Risk Treatment & Executive Communication
Identifying and quantifying risk is half the job — the other half is deciding what to do about it and communicating it effectively. This section covers the four treatment strategies, risk appetite operationalization, risk register management, executive reporting, and risk exception governance.
Risk Treatment Strategies
Risk Treatment Decision Framework
Mitigate (Reduce)
Implement controls to reduce likelihood and/or impact. Most common treatment strategy.
- • Effective controls exist at reasonable cost
- • Risk-to-mitigation cost ratio is favorable
- • Regulatory requirement mandates specific controls
- • Control implementation cost
- • Expected risk reduction (pre/post FAIR analysis)
- • Ongoing operational cost
Accept
Acknowledge the risk and proceed without additional controls. Requires formal documentation.
- • Risk falls within defined risk appetite
- • Cost of mitigation exceeds potential loss
- • Temporary acceptance with compensating controls
- • Signed risk acceptance by appropriate authority
- • Defined review period (typically 6-12 months)
- • Compensating controls documented
Transfer
Shift the financial impact to a third party through insurance or contractual transfer.
- • Low-frequency, high-impact risks
- • Cyber insurance is cost-effective
- • Contractual indemnification available
- • Transfers financial risk, not reputational risk
- • Insurance exclusions (acts of war, ransomware)
- • Regulatory obligations can't be transferred
Avoid
Eliminate the risk by removing the activity, system, or process that creates it.
- • Risk exceeds organizational risk tolerance
- • No cost-effective mitigation exists
- • Business case doesn't justify the risk
- • Decommissioning a legacy system
- • Not entering a high-risk market
- • Discontinuing a feature with unmanageable risk
Risk Appetite & Tolerance
Appetite vs Tolerance vs Capacity
Risk Appetite Statement Framework
══════════════════════════════════
STRATEGIC RISK APPETITE (Board-level)
─────────────────────────────────────
"[Organization] accepts a MODERATE level of cybersecurity risk
in pursuit of digital transformation objectives. We will NOT
accept risks that could result in:
• Loss of customer PII affecting >10,000 records
• Regulatory fines exceeding $5M
• Business interruption >24 hours for critical services
• Reputational damage from data breach making national news"
OPERATIONAL RISK TOLERANCE (CISO-level)
───────────────────────────────────────
Category Tolerance Escalation
─────────────────────────────────────────────────────
Critical vulns 0 unpatched >72h → CISO immediate
High vulns 0 unpatched >30d → Security Lead
Vendor risk (Tier 1) Score ≥ 70/100 → Risk Committee
Open risk acceptances Max 20 concurrent → CISO quarterly
ALE per risk < $2M annually → Auto-accept
ALE per risk $2M-$10M → Risk Committee
ALE per risk > $10M → Board/CEO
RISK CAPACITY (CFO-level)
─────────────────────────
• Cyber insurance coverage: $50M per occurrence
• Self-insured retention: $2M
• Maximum acceptable annual cyber loss: $25M
• Cash reserves for incident response: $5MRisk Appetite Statement Framework
══════════════════════════════════
STRATEGIC RISK APPETITE (Board-level)
─────────────────────────────────────
"[Organization] accepts a MODERATE level of cybersecurity risk
in pursuit of digital transformation objectives. We will NOT
accept risks that could result in:
• Loss of customer PII affecting >10,000 records
• Regulatory fines exceeding $5M
• Business interruption >24 hours for critical services
• Reputational damage from data breach making national news"
OPERATIONAL RISK TOLERANCE (CISO-level)
───────────────────────────────────────
Category Tolerance Escalation
─────────────────────────────────────────────────────
Critical vulns 0 unpatched >72h → CISO immediate
High vulns 0 unpatched >30d → Security Lead
Vendor risk (Tier 1) Score ≥ 70/100 → Risk Committee
Open risk acceptances Max 20 concurrent → CISO quarterly
ALE per risk < $2M annually → Auto-accept
ALE per risk $2M-$10M → Risk Committee
ALE per risk > $10M → Board/CEO
RISK CAPACITY (CFO-level)
─────────────────────────
• Cyber insurance coverage: $50M per occurrence
• Self-insured retention: $2M
• Maximum acceptable annual cyber loss: $25M
• Cash reserves for incident response: $5MRisk Register
The risk register is the living document that captures all identified risks, their scores, treatment decisions, and status. It's the primary output of significant TRA engagement.
| ID | Risk | ALE (FAIR) | Treatment | Control | Owner | Status |
|---|---|---|---|---|---|---|
| R-001 | Cardholder data breach via API exploitation | $3.2M–$8.5M | Mitigate | WAF + API gateway + runtime protection | Platform Lead | In Progress |
| R-002 | Ransomware via compromised CI/CD pipeline | $1.8M–$4.2M | Mitigate | SLSA Level 3 + signed artifacts + RBAC | DevOps Lead | Complete |
| R-003 | Single cloud region failure (us-east-1) | $800K–$2.1M | Accept | Multi-AZ (not multi-region) — cost accepted | CTO | Accepted |
| R-004 | Regulatory fine from GDPR data subject request failure | $500K–$3M | Transfer | Cyber insurance + automated DSR workflow | DPO | Complete |
Executive Reporting
Executives don't need threat details — they need decision-ready summaries. Structure TRA reports for your audience level.
