KPI Vs KRI
KPI Vs KRI
KPI
shows a performance change indication (i.e. error level goes beyond 8%)
Used to determine control effectiveness to determine if business requirements are being met
KRI
Primary reason for periodically monitoring risk profile may have change
Lagging (backwards looking) are used to gather and report data to management (event has occurred)
Ex. Average number of -- missed patches, data entry errors, virus and phishing attacks
Ex2. Security incidents cuased by unpatched systesm; devices on netowrk that are not hardened
Roles and responsibilities
Business Owner
• report to when KRI for IT change management reaches it threshold (CISO; help desk; CSIRP Team)
Board of Directors
• Ultimately accountable for risk (chief risk officer; compliance officer; CFO)
• Accountable for overall enterprise strategy for risk governance (Senior Management, BU Managers,
Chief Risk Officer)
• Accountable for risk to an IT system that supports a critical busines process (IT management; risk
management department; system users)
• approving organizations risk appetite and risk tolerance related to information security (Business unit
manager, Information security officer, risk manager)
System Auditor
• evaluating the effectiveness of existing internal information security controls within an enterprise
(Data Owner; Senior Management; End User)
The IT Department
• responsible for risk posed by third party applications -- if implemented globally (marketing
department; data privacy officer; chief risk officer)
IT Management
• included in reporting IT KRIs related to a critical BU app (key stakeholders; IT admins; finance
department)
• included in the reporting of risk (Third-party vendor; Business Continuity manager; Audit Manager)
IT Steering committee
• represented by key members from each department (executive board; high-level IT managers; IT
managers from outside the organization)
• aggregate results of continuous monitoring should be reported to (technical staff; audit department;
information security manager)