Module 8: IT Governance, Risk, and Compliance

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

What does GRC stand for?

Governance, Risk, Compliance

2
New cards

Why is IT GRC important?

It ensures accountability and transparency, protects systems from threats, helps meet legal obligations, and builds trust.

3
New cards

What is governance in GRC?

It involves rules, policies, and processes ensuring IT aligns with business strategy.

4
New cards

What is Risk in GRC?

It involves identifying, assessing, and mitigating potential threats to IT systems.

5
New cards

What is Compliance in GRC?

It is the adherence to laws, regulations, and standards applicable to IT systems.

6
New cards

What are the three main types of IT governance models?

Centralized, Decentralized, and Federated (hybrid) governance.

7
New cards

What is Centralized governance?

-All decisions are made by a single group

-The group sets the rules, selects the technologies, manages budgets, and enforces policies

-Pros: Ensures consistency

-Cons: Limits flexibility

8
New cards

What is Decentralized governance?

-Each business unit or department makes its own decisions

-Pros: Brings speed and innovation

-Cons: Inconsistent systems, hard to maintain security standards

9
New cards

What is Federated governance?

-Combination

-Central IT teams sets overall policy and security standards, but individual business units have freedom to make some IT decisions within those guidelines

-Common to large/global organizations

10
New cards

What is COBIT?

Control Objectives for Information and Related Technologies.

-Defines objectives and practices across risk management, resource optimization, compliance assurance, and performance measurements

-Used by large organizations that require strict internal controls

11
New cards

What is ITIL?

Information Technology Infrastructure Library

-Primary focus on Information Technology Service Management (ITSM)

-Best practices for delivering IT as a service

-Popular choice of organizations that prioritize customer service and efficiency

12
New cards

What is ISO/IEC 38500?

-International standard for corporate IT Governance

-Six key principles: responsibility, strategy, acquisition, performance, conformance, and human behavior

-Popular choice for organizations interested in adopting global standards for executive decision-making

13
New cards

What is the goal of IT Risk Management?

To minimize the impact of risks on infrastructure and business.

14
New cards

What are the four key aspects of IT Risk Management?

Identification, Assessment, Mitigation, and Monitoring.

15
New cards

What types of risks fall under IT Risk?

Cybersecurity Risks, Operational Risks, and Compliance Risks.

16
New cards

What does a Risk Matrix help organizations do?

It enables them to identify and prioritize risks based on likelihood and impact.

17
New cards

What is Risk Avoidance?

Eliminating the cause of a risk to avoid it altogether.

Use Case:

•High-impact, high-likelihood

•Situations where potential consequences outweigh the benefits

18
New cards

What is Risk Limitation?

To limit the risk by implementing controls that minimize the likelihood/adverse impact

Use Case:

•Common IT threats (e.g., phishing, malware, etc.)

•Moderate to high likelihood risks

19
New cards

What is Risk Transference?

To transfer the risk by using options to compensate for the loss, such as purchasing insurance

Use Case:

•Financially significant risks

20
New cards

What are the consequences of Non-Compliance?

Financial penalties, legal actions, security breaches, and reputational damage.

21
New cards

What is IT Compliance Lifecycle?

•Identify applicable standards

•Evaluate current IT environments against requirements to identify gaps (gap analysis)

•Implement controls to enforce policies and mitigate risks

•Monitor and audit regularly

•Remediate non-compliance issues

•Report and document for transparency and accountability

22
New cards

What is the importance of IT Risk Management?

It protects assets, ensures business continuity, compliance, reputation management, and cost savings.

23
New cards

What are the five core domains of IT governance?

Strategic alignment, Value delivery, Performance Measurement, Risk Management, Resource Management

24
New cards

Strategic alignment

technology should deliver what business needs

25
New cards

Value delivery

IT investments should produce value (increased efficiency, customer satisfaction, revenue growth)

26
New cards

Performance Measurement

-Uses Key Performance Indicators (KPIs) and metrics for measuring efficiency, quality, service uptime, etc.