Board / C-Suite
- • 1-page executive summary
- • Top 5 risks with ALE ranges
- • Risk trend (improving/worsening)
- • Investment ask with ROI
- • Peer benchmarking data
- • Format: dashboard with traffic lights
Risk Committee / CISO
- • Full risk register with FAIR scores
- • Treatment plan and timeline
- • Control effectiveness assessment
- • Risk acceptance decisions needed
- • Exceptions and waivers status
- • Format: detailed report + risk matrix
Technical / Engineering
- • Detailed threat scenarios
- • Attack trees and DFDs
- • Specific control recommendations
- • Remediation backlog items
- • Architecture diagrams with risk annotations
- • Format: technical appendix + JIRA items
Risk Exceptions & Waivers
Risk Exception / Waiver Governance Process
═══════════════════════════════════════════
WHEN TO REQUEST AN EXCEPTION
─────────────────────────────
• A mandated control cannot be implemented by deadline
• Cost of full compliance exceeds risk-justified spending
• Technical debt requires phased remediation
• Legacy system cannot support required controls
EXCEPTION REQUEST TEMPLATE
───────────────────────────
Risk ID: [R-XXX]
Requested by: [Name, Title]
Risk description: [What risk is being accepted]
Current ALE: [$ range from FAIR analysis]
Why exception needed:
[Business/technical justification]
Compensating controls in place:
1. [Control description and effectiveness]
2. [Control description and effectiveness]
Residual risk with compensating controls:
[Updated ALE estimate]
Requested duration: [X months, max 12]
Review date: [Specific date]
APPROVAL AUTHORITY
──────────────────
ALE < $500K: Security Lead
ALE $500K-$2M: CISO
ALE $2M-$10M: Risk Committee
ALE > $10M: CEO / Board
GOVERNANCE REQUIREMENTS
───────────────────────
• All exceptions tracked in risk register
• Maximum exception duration: 12 months
• Mandatory review at expiration
• Auto-escalation if not renewed or remediated
• Quarterly exception summary to Risk CommitteeRisk Exception / Waiver Governance Process
═══════════════════════════════════════════
WHEN TO REQUEST AN EXCEPTION
─────────────────────────────
• A mandated control cannot be implemented by deadline
• Cost of full compliance exceeds risk-justified spending
• Technical debt requires phased remediation
• Legacy system cannot support required controls
EXCEPTION REQUEST TEMPLATE
───────────────────────────
Risk ID: [R-XXX]
Requested by: [Name, Title]
Risk description: [What risk is being accepted]
Current ALE: [$ range from FAIR analysis]
Why exception needed:
[Business/technical justification]
Compensating controls in place:
1. [Control description and effectiveness]
2. [Control description and effectiveness]
Residual risk with compensating controls:
[Updated ALE estimate]
Requested duration: [X months, max 12]
Review date: [Specific date]
APPROVAL AUTHORITY
──────────────────
ALE < $500K: Security Lead
ALE $500K-$2M: CISO
ALE $2M-$10M: Risk Committee
ALE > $10M: CEO / Board
GOVERNANCE REQUIREMENTS
───────────────────────
• All exceptions tracked in risk register
• Maximum exception duration: 12 months
• Mandatory review at expiration
• Auto-escalation if not renewed or remediated
• Quarterly exception summary to Risk CommitteeGRC Tool Integration
| Platform | Strengths | Best For | API |
|---|---|---|---|
| ServiceNow IRM | Enterprise integration, workflow automation | Large enterprises with ITSM integration | REST API, IntegrationHub |
| Archer (RSA) | Customizable data model, reporting | Regulated industries, complex frameworks | REST API |
| LogicGate Risk Cloud | Modern UI, no-code workflows, FAIR support | Mid-market, teams wanting FAIR quantification | REST API, webhooks |
| OneTrust | Privacy + security risk, vendor management | Privacy-focused orgs, GDPR compliance | REST API, pre-built integrations |
Section Summary
Key Takeaways
- • Four treatment strategies: mitigate, accept, transfer, avoid
- • Risk appetite must be formally defined at strategic, operational, and financial levels
- • Risk registers are living documents with clear ownership and review cycles
- • Tailor reporting depth to audience: board, risk committee, engineering
- • Risk exceptions require formal governance with time-boxing and approval authority
Next Steps
- • Section 12: Case Studies & Templates
- • Reporting Templates section
- • Section 06: Risk Quantification — for FAIR scoring