As a Chief Information Security Officer (CISO), your role has evolved. You are no longer just the guardian of the organization's data and systems; you are a strategic advisor who must translate the complex world of cybersecurity into the language of business risk and opportunity. One of the most critical conversations you will have with your Board of Directors is about risk appetite and risk tolerance.
This guide is designed to equip you with the knowledge and a practical framework to lead this crucial discussion. A well-defined risk appetite is the cornerstone of effective Enterprise Risk Management (ERM) and good corporate governance. It doesn't stifle growth—it enables it. It provides the guardrails for innovation, ensuring that the organization takes calculated, strategic risks that are in line with its objectives. By guiding your board through this process, you will solidify your position as a key business partner and help steer the organization toward a more resilient and prosperous future.
To support this process, we have developed a Risk Appetite and Tolerance Register Template. This template is designed to help you guide the Board of Directors and record the Risk Appetites and Tolerances discussed in your workshop. It can serve as an operational spreadsheet, as it includes columns for tracking metrics and dates for recurring measurement activities. The content within the template serves as examples only; you should delete the pre-filled content and populate it with your company's specific information.
To help you facilitate the board workshop, we have created a Presentation Template. This template translates the steps, questions, and frameworks outlined in this guide into a clear, professional slide deck. It provides a ready-made structure to lead the board from the initial business case through the collaborative workshop and into defining actionable next steps.
This companion document provides a slide-by-slide example script for a CISO to lead a board workshop on defining the organization's risk appetite and tolerance.
Before you can lead a discussion, you must have a firm grasp of the core concepts. While often used interchangeably, risk appetite and risk tolerance are distinct and serve different purposes in an effective ERM program.
Enterprise Risk Management (ERM): A holistic, top-down approach to managing risk across an entire organization.
Risk: The effect of uncertainty on objectives. This uncertainty arises from the nature and scope of an organization's activities and can present as both a potential for gain (an opportunity) and a potential for loss (a threat). Reference: ISO 3100
Risk Appetite: The amount of risk an organization is willing to accept in pursuit of strategic objectives. This is a high-level, strategic statement that sets the tone for the organization's risk culture. It answers the strategic question, "What business are we in, and what risks are we willing to take to succeed?"
Risk Tolerance: The acceptable level of variation from the organization's risk appetite. Tolerance is tactical and operational. It sets the specific, measurable boundaries for risk-taking. It answers the tactical question, "How much variance from our appetite can we live with?"
Risk Capacity: The maximum amount of risk an organization can absorb without failing.
Risk Profile: A view of the organization's overall risk exposure at a specific point in time.
Most people use Risk Appetite and Risk Tolerance in everyday life without even realizing it. Here are a few examples to help illustrate these concepts.
Objective
Drive from New York to Los Angeles.
Risk Appetite
"We are willing to accept some risks to get there quickly and efficiently, but we have a low appetite for anything that would compromise the safety of the vehicle or its passengers."
Risk Tolerance
"We will not exceed the speed limit by more than 10 mph."
"The fuel tank will not go below a quarter full."
"We will not drive more than 10 hours in a single day."
Objective:
Achieve a $5 million retirement fund by age 65.
Risk Appetite:
"We have a moderate appetite for pursuing growth through equity markets to outperform inflation and achieve our target. However, we have a low appetite for catastrophic principal loss, especially as we get closer to our goal."
Risk Tolerance:
"No more than 70% of the portfolio will be allocated to equities."
"No single stock will represent more than 5% of the total portfolio value."
"If the total portfolio value experiences a drawdown of more than 15% in any quarter, we will immediately re-evaluate our asset allocation."
Objective:
Manage high blood pressure to ensure long-term health and prevent serious complications.
Risk Appetite:
"I have a very low appetite for risks that could lead to a major cardiovascular event like a heart attack or stroke. However, I have a moderate appetite for occasional lifestyle flexibility to maintain a good quality of life."
Risk Tolerance:
"My systolic blood pressure reading must not exceed 140 mmHg more than twice in any given week."
"I will tolerate missing a scheduled daily medication no more than once per month."
