Skip to main content

Risk management and prioritization

You can't protect everything equally. You don't have the budget, the time, or the people. Risk management helps you decide what to protect first, how much to invest, and when "good enough" is actually good enough.

This isn't about filling out compliance forms. It's about making smart decisions with limited resources.

Why risk management matters for small companies

Without formal risk management, security decisions happen based on:

  • Whatever incident just occurred
  • What the loudest person in the room thinks
  • What the latest news article covered
  • What tools vendors are currently selling

This leads to misallocated resources. You might spend $50,000 on an advanced threat detection system while leaving your S3 buckets public. Or train everyone on phishing while ignoring that three people share the admin password.

Risk management provides a framework for answering: "Where should we focus next?"

The basics: what is risk?

In security, risk is calculated as:

Risk = Likelihood × Impact

Likelihood: How probable is this threat? Daily occurrence? Once a year? Once a decade?

Impact: If it happens, how bad is it? Minor inconvenience? Major financial loss? Company-ending?

A threat with high likelihood but low impact (spam emails) requires different treatment than low likelihood but catastrophic impact (ransomware destroying all data).

Risk response options

For any identified risk, you have four choices:

ResponseWhen to useExample
MitigateRisk is too high, controls can reduce itAdd MFA to reduce account compromise risk
AcceptRisk is low enough, or mitigation cost exceeds benefitAccept that a non-critical internal tool might have minor downtime
TransferSomeone else can handle the risk betterBuy cyber insurance, use managed security services
AvoidRisk is unacceptable and can't be mitigatedDon't store credit card data; use Stripe instead

Most security work is mitigation. But knowing when to accept, transfer, or avoid is equally important.

Simplified risk assessment process

Enterprise risk frameworks (ISO 31000, NIST RMF) are comprehensive but overwhelming for small companies. Here's a practical approach you can complete in a day.

Step 1: Identify critical assets (2 hours)

What would hurt most if compromised, destroyed, or leaked?

Asset categories to consider:

CategoryExamplesQuestions to ask
DataCustomer PII, source code, financial recordsWhat data can't be recreated? What data would damage reputation if leaked?
SystemsProduction servers, databases, SaaS platformsWhat systems, if down, stop business?
ProcessesPayment processing, customer onboardingWhat processes handle sensitive operations?
PeopleKey employees with critical knowledge or accessWho has keys to the kingdom?
ReputationBrand, customer trustWhat would make customers leave?

Quick exercise: List your top 10 assets. If you struggle to prioritize, ask: "If this disappeared tomorrow, how long until the company notices? How long until it's a crisis?"

Step 2: Identify threats (1 hour)

What could go wrong? Be specific.

Common threat sources for small companies:

Threat sourceExample scenarios
External attackersRansomware, credential stuffing, opportunistic scanning
Insider threatsDisgruntled employee, accidental data leak, social engineering victim
Third partiesVendor breach, supply chain compromise, SaaS outage
Technical failuresHardware failure, configuration error, software bug
Natural/physicalPower outage, flood, theft of equipment

Don't overthink this. You're not defending against nation-states. Focus on threats that actually affect companies like yours. Check the Verizon DBIR for data on what attacks are most common in your industry.

Step 3: Assess likelihood (1 hour)

For each threat-asset combination, estimate likelihood:

RatingDescriptionFrequencyExample
5 - Almost certainExpected to occurMultiple times per yearPhishing attempts against employees
4 - LikelyWill probably occurOnce per yearCredential stuffing attempt
3 - PossibleMight occurOnce every 2-3 yearsTargeted attack on your company
2 - UnlikelyCould occur but not expectedOnce per 5-10 yearsInsider sabotage
1 - RareExceptional circumstancesOnce per 10+ yearsNation-state attack

Use data when available:

  • How many phishing emails did you receive last month?
  • How many vulnerability scan attempts in your logs?
  • What does industry data say about breach frequency?

When data isn't available, use informed judgment. It's better to estimate than to not assess at all.

Step 4: Assess impact (1 hour)

If the threat materializes, how bad is it?

