Why Most Risk Analyses Fail

Risk analyses do not have to be painful compliance exercises that gather dust on the shelf. Done correctly, they are your roadmap to protecting what truly matters—before something goes wrong. We show how to conduct risk analyses that are actually utilized, save money, and keep you out of crisis mode.

Abstract network structure made of glowing, connected points on a dark background.

Here is something that we have noticed over the years...

Most organizations treat risk assessments like dentist appointments. Everyone knows they should be done. They reluctantly schedule them. And then they forget everything the moment they walk out the door.

But here's the thing. Risk assessments are not meant to be checkbox exercises to satisfy an auditor for fifteen minutes. They are meant to protect your organization from disasters.

The real problem with our understanding of risk

Let's be honest.

When was the last time someone in your organization actually changed their behavior because of a risk assessment? When did a risk assessment really prevent something bad, instead of just documenting what everyone already knew was broken?

We've worked with dozens of organizations, and the pattern is always the same. The risk assessment becomes this massive document that:

  • Takes months to complete

  • Consumes a fortune in consultancy fees

  • Uses language that no one outside the security team understands

  • Gets filed away immediately

  • Is outdated before it is even finished

And then—surprise, surprise—when the security breach happens or the system fails, everyone acts shocked. "We didn't see that coming!" Except... you did. It was right there in the analysis that nobody read.

What actually makes a risk assessment useful

We will go through how to conduct risk assessments that people actually use. Not the kind that wins awards for thoroughness. The kind that prevents disasters and enables smart allocation of limited resources.

Because that's what it's really about, right? You don't have unlimited money, time, or people. You need to know where to focus your efforts so you can protect what matters most.

The four-step process that actually works

Think of risk assessment like diagnosing a health problem. You don't just randomly treat symptoms. You prepare properly, conduct a thorough investigation, clearly communicate what you've found, and then continue to monitor to see if things change.

Step 1: Prepare (Or: Stop and Think before you start)

This is where most organizations go wrong right from the start.

They jump straight to "What are our risks?" without first asking "What are we actually trying to protect?" and "What decisions is this analysis supposed to support?"

You need to clarify this before you do anything else:

Purpose: Why are you doing this? Not "because compliance requires it". The real reason. Are you trying to decide whether to use cloud services? Figuring out where to spend next year's security budget? Supporting an authorization decision for a critical system?

The purpose shapes everything else. A risk assessment supporting a merger looks entirely different from one supporting day-to-day operations.

Scope: What are you actually assessing? Your entire organization? A business process? A single application?

We've seen too many assessments that try to boil the ocean. They try to assess everything, which means they effectively assess nothing. Be specific. Be ruthless with boundaries.

Assumptions: What are you assuming? This is more important than you think. Are you assuming attackers have state-level capabilities? Or are you assuming basic opportunistic hackers? Your assumptions about threats, your risk tolerance, and your constraints must be explicit and documented.

Because here's what happens if you don't... different people interpret the assessment results differently, decisions get made based on misunderstandings, and six months later everyone argues about what the assessment actually meant.

Step 2: Conduct (Or: The actual investigation)

This is where the rubber meets the road. And where things can quickly become overwhelming if you're not careful.

The process boils down to understanding six key things:

Who wants to harm you (or what could go wrong)?

Threats come in different flavors. There’s the adversarial stuff—hackers, insiders, competitors, nation states. And there’s the non-adversarial stuff—human error, equipment failure, natural disasters.

You need to be realistic about both. Not paranoid. Not dismissive. Realistic.

If you're a small regional business, you probably don't need to worry about advanced persistent threats from foreign intelligence agencies. But you absolutely need to worry about ransomware and the fact that Thomas in accounting clicks on everything.

What exactly could they do?

This is where you identify threat events. Not vague "cyberattack" talk. Specific scenarios like:

  • Phishing email captures employee credentials

  • Ransomware encrypts critical databases

  • Insider steals customer data

  • Power outage cripples data center

The more specific you are, the better you can assess and respond to the risks.

Where are you vulnerable?

Vulnerabilities are not just technical. Sure, unpatched software is a vulnerability. But so is the fact that only one person knows how to maintain your critical system, and that person is planning to retire next year.

These are also overly complex architectures. Inadequate backup procedures. Lack of security awareness training. Reliance on a single supplier. Poor documentation.

You're looking for the gaps between where you are and where you need to be.

How likely is it that something bad will happen?

This is where it gets tricky. And where many organizations either oversimplify or overcomplicate.

You need to consider two things: How likely is it that the threat will be initiated? And if initiated, how likely is it that it will succeed given your current defenses?