"My daily sodium intake will not exceed 2,300 milligrams, with an allowance for up to 3,000 milligrams on special occasions, not to exceed twice a month."
Objective:
Run a marathon in under four hours.
Risk Appetite:
"I have a high appetite for pushing my physical limits to achieve a personal best, but a very low appetite for any risk that could lead to a serious or long-term injury."
Risk Tolerance:
"I will not increase my weekly running mileage by more than 10% to prevent overtraining."
"I will tolerate minor muscle soreness, but I have zero tolerance for sharp or persistent joint pain and will stop training immediately if it occurs."
"During long runs, my heart rate will not exceed my target Zone 3 for more than 20 continuous minutes."
Your board will want to know why this is a valuable use of their time. Be prepared to articulate the compelling business reasons for establishing a formal risk appetite framework.
Strategic Alignment
A clear risk appetite ensures that the entire organization is aligned on the level of risk that is acceptable in the pursuit of strategic goals. It prevents individual departments from taking on risks that are out of step with the company's overall strategy.
Optimizes Risk/Reward for Value Creation
ERM is not just about preventing loss; it's about creating value. A defined risk appetite enables the board to make conscious decisions about which risks are worth taking to achieve a higher return.
Provides a Portfolio View of Risk
It allows the board to see an aggregated, entity-level view of risks, understanding how risks in different parts of the business might interact or correlate.
Informed and Empowered Decision-Making
When employees at all levels understand the organization's risk appetite, they are empowered to make timely, risk-aware decisions without constant escalation.
Enables Dynamic Business Steering
A defined appetite and tolerance framework creates clear signals for the board. The board should be informed when tolerance limits are exceeded (indicating too much risk is being taken and potentially jeopardizing financial capacity) or not met (indicating too little risk may be taken, causing the company to miss important opportunities). This information allows the board to understand when strategic adjustments are necessary.
Regulatory and Governance Excellence
Regulators and shareholders increasingly expect boards to demonstrate robust oversight of risk management. A formal risk appetite statement is a cornerstone of good corporate governance and demonstrates compliance with standards of safety and soundness.
Enhanced Communication
It creates a common language and framework for discussing risk across the organization, breaking down silos between departments like IT, finance, and operations.
Resource Optimization
Risk appetite guides resource allocation and improves capital deployment by providing a clearer picture of the risk/reward trade-offs.
Too Much Risk = Exceeding tolerance and financial capacities.
Too Little Risk = The company may be missing important opportunities.
Ultimately, risk appetite is a matter of judgment based on each company’s specific circumstances and objectives. There is no one-size-fits-all solution, which is why a thoughtful, board-led discussion is so critical.
While the CISO is a business leader focused on driving value, they are also responsible for building and maintaining an Information Security Management Program that operates within the company's defined boundaries. The board-approved Risk Appetite and Tolerance statements are therefore a foundational and empowering tool for the CISO.
It Provides the Mandate for the Security Program: The Cyber Risk Appetite provides the foundation for the entire Information Security Management Program. It is the anchor to which the CISO builds and justifies the risk management and information security program. It is the board’s explicit direction on what to protect and to what degree.
It Justifies Security Investments: When the CISO requests a budget for a new technology or additional personnel, the request is no longer a "technical need" but a "business necessity." The justification becomes: "This investment is required to keep our cybersecurity risk profile within the tolerance levels you, the board, have approved."
It Enables Prioritization and Focus: The security team cannot protect everything equally. The risk appetite framework provides a clear, board-mandated guide for prioritizing resources, budget, and attention on the risks that matter most to the organization's strategic objectives.
It Creates a Defensible Position: A clearly defined risk appetite and tolerance framework provides a defensible rationale for the security decisions made. It demonstrates that the security program is operating under a structured, diligent, and board-approved methodology.
Cyber Risk Appetite is the anchor to which the ISMS program is built upon
The Board of Directors operates at the 30,000-foot level. They are focused on strategy, financial performance, market position, and shareholder value. To be effective, you must frame the discussion in their terms.
Avoid technical jargon.
