Methodological model based on risk it as a strategy for organizational risk management

Authors

DOI:

https://doi.org/10.32645/13906925.1129

Keywords:

Govern risk, assess risk, respond to risk, IT risk management

Abstract

The risk is the combination of the probability of a calamity occurring and also the result of it when it happens. It has influence on the objectives that the organization has set because it can divert them from what was planned to positive or negative. Risk and opportunities coexist, so the management of both is a key strategic activity for the success of the organization. Then, risk management is the process of identifying and applying control measures to counteract risky events and therefore protect the organization’s assets through approved and coordinated activities that lead the company to meet the proposed goals. This paper proposes a guide for risk management based on the ISACA RISK IT tool, a tool applied globally. To fulfill the purpose, a specific methodology was developed, based on RISK IT. Within the proposed methodological guide, there are the areas of governing risk, evaluating and responding to it, and nine processes that range from managing risk, collecting data, analyzing them, providing a response through controls, and recommending strategies to communicate and express them in a way that become part of the organizational risk culture.

References

Chambi, R. (2018). Modelo de Gestión de Riesgos de TI bajo COBIT 5. Repositorio Virtual de Tesis Universidad Mayor de San Andrés

Crespo, P. (Noviembre de 2016). Metodología de Seguridad de la Información para la Gestión del Riesgo Informático Aplicable a MPYMES. Repositorio Virtual de Tesis Universidad de Cuenca

Cruces, M., & Mora, J. (Julio de 2016). Gestión de Riesgo de Seguridad de la Información con Base en la Norma ISO/IEC 27005 de 2011 Adaptando la Metodología COBIT al Caso de Estudio: Procedimiento Recaudos de la División Financiera de la Universidad del Cauca. Repositorio Virtual de Tesis Universidad del Cauca

Erreyes, D. (2017). Metodología para la Selección de Herramientas Eficientes y Protocolos Adecuados para Mejorar la Seguridad de los Dispositivos Móviles. Repositorio Virtual de Tesis Universidad de Cuenca

Gualim, N. (Agosto de 2014). Plan de Acción para Minimizar la Exposición al Riesgo Tecnológico de una PYME Basada en el Marco de Referencia RISK IT. Guatemala. Repositorio Vitual de Tesis Universidad San Carlos de Guatemala

Hernández, R., Fernández, C., & Baptista, P. (2010). Metodología de la Investigación. McGraw Hill.

Instituto Nacional de Ciberseguridad. (2017). INCIBE. https://www.incibe.es/

ISACA. (2012). COBIT 5 Marco de Negocio para el Gobierno y Gestión de las TI de la Empresa.

_____. (2020). Guía Profesional RISK IT. EEUU.

_____. (2020). RISK IT Marco de Riesgos de TI. EEUU.

ISO. (octubre de 2019). International Organization for Standarization. Obtenido de https://www.iso.org/home.html

NIST. (2018). Seguridad Cibernética. https://www.nist.gov/topics/cybersecurity

RAE. (octubre de 2019). Real Academia Española. https://dle.rae.es/?w=riesgo

Yunn, S. (25 de septiembre de 2019). Introducción a la Seguridad. Quito, Pichincha, Ecuador.

Published

2022-07-07

How to Cite

Methodological model based on risk it as a strategy for organizational risk management. (2022). SATHIRI, 17(2), 26-46. https://doi.org/10.32645/13906925.1129