Contents

Cyber-security risk management – an overview

Read time: 5 mins
Last Updated on Aug. 27, 2025
Published Dec. 3, 2022

Cybersecurity risk management isn’t a one‑and‑done checklist — it’s an ongoing routine. Think of it as a cycle where organizations keep spotting, analyzing, and tackling threats before they turn into real problems. The process follows a structured approach, often backed by well‑known frameworks, to make sure defenses stay sharp and adaptable as risks evolve.

Essential Steps in the Continuous Cybersecurity Risk Management Process

Managing cybersecurity risk is an ongoing, iterative process rather than a one-time event. Organizations generally follow a structured process that starts with establishing scope and objectives and ends with continuous monitoring.

The core steps involved in a comprehensive cybersecurity risk management program include:

1. Risk Framing and Preparation

The first activities prepare the organization to manage security and privacy risks. Risk framing defines the context in which risk decisions are made, aligning risk management strategies with overall business goals. This involves defining:

  • Scope: Identifying which systems, assets, and threats will be examined, and the timeline for the process.

  • Asset Inventory and Prioritization: Determining which data, devices, and software are most critical to the organization.

  • Organizational Resources and Priorities: Establishing the IT systems, business processes, and resources (financial and otherwise) committed to risk management.

  • Legal and Regulatory Requirements: Identifying laws and standards the company must comply with.

  • Risk Tolerance: Defining the level of uncertainty the organization finds acceptable while striving to achieve its goals, which makes subsequent risk decisions easier.

2. Identify and Assess Risks

This step determines the organization's level of risk by identifying threats, vulnerabilities, and their potential consequences.

  • Identify Cybersecurity Risks: This involves understanding threats (events or circumstances that can negatively affect operations or assets, such as hostile attacks, human errors, or natural disasters), vulnerabilities (weaknesses that a threat source can exploit), and the resulting consequences.

  • Assess Likelihood and Impact: Risk assessments determine the probability of a threat exploiting a vulnerability and the severity of the potential impact (consequences). Consequences include fiscal costs (fines, lost income), operational costs (lost time), and reputational costs.

  • Determine Risk and Prioritize: The organization determines its overall risk, often listing risks by likelihood and impact. This process builds a risk profile, prioritizing threats based on their criticality level, which informs subsequent decisions.

3. Risk Evaluation and Response (Mitigation)

In the evaluation step, assessed risks are compared against organizational tolerance levels to prioritize them for decision-making. The organization determines how it will address risks, which may include developing documented risk treatment strategies.

Organizations can adopt one or more of four risk management strategies:

  • Mitigation (Reduction): Selecting and applying controls (people, processes, or technology) to make exploitation harder or minimize impact. Examples include privileged access management, cybersecurity training, or implementing incident response plans.

  • Acceptance: Accepting some residual risk when its potential impact is low, insignificant, or if investing in security measures is more expensive than the risk itself. Risks below the organizational risk tolerance are functionally considered accepted.

  • Transfer: Shifting potential loss or responsibility for risk impacts to a contracted third party, such as purchasing cyber insurance or contractually transferring responsibility to suppliers/vendors.

  • Avoidance: Implementing policies and technologies that help eliminate risk by avoiding or more closely managing activities that invite organizational risk.

Risks that are fully addressed so they cannot be exploited are considered remediated (e.g., patching a software bug). After applying all mitigation measures, any remaining, unavoidable risk is known as residual cybersecurity risk.

4. Continuous Monitoring and Review

Since change is constant, environments must be continually monitored to ensure internal controls align with risk. Monitoring involves maintaining ongoing situational awareness about the security and privacy posture of the system and organization to support risk management decisions.

Monitoring activities include:

  • Tracking identified risks and evaluating the effectiveness of risk responses.

  • Monitoring the effectiveness of new security controls and verifying they meet regulatory requirements.

  • Staying abreast of regulatory change.

  • Assessing and documenting vendor risk.

  • Monitoring internal IT usage and the broader threat landscape.

Risk management is a continual process that should always include re-assessment, new testing, and ongoing mitigation. Organizations should also prepare for incident response (IR) and plan for recovery (DRP) before a vulnerability becomes an urgent security event.