Do not talk about: "vulnerabilities" and "threat vectors,"
Do talk about: "the potential for financial loss," "reputational damage," "disruption to operations," or "loss of customer trust."
To translate technical risks into financial terms, a CISO can leverage the structured methodology of FAIR. Factor Analysis of Information Risk (FAIR) is a popular standard for quantifying cyber and operational risk in financial terms.
What it is: FAIR provides a model for understanding, analyzing and quantifying cyber risk in financial terms. It provides measurement scales for risk factors, and modeling constructs for analyzing complex risk scenarios.
Why it's valuable: It moves the conversation beyond qualitative "high, medium, low" ratings. It helps translate the esoteric lexicon of IT into financial terms for informed risk decisions. For example:
“What are their organization’s top cyber risks and how much exposure do they represent?”
“Are we investing enough (or too much) in mitigating security controls?"
How to use it: By applying the FAIR model, a CISO can present data-driven scenarios to the board that quantify the potential financial impact of cyber risks.
Frame the need for a defined risk appetite in the context of achieving the company's strategic goals. For example:
"To achieve our objective of expanding into the European market, we need to be clear about our appetite for regulatory compliance risk."
"As we pursue our innovation goals with new product launches, we need to define our appetite for technology and operational risks."
Come prepared with data that illustrates the potential impact of cyber risks. This could include industry benchmarks such as the CYE Cybersecurity Maturity Report, statistics on the cost of a data breach in your sector, such as the IBM Cost of a Data Breach Report, or findings from your own risk assessments, such as a CIS CSC Assessment.
Facilitating the definition of risk appetite is a process. This section outlines the practical steps for guiding your board through this crucial conversation.
Build Alliances
This is not a conversation for the CISO to have in isolation. Partner with the Chief Financial Officer (CFO), Chief Risk Officer (CRO), and other key executives. A unified front demonstrates that this is a business-wide imperative.
Educate and Socialize the Concept
Before the formal board meeting, have as many one-on-one conversations with board members to introduce the concepts of risk appetite and tolerance and get their initial thoughts.
Schedule a Dedicated Session
This topic deserves its own time on the agenda, not just a few minutes at the end of a long meeting. A workshop format is often most effective.
Start with 'Why'
Begin by presenting the business case (See: Why Define Risk Appetite?).
Use Guiding Questions
Initiate the conversation with strategic questions designed to flow from high-level strategy down to specific risk attitudes. The following sequence synthesizes best practices from the IRM, COSO, and NIST to create a logical path for the board's first major discussion on this topic.
Focus on Categories
Structure the workshop around key risk categories relevant to your business (e.g., Strategic, Operational, Financial, Compliance, Reputational, Cybersecurity).
Use a Qualitative Scale
To start, use a simple qualitative scale (e.g., Low, Moderate, High) to gauge the board's appetite for each category.
Draft a High-Level Statement
Work collaboratively to draft a concise, high-level Risk Appetite Statement. This statement should be memorable and clearly articulate the organization's overall stance on risk.
Present a Path Forward
The Risk Appetite Statement is the "what." You must also present the "how." Explain that management will take the board's strategic direction and translate it into specific, measurable risk tolerances for business units.
Outline the Governance Process
Describe how management will monitor adherence to risk tolerances and report back to the board on the organization's risk profile.
This framework is designed to guide the board through a structured dialogue. The CISO should facilitate this as a conversation, not an interrogation, using the questions to build a shared understanding and consensus.
Templates
To support your efforts, we've created companion templates. (See: Templates)
The goal of this phase is to connect the abstract concept of "risk" directly to the company's mission and strategic plan.
"Let's start with our core purpose. What are the key strategic objectives we are committed to achieving over the next 3-5 years?" (This ensures everyone is aligned on the goals that risk-taking is meant to support).
"To achieve these goals, what are the most critical business activities we must succeed at?" (e.g., product innovation, market expansion, operational efficiency).
"What are the major uncertainties or obstacles—both internal and external—that could prevent us from achieving these objectives?" (This introduces the concept of risk as a direct impediment to strategy).