RatingDescriptionFinancialOperationalReputational
5 - CatastrophicBusiness survival at risk>$1M or >50% revenueMonths of disruptionMajor media coverage, customer exodus
4 - MajorSignificant damage$100K-$1MWeeks of disruptionIndustry coverage, notable customer loss
3 - ModerateNotable impact$10K-$100KDays of disruptionSome customer complaints
2 - MinorSmall impact$1K-$10KHours of disruptionFew notice
1 - NegligibleMinimal effectUnder $1KMinutes of disruptionNo one notices

Tip: Consider all impact types. A breach might cost $50K in direct response but $500K in lost deals if it hits the news.

Step 5: Calculate and rank risks (30 minutes)

Multiply likelihood × impact to get risk score:

Risk Score = Likelihood (1-5) × Impact (1-5)

Risk levels:
- 1-4: Low (green) → Accept or monitor
- 5-9: Medium (yellow) → Plan mitigation
- 10-14: High (orange) → Prioritize mitigation
- 15-25: Critical (red) → Immediate action required

Example risk assessment:

AssetThreatLIScoreRisk level
Customer databaseRansomware3515Critical
Customer databaseSQL injection2510High
Source codeDeveloper laptop theft339Medium
Email systemPhishing → account takeover4416Critical
Marketing websiteDefacement326Medium
HR dataInsider access abuse248Medium
Production serversDDoS3412High
BackupsCorruption/deletion2510High

Now you know where to focus: ransomware and phishing-to-account-takeover are your critical risks.

The risk register

A risk register is your living document for tracking risks and their treatment. It doesn't need to be fancy—a spreadsheet works fine.

Risk register template

IDAssetThreatLIScoreCurrent controlsTreatmentOwnerTarget dateStatus
R-001Customer DBRansomware3515Daily backups, AVMitigate: Add network segmentation, EDRIT LeadQ1 2025In progress
R-002EmailPhishing4416Basic spam filterMitigate: Deploy email security gateway, train usersSecurity ChampionQ1 2025Planned
R-003Source codeLaptop theft339Full disk encryptionAccept: Current controls sufficientDev LeadN/AAccepted

Risk register best practices

  1. Review quarterly — Risks change. New threats emerge. Controls mature.

  2. Assign owners — Every risk needs one person accountable.

  3. Track treatment progress — A risk register that just lists risks is useless. Track what you're doing about them.

  4. Keep it simple — 15-25 risks is manageable. 200 risks means you'll never look at it.

  5. Include accepted risks — Document why you accepted them. When leadership asks "why didn't we...?" you have the answer.

Risk register tools

ToolCostBest for
Google SheetsFreeQuick start, small teams
NotionFree tierVisual, easy sharing
Jira/LinearFree tiersIntegration with dev workflow
OWASP Threat DragonFreeVisual threat modeling
SimpleRiskFree (Community)Dedicated risk management
LogicGate, ServiceNowPaidEnterprise GRC needs

Recommendation for small companies: Start with a spreadsheet. Move to a dedicated tool only when complexity demands it.

The risk matrix: visual prioritization

A risk matrix makes prioritization visual and easy to communicate to leadership.

LikelihoodImpact 1Impact 2Impact 3Impact 4Impact 5
5 — Almost certain5 Med10 High15 Crit20 Crit25 Crit
4 — Likely4 Low8 Med12 High16 Crit20 Crit
3 — Possible3 Low6 Med9 Med12 High15 Crit
2 — Unlikely2 Low4 Low6 Med8 Med10 High
1 — Rare1 Low2 Low3 Low4 Low5 Med

Color coding for presentations:

  • Green (Low): Monitor, no immediate action
  • Yellow (Medium): Plan mitigation, reasonable timeline
  • Orange (High): Prioritize, address within quarter
  • Red (Critical): Immediate action, escalate to leadership

Using risk data for prioritization

Prioritizing security initiatives

When deciding between projects, compare their risk reduction:

InitiativeCostEffortRisks addressedRisk reduction
MFA rollout$2K/yr2 weeksR-002 (phishing)16 → 8
EDR deployment$10K/yr1 monthR-001 (ransomware)15 → 10
Security training$3KOngoingR-002, R-003Multiple -2
Network segmentation$5K2 monthsR-00115 → 9

MFA offers the best risk reduction per dollar. Start there.

