Sei sulla pagina 1di 4

3/5/20103/5/2010

Center for Information Systems Research


Sloan School of Management
Massachusetts Institute of Technology

RESEARCH BRIEFING
Volume V Number 1D March 2005 (Revised April 2006)

THE IT RISK PYRAMID: Multiple Factors Drive the Four Risks


WHERE TO START IT risks arise from the way IT applications,
infrastructure, people, and policies are organized and
WITH RISK MANAGEMENT managed. Non-standard technologies, inconsistent
George Westerman, Research Scientist application maintenance processes, ineffective poli-
MIT Sloan Center for Information Systems Research cies, or missing skills are just some of the factors
that increase risks on the four A’s. Each risk factor
results from a series of conscious or unconscious
IT risk management has reached the top of the tradeoffs over time. Assumptions and tradeoffs built
agenda for CIOs and their senior management into “the way we do things around here” can reduce
colleagues. These executives realize that effective IT some risks while increasing others.
oversight requires not only monitoring IT For example, a global manufacturing firm had a
performance, but also understanding the risks that IT policy of keeping acquired firms’ systems separate
creates for the enterprise. Unfortunately, the risk from each other, integrating infrastructure only.
management methods used in most enterprises are Senior executives believed this reduced availability
unable to cope with the complexity of IT risks, risk, since the manager of each factory controlled the
leaving the enterprise vulnerable to costly IT resources that ran the factory’s IT systems. They
“surprises.” also believed it reduced agility risk because leaving
This briefing, based on a survey of more than 130 IT systems un-integrated made it easier to buy and sell
executives, helps resolve the complexity of risk businesses.
management by identifying key drivers of IT risk Unfortunately, having more than 20 different ERP
and describing a path IT executives can follow to versions in-house meant that availability risk varied
manage IT risk effectively. across the globe, depending on the skill and
Prior CISR research has identified four enterprise- conscientiousness of IT technicians in each plant. In
level risks that are most affected by IT assets and addition, the diverse platforms created unacceptable
processes (the four A’s):1 global risks for access and accuracy. Agility risks
increased when the large number of applications
ƒ Availability: keeping existing processes running,
prevented the firm from implementing global
and recovering from interruptions.
changes required to meet competitive pressures.
ƒ Access: ensuring that authorized people have
access to information and facilities they need, Risk Factors Are Interdependent
and that unauthorized people do not gain access. Figure 1 shows key factors associated with each IT
ƒ Accuracy: providing accurate, timely and com- risk, based on statistical analysis of the survey data.
plete information that meets the requirements of Each tier of the pyramid represents one of the four
management, staff, customers, suppliers and IT risks. Enterprises that are worse on any factor in a
regulators. risk “tier” report statistically significantly higher
ƒ Agility: implementing new strategic initiatives, levels of that risk. For example, uncompartmen-
such as acquiring a firm, completing a major talized data increases access risk because it increases
business process redesign or launching a new the difficulty of administering user access and also
product/service. increases the amount of data that can be com-
promised by an intrusion.
The risk factors form a hierarchy. Factors at the base
of the pyramid increase availability risk but also
1
See Understanding the Enterprise’s IT Risk Profile, MIT Sloan
CISR Research Briefing Vol. IV, No. 1C, March 2004.
© 2005 MIT CISR, Westerman. CISR Research Briefings are published three times per year to update CISR patrons,
sponsors & other supporters on current CISR research projects.
CISR Research Briefing, Vol. V, No. 1D Page 2 March 2005
increase access, accuracy, and agility risk. Factors in business units snaked through a hodgepodge of
the second tier of the pyramid increase access risk but infrastructure and applications with little to no
also increase accuracy and agility risk, and so on. documentation or standardization. Quarterly finan-
cial closes took several weeks, credit approvals
Non-standard infrastructure is an example of how an
required 24 hours, and expediting an order typically
