organization is a good practice to clarify and assign the duties and accountabilities for the cyber risk management and control processes, but it does not directly address the cyber risk assessment and integration with the enterprise-level risk profile. Conducting cyber risk awareness training tailored specifically for senior management is a useful method to educate and engage the senior management in the cyber risk management and control processes, but it does not provide a systematic or consistent way to assess and reflect the cyber risk in the enterprise-level risk profile. Implementing a cyber risk program based on industry best practices is a possible action to improve and enhance the cyber risk management and control processes, but it does not ensure the alignment or integration with the organization's risk management framework or the enterprise-level risk profile. References = Integrating Cybersecurity and Enterprise Risk Management (ERM) - NIST, IT Risk Resources | ISACA, Identifying and Estimating Cybersecurity Risk for Enterprise Risk ...
Question 187
The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:
Correct Answer: A
The percentage of projects introduced into production without high-risk issues is the most important measure of the effectiveness of risk management in project implementation, as it reflects the ability of risk management to ensure that the project deliverables meet the quality, functionality, and security requirements, and do not introduce unacceptable risks to the organization. The percentage of projects having the risk register updated regularly, having key risk indicators (KRIs) established to measure risk, or having an action plan to remediate overdue issues are not the most important measures, as they are more related to the process, performance, or compliance of risk management, rather than the outcome or value of risk management. References = CRISC Review Manual, 7th Edition, page 110.
Question 188
An organization's risk tolerance should be defined and approved by which of the following?
Correct Answer: B
The organization's risk tolerance should be defined and approved by the board of directors, as they are the highest governing body of the organization and have the ultimate responsibility and accountability for the strategic direction and oversight of the risk management process. The board of directors should establish and communicate the risk appetite and tolerance of the organization, and ensure that they are aligned with the organization's vision, mission, values, and goals. The board of directors should also monitor and review the risk management performance and outcomes, and provide guidance and support to the management and staff. The other options are not the correct answers, as they do not have the authority or responsibility to define and approve the organization's risk tolerance, although they may have some roles or involvement in the risk management process. The chief risk officer (CRO) is the senior executive who leads and coordinates the risk management activities across the organization, and reports to the board of directors and the chief executive officer (CEO). The CRO should advise and assist the board of directors in defining and approving the risk tolerance, but they cannot do it on their own. The chief executive officer (CEO) is the highest-ranking manager of the organization and has the responsibility and accountability for the execution and implementation of the risk management process. The CEO should support and communicate the risk tolerance defined and approved by the board of directors, but they cannot do it on their own. The chief information officer (CIO) is the senior executive who oversees and manages the information and technology functions and resources of the organization. The CIO should ensure that the IT risks and controls are aligned with the risk tolerance defined and approved by the board of directors, but they cannot do it on their own. References = Risk and Information Systems Control Study Manual, Chapter 1: IT Risk Identification, page 24.
Question 189
When testing the security of an IT system, il is MOST important to ensure that;
Correct Answer: C
Question 190
You are the project manager of your enterprise. You have identified new threats, and then evaluated the ability of existing controls to mitigate risk associated with new threats. You noticed that the existing control is not efficient in mitigating these new risks. What are the various steps you could take in this case? Each correct answer represents a complete solution. (Choose three.)
Correct Answer: A,B,C
Explanation/Reference: Explanation: As new threats are identified and prioritized in terms of impact, the first step is to evaluate the ability of existing controls to mitigate risk associated with new threats and if it does not work then in that case facilitate the: Modification of the technical architecture Deployment of a threat-specific countermeasure Implementation of a compensating mechanism or process until mitigating controls are developed Education of staff or business partners Incorrect Answers: D: Applying more controls is not the good solution. They usually complicate the condition.