Justifying security budget

Risk data makes budget conversations easier:

Before risk assessment: "We need $15K for security tools." → "Why? We haven't had any problems."

After risk assessment: "Our top risk—phishing leading to account takeover—has a score of 16/25. Industry data shows similar companies face $150K average breach cost. A $15K investment in email security and training reduces this risk to 8/25, roughly halving our expected loss."

Accepting risk deliberately

Sometimes the right answer is "accept the risk." But do it consciously:

Risk Acceptance Template

Risk ID: R-003
Risk description: Source code theft via laptop theft
Current risk score: 9 (Medium)
Current controls: Full disk encryption, remote wipe capability

Recommendation: Accept
Rationale:
- Current controls reduce impact significantly
- Additional controls (e.g., no local code) would severely impact productivity
- Cost of additional mitigation exceeds expected loss

Accepted by: [CTO Name]
Date: [Date]
Review date: [Date + 1 year]

Risk assessment for specific scenarios

New vendor evaluation

Before adopting a new SaaS tool:

Risk factorQuestionsRed flags
Data exposureWhat data will they access?Access to all customer data when they only need email
AuthenticationDo they support SSO/MFA?Password-only authentication
Breach historyHave they been breached?Recent breach, poor response
ComplianceDo they have SOC 2/ISO 27001?No third-party audits
Backup/recoveryWhat's their SLA? Data export?No export capability

New feature/project

Before building something new:

  1. What sensitive data does it handle?
  2. What authentication/authorization does it need?
  3. What third parties are involved?
  4. What's the blast radius if compromised?
  5. What's the MVP security requirement?

Infrastructure change

Before major changes:

  1. What existing controls are affected?
  2. Are new attack vectors introduced?
  3. What's the rollback plan?
  4. Has security reviewed the design?

Common mistakes

  1. Analysis paralysis — Spending months on a perfect assessment instead of taking action. A rough assessment done in a day beats a perfect one that takes a quarter.

  2. Ignoring accepted risks — Writing them down and forgetting. Review quarterly.

  3. Treating all risks equally — The whole point is prioritization. If everything is high priority, nothing is.

  4. Not involving stakeholders — Risk assessment done in isolation misses business context. Involve product, engineering, and leadership.

  5. Static risk register — Risks change. New assets appear. Threats evolve. Review and update regularly.

  6. Over-reliance on frameworks — NIST and ISO are useful references, not gospel. Adapt to your context.

  7. Forgetting about risk acceptance — Sometimes accepting risk is the right call. Not documenting that decision is the mistake.

  8. Impact bias — People focus on high-impact risks even when likelihood is negligible. A once-in-a-century catastrophe may deserve less attention than frequent medium-impact incidents.

Quantifying risk in dollars

Leadership understands money better than risk scores. Convert abstract risks to financial terms.

Simple risk quantification

Annual Loss Expectancy (ALE) = Single Loss Expectancy × Annual Rate of Occurrence

Example: Customer data breach
- Single Loss Expectancy (SLE): $150,000 (response + fines + reputation)
- Annual Rate of Occurrence (ARO): 0.1 (10% chance per year)
- ALE = $150,000 × 0.1 = $15,000/year expected loss

If a $5,000/year control reduces ARO to 0.02:
- New ALE = $150,000 × 0.02 = $3,000/year
- Savings: $15,000 - $3,000 = $12,000/year
- ROI: ($12,000 - $5,000) / $5,000 = 140%

Cost estimation reference

Use these ranges for your calculations (adjust for company size):

Impact typeSmall company estimateNotes
Incident response$10K-50KInternal time + forensics
Legal/regulatory$20K-200KVaries by jurisdiction, data type
Customer notification$1-5 per recordRequired in most jurisdictions
Credit monitoring$10-20 per person/yearOften required after PII breach
Downtime$1K-50K per hourDepends on business model
Reputation5-20% revenue impactHard to quantify, real nonetheless

Presenting risk in business terms

Technical framingBusiness framing
"SQL injection risk is high""An attacker could steal our entire customer database"
"Risk score 16 out of 25""We estimate $75K expected annual loss from this risk"
"We need a WAF""For $10K/year, we can reduce breach probability by 60%"
"CVSS 9.8 vulnerability""This vulnerability allows attackers to take over our servers within hours of being scanned"

STRIDE: threat modeling for developers

For development teams, STRIDE provides a systematic way to identify threats. Use it when designing new features or reviewing architecture.

