Daunted by the ambition of enterprise risk management? Here's a straightforward exercise to get started delivering ERM's business value. Let’s say your organization doesn’t have a formal enterprise risk management (ERM) program. If you’re at a big company, ERM might seem daunting because of silos, inertia and so on.If you’re at a small company, you might think you lack the resources to pull it off.I propose that ERM is worth doing and doesn’t have to be so complex if you simply “begin with the end in mind,” as Stephen Covey says in The 7 Habits of Highly Successful Security Leaders. Or would have said if he’d written such a book.The basis of my thoughts is COSO’s ERM framework (link goes to a PDF of the Executive Summary). Here is the end to keep in mind as you begin your ERM efforts, taken from COSO’s work: You want to createa processthat can be applied to strategy-settingin order to achieve business objectives.COSO says the goal of ERM is “to provide reasonable assurance regarding the achievement of entity objectives.” Translation: The goal is to enable the business. That should be your security department’s goal, and (critically) your CEO must know that it’s your goal. That’s why I like COSO’s formulation of ERM. It communicates to the business that you are working to help them achieve their objectives. Also see ‘Enterprise risk management: All systems go’So here’s an exercise that can help you begin to devise and refine a process that can be applied in strategy-setting. It doesn’t require any org-chart-jitsu. It’s just a beginning, but it can be a beginning that yields immediate payoff. And that will help gather support for more formal efforts down the road.The exercise—the process—consists of six steps. Let’s choose internal investigations as the first business activity to which we’ll apply these steps. The six steps are based on COSO’s seven components of ERM, modified for this beginner’s exercise.Step 1. Create a working group that includes a representative from every department that plays any role in internal investigations. This might include HR, corporate security, information security, facilities, finance and legal.Step 2. Brainstorm (i.e., red team) events and scenarios that could create risk for the company in an internal investigation. Such events might include information leaks in various departments or a potentially violent suspect.Step 3. Rank the risks by likelihood and impact. Absolute precision is not necessary here, although this step may provide the impetus to gather new metrics, both within your business and from the outside world for benchmarking purposes.Step 4. Now for controls and solutions: List existing controls. Look for redundancy across departments. Brainstorm new ones to address these risks. Rank new controls based on cost, difficulty, and effectiveness—especially noting controls that can reduce likelihood and impact across multiple types of event. With good luck, you might be able to pay for a new control by reducing the redundancy of existing controls. Step 5. Select the appropriate point person responsible for implementing (or championing) each high-priority control.Step 6. Establish a way to measure the effect of each new control and a way to communicate that measurement within and outside of your working group. Don’t get too hung up on making Step 6 overly formal. Keep the end in mind: Enable business objectives. Keep it simple. Show progress. Make internal investigations more effective and less risky.Now repeat this six-step process with a new team for each of these additional areas:business continuity and disaster recoveryintellectual property protectionand brand protection.Obviously each of these areas may require a different set of team members. Beyond the specific business value you create in each area—the deliverables in steps five and six—you will also lay the foundation for more interdepartmental communication and coordination. Security personnel will have more and better contacts within finance, marketing and other groups. As we’ve noted before, those connections can form the basis for competitive advantage for your company.Ambitious goals?Yes, but the first steps don’t have to be giant ones. Hopefully this six-step exercise gives you a starting place. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe