Accendo Reliability

Your Reliability Engineering Professional Development Site

  • Home
  • About
    • Contributors
    • About Us
    • Colophon
    • Survey
  • Reliability.fm
    • Speaking Of Reliability
    • Rooted in Reliability: The Plant Performance Podcast
    • Quality during Design
    • CMMSradio
    • Way of the Quality Warrior
    • Critical Talks
    • Asset Performance
    • Dare to Know
    • Maintenance Disrupted
    • Metal Conversations
    • The Leadership Connection
    • Practical Reliability Podcast
    • Reliability Hero
    • Reliability Matters
    • Reliability it Matters
    • Maintenance Mavericks Podcast
    • Women in Maintenance
    • Accendo Reliability Webinar Series
  • Articles
    • CRE Preparation Notes
    • NoMTBF
    • on Leadership & Career
      • Advanced Engineering Culture
      • ASQR&R
      • Engineering Leadership
      • Managing in the 2000s
      • Product Development and Process Improvement
    • on Maintenance Reliability
      • Aasan Asset Management
      • AI & Predictive Maintenance
      • Asset Management in the Mining Industry
      • CMMS and Maintenance Management
      • CMMS and Reliability
      • Conscious Asset
      • EAM & CMMS
      • Everyday RCM
      • History of Maintenance Management
      • Life Cycle Asset Management
      • Maintenance and Reliability
      • Maintenance Management
      • Plant Maintenance
      • Process Plant Reliability Engineering
      • RCM Blitz®
      • ReliabilityXperience
      • Rob’s Reliability Project
      • The Intelligent Transformer Blog
      • The People Side of Maintenance
      • The Reliability Mindset
    • on Product Reliability
      • Accelerated Reliability
      • Achieving the Benefits of Reliability
      • Apex Ridge
      • Field Reliability Data Analysis
      • Metals Engineering and Product Reliability
      • Musings on Reliability and Maintenance Topics
      • Product Validation
      • Reliability by Design
      • Reliability Competence
      • Reliability Engineering Insights
      • Reliability in Emerging Technology
      • Reliability Knowledge
    • on Risk & Safety
      • CERM® Risk Insights
      • Equipment Risk and Reliability in Downhole Applications
      • Operational Risk Process Safety
    • on Systems Thinking
      • The RCA
      • Communicating with FINESSE
    • on Tools & Techniques
      • Big Data & Analytics
      • Experimental Design for NPD
      • Innovative Thinking in Reliability and Durability
      • Inside and Beyond HALT
      • Inside FMEA
      • Institute of Quality & Reliability
      • Integral Concepts
      • Learning from Failures
      • Progress in Field Reliability?
      • R for Engineering
      • Reliability Engineering Using Python
      • Reliability Reflections
      • Statistical Methods for Failure-Time Data
      • Testing 1 2 3
      • The Hardware Product Develoment Lifecycle
      • The Manufacturing Academy
  • eBooks
  • Resources
    • Accendo Authors
    • FMEA Resources
    • Glossary
    • Feed Forward Publications
    • Openings
    • Books
    • Webinar Sources
    • Journals
    • Higher Education
    • Podcasts
  • Courses
    • Your Courses
    • 14 Ways to Acquire Reliability Engineering Knowledge
    • Live Courses
      • Introduction to Reliability Engineering & Accelerated Testings Course Landing Page
      • Advanced Accelerated Testing Course Landing Page
    • Integral Concepts Courses
      • Reliability Analysis Methods Course Landing Page
      • Applied Reliability Analysis Course Landing Page
      • Statistics, Hypothesis Testing, & Regression Modeling Course Landing Page
      • Measurement System Assessment Course Landing Page
      • SPC & Process Capability Course Landing Page
      • Design of Experiments Course Landing Page
    • The Manufacturing Academy Courses
      • An Introduction to Reliability Engineering
      • Reliability Engineering Statistics
      • An Introduction to Quality Engineering
      • Quality Engineering Statistics
      • FMEA in Practice
      • Process Capability Analysis course
      • Root Cause Analysis and the 8D Corrective Action Process course
      • Return on Investment online course
    • Industrial Metallurgist Courses
    • FMEA courses Powered by The Luminous Group
      • FMEA Introduction
      • AIAG & VDA FMEA Methodology
    • Barringer Process Reliability Introduction
      • Barringer Process Reliability Introduction Course Landing Page
    • Fault Tree Analysis (FTA)
    • Foundations of RCM online course
    • Reliability Engineering for Heavy Industry
    • How to be an Online Student
    • Quondam Courses
  • Webinars
    • Upcoming Live Events
    • Accendo Reliability Webinar Series
  • Calendar
    • Call for Papers Listing
    • Upcoming Webinars
    • Webinar Calendar
  • Login
    • Member Home
Home » Articles » on Risk & Safety » CERM® Risk Insights » Cyber Security and Enterprise Risk Management

by Greg Hutchins Leave a Comment

Cyber Security and Enterprise Risk Management

Cyber Security and Enterprise Risk Management

Guest Post by James Kline (first posted on CERM ® RISK INSIGHTS – reposted here with permission)

In September 2022 the National Institute of Standards and Technology (NIST) issued NIST IR 8286C. (1) As the C indicates, this is the third such cybersecurity risk management standard issued by NIST. NISTIR 8286A and 8286B provide guidance to stakeholders on assessing and managing cybersecurity risk in conjunction with Enterprise Risk Management (ERM) processes. This piece looks at the guidance provided under NIST IR 8286C.

Purpose

NIST IR 8286C provide guidance for all sectors, public and private, on how to integrate Cybersecurity Risk Registers (CRR) in a “holistic manner” into the organization’s ERM process, specifically the enterprise risk register and enterprise risk profile. (The risk register is a prioritized compilation of the risks the organization faces. The risk profile is the assessment of the major risks an organization faces and the likely impact.)

Audience 

As noted above, the guidance is for all sectors. However, it important to note two things. First, NIST guidance is essentially a mandate for federal agencies. This has been established in several Presidential Executive Orders. Most recently in the Executive Order on Improving the Nation’s Cybersecurity. (2) Second, Executive Orders, M-22-12, and the Food and Drug Administration (FDA) Risk Management Plan Draft Guidance, both stress the need to integrate operational activities with ERM. (3) Both also require federal agencies to assess risks to their program activities, which includes grants, loans, and contracts.

While the focus of the executive orders is on federal agencies, the FDA risk management plan touches on the private sector. Further, NIST’s cybersecurity risk integration plan, links cybersecurity with ERM. The rational is clearly stated in IR 8286C. “The importance of information and technology risks to the enterprise risk posture makes it critical to ensure broad visibility about risk-related activities to protect enterprise reputation, finances and objectives.” (4)

Consequently, IR 8286C can be seen as something stronger than a recommendation for all public and private sector organizations which accept money from the federal government.

Structure of NIST IR 8286C

NIST IR 8286C’s focus is on integrating Cybersecurity Risks into the broader ERM process. While the integration process and the development of a CRR is discussed, there is a reliance on the prior two reports to more fully describe the ERM implementation process. (For a step-by-step review of what governments at all levels around the world are doing at each step in the ERM implementation process, see my book Enterprise Risk Management in Government: Implementing ISO 31000:2018. It is available on Amazon.)

To facilitate the integration process NIST IR 8286C emphasizes three main actions. These are: 1. Aggregation of Cybersecurity Risk Information, 2. The integration of the Cybersecurity Risk Register into the Enterprise Risk Register and 3. Establishing the organization’s Risk Profile.

Aggregation

In this activity all the risks associated with Cybersecurity are identified. The identified risks come from each component and level of the organization. In other words, it is enterprise wide.

Where duplicates are present, they are combined. Where there are differences in perspective or description, a common understanding sought. Once the risks are aggregated, they are scored based on their impact and probability of occurrence.

The scored list become the CRR. This register is then integrated with the risk registers from the other functional activities that comprise the enterprise.

Integration

NIST lists four enterprise-wide risk functional activity. These are Mission, Financial, Reputational and Cybersecurity.  NIST defines the first three function as follows:

Mission: Risk conditions that affect the enterprise’s ability to achieve objectives.

Financial: Practices that represent exposure to net income, capital, cash flow, and solvency factors, including appropriations and investments.

Reputation: Considerations that might be measurable through key stakeholder surveys or sentiment analysis. (5)

Table 1 shows the risk areas under each activity.

Enterprise Risk Profile

The Enterprise Risk Profile (ERP) is the end goal of the process. It is described as follows:

“The ERR informs the ERP once the risks are as prioritized at the highest level of the Risk Management Function in the enterprise … The ERP is a subset of carefully selected risks from the largest ERR. As the federal ERM playbook points out, there is no single best way to document a risk profile.” (6)

In general parlance, the ERP is the prioritized strategic risk register of the enterprise as determined by the members of the C-suite. It reflects the assessment of the key mission, financial, reputational, and cybersecurity risks the organizational faces and the approaches the organization is taking to mitigate these risks.

Summary

NIST has released the third cybersecurity guide. It is designated NIST IR 8286C. Its specific focus is the integration of cybersecurity risk management into the overall ERM process of the organization.  While NIST IR 8286C is considered a guide, it is a mandate for federal agencies. Thus, any organization which takes money from the federal government will likely be encouraged to follow the guidance laid out in NIST IR 8286C and integrate CRR with ERR to produce the ERP.

Endnotes

1.NIST, 2022, Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight, NIST IR 8286C, https://www.nist.gov/search?=+8286C

  1. U.S Government, 2021, Executive Order on Improving the Nation’s Cybersecurity, May 12, https://www.whitehourse.gov/briefing-room/presidential -action/2021/05/12/executive-order-on-improving-the-nations-cybersecurity.
  2. Kline, James J. 2022, Biden Administration Pushes ERM, CERM Insights # 377, Portland Oregon.
  3. NIST, 2022, Op. cit. Page 1.
  4. Ibid, Page 13.
  5. Ibid, Page 14.

BIO

James J. Kline has a PhD from Portland State University. He has worked for federal, state, and local government. He has consulted on economic, quality and workforce development issues. He has authored numerous articles on quality and risk management. His book “Enterprise Risk Management in Government: Implementing ISO 31000:2018” is available on Amazon. He edited “Quality Disrupted” which is also available on Amazon. He can be contacted on LinkedIn or jamesjk1236@outlook.com

Filed Under: Articles, CERM® Risk Insights, on Risk & Safety

About Greg Hutchins

Greg Hutchins PE CERM is the evangelist of Future of Quality: Risk®. He has been involved in quality since 1985 when he set up the first quality program in North America based on Mil Q 9858 for the natural gas industry. Mil Q became ISO 9001 in 1987

He is the author of more than 30 books. ISO 31000: ERM is the best-selling and highest-rated ISO risk book on Amazon (4.8 stars). Value Added Auditing (4th edition) is the first ISO risk-based auditing book.

« Measuring Replacement Asset Value (RAV)
Is Using MTBF Habit Forming? »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CERM® Risk Insights series Article by Greg Hutchins, Editor and noted guest authors

Join Accendo

Receive information and updates about articles and many other resources offered by Accendo Reliability by becoming a member.

It’s free and only takes a minute.

Join Today

Recent Articles

  • The Hidden Challenges of Agile in Hardware Development
  • Statistical Tools most Frequently used During Product Validation.
  • The Challenges in Reliability Engineering
  •  How to Make RCFA a Successful Business Improvement Strategy 
  • Which is Stronger: Outside Pressure to Change? or, Your Internal Drive to Transform

© 2025 FMS Reliability · Privacy Policy · Terms of Service · Cookies Policy

Book the Course with John
  Ask a question or send along a comment. Please login to view and use the contact form.
This site uses cookies to give you a better experience, analyze site traffic, and gain insight to products or offers that may interest you. By continuing, you consent to the use of cookies. Learn how we use cookies, how they work, and how to set your browser preferences by reading our Cookies Policy.