availability risk factor affects the risks above it in the
required five separate phone calls.
pyramid. Availability risk increases because it is
difficult to ensure that all equipment is properly Tektronix had already begun to resolve these issues
maintained and that the enterprise has skills to fix three years earlier by consolidating seven data
each type of equipment should it fail. Access risk centers into one, four computing platforms into two
increases because security patching is difficult with a (with mainframes outsourced separately), and a
diverse set of server types and access controls are variety of communications protocols into a single
difficult when users have many different passwords. IP-based network. This reduced the firm’s
Accuracy risk increases because of the need to availability risk and laid the foundation for
manually integrate data across disparate systems. additional transformation. Only then could the CFO
Finally, agility risk increases because existing and CIO begin a $40-million, three-year initiative to
applications are difficult to extend or convert, thus redesign processes and replace legacy applications
reducing organizational agility. through a new ERP. They started with a single
division to create uniform global processes, and then
Where to Start with Risk Management integrated the other two business units in a standard,
The pyramid provides a map for addressing the well-documented way.
complexity of IT risks. Factors at the base of the Today, accuracy risk is much lower, as evidenced by
pyramid provide the greatest “bang for the buck” in higher inventory visibility, lower days sales out-
an enterprise with limited resources. First, correcting standing, faster credit approvals, and a five-fold
availability and access risk factors can often be cost- increase in the percentage of same-day shipments.
justified, whereas it can be more difficult to compute Furthermore, agility risk decreased, as the firm was
an ROI on accuracy and agility factors such as able to sell a business unit easily, was able to
standard business processes or automated systems integrate a new acquisition in less than 60 days, and
interfaces. Second, even when cost-savings are not had better information visibility to make strategic
readily apparent, business executives can immedi- decisions. By starting at the bottom of the pyramid
ately grasp the business impacts of losing sensitive and working upwards, Tektronix reduced all four IT
data or losing their systems for a day. They may be risks.
willing to invest in “insurance” activities to reduce
these risks quickly. Lastly, factors at the base of the What If We Can’t Wait to Address Accuracy or
pyramid typically require less business involvement Agility Risks?
than factors at the top. Less negotiation and organ-
Risk factors at the top of the pyramid tend to require
izational change is required to implement con-
long-term collaborative solutions involving IT and
figuration controls, patch management, or IT skills
the business. IT executives can begin working on
improvements than to restructure applications or
these long-term solutions at the same time that they
change the IT/Business relationship.
address lower-tier risks. However, they need to
By focusing at the base of the pyramid, IT recognize that higher-tier risks cannot be fully
executives can start on the long-term task of resolved without addressing the lower-tier risk
resolving accuracy and agility risks, while achieving factors. For example, executives can begin the long
“quick hits” that give demonstrable value for process of improving the IT/business relationship by
availability and access risks along the way. For implementing transparent metrics and oversight.2
example, Tektronix, a $2Billion electronics However, during this process, they should also work
manufacturer, found that it could not divest a on availability and access risk factors such as IT
business unit because its systems were too staffing shortages and configuration controls.
intertwined with two other business units. This Otherwise, continuing risks in availability and
agility risk arose because for decades, they had access may undo any benefits from increased
incrementally patched core systems to meet new transparency.
requirements rather than building new systems or re-
2
architecting old ones. The result was that key See What Are the Key Capabilities of Effective CIOs? MIT
financial and manufacturing processes for three Sloan CISR Research Briefing Vol. IV, No. 3C, October 2004.
CISR Research Briefing, Vol. V, No. 1D Page 3 March 2005 (Revised April 2006)

