Danger! Risks ahead – how to establish a risk registry
Risks are a common part of life, and security is no different. If anything, in my opinion, security teams operate with more risk than other business units. Therefore, as part of a security program and SOC, you’ll need to be able to effectively evaluate and measure risks, and build and manage a risk registry.
To start, you need to identify risks and determine whether they should be tracked on a risk registry. While personnel who are already experienced in information security probably already understand what a risk register is, there are many ways to complete it. This is an example of what I would recommend for setting up and evaluating a registry. The first step in identifying risks is to review whether there are currently any threat models or risks identified. If you are in an already established program, those responsible for it should have an idea of what the potential risks are, and what the common threat vectors...