Technology, Information and Resilience Risk Primer for 2019 Published: 5 February 2019 ID: G00375911 Analyst(s): Earl Perkins, Roberta Witty, Jie Zhang Risk management identifies an organization’s hazards to achieving success. Security and risk management leaders must rethink how continuous change requires new approaches to the risk-security relationship. Scope Information and technology now serve as tool and product, changing in value, volume, variety and velocity. Organizations must change in approach and skill to meet the new risks and security demands. Some topics within this initiative include: ■ Resilience ■ Risk management ■ Privacy ■ Business continuity ■ Cyber-physical security Analysis Figure 1. Technology, Information and Resilience Risk Overview Source: Gartner (February 2019) Organizations are moving from just responding to technology changes to creating a resilient 1 ecosystem that embraces change. Gartner’s “ContinuousNext” formula envisions an informationrich organization driven by five key imperatives: augmented intelligence, culture, digital product management, digital twins and privacy. The ContinuousNext formula is a response to continuous change in risk management. The very nature of the risk and business relationship changes as well. Risk management becomes 2 more digital and integrated, and business imperatives become more cyber-physical. For both risk and business practices to be efficient and effective, organizations need an approach that leverages the risk-business relationship. Organizational resilience — the ability of an organization to resist, absorb, recover from and adapt to business disruption — is the cornerstone of any risk-security relationship. To deliver that resilience, a coordinated system of information, technology and operations provides the business with security, preserves data privacy and ensures continuity of operations. Organizations must continuously analyze their risk exposure and environment. They may leverage risk-data Page 2 of 10 Gartner, Inc. | G00375911 management for decisions about setting security priorities and reporting on risk to audit stakeholders. Factors such as leadership, culture, governance and skills development aid in ensuring the success of the risk-security relationship. In 2019, the theme continues to be one of continuous and accelerated change — in technology and in business relationships and practices. Restructuring the risk-business relationship with new and updated practices is mandatory to reflect and maintain how organizations respond to that change. Determining and obtaining the necessary resources to do so ensures a higher probability of success for managing risk, securing cyber and physical ecosystems, and, most important, protecting the business. Top Challenges and How Gartner Can Help Risk management processes aren’t positioned for a rapidly changing regulatory environment, which impacts achievement of the organization’s strategy and objectives. Restructuring the risk management program to more nimbly adapt to these changes should be the goal. Many risk decision makers haven’t been educated on effective risk management decision making. Many risk decisions have also been automated, and the risk processes supporting those decisions haven’t been restructured to account for this. Security policies are too broad and don’t drive effective risk decision making, and the cyber-physical security practice has not yet become a more effective consultant for those decision makers. Risk isn’t communicated effectively to senior business leadership as a result. Organizations must remake the risk-business relationship in the image of the business for leadership to succeed. The topics we cover include these areas: ■ Resilience: Develop organizationally resilient business planning and operations to address risk and security needs. ■ Risk management: Design and deploy a risk management program with fit-for-purpose frameworks, technology choices and organization. ■ Privacy: Address privacy concerns through program management and effective technology use. ■ Business continuity: Deliver business continuity and disaster recovery capabilities for business and IT. ■ Cyber-physical security: Leverage digital transformation with a cyber-physical security practice around technology, process and organization. Some content may not be available as part of your current Gartner subscription. Contact an Account Executive if you wish to discuss expanding your access to Gartner content. Our research addresses the following common client questions: Gartner, Inc. | G00375911 Page 3 of 10 How can we develop and manage organizational resilience as part of risk management? Gartner research has found that current risk management plans fail to account for the organization’s ability to absorb, recover and adapt to digital transformation. For example, many risk plans draw only cursory links between business continuity and risk, raising the possibility that plans could fail to account for known risks. Likewise, risk plans have incomplete means to quickly and accurately assess digital risk costs. Emerging trends in performance-to-risk indicator mapping underscore a new approach to resilient risk practice. Certification activities can inform best practices for maturing risk management to a resilient state. During events that can disrupt an organization’s business, better communication to risk accountability owners and influencers can lead to improved resilience. Planned Research ■ Organizational Resilience Strategic Roadmap ■ Communicating to Different Constituents During a Crisis ■ Making the Business Case for Organizational Resilience by Applying Risk-Adjusted Leading Performance Indicators How can we design and deliver business-relevant risk management frameworks, metrics and systems? The design and delivery of effective risk management practice is a critical objective for security and risk management (SRM) leaders. They need a formal approach to define business-relevant risk, measure it and operate systems around it for the organization’s business users