140 likes | 308 Views
Figure 1 Sources and Types of IT Risk. External Threats. Legal & Regulatory. Natural Disasters. Value Stream Participants. Technology and Technology Vendors. Competitors. Illegal Acts. Outsiders Criminals Terrorists Pranksters Insiders Employees. Investment Risks.
E N D
Figure 1Sources and Types of IT Risk External Threats Legal & Regulatory Natural Disasters Value Stream Participants Technology and Technology Vendors Competitors Illegal Acts Outsiders Criminals Terrorists Pranksters Insiders Employees Investment Risks Operational Risks IT Operations Internal Controls System Development System Architecture Data Internal Threats
Table 5Investment Risk: The Threat of Depressed Benefit Flows
Table 7Investment Risk: The Threat of Inadequate Internal Controls
Figure 2Risk Assessment Matrix High Probability of a Risk Event Occurring Medium Low Low Medium High Expected Loss If a Risk Event Occurs
Figure 3Effective Risk Management Cost of Risk Prevention/Mitigation Cost Sweet Spot Expected loss in the Absence of Risk Prevention/Mitigation Risk
Table 9Illustrative IT Project Portfolio Management Category Structure
Table 11Coors’ POS Application Suite:Assessing Operational Risk Exposure