Here we go, week 8. I hope everyone is enjoying these as much as I am enjoying posting them. If you're just joining: I'm sharing 32 specific mindset shifts from my upcoming book that help risk professionals transition from traditional risk management (heat maps, gut feelings) to decision-based risk using quantification. We're in THEME 2: MEASUREMENT THINKING, moving from vague categories to decision-ready metrics leaders can actually use to make trade-offs. This week, we're tackling one of the most frustrating barriers in risk management: risk appetite statements that sound official but provide zero guidance when you actually need to make a decision. 8. Vague Risk Appetite → Quantified Thresholds Traditional Risk: Use vague statements like "low risk tolerance" or "acceptable risk levels" that force teams to guess what leadership actually wants when facing real decisions. Decision-Based Risk: Create quantified risk appetite statements with specific probability limits and measurable criteria. For example: "We accept no more than 10% chance of cyber losses exceeding $5M annually, and no more than 1% chance of losses exceeding $25M." Mindset Shift: Train your brain to question fuzzy appetite statements and seek out measurable thresholds. When you hear "moderate risk tolerance," your mind should immediately ask: "Moderate means what dollar amount? What probability levels?" Instead of "We have a low risk appetite for cyber threats," try "We accept no more than 10% chance of cyber losses exceeding $5M annually, and no more than 1% chance of losses exceeding $25M." Here's where it gets really powerful: quantified thresholds enable much richer risk conversations. Instead of blanket statements like "we don't tolerate high risk" or "$50M is too much risk," you can have nuanced conversations: "We feel a 50% chance of losses exceeding $50M is unacceptable, but we're willing to accept a 5% chance of $50M losses if we're pursuing something with really big upside potential." This transforms risk discussions from binary yes/no decisions into sophisticated trade-off conversations about opportunity cost, investment priorities, and strategic bets. Your security team isn't just "minimizing risk" - they're optimizing for the right risk/reward profile that enables business growth. #RiskManagement #RiskQuantification #DecisionMaking #CRQ #FAIR
Understanding Risk Appetite and Tolerance
Explore top LinkedIn content from expert professionals.
-
-
Risk appetite isn’t universal. It’s not a template you copy-paste, it’s where your board sets the boundaries for your business, in your context. I’ve been asked a lot in the last days how to start these conversations at the board level. So I put together a small practical guide to get you moving. It’s not perfect out of the box, it has to be tailored to your industry, your local regulations, and your board’s actual tolerance for risk. But it gives you the structure, the language, and the tools to stop talking in theory and start governing in practice. 👉 What’s inside the article (with links to a shared folder for downloads - I dare you to click 😇): 🔸 A 90-minute workshop flow for the board to align on appetite, tolerances, and governance 🔸 Board-level appetite statements (framed at residual risk, not compliance fluff) 🔸 Measurable tolerances, KEV patch windows, ransomware loss limits, vendor thresholds 🔸 A KRI library with thresholds and escalation paths 🔸 A Risk Acceptance log so exceptions don’t slip through the cracks 🔸 Scenario quantification with Open FAIR examples, calibrated to data like DBIR trends and your own capacity headroom This is a starting framework. The real value comes when you adapt it to your business discussions, your local regulations, and your board’s own definition of acceptable risk. If you like it, have ideas for improvement, or find a mistake, please leave a feedback or contact me directly. We all learn, and sharing is caring! 🔔 Follow Michael Reichstein for more board-level cybersecurity strategy and governance insights. ♻️ Useful? Share so other boards stop flying blind. #CISO #CyberSecurity #RiskManagement #BoardGovernance #OpenFAIR #NISTCSF #DORA #KEV #ThirdPartyRisk #QuantitativeRisk
-
Communicating about cyber risk? Use terminology like: 1/ RISK APPETITE A dollar figure over a given time period (usually a year, AKA annual loss expectancy [ALE]) identifying how much a particular business or product line is willing to lose, on average. Also known as “the cost of doing business.” Risk quantification legends Richard Seiersen and Doug Hubbard recommend providing a range of possible outcomes (e.g. a 1% chance of a $1,000,000 loss, a 0.1% chance of a $50,000,000 loss, and so forth) to build a loss exceedance curve. This is an advanced technique, but do it if you can. In any case, this figure should come from a business (private sector) or mission (government) leader, NOT the security team. It might be hard to coax exact numbers out of them, but you shouldn’t accept wishy-washiness. Organizations have acceptable quantitative limits for employee attrition, theft, and other bad things. Cyber risk is just another kind of (business) risk. So quantify it. 2/ RISK TOLERANCE The relative speed with which the organization must return to its risk appetite, if exceeded. Most easily expressed in ALE. For example, if you identify a vulnerability which poses a risk that - on top of existing ones - would put you over your appetite, your tolerance would tell you how quickly you need to get back to baseline. So if you have a risk tolerance of $50,000 per year, and a newly identified vulnerability represents an additional $100,000 of ALE (when factoring in likelihood of exploitation and severity), you have six months to mitigate, transfer, or avoid the resulting risk. If the vulnerability poses $18,000,000 per year of marginal risk (think log4shell), then you have about a day to resolve it. $18,000,000 of excess ALE per year * 1 year per 365 days = $49,315 of excess ALE per day, meaning you have slightly more than 24 hours before you exceed your risk tolerance. This is is all cumulative. So if you identify two instances of log4shell (assuming they pose the same risk), you'll need to fix both in 12 hours or one almost immediately and another one by the next day. TL:DR: 1/ RISK APPETITE: the annual risk (in dollars) your organization will accept as part of normal operations. 2/ RISK TOLERANCE: the speed with which you need to get back to that baseline, if exceeded. Does that square with your definitions?
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development