ABSTRACT

Engineering risk assessment approaches look back on a longtime success story. This development has not been repeated in Information Technology (IT). The paper outlines the diverging development of (risk) analysis as driven by operators of sites and of IT infrastructures. The limitation of IT approaches is exemplified by the IT trend of Bring Your Own Device at enterprises. There, Chief Information Officers (CIO) are key persons when deciding about usage and acceptance of any evaluation procedures. IT compliance checks and risk assessment approaches are discussed. In order to overcome their emerging weaknesses in the field, a two stage procedure in IT risk assessment is suggested: It starts with IT compliance checks to ensure basic protection of IT system operation. Second, a FMEA-like approach is adapted to cover non-standard processes further structured by engineering safety principles as Defence-in-Depth. The pros and cons of the procedure are discussed.