Guiding Frameworks for Cybersecurity Risk Management

Several standards and frameworks provide a structure for enterprise risk management, helping teams align controls, assessments, and reporting. We'll briefly go through 4 of them:

  • NIST Cybersecurity Framework Version 2.0 (NIST CSF 2.0)
  • NIST Risk Management Framework (RMF)
  • ISO/IEC 27001
  • NIST Special Publication 800-30

NIST Cybersecurity Framework Version 2.0 (NIST CSF 2.0)

NIST CSF 2.0 is a voluntary framework designed to help organizations of all sizes manage and reduce cyber risks. It outlines a taxonomy of high-level cybersecurity actions across six critical security functions:

Function Focus
Govern Establishing mission-aligned policies, priorities, constraints, risk tolerances, and strategies to support operational risk decisions.
Identify Understanding cybersecurity risks to organizational operations, assets, and individuals. This includes identifying asset vulnerabilities, documenting threats, utilizing cyber threat intelligence, determining business impacts, and prioritizing risk responses.
Protect Focusing on ensuring the delivery of critical infrastructure services.
Detect Identifying the occurrence of a cybersecurity event.
Respond Taking action regarding a detected cybersecurity incident.
Recover Maintaining plans for resilience and restoring any impaired assets or services.

NIST CSF 2.0 also provides detailed guidance for managing supply chain risks through its Cybersecurity Supply Chain Risk Management (C-SCRM) processes.

NIST Risk Management Framework (RMF)

The NIST Risk Management Framework provides a process that integrates security, privacy, and cyber supply-chain risk management into the system development life cycle. This approach can be applied across various system types (e.g., IoT, control systems) and organizations.

The key steps in the NIST RMF include:

  1. Prepare: Essential activities to prepare the organization to manage security and privacy risks.

  2. Categorize: Determining the adverse impact related to the loss of confidentiality, integrity, and availability of systems and the information they process.

  3. Select: Choosing, tailoring, and documenting the controls necessary to protect the system and organization commensurate with risk.

  4. Implement: Implementing the controls outlined in the security and privacy plans.

  5. Assess: Determining if the controls are implemented correctly, operating as intended, and meeting security and privacy requirements.

  6. Authorize: Requiring a senior official to determine if the security and privacy risk is acceptable.

  7. Monitor: Maintaining ongoing situational awareness to support risk management decisions.

ISO/IEC 27001

This is the international standard for information security management. Clause 6.1.2 mandates specific requirements for information security risk assessment, including:

  • Establishing and maintaining information security risk criteria.

  • Ensuring repeated risk assessments produce consistent, valid, and comparable results.

  • Identifying risks associated with the loss of confidentiality, integrity, and availability.

  • Identifying the owners of those risks.

  • Analyzing and evaluating information security risks according to established criteria.

NIST Special Publication 800-30

This framework guides risk assessments and provides a helpful guide for organizations to choose controls to mitigate risks. It outlines a four-step progression for risk assessments:

  1. Prepare for the assessment by clarifying purpose, scope, constraints, and the risk model/analytics to be used.

  2. Conduct the assessment to list risks by likelihood and impact and determine overall risk.

  3. Share the results to drive mitigation efforts.

  4. Maintain the assessment by continually monitoring environments.

Steer Clear, matey.

Cybersecurity risk management isn’t something you can tackle in silos — it works best when everything is coordinated and consistent across the organization. Think of it like steering a ship:

  • First, you chart the waters (spot the risks).

  • Then, you check the hull (look for vulnerabilities).

  • Next, you decide how to handle storms (mitigate or transfer risk).

  • And finally, you keep an eye on the radar (continuous monitoring).

Do all that, and you’ll stay on course without drifting outside your comfort zone (risk tolerance).

back to more articles

security   Acceptance   Avoidance   Consequences   Continuous Monitoring and Review   Detect   DevSecOps   GRC Management   Govern   Governance Risk & Compliance Management   Identify   Identify and Assess Risks   Impact   Likelihood   mitigation   NIST   NIST CSF 2.0   NIST Cybersecurity Framework   NIST Risk Management Framework   Protect   RMF   Recover   remediation   Residual Cybersecurity Risk   Respond   Risk Criteria   Risk Framing   Risk Framing and Preparation   Risk Management Strategies   Risk Preparation   Risk Tolerance   risk management   SecDevOps   SecOps   Threats   Tracking Identified Risks   Transfer   vulnerabilities   residual risk   secure engineering   security architecture   ISO-IEC 27001   2022