The goal here is to surface the board's existing, unstated beliefs and assumptions about risk, which defines the current culture.
"Thinking about our past decisions, where have we historically been willing to be bold and take significant risks?" (This identifies areas of high implicit appetite).
"Conversely, where have we always been highly cautious or risk-averse?" (This identifies areas of low implicit appetite).
"What does our current incentive and compensation structure reward? Does it encourage calculated risk-taking for long-term value, or does it prioritize short-term gains, potentially at the expense of risk management?"
"Do we feel that we currently have the right capabilities—people, processes, and data—to effectively manage the risks that come with our strategy?"
This is the core of the workshop. The goal is to move from past behavior to a future, intentional stance on risk. Use the Risk Register Template as a visual aid to capture these decisions in real-time.
"Now, let's be deliberate. For each major risk category—Strategic, Operational, Financial, Cybersecurity—what is the level of risk we are willing to accept to achieve our objectives? Let's use a simple scale: Low, Moderate, or High." (Facilitate this category by category, seeking consensus).
"For the risks we are willing to take (our 'Moderate' or 'High' appetite areas), what are the absolute boundaries we should not cross? What would constitute an unacceptable outcome?" (This begins to define tolerance).
"For the risks we are not willing to take (our 'Low' appetite areas), what does 'failure' look like? What level of deviation is intolerable?" (This defines tolerance for critical areas).
"Based on our discussion, how can we summarize our overall risk philosophy in a single, memorable Risk Appetite Statement?" (Collaboratively draft the high-level statement).
The goal is to transition from the 'what' (the statement) to the 'how' (the governance process), reinforcing the board's oversight role.
"How will the board monitor that the company is operating within this newly defined appetite?"
"What key metrics (Key Risk Indicators) must management provide to the board quarterly to give us the necessary oversight?"
"Are we comfortable with the proposed RACI model, where the board is ultimately accountable for this framework?"
This structured approach ensures the conversation is efficient, strategic, and results in actionable outputs that can be directly populated into the Risk Appetite and Tolerance Register.
To make the concepts tangible, use examples to illustrate what a good risk appetite statement looks like and how it's applied. The following are examples across key business risk categories.
Strategic risks are those that affect the organization's ability to achieve its long-term goals and objectives.
Risk Appetite Statement
"To achieve our global growth objectives, we have a high appetite for risks associated with entering new geographic markets, provided that these markets align with our core business strategy and brand values."
Risk Tolerance Statements
"Initial investment in a new market must not exceed $15 million."
"Customer Acquisition Cost (CAC) in a new market will be tolerated at a level up to 50% higher than our established domestic CAC for the initial 24 months."
Risk Appetite Statement
"We have a moderate appetite for pursuing strategic acquisitions that accelerate our technology roadmap and expand our customer base. We have a low appetite for acquisitions that would result in significant brand dilution or complex cultural integration challenges."
Risk Tolerance Statements
"No single acquisition shall exceed 20% of our current market capitalization."
"Target companies must have a customer satisfaction score of 85% or higher."
"We will tolerate a maximum of a 10% voluntary employee turnover rate in the acquired company within the first 12 months post-acquisition."
Risk Appetite Statement
"We have a high appetite for innovation risk in our R&D division to maintain our position as a market leader. However, we have a low appetite for risks that could compromise product safety or quality."
Risk Tolerance Statements
"A maximum of 15% of the annual R&D budget can be allocated to 'moonshot' projects with a high probability of failure."
"Time-to-market for new products may be extended by up to 6 months to address any identified critical quality or security issues."
"All new products must pass 100% of safety and quality control checkpoints before launch, with zero tolerance for failure in these areas."
Cybersecurity risks relate to the loss of confidentiality, integrity, and availability of information and systems.
Risk Appetite Statement
"We have a near-zero appetite for risks that could lead to the unauthorized disclosure of our customers' personally identifiable information (PII), as this is fundamental to the trust our customers place in us."
Risk Tolerance Statements
"Critical vulnerabilities in systems containing PII must be patched within 7 days of discovery."
"All customer PII must be encrypted at rest and in transit."