STRIDE categories

ThreatWhat it meansExampleMitigation approach
SpoofingPretending to be someone elseUsing stolen credentialsAuthentication, MFA
TamperingModifying data or codeSQL injection, changing pricesInput validation, integrity checks
RepudiationDenying actions takenUser claims they didn't make a transactionAudit logs, non-repudiation
Information disclosureExposing sensitive dataDatabase dump, verbose errorsEncryption, access control, error handling
Denial of serviceMaking system unavailableDDoS, resource exhaustionRate limiting, redundancy
Elevation of privilegeGaining unauthorized accessAdmin account takeover, privilege escalationLeast privilege, authorization checks

Quick STRIDE analysis

For any new feature, ask:

1. SPOOFING: How do we verify user identity?
- Can attackers impersonate legitimate users?
- Is session management secure?

2. TAMPERING: Can data be modified in transit or storage?
- Is input validated?
- Are integrity checks in place?

3. REPUDIATION: Can we prove what happened?
- Are actions logged?
- Are logs tamper-proof?

4. INFORMATION DISCLOSURE: What data could leak?
- Are errors too verbose?
- Is sensitive data encrypted?

5. DENIAL OF SERVICE: Can this be abused?
- Are there rate limits?
- What happens under load?

6. ELEVATION OF PRIVILEGE: Can users do more than allowed?
- Is authorization checked at every level?
- Are admin functions properly protected?

Resources for threat modeling

Real-world incidents: when risk wasn't managed

Case 1: The forgotten S3 bucket

A startup had "public S3 buckets" on their risk register as "Medium" risk. They planned to fix it "next quarter" for three quarters in a row. A security researcher found the bucket containing 2M customer records and reported it to journalists before notifying the company.

Cost: $400K in incident response, legal fees, and customer churn. The $2K and 2 days to fix it had seemed "too expensive" for too long.

Case 2: The accepted risk that bit back

A SaaS company accepted the risk of not having MFA on their admin console because "it's behind VPN." An employee's laptop was compromised via phishing. The attacker accessed the VPN, then the admin console. No MFA meant full access to customer data.

The risk register said: "Accepted - VPN provides sufficient protection." The risk review hadn't questioned whether VPN alone was enough.

Case 3: Risk assessment that saved the deal

A fintech startup was in M&A discussions. The acquirer's due diligence included security review. Because the startup had:

  • Documented risk register
  • Clear risk ownership
  • Regular quarterly reviews
  • Formal acceptance documentation for known gaps

The acquirer's security team spent 2 days instead of 2 weeks on assessment. The startup demonstrated security maturity beyond their size, contributing to a higher valuation.

Case 4: Priorities without risk assessment

A company invested $50K in advanced threat detection while having:

  • 30% of systems unpatched
  • No MFA on critical systems
  • Shared admin passwords

Their first "detected threat" was an attacker already inside, using those shared credentials. The expensive detection tool worked perfectly—it detected the breach that basic hygiene would have prevented.

Risk communication: making it real

The scenario technique

Instead of abstract risk scores, tell stories:

Abstract: "Risk R-002: Phishing leading to account compromise. Likelihood 4, Impact 4, Score 16."

Scenario: "It's Thursday afternoon. A developer clicks a link in an email that looks like it's from GitHub. They enter their credentials. By Friday morning, the attacker has cloned all our private repositories, including the one with hardcoded API keys. They've accessed our AWS account and downloaded customer data. Our first indication is a tweet from a security researcher saying our data is for sale."

Scenarios make risk visceral. Leadership remembers scenarios.

Risk appetite statements: examples

Get leadership to approve explicit risk appetite. Examples:

Conservative (regulated industry):

"We will not accept any risk rated 10 or above. All medium risks (5-9) must have documented mitigation plans with 90-day timelines. No production system may have known critical or high vulnerabilities for more than 7 days."

Balanced (typical tech company):

"Risks rated 15+ require C-level approval for acceptance. Risks rated 10-14 require VP approval. All high and critical risks must have mitigation plans. We accept that some medium risks will exist; they require quarterly review."

