Building Governance Strategies and Fostering a Risk-Aware Culture Through Frameworks

Building Governance Strategies and Fostering a Risk-Aware Culture Through Frameworks

By Dwayne Natwick, CISSP, CISSP-ISSMP, CISSP-ISSAP, CCSP, CGRC, CSSLP, SSCP, CC (C) – ISC2 Authorized Instructor

In today’s threat landscape, building cyber resilience requires more than technology controls—it demands governance strategies and a risk-aware culture that permeates every level of the organization. By leveraging established frameworks such as ITIL, ISO/IEC, NIST, and ISACA’s COBIT, businesses can translate high-level principles into customizable, actionable processes for engineering data protection and minimizing exposure.

Governance and Risk Management: Foundations of Cyber Resilience

Effective governance establishes roles, responsibilities, and decision rights for managing cyber risk, while risk management provides the methods to identify, assess, and mitigate that risk. When paired with a risk-aware culture—where employees understand and own their role in safeguarding data—these disciplines form the bedrock of a resilient enterprise.

Key Frameworks Overview

ITIL (Information Technology Infrastructure Library)

ITIL offers a service-lifecycle approach encompassing strategy, design, transition, operation, and continual improvement. By mapping ITIL’s Change Management, Incident Management, and Knowledge Management processes to security objectives, organizations can embed risk controls into every service phase and promote cross-team collaboration on threat detection and response.

ISO/IEC 27001 & 27002

The ISO/IEC 27001 standard defines requirements for an Information Security Management System (ISMS), while ISO/IEC 27002 provides best-practice security controls. Together, they help organizations:

NIST Cybersecurity Framework (CSF)

NIST CSF organizes cybersecurity activities into five core functions—Identify, Protect, Detect, Respond, Recover—and offers profiles to align controls with business priorities. Its flexibility allows tailoring of controls (e.g., SP 800-53 baselines) to industry needs and risk tolerance, providing a clear roadmap for both technical teams and executives.

ISACA’s COBIT 2019

COBIT 2019 emphasizes governance and management objectives across domains such as Align, Plan & Organize; Build, Acquire & Implement; Deliver, Service & Support; and Monitor, Evaluate & Assess. By integrating agency-theory principles, COBIT facilitates open dialogue between stakeholders and leverages performance metrics to drive informed cyber-risk decisions and accountability.

Customizing Frameworks for Actionable Risk Management

Frameworks can be used as guidance for building organizational policies, strategies, processes, and procedures that are repeatable. Selecting a framework that best aligns with your organization is a good starting point. You can then customize it for your organizational needs and risk management profile.

  1. Align to Business Objectives

    • Map framework functions (e.g., NIST CSF Protect) to critical processes and data flows.

    • Use ISO/IEC 27001’s risk treatment plan to prioritize controls based on impact and likelihood.

  2. Tailor Controls for Context

    • Adopt ITIL’s Change Management to enforce security validation before production releases.

    • Leverage COBIT’s management objectives to assign clear ownership of controls and metrics.

  3. Engineer Data Protection

    • Implement encryption, tokenization, and key-management standards from ISO/IEC 27002.

    • Integrate logging and SIEM use-cases defined in NIST SP 800-53 to detect anomalous data access.

  4. Operationalize Continuous Improvement

    • Apply ITIL’s Continual Service Improvement processes to incorporate lessons learned from incidents.

    • Conduct regular COBIT performance assessments and ISO internal audits to refine risk treatment.

Cultivating a Risk-Aware Organizational Culture

Having an organizational culture that nurtures risk awareness and reporting will provide growth and strength in a organization’s profile toward risk and cyber resilience. Here are some key points to build upon in a risk aware organization.

Conclusion

By utilizing ITIL, ISO/IEC, NIST, and COBIT frameworks, among others, for guidance and strategy, organizations can craft governance strategies that translate into actionable risk-management processes. This unified approach not only recognizes and architects technical safeguards—such as encryption, access controls, and continuous monitoring—but also fosters a culture where every employee understands their role in maintaining cyber resilience. The result is a dynamic, risk-aware organization with repeatable activities that are capable of adapting to evolving threats and safeguarding critical data assets.

References ISACA, “Cybersecurity Risk Management Governance: An Agency Theory Perspective,” 2024. ORNA, “NIST, ISO, COBIT, ITIL – Which Cyber Framework Rules Them All?”, Sep 6, 2022. Rick Lemieux, “ITIL and the NIST Cybersecurity Framework: A Synergistic Approach to Cyber Resilience,” DVMS Institute, Aug 5, 2024.