NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
August 20, 2014

1 Risk Assessment Question to Grab the Attention of your Leadership Team.

Justin Fimlaid Justin Fimlaid

Risk Assessments are required by various compliance and regulatory mandates but they also help us prioritize our Security Initiatives. However, too often I see Risk Assessments completed using a check-the-box mentality and the assessment eventually turns into a laborious exercise to complete. To compound issues further, your Executives and Business Leaders aren't going to care about your assessment that much unless it directly and explicitly helps them to do their jobs better. Your Executives and Business Leaders want to know Compliance and Security risks are addressed, but once they know the risk has been mitigated they will focus their interests and time back to managing and growing the business.

The challenge is to get Executives and Business Leaders engaged in managing Security and Compliance risks year-round. In order to do this you need to appeal to them on topics that of interest--strategic business goals and objectives. When conducting a top-down risk assessment as part of your Risk Management Program and you've identified their business goals, one question to ask is:

"What are the barriers or obstacles preventing you from achieving your goals and objectives?"

Asking this question will give professional appeal to your Executives and Leaders because they often receive bonuses based on delivery of this business strategy. From here, this is where assessing Risk is an art form: https://www.youtube.com/watch?v=vqxzg79FPHo (start at 1m46s). As a risk management professional you'll have to guide the Executive or Business Leader to the level of answer you want; some will answer in a very high level response, others will give a lot of detail you'll have to wade through. There's a fine line here, if your answers are too high-level then your assessment of risk might be too subjective and if you get too much detail you might miss the big picture issues.

Once you've aggregated this risk information, merged common themes, started to identify risk "hot-spots" from your Leadership team. You now have the capability to cascade these top-level risks down to your Security and Compliance program or other business unit such as IT, Finance, HR. You can now begin to assess risk on a more micro-level this is where you can gather detailed risk calculations, figure out risk transferrance mechanisms (i.e. Insurance policies), and this is where assessing risk becomes a science: https://www.youtube.com/watch?v=vqxzg79FPHo.

For Security and Compliance professionals, once you've started to show and prove that your program can mitigate business risks and show that Security and Compliance programs can enable Business Growth and Strategy you'll have a much easier time advocating for budget and headcount, but you'll also be seen a trusted business advisor. Most importantly, you can prove that your department and staff is directly supporting business strategy.

The first year of delivering this philosophy in your Risk Management Program will be a challenge to get the time and attention from the Leadership team, but you need to persevere. Once your Executive and Leadership team sees the value they will be looking for this assessment every year because it helps them be better at their job.

Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

2 min read
Integrated Risk Management Part 5: Aggregating risk data and reporting to Executive Management Read More
2 min read
Using Chaos Theory to Guide Strategic Cybersecurity Decisions Read More
4 min read
Top Three Breaches of the Last Decade Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.