Aggressive (early-stage startup):

"We prioritize speed to market. Risks rated 20+ require founder approval. We consciously accept higher risk in exchange for velocity, but document our decisions for future reference. No customer data exposure risks are acceptable regardless of score."

Heat maps for presentations

Visual risk presentations work better than tables:

Company Risk Heat Map — Q1 2025

LikelihoodImpact: LowImpact: MedImpact: High
HighEmail phishingCustomer DB
MedWebsiteLaptop theftSource code
LowDDoS

Focus areas: Customer DB protection, email security. Acceptable risks: website defacement (low likelihood/impact).

Expert tips

The "3-in-30" review

Can't do a full assessment? Do "3-in-30":

  • Identify your top 3 assets
  • For each, name the top 3 threats
  • Score them in 30 minutes

This gives you 9 risk items covering your most critical areas. Better than nothing.

Use threat intelligence to calibrate likelihood

Don't guess likelihood in a vacuum:

The "newspaper test" for impact

When estimating impact, ask: "Would this make the news?" If yes, it's probably a 4 or 5.

Risk appetite statement

Get leadership to define risk appetite: "We will not accept risks above [score X] unless explicitly approved by [role]." This gives you clear escalation criteria.

Example:

"Risks scoring 15 or above require CEO approval for acceptance. Risks scoring 10-14 require CTO approval. Risks below 10 can be accepted by department heads."

Connect risks to OKRs

Map security risks to company objectives:

  • "Our Q1 goal is $2M ARR" → "A breach would delay sales cycles by ~2 months"
  • "We're launching in the EU" → "GDPR violation fines could be 4% of revenue"

This makes security relevant to business priorities.

Workshop: conduct your risk assessment

Part 1: Asset inventory (1 hour)

  1. List your company's critical assets
  2. Categorize: Data, Systems, Processes, People, Reputation
  3. Rank by importance (if you can only protect 5, which 5?)

Deliverable: Asset inventory with top 10 critical assets identified

Part 2: Threat identification (1 hour)

  1. For each top asset, identify 3-5 relevant threats
  2. Be specific: "Ransomware via phishing email" not just "cyberattack"
  3. Use threat intelligence sources to validate

Deliverable: Threat list mapped to assets

Part 3: Risk scoring (1 hour)

  1. Score each threat-asset pair for likelihood (1-5)
  2. Score each for impact (1-5)
  3. Calculate risk scores
  4. Rank from highest to lowest

Deliverable: Ranked risk list with scores

Part 4: Risk register (1 hour)

  1. Create a risk register using the template provided
  2. Document current controls for each risk
  3. Propose treatment (mitigate, accept, transfer, avoid)
  4. Assign owners and target dates for high/critical risks

Deliverable: Initial risk register with top 15 risks

Part 5: Risk mitigation plan (1 hour)

  1. For your top 5 risks, define specific mitigation actions
  2. Estimate cost and effort for each
  3. Propose timeline and priorities
  4. Prepare brief for leadership

Deliverable: Risk mitigation plan with prioritized actions

How to explain this to leadership

The pitch:

"I want to formalize how we make security decisions. Right now, we react to whatever feels urgent. A risk assessment will give us a clear picture of our actual risks—what's likely to happen and how bad it would be. Then we can invest in the things that matter most, not just the things that are loudest."

What to present:

  1. Top 5 risks with plain-English descriptions
  2. Current controls and gaps
  3. Proposed investments with cost and risk reduction
  4. What you recommend accepting (and why it's okay)

The ask:

"I need 4 hours to complete the initial assessment, and 30 minutes of your time to review the results. After that, quarterly 15-minute reviews to keep it current."

Expected outcome:

"You'll have visibility into our actual security posture and the data to make informed decisions about where to invest."

Conclusion

You can't eliminate all risk. The goal is to make deliberate decisions about which risks to accept, which to reduce, and which to transfer. A risk register makes those decisions explicit instead of implicit.

Start with a spreadsheet and four columns. You can add process later.

What's next

Next: compliance and regulatory requirements — understanding what you're legally required to do and how to turn that into a competitive advantage.