"We will tolerate zero instances of unencrypted PII being stored in non-production environments."
Risk Appetite Statement
"We have a moderate appetite for leveraging third-party vendors to enhance our service offerings, but a low appetite for risks stemming from vendors who handle our critical data or have access to our network."
Risk Tolerance Statements
"All vendors handling critical data must be ISO 27001 certified or provide an equivalent third-party audit report (SOC 2 Type II)."
"Vendors must notify us of any security incident affecting our data within 24 hours of their discovery."
"No more than 20% of our critical business applications can be dependent on a single third-party vendor."
Risk Appetite Statement
"We have a low appetite for unplanned downtime of our customer-facing production systems, as availability is a key component of our brand promise."
Risk Tolerance Statements
"The Recovery Time Objective (RTO) for Tier 1 applications is 1 hour."
"The Recovery Point Objective (RPO) for Tier 1 applications is 15 minutes."
"Total unplanned downtime for our primary e-commerce platform must not exceed 4 hours per year."
Operational risks are associated with failures in internal processes, people, and systems.
Risk Appetite Statement
"We have a moderate appetite for cost savings achieved through single-sourcing strategies but a low appetite for disruptions in our critical supply chain that would halt production for an extended period."
Risk Tolerance Statements
"For any Tier 1 component, we must not have less than 30 days of inventory on hand."
"No more than 60% of our critical components can be sourced from a single geographic region."
"An alternate, pre-qualified supplier must be identifiable and capable of starting delivery within 14 days for all critical components."
Risk Appetite Statement
"We have zero appetite for risks that could lead to serious injury or fatality in the workplace. The safety of our employees is our highest priority, overriding all other operational goals."
Risk Tolerance Statements
"There is zero tolerance for willful safety violations."
"All 'near-miss' incidents must be reported and investigated within 24 hours."
"Safety training compliance for all manufacturing staff must be maintained at 100%."
Risk Appetite Statement
"We have a low appetite for product defects that reach the customer, as quality is a key differentiator for our brand."
Risk Tolerance Statements
"The final product defect rate must not exceed 0.1%."
"Customer complaints related to product quality must not exceed 50 per million units sold."
"Any quality control failure that affects more than 5% of a production batch requires an immediate halt to production and a full investigation."
Financial risks are those related to the management of an organization's capital and financial exposures.
Risk Appetite Statement
"We have a low appetite for credit risk and will maintain a high-quality loan portfolio to ensure the long-term stability of the institution."
Risk Tolerance Statements
"No more than 2% of the total loan portfolio can be in non-performing loans."
"The portfolio's weighted average credit score must not fall below 720."
"No single borrower can represent more than 5% of the total loan portfolio."
Risk Appetite Statement
"We will maintain a strong liquidity position to meet our obligations, even in stressed market conditions. We have a very low appetite for liquidity shortfalls."
Risk Tolerance Statements
"Cash and cash equivalents must not fall below 15% of total assets."
"The ratio of liquid assets to projected 30-day outflows must remain above 1.25."
"No more than 40% of our funding can come from short-term sources."
Risk Appetite Statement
"We have a moderate appetite for market risk in our investment portfolio to achieve returns that exceed our benchmark. We have a low appetite for catastrophic losses."
Risk Tolerance Statements
"The portfolio's annual Value at Risk (VaR) at a 95% confidence level must not exceed $50 million."
"The maximum portfolio drawdown in any given quarter must not exceed 15%."
"Exposure to any single asset class (e.g., equities, bonds) must not exceed 60% of the total portfolio value."
A risk appetite framework is not merely a document; it is a central component of corporate governance. Active engagement and clear role definition between the board and management are essential for its success. This section outlines the structure for effective oversight.
The Board's Role: Accountability and Strategic Oversight
The Board is ultimately accountable for the organization's risk appetite and tolerances. They are responsible for understanding the risks inherent in the business, driving the risk appetite conversation, and formally owning and approving the final risk appetite statement. This is a fundamental fiduciary duty. The board should have regular discussions about the company’s risk appetite in relation to its strategic objectives. This oversight includes monitoring the implementation of the risk appetite process and ensuring management has the procedures in place to operate within that appetite.