Addressing an accuracy or agility risk without new privacy legislation, etc.) may require another
addressing foundational availability and access risk stopgap solution.
factors leads to short-term solutions that need to be
reworked later. For example, many firms are Conclusion
addressing immediate Sarbanes-Oxley accuracy The risk pyramid charts a path through the
issues by using data warehouses to integrate complexity of IT risk management. IT executives
disparate financial systems. These stopgap measures should start risk management by resolving factors
will ultimately need to be replaced when the firms associated with availability and access. Reducing
are better able to document processes, improve these risks pays immediate benefits to the enterprise,
internal controls, and standardize infrastructure and and also provides a foundation for the more difficult
processes. Worse still, the next requirement (e.g., challenges of reducing accuracy and agility risks.

Figure 1: The IT Risk Pyramid

• Poor IT/Business relations AGILITY


• Poor project delivery

• Applications do not meet business requirements


• Manual data integration required ACCURACY
• Significant implementation underway or
recently completed

• Data not compartmentalized • Network not reliable


• Applications need standardization to all locations ACCESS
• Lack of internal controls
in applications

• High IT staff turnover • Poorly understood processes


• Infrastructure not standardized and applications
• Missing skills for new initiatives
AVAILABILITY
• Ineffective patch/upgrade mgmt
• Old technology • Regulators would find
• Poor backup/recovery deficiencies

Analysis of 134 surveys shows that risk factors for a given enterprise IT risk (level of the pyramid) are
statistically significantly correlated with amount of not only that risk, but also one or more risks above it
in the pyramid.
About the MIT Sloan Center for Information Systems Research

MIT SLOAN CISR MISSION CISR RESEARCH PATRONS


MIT CISR was founded in 1974 and has a strong track The Boston Consulting Group, Inc.
record of practice-based research on the management of Diamond Management & Technology Consultants
information technology. MIT CISR’s mission is to Gartner
perform practical empirical research on how firms IBM Corp.
generate business value from IT. MIT CISR dissem- Microsoft Corporation
inates this research via electronic research briefings, Tata Consultancy Services Limited
working papers, research workshops and executive
education. Our research portfolio includes but is not
limited to the following topics:
CISR SPONSORS
ƒ IT Governance
AECOM Mohegan Sun
ƒ Enterprise Architecture
Aetna, Inc. NASA
ƒ IT-Related Risk Management Allstate Insurance Company Nomura Research Institute,
ƒ IT Portfolios and IT Savvy ANZ Banking Group (Australia) Ltd.
ƒ Operating Model Australian Government, DIAC Origin Energy
ƒ IT Management Oversight Banco Bradesco S.A. (Brazil) Parsons Brinckerhoff
ƒ Business Models Banco Itaú S.A. (Brazil) PepsiAmericas, Inc.
ƒ IT-Enabled Change Bank of America PepsiCo International
Biogen Idec Pfizer, Inc.
ƒ IT Innovation Blue Cross Blue Shield PNC Global Investment
ƒ Business Agility of Massachusetts Servicing
ƒ The IT Engagement Models BP Procter & Gamble Co.
Campbell Soup Company Raytheon Company
In July of 2008, Jeanne W. Ross succeeded Peter Weill Canadian Imperial Bank of Renault (France)
as the director of CISR. Peter Weill became chairman Commerce Sears Holdings
of CISR, with a focus on globalizing MIT CISR re- CareFirst BlueCross BlueShield Management Corp.
search and delivery. Drs. George Westerman, Stephanie Caterpillar, Inc. Standard & Poor’s
L. Woerner, and Anne Quaadgras are full time CISR Celanese State Street Corporation
research scientists. MIT CISR is co-located with MIT Chevron Corporation Sunoco, Inc.
Sloan’s Center for Digital Business and Center for CHRISTUS Health TD Bank
Collective Intelligence to facilitate collaboration between Chubb & Son Telstra Corp. (Australia)
faculty and researchers. Commonwealth Bank of Australia Tetra Pak (Sweden)
MIT CISR is funded by Research Patrons and Sponsors Credit Suisse (Switzerland) Time Warner Cable
and we gratefully acknowledge the support and con- CVS Pharmacy, Inc. Trinity Health
tributions of its current Research Patrons and Sponsors. Det Norske Veritas (Norway) Unibanco S.A. (Brazil)
Direct Energy VF Corporation
Embraer – Empresa Brasileira de Wal-Mart, Inc.
CONTACT INFORMATION Aeronautica S.A. (Brazil) WellPoint, Inc.
Center for Information Systems Research EMC Corporation Westpac Banking
MIT Sloan School of Management ExxonMobil Global Services Co. Corporation
5 Cambridge Center, NE25, 7th Floor Fidelity Investments World Bank
Cambridge, MA 02142 Govt. of Australia, Dept. of
Telephone: 617-253-2348 Immigration & Citizenship
Facsimile: 617-253-4424 Grupo Santander Brasil
Email: cisr@mit.edu Guardian Life Insurance Company
http://cisr.mit.edu of America
Hartford Life, Inc.
HBOS Australia
Holcim Brasil S.A.
Intel Corporation
International Finance Corp.
JM Family Enterprises, Inc.
Johnson & Johnson
Liberty Mutual Group
Marathon Oil Corp.
Mission and Contact Information as of February 2010. MetLife

Potrebbero piacerti anche