-Identifies which IT areas are working well and which need improvement

27
New cards

Risk Management

-IT should reduce or manage risks (cybersecurity breaches, data loss, system downtime, etc.)

-Protects the organization from financial loss, legal issues, reputation damage due to IT failures

28
New cards

Resource Management

-Effective use of IT resources

- No waste or overuse

29
New cards

How to Implement IT Governance

•Assess the current IT environment

•Define roles and responsibilities - identify decision makers, stakeholders, etc.

•Choose the appropriate framework - COBIT, ITIL, etc.

•Define KPIs and metrics to guide decisions

•Monitor, review, and refine regularly - should be a continuous process

30
New cards

Common pitfalls

•Ignoring alignment with business needs can lead to wasteful IT investments

•Lack of executive sponsorship may cause governance to lose priority or premium

•Treating IT governance as a one-off task (should evolve)

•Prioritizing tools before strategy

•Failure to track performance metrics

31
New cards

When IT Governance Becomes Critical

•During a digital transformation or major IT overhaul

• Preparing for compliance audits or certifications

• Mergers or rapid scaling

• After a cybersecurity breach or IT failure

• Launching a new product, service, or cloud environment

• Entering new markets or regions with different regulatory or data privacy requirements

• When IT budgets grow significantly and leadership needs to ensure investments are strategic and accountable

32
New cards

Risk

the potential of losing something of value

33
New cards

IT Risk Management

is the approach to identify, assess, mitigate, and monitor risks associated with an organization's IT systems, processes, and data

34
New cards

Identification

Identify the threats and vulnerabilities within the IT environment

35
New cards

Assessment

Identify the likelihood (probability) and potential impact of the identified risks and prioritize them based on the level of severity

36
New cards

Mitigation

Prioritizing, implementation, and maintaining risk-reducing measures

37
New cards

Monitoring

Continuously track and evaluate the effectiveness of the implemented controls, adjust for emerging threats and vulnerabilities

38
New cards

Cybersecurity risks

include malicious activities that target systems and data.

39
New cards

Operational risks

include threats that impact the functioning of technology systems such as hardware and software failures, power outages, etc.

40
New cards

Compliance risks

include potential violation of laws and regulations governing technology and data management

41
New cards

Risk Matrix Formula

Risk Level = Threat Likelihood x Impact

42
New cards

Risk Acknowledgement

To acknowledge the risk and monitor it rather than taking immediate corrective action.

Use Case:

•Low-impact or low-likelihood risk

•Mitigation is not cost-effective

43
New cards

IT Compliance

•Ensures adherence to laws, regulations, and standards

•Compliance reduces security risks and safeguards business-critical information and sensitive customer data.

44
New cards

Regulatory Compliance

adhering to the laws and regulations set by government and other regulatory bodies.

45
New cards

General Data Protection Regulation (GDPR)

Protects EU citizens and their Personally Identifiable Information (PII)

46
New cards

Health Insurance Portability and Accountability Act

Protects patient information (Healthcare in the US)

47
New cards

Sarbanes-Oxley Act (SOX)

Financial reporting for public companies to prevent corporate fraud and protect investors

48
New cards

Industry Compliance

adhering to standards specific to a particular industry/sector

49
New cards

Payment Card Industry Data Security Standard (PCI DSS)

Protects cardholder information and reduce fraud

50
New cards

NIST Cybersecurity Framework, ISO 27001

Frameworks for security and governance

51
New cards

Technical Control Category

System-based, Firewalls, MFA, Encryption

52
New cards

Operational Control Category

Day-to-day actions, Security Awareness and Training, Incident Response Plan, Backup and Recovery Procedures

53
New cards

Management (Administrative) Control Category

Policy and Oversight, Information Security Policies, Risk Assessment, Vendor Review