December 18, 2017 By Christophe Veltsos 3 min read

This is the second installment in a series about the Committee of Sponsoring Organizations of the Treadway Commission’s updated enterprise risk management framework. Be sure to read part 1 for the full story.

This past September, the Committee of Sponsoring Organizations (COSO) of the Treadway Commission issued an updated enterprise risk management (ERM) framework, titled “Enterprise Risk Management — Integrating with Strategy and Performance,” to help business leaders understand the risks their organizations face and evaluate their impact on business performance.

While the COSO ERM guidance is designed to simplify risk management at an enterprise level, organizations can derive even more value from the framework by coupling it with the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), which is geared more toward day-to-day, ground-level risk management.

Comparing the COSO ERM and NIST CSF: Apples to Oranges

The two frameworks come from different organizations with differing viewpoints and guiding principles. The NIST CSF is a business-friendly framework that is currently only mandatory for entities in the critical infrastructure space. While the CSF is focused on cybersecurity, it is a departure from prior NIST efforts in that it is meant to span a wide range of levels within an organization. The CSF can be used down in the security trenches, guiding everyday decisions and the implementation of particular policies and practices. It can also be used by the chief information security officer (CISO) to provide a framework of items on which to report to the C-suite and board directors.

The COSO ERM, on the other hand, has been a staple of enterprise-level risk management. It takes a holistic view of risk across the entire enterprise, but its primary audience is the top leadership and board directors who are tasked with the management of risks, including cyber risks. For the board, it addresses oversight of management’s activities and decisions, such as alignment of resources, to ensure that positive risks are given proper consideration while negative risks are within board-approved risk appetite.

Not every cybersecurity issue will turn into a cyber risk — a potential negative impact on business objectives — that needs to involve top leadership. With its primary focus on cybersecurity, the NIST CSF is more tactically and operationally focused, while the COSO ERM helps business leaders link strategy, risks and performance to deliver value.

One of the biggest goals of the ERM is to improve executives’ understanding of the impact of risk on performance. Given the number of data breaches, exposed cloud storage units, instances of ransomware and other adverse cyber-related events that shook global economies in 2017, applying the benefit of the ERM to the cyber risk domain should be a top issue for boards and the C-suite.

There has never been a better time to understand the linkage between cyber risks, business strategy and performance, and to ensure that at all levels of the organizations are making the best decisions possible — for both today’s world and tomorrow’s cyber earthquakes.

Applying NIST CSF Functions to the COSO Enterprise Risk Management Framework

The NIST CSF includes a table that maps the framework core to various other standards. However, since we’ve yet to see a CSF-to-ERM mapping, below is an initial sketch of the mappings between the two frameworks. Let’s reiterate the list of NIST CSF functions and categories, since we’ll mention those later next to the COSO ERM principles:

The chart below shows an initial mapping of which areas of the NIST CSF are connected to the COSO ERM principles. Not surprisingly, the table shows that the CSF is rather light in its ability to ensure strong governance and culture as well as strategy and objective components, two areas in which adopting the ERM can provide significant benefits.

Linking Strategy and Performance to Cyber Risks

The NIST CSF and the COSO ERM are indeed apples and oranges, but that’s exactly what is needed to help organizations improve not only how they handle their cybersecurity operations, but also how they link strategy and performance to cyber risks. After a year full of high-profile data breaches and unprecedented ransomware attacks, these frameworks couldn’t have come at a better time.

Listen to the podcast series: Take Back Control of Your Cybersecurity Now

More from Risk Management

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today