and providers of technology. A wide range of process steps, tools and controls must be available, including updated risk heat maps, guides for the business-technology approach to risk, processes for complex and varied service environments, and systems for risk quantification. Planned Research ■ Toolkit: A Practical Risk Heat Map That Drives Change and Growth ■ From GRC to Integrated Risk Management: A Practical Guide ■ Managing Vendor Risk to Ensure Digital Business Success ■ Opportunities and Challenges in Cyber Risk Quantification ■ Magic Quadrant for Integrated Risk Management What can we do to provide an effective compliance and audit process and tools to stay relevant to an evolving digital business environment? The continuously evolving business requirements and subsequent transition in technology decisions impact applicable compliance mandates and challenge the effectiveness of existing risk remediation strategies. SRM leaders continue to need capabilities for optimizing and realigning due diligence activities in their digital ecosystem. Gartner research continues the practice of updating advice Page 4 of 10 Gartner, Inc. | G00375911 regarding frameworks that inform compliance and audit activities. Evolving roles in governance and management are also addressed. Notable reset approaches in auditing affected by environments such as the cloud, application development and operations will be examined. Addressing technology and service changes in support of assurance activities and audit systems will also be core topics for leaders in business and technology support. Planned Research ■ Toolkit: Job Description for the Digital Compliance Officer ■ How to Audit Agile Approaches in DevOps ■ FedRAMP Demystified ■ Best Practices in Implementing the NIST Cybersecurity Framework What are the components of best-in-class privacy programs, and how do we enable privacy compliance for our organization? Gartner research examines the governance and control necessary to ensure privacy and trust in business interactions for organizations and people. Privacy management programs have people, business, technology and legal drivers. Digital transformation also forces privacy programs to address the continuous changes needed to stay ahead and remain practical. Innovations in data privacy will address key technological changes in areas such as analytics, artificial intelligence and integrated risk management. A growing and complex regulatory environment also continues to place demands on privacy management that must be addressed. An encompassing privacy architecture is required to participate fully in the ContinuousNext formula for 2019 and beyond. Planned Research ■ Practical Privacy — Data Mapping, Going From Manual to Continuous Discovery ■ Six Security Technologies That Are Key to Operationalizing Privacy ■ Five Areas Where AI Can Supercharge Your Privacy Readiness ■ Evolving Toward a Comprehensive Privacy Architecture for Data and Analytics How do we ensure business continuity, disaster recovery and crisis management, and what technologies and services are required to do so? Business continuity management programs are broad, addressing recovery, crisis/emergency management, disaster recovery, and supplier risk and contingencies. Few programs in an organization affect as many stakeholders: customers, partners, suppliers and employees. Few programs are so pervasive across facilities and supporting systems such as IT/OT and data, including vital records. Business continuity management (BCM) is also central to ensuring organizational resilience in the enterprise and supplier ecosystem. Gartner research seeks to deliver a strategic roadmap for clients and to identify how elements of BCM processes are used. Advice Gartner, Inc. | G00375911 Page 5 of 10 regarding use of new technologies to address engagement practices, regulatory requirements and collaboration functions is also provided. Gartner continues to expand research into markets for crisis/emergency management platforms and notification services. Planned Research ■ BCM Strategic Roadmap ■ How Artificial Intelligence and Machine Learning Are Changing the BCM Profession ■ Best Practices for Developing Business Workaround Procedures Following a Cyberattack Outage ■ ISO 22301:2012 Organizational Certification and Best Practices — Certification vs. Resilience How can we deliver a cyber-physical security practice around technology, process and organization? Gartner is expanding research into the cyber-physical systems (CPS) security initiatives that assetcentric organizations pursue. CPS presents an opportunity to tackle security and safety across IT, OT and Internet of Things (IoT) through transformation initiatives specific to vertical industry needs. Strategy, governance and tactics for business models and direction aid relevant SRM leaders to address specific needs of CPS. Those needs include identifying vertical requirements for strategic security and safety concerns, operational changes, and risk management. Planned Research ■ Key Considerations for Developing a Security Vision and Strategy for Cyber-Physical Systems ■ How Cyber-Physical Systems Stretch Traditional Vulnerability and Threat Considerations ■ Using the Gartner Vertical Strategy Framework to Position Cyber-Physical Systems Security as a Business Imperative Page 6 of 10 Gartner, Inc. | G00375911 Related Priorities Table 1. Related Priorities Priority Focus Vendor Management Strategy and Operations Vendor management strategy and operations help mature the organization’s ability to assess, monitor and manage vendor performance, risks, relationships and contracts in pursuit of business goals. Identity and Access Management IAM encompasses tools and best practices to manage identities and access across an enterprise's workforce and customers, to manage risk, reduce fraud and other losses, and enable business imperatives. Security of Applications and Data This initiative enables organizations to conduct business and venture into new opportunities by managing security risks against their most exposed