A CAREER IN CYBERSECURITY GOVERNANCE & RISK MANAGEMENT

Working within this specialism in cybersecurity is about protecting the security of an organisation’s information systems and data, by setting policies, monitoring compliance and following defined procedures to identify, assess and manage risks from external and internal threats, all guided by the organisation’s view of any risk.


What will be your responsibilities?


As a Practitioner:


  • draft cyber security policies and procedures, taking an account of an organisation’s legal, regulatory and operational requirements
  • identify cyber security risks, posed by the combination of vulnerabilities and threats, to the security of an organisation’s information systems and data
  • assess the impact and likelihood of identified cyber security risks
  • propose measures - including avoidance, mitigation, sharing and acceptance - to manage risks
  • create and maintain a risk register or include the cyber security risks in the organisation’s overall risk register


As a Senior Practitioner:


  • manage governance and risk management practitioners
  • contribute to an organisation’s high-level risk strategy and the definition of its risk appetite
  • identify the requirement for policies and procedures and monitor their production and updating
  • approve policies and procedures
  • set up and maintain the arrangements for managing cyber security risk
  • engage with heads of business departments to demonstrate the cyber risks which the organisation faces through existing processes and to recommend changes to them
  • assess and report on the effectiveness of company risk management standards and policies


What skills will you need?


Transferable soft skills:


  • taking account of multiple complex factors to arrive at logical, repeatable conclusions
  • verbal and written communication, especially in producing formal documents which are comprehensive and without ambiguities
  • presenting logical, objective reasons for all decisions made


Specialist skills: 


  • using statistical, mathematical or financial techniques to assess the likelihood (taking account of vulnerabilities and threats) and impact of cyber-attack techniques and deliberate or unintentional damaging actions by people within the organisation
  • applying risk management methodologies, such as those in ISO 27001, and sector-specific requirements, such as PCI-DSS
  • interpreting legal and regulatory requirements and integrating them with an organisation’s operational requirements
  • assessing the compliance of procedures and practice with agreed standards


Transferable skills from a different career path:


  • roles in the emergency services, especially fire and police services, which require substantial risk management
  • operational and staff roles in the Armed Forces
  • business risk management
  • business operations
  • IT system management
  • business continuity
  • financial or internal audit
  • specialist commercial insurance assessment


20 April 2022

by Nick Kebbell 8 May 2025
Secure insights: Voice Cloning, Phishing & the $4.8M Breach: The Rise of Social Engineering
by Shazamme System User 7 May 2025
A Strategic Look at Signal vs. Substance 
Securing a Series A is a defining moment for any AI startup, a signal to the market that your produc
by Nick Kebbell 28 April 2025
Securing a Series A is a defining moment for any AI startup, a signal to the market that your product and vision are worth backing.
by Nick Kebbell 24 April 2025
Secure Insights Podcast: New Episode Featuring Mohit Tiwari on DSPM and AI in Data Security 
by Nick Kebbell 16 April 2025
CROs in Cybersecurity: Driving Revenue in AI-Enhanced Markets. Do You Have One? 
by Megan Hill 27 March 2025
Cybersecurity in the USA: A Closer Look from the Front Lines An Opinion Piece by NDK Cyber
by Nick Kebbell 24 February 2025
How AI, ML, and Cloud are Transforming Cybersecurity Defences
by Nick Kebbell 12 February 2025
The Intersection of Cybersecurity Talent and Product GTM Strategies 
by Nick Kebbell 4 February 2025
The Hidden Force Behind Scaling Cybersecurity Startups
Ndk cyber partners with istari to elevate global cyber leadership europe
23 September 2024
NDK Cyber Partners with ISTARI to Elevate Global Cyber Leadership
Show More
by Nick Kebbell 8 May 2025
Secure insights: Voice Cloning, Phishing & the $4.8M Breach: The Rise of Social Engineering
by Shazamme System User 7 May 2025
A Strategic Look at Signal vs. Substance 
Securing a Series A is a defining moment for any AI startup, a signal to the market that your produc
by Nick Kebbell 28 April 2025
Securing a Series A is a defining moment for any AI startup, a signal to the market that your product and vision are worth backing.
by Nick Kebbell 24 April 2025
Secure Insights Podcast: New Episode Featuring Mohit Tiwari on DSPM and AI in Data Security 
by Nick Kebbell 16 April 2025
CROs in Cybersecurity: Driving Revenue in AI-Enhanced Markets. Do You Have One? 
by Megan Hill 27 March 2025
Cybersecurity in the USA: A Closer Look from the Front Lines An Opinion Piece by NDK Cyber
by Nick Kebbell 24 February 2025
How AI, ML, and Cloud are Transforming Cybersecurity Defences
by Nick Kebbell 12 February 2025
The Intersection of Cybersecurity Talent and Product GTM Strategies 
by Nick Kebbell 4 February 2025
The Hidden Force Behind Scaling Cybersecurity Startups
Ndk cyber partners with istari to elevate global cyber leadership europe
23 September 2024
NDK Cyber Partners with ISTARI to Elevate Global Cyber Leadership
More posts