Top down risk approach

Top down risk approach

The Risk approach is a vital way to firm up an organization's stance and steer the complex journey of managing risk which may start from asset identification leading to risk identification and way forward how the risk picture is blown and painted . One of the approaches is top down.

Top down approach, as the name says it flows from top. It is a strategic approach. In this approach senior stakeholders set the overall tone of the risk picture, and communicate the risks  down the ladder for implementation. it is centrally driven hence it is also named as centralized approach. It is Developed and dealt at Macro level which means big picture and strategic approach is taken. Risk is found out first and mitigation approach is decided as per risk gravity and priority matrix depending on its impact or exposure to the enterprise and business. The benefits of Top down approach is clear guidelines, faster implementation, Risks are painted in accordance with the business hence it is business centric. Sometimes this approach is called a rigid or inelastic or stiff approach that doesn't involve ground inputs and only considers all the risks which collide with strategic business goals. 

Lets discuss Bottom approach in coming discussion .

Ashok Mane

Global Security Operation Centre TL at Veritas Technology Ltd

3mo

Thanks Sir

Like
Reply
Samrendra Mohan Kumar

Co-founder & MD, MitKat Advisory

4mo

Thanks for sharing, Ambarish! Excellent stuff!

Anand Rawal, CSM

Military Veteran/Physical Security/OHSAS 18001/Risk Management/Crisis Management/Safety Management

4mo

Thanks for sharing, Ambarish

Hanumant Katkar - CSP

AGM Operations and Training west Zone

4mo

Thanks for sharing, Ambarish Sir 🙏

To view or add a comment, sign in

More articles by Ambarish Purohit CISM®,CPP®,PSP®,PCI®,CFE,PGDDM

  • Expressions of Risk aspects

    All exercise of Risk assessment, Vulnerability impact assessment, Threat mapping is to arrive at terms which make the…

    5 Comments
  • Risk, Threat, Vulnerability

    It is Important to know Threat, Vulnerability and Risk, Vulnerability and Risk and at the same time we know the…

    12 Comments
  • ESRM- Enterprise Security Risk management

    Enterprise Security Risk Management Approach the Holistic Security Risk Management Enterprise security risk management…

    17 Comments
  • PIAM success curry

    It is been some time now that we are on to such transition curve that industry, Business leaders, Colleagues, stake…

    5 Comments
  • PIAM

    PIAM, what is secret on the PIAM theory Physical Identity and access management. It is the 2.

    2 Comments
  • Magnetic Stripe Cards

    They store data on a magnetic stripe, read by swiping the access card through a reader. In terms of usage, magnetic…

    7 Comments
  • RFID and NFC based Access basics

    RFID and NFC Radio-frequency identification (RFID) technology transmits credentials by way of radio waves to…

    14 Comments
  • Cards usage and security

    SMART CARDS - Smart cards are modern day synonym to access cards. These cards generally use Hi frequency 13.

    3 Comments
  • Surveillance - evergreen topic in security world Episode 2

    Surveillance Methods a) Aerial Surveillance Aerial surveillance refers to the observation of a place, person, group, or…

    1 Comment
  • Surveillance - evergreen topic in security world Episode 1

    Let’s reach out to pages of History book to know some interesting history of word surveillance. The first time it was…

    5 Comments

Explore content categories