and valuable assets, namely applications and data. Information Security Management Program Gartner delivers timely and comprehensive guidance for information security management programs for organizations. That guidance is prescriptive and targets key initiatives for best-in-class programs. Source: Gartner Suggested First Steps ■ “Leadership Vision for 2019: Security and Risk Leader”: This slide deck will help SRM leaders in planning for 2019 and in presentations to leadership, peers and teams. ■ “Build for Privacy”: Successful SRM leaders need to support their business objectives with “privacy engineering” to gain a competitive advantage and differentiate offerings in crowded markets. ■ “The Resilience Premium of Digital Business: A Gartner Trend Insight Report”: SRM leaders must deliver by building a culture of systemic resilience through viewing resilience as a premium and not as a cost. ■ “Top Security and Risk Management Trends”: SRM leaders must take advantage of emerging trends to improve resilience and elevate their standing in the organization. ■ “Definition: Business Continuity Management”: SRM leaders responsible for business continuity need to understand the full scope of their BCM efforts, which should comprise an enterprisewide program. ■ “The Business Impact Analysis: A Digital Business Essential”: SRM leaders should use a crossfunctional BIA as an essential tool in developing collaborative procedures in response to a major business disruption. ■ “Organizational Resilience Is More Than Just the Latest Trend”: SRM leaders must work with the whole organization to design, implement and maintain resilience characteristics to ensure digital business initiatives become sustainable operations. Gartner, Inc. | G00375911 Page 7 of 10 ■ “Ensure Digital Business Resilience Through Better Risk Management Planning”: To achieve organizational resilience, SRM leaders must consider impacts on roles, responsibilities and external relationships resulting from new participants, technologies and processes. ■ “The Organizational Resilience Program Delivery Model”: SRM leaders must work with the whole organization to design, implement and maintain resilience characteristics to transform digital business initiatives into sustainable operations. ■ “Delivering Resilience and Recoverability for Distributed Transactions Poses a Whole New Challenge”: As digital business software embraces heterogeneous distributed transactions and microservices, application leaders need new means of ensuring data and process integrity. ■ “Cybersecurity Redefined for the Digital Era”: SRM leaders must agree on what cybersecurity means to address the risks and threats of digital transformation. ■ “Focus More on the Realities of Cyber-Physical Systems Security Than on the Concepts of IoT”: To be effective, SRM leaders must holistically address the needs of cyber-physical systems rather than focusing on specific implementations of IT, OT or IoT security. Essential Reading ■ “Critical Capabilities for Integrated Risk Management": SRM leaders can use this research to evaluate IRM solutions to address a business-unit-wide view of risk and compliance. ■ “Magic Quadrant for Integrated Risk Management”: SRM leaders should use this Magic Quadrant to identify solutions that support an integrated approach to risk management. ■ “Maverick* Research: Why GDPR and Other Privacy Initiatives Will Fail”: CIOs and IT leaders should be aware that difficulties and challenges may lead these regulations to fail. ■ “From Digital Transformation to ContinuousNext: Key Insights From the 2018 Gartner Symposium/ITxpo Keynote”: CIOs can prepare their organizations for continuous change by focusing on five imperatives: augmented intelligence, privacy, culture, digital product management and digital twins. ■ “Critical Capabilities for IT Risk Management Solutions”: SRM leaders experience increased demand for ITRM solutions originating from cybersecurity initiatives. ■ “Predicts 2019: The Ambiguous Future of Privacy”: These predictions highlight for SRM leaders the correlation between new technology and regulatory impact, customer dependency and commercial opportunity. ■ “Cool Vendors in Security and Risk Management: Securely Scaling Digital Businesses”: SRM leaders striving to balance assurance against scaling business operations should evaluate these solutions. ■ “Manage the Digital Risks of Blockchain Initiatives”: SRM leaders require digital risk thinking and action to address blockchain risk. ■ “Leverage Emotions to Communicate Risk More Effectively”: Understanding risk sentiment helps SRM leaders craft more meaningful risk messaging. Page 8 of 10 Gartner, Inc. | G00375911 ■ “Learn Your Risk Appetite or Fail at Risk Management”: SRM leaders need to work with business stakeholders to determine organizational risk appetites. Tools and Toolkits ■ “Toolkit: Conducting a Business Impact Analysis”: SRM leaders should use this Toolkit to capture and analyze the data needed to determine the recovery priorities that will drive recovery strategies and solution development. ■ “Toolkit: Assessing the Effectiveness of Recovery Plans Following a Business Disruption”: This user-customizable Toolkit offers SRM leaders and their enterprises an easy way to assess the effectiveness of their plans following a business disruption. Evidence 1 “From Digital Transformation to ContinuousNext: Key Insights From the 2018 Gartner Symposium/ ITxpo Keynote” 2 “Focus More on the Realities of Cyber-Physical Systems Security Than on the Concepts of IoT” Gartner, Inc. | G00375911 Page 9 of 10 GARTNER HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT 06902-7700 USA +1 203 964 0096 Regional Headquarters AUSTRALIA BRAZIL JAPAN UNITED KINGDOM For a complete list of worldwide locations, visit http://www.gartner.com/technology/about.jsp © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. It consists of the opinions of Gartner's research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see "Guiding Principles on Independence and Objectivity." Page 10 of 10 Gartner, Inc. | G00375911