|
Section: IT Risk Management Process
IT controls result from an effective, risk assessment process. Therefore, the ability to mitigate IT risks is dependent upon risk assessments. Senior management should identify, measure, control, and monitor technology to avoid risks that threaten the safety and soundness of an institution. The institution should (1) plan for use of technology, (2) assess the risk associated with technology, (3) decide how to implement the technology, and (4) establish a process to measure and monitor risk that is taken on. All organizations should have:
An effective planning process that aligns IT and business objectives;An ongoing risk assessment process that evaluates the environment and potential changes; Technology implementation procedures that include appropriate controls; and Measurement and monitoring efforts that effectively identify ways to manage risk exposure. This process will typically require a higher level of formality in more complex institutions with major technology-related initiatives.Home | Join Now | Benefits | Courses | Providers | Locations | Certification | Stay Certified Articles | My AAPM
Disclaimer | Contact Us | About AAPM | Site Design by Konigstein | IPMC | AAFM | GAM | AAPM US1 | GAPM