An elaborate attack might be unlikely to be initiated against you... but if it were, it could be very likely to succeed because you have poor detection capabilities. That's different from a frequent attack (likely to be initiated) that your defenses handle well (unlikely to be successful).

What is the damage if it happens?

Impacts are not just dollars, although that counts. It's about:

  • Can you still perform your core mission/business?

  • How long are you disrupted?

  • What's the damage to your reputation?

  • Are there legal or regulatory consequences?

  • Could people get hurt?

And here's something many organizations overlook... impacts compound. Several moderate-impact events occurring close together can be more devastating than a single high-impact event you can focus on.

What is the overall risk?

This is where you combine likelihood and impact to determine your actual risk level. And then—critically—you prioritize.

Not everything can have high priority. Not everything should. Some risks you'll mitigate. Some you'll accept. Some you'll transfer (hello, insurance). And some you might decide to avoid altogether by changing how you operate.

Step 3: Communicate (Or: Making sure anyone actually cares)

This might be the most important step. And it's the one most organizations bungle entirely.

You've done all this work. You have insights. You understand the risks. Now you need to communicate in ways different audiences can understand and act on.

Your board doesn't need to see the detailed technical appendices. They need to understand: What are our top risks? What are we doing about them? What will it cost? What's the alternative?

Your system owners need specific, actionable information about their systems. Not a 200-page report. A clear breakdown of vulnerabilities, impacts, and recommended actions.

Your security team needs the details, the trends, the connections between risks.

Different audiences, different needs. One analysis, multiple views.

And please... skip the jargon. If you can't explain the risk to an intelligent executive with no security background, you haven't really understood it yourself.

Step 4: Maintain (Or: Why this is never "done")

Here's an uncomfortable truth: Your risk assessment is already out of date.

New threats emerge. New vulnerabilities are discovered. Your systems change. Your business changes. The technology you rely on changes.

A risk assessment is not a one-time project. It's a continuous capability.

You need to:

  • Monitor the key risk factors

  • Update your analysis when significant changes occur

  • Track whether your risk responses are actually working

  • Feed new information back into the cycle

Think of it like maintaining your car. You don't just check the oil once when you buy it. You regularly monitor it because conditions change.

The stuff that matters most (That everyone ignores)

After years of this work, we've noticed a few things that distinguish effective risk assessments from worthless ones:

Layered thinking: Risks exist at different levels. Organizational risks (governance, strategy, culture). Mission/business process risks (the way work gets done). Information system risks (the technology itself). You need to think across all three, not just focus on the technical stuff.

Honest talk about uncertainty: Every risk assessment includes uncertainty. You don't know exactly what opponents are capable of. You don't know every vulnerability. You can't predict every failure mode.

Stop pretending you have perfect information. Be explicit about what you don't know and what you're assuming. It makes the analysis more credible, not less.

The supply chain blind spot: Most assessments focus on what you directly control. But what about your suppliers? Your cloud providers? The commercial software you rely on? Your contractors?

Some of your largest risks come from outside your direct control. Assess them anyway.

People are part of the system: Your risk assessment must factor in human elements. Not just "users are stupid and click on phishing emails" (though that's real). But also:

  • What happens when key people leave?

  • Do people have the training they need?

  • Are your policies actually followed, or do people work around them?

  • What is your security culture really like?

Technology is the easy part. People are hard. And usually more important.

Actually making it work in your organization

Look, we know this seems like a lot. It is a lot.

But here's the thing... you don't need to do everything perfectly from day one. Start somewhere. Start even small. Do a focused risk assessment for a critical system or a business process. Learn from it. Refine your approach. Build organizational muscle.

What matters is that you:

  • Make risk-informed decisions rather than flying blind

  • Protect what actually matters to your organization

  • Use limited resources wisely

  • Get better over time

The goal is not perfection. It's progress.

And honestly? Even a moderately useful risk assessment that people actually use beats a theoretically perfect one ignored in a drawer.

The bottom line

Risk assessments are supposed to help you sleep better at night. They are supposed to give you confidence that you understand your exposures, you are making smart decisions, and you won't be blindsided.

If your risk assessment process doesn't do that... it's time to change your approach.

Start with a clear purpose. Be honest about what you know and don’t know. Communicate in ways people can grasp. And keep it current.

Do that, and you’ll be way ahead of most organizations. Your risk assessment will become a tool that actually works—not just another compliance burden.

Because at the end of the day, it’s not about generating reports. It’s about protecting your organization’s ability to do what it's supposed to do. That’s worth getting right.

Does this topic concern you?

Effortlessly schedule a conversation and discover how we bring success in the digital world to your company.

Contact us!

Grabenstrasse 15a

6340 Baar

Switzerland

+41 43 217 86 70

Copyright © 2025 ODCUS | All rights reserved.

Legal Notice