IT Risk: George Westerman Richard Hunter
IT Risk: George Westerman Richard Hunter
IT Risk: George Westerman Richard Hunter
George Westerman
Richard Hunter
IT Risk
Turning Business Threats
into Competitive Advantage
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 1
Introduction
IT Risk and Consequences
1
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 2
2 | IT Risk
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 3
Introduction | 3
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 4
4 | IT Risk
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 5
Introduction | 5
was getting worse and worse, and IT managers knew that the systems
were becoming more and more difficult to maintain. Extensive coor-
dination by smart support staff covering for system inadequacies was
so frequent that it produced a motto: “Five calls does it all.”
But these ongoing signs of agility risks seemed relatively low
impact. They were annoying, of course, but they were a more or less
normal part of the way business was done at Tektronix and at many
other companies. It was only when Tektronix executives tried to
break from the past that they saw the real threat those familiar an-
noyances posed.
The Tektronix and Comair cases are extreme in their conse-
quences, but they are not unique. Other events in multiple industry
sectors show that executives must learn to think of IT risk in terms
of serious business consequences:
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 6
6 | IT Risk
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 7
Introduction | 7
Ineffective IT Governance
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 8
8 | IT Risk
What Is IT Governance?
a. Peter Weill and Jeanne Ross, IT Governance: How Top Performers Manage IT Decisions Rights
for Superior Results (Boston: Harvard Business School Press, 2004), 2.
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 9
Introduction | 9
Uncontrolled Complexity
Inattention to Risk
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 10
10 | IT Risk
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 11
Introduction | 11
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 12
12 | IT Risk
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 13
Introduction | 13
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 14
14 | IT Risk
Chapters 3–6 represent the heart of the book and offer a blue-
print for developing effective risk management capabilities. These
chapters have been written for IT executives, who will be responsible
for implementing the practices, and should be skimmed by business
executives, who will participate in the processes and charge their
CIOs with implementing those processes. Chapters 3–4 describe
how to improve the IT foundation of applications, infrastructure,
people, processes, and controls. In these two chapters, we describe
the IT risk pyramid and how executives can use it to manage the
right risks in the right order.
Chapter 5 shows how to establish the second core discipline, the
IT risk governance process. An effective IT risk governance process is
coordinated by a risk officer, conducted by managers in each func-
tional area, and overseen by executives at higher levels. The chapter
includes processes and tools to make risk governance effective.
The final risk discipline, a risk-aware culture, is the topic of chap-
ter 6. No process can be effective and no foundation can be protected
if the enterprise is afraid to talk about risk. A risk-aware culture starts
at the top with business executives who set direction, model risk-
aware decision making, and reward effective risk management behav-
iors. The goal is a culture in which risk is discussed openly across the
organization and actively managed to tolerable levels.
Chapters 7–9 bring the focus back to the business executives
who are so critical to the success of IT risk management. IT risk has
serious business consequences, and business executives have im-
portant roles to play in managing IT risk effectively.
Chapter 7 describes how to assess each discipline—the founda-
tion, risk governance process, and risk-aware culture—in your orga-
nization and bring each up to at least a competent level. Although
enterprises must become competent in all three disciplines as fast as
possible, they often choose one focal discipline as the rallying point
to continuously improve all three well beyond the competent stage.
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 15
Introduction | 15
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.
Westerman_intro.qxd 6/1/07 3:21 PM Page 16
Excerpted from IT Risk by George Westerman and Richard Hunter. Copyright George
Westerman and Gartner, Inc. All rights reserved. Harvard Business School Press, June 2007.