Management's Role: Responsibility for Implementation
Senior management is responsible for developing and implementing the risk management policies and procedures that bring the board-approved risk appetite to life. This includes the hands-on work of creating specific risk tolerances, monitoring the organization's risk profile, and reporting back to the board.
To further clarify these distinct roles, a RACI (Responsible, Accountable, Consulted, Informed) model provides a simple and effective guide for the development and approval of the risk appetite framework.
RACI for Risk Appetite
For the board to be effectively informed, a structured reporting and meeting cadence is essential. This ensures a continuous, disciplined dialogue about risk.
Quarterly Risk Review
The board or its designated risk committee should meet with senior management at least quarterly to review the organization's risk profile against the approved risk appetite. This aligns with financial reporting cycles and provides a timely forum to discuss any risk tolerance breaches, emerging threats, and the overall effectiveness of the risk management program.
As-Needed Updates
In addition to scheduled meetings, the governance framework must include a process for immediate communication to the board when a significant risk event occurs or a critical risk tolerance is breached. Triggers for an ad-hoc meeting might include a major cybersecurity incident, a sudden change in market conditions, or a significant supply chain disruption.
Annual Deep Dive and Re-evaluation
At least annually, the board should conduct a comprehensive review of the entire risk appetite framework. This is an opportunity to re-evaluate the appetite statement and tolerances to ensure they are still aligned with the company's long-term strategic objectives and the evolving business environment.
To actively fulfill their oversight responsibilities, boards can use the following strategic questions to probe and guide management's approach to the risk appetite framework:
Does the company have a continuous risk assessment process in place that identifies, prioritizes, and analyzes the key risks? Are the key risks aligned with the company’s strategic goals and objectives?
Does the company have an ongoing process to update its risk profile to respond to major changes in strategic direction, business activities, and the business environment?
Does the company have the capabilities required to assess and manage the risks it is taking on today and the risks that it will be taking on as a result of its strategic imperatives?
Does the company have a structured process in place to continuously evaluate and adjust its risk appetite and tolerances, both positive and negative, as changes in strategic goals and objectives occur?
Are changes in the corporate risk appetite and tolerances communicated effectively to internal and external stakeholders and integrated into the company’s risk-based strategic initiatives?
Clear Communication and Reporting
There must be a formal, transparent process for management to report on the organization's risk profile relative to its stated appetite. This should be a recurring agenda item at board meetings, allowing for robust discussion and strategic adjustments.
Proportionality and Tailoring
The risk appetite framework, including its internal controls and information systems, must be appropriate to the nature, size, complexity, and risk profile of the organization. A one-size-fits-all approach is ineffective and can hinder the business. The board must ensure the framework is tailored to the specific context of the company.
A documented risk appetite statement is the starting point, not the final destination. The ultimate goal is to embed risk-aware thinking into the very culture of the organization, making it a natural part of the day-to-day decision-making process at all levels.
Cascading the Message
Senior leadership must consistently communicate the risk appetite and its importance through town halls, newsletters, and management meetings.
Aligning Incentives
The organization's performance management and compensation structures must reward intelligent risk-taking that aligns with the stated risk appetite. If incentives reward growth at all costs, the risk appetite statement will be ignored.
Training and Education
Provide practical training to managers and employees on how to apply the risk appetite framework to their specific roles and decisions.
Integration with Processes
Embed risk appetite considerations into key business processes, such as strategic planning, budgeting, product development, and M&A evaluations.
Guiding the Board of Directors in defining risk appetite and tolerance is one of the most strategic functions a CISO can perform. It elevates the conversation from technical controls to business enablement. It demonstrates your understanding of the business and your commitment to its success.
This is not a one-time exercise. Risk appetite should be reviewed and recalibrated annually, or whenever there is a significant change in the business environment or strategy. By leading this ongoing dialogue, you will build trust with the board and become an indispensable advisor, helping the organization to navigate the complexities of the digital age with confidence and resilience.
Download version: Google Doc