If your risk register reads like it was written by the Brothers Grimm, you’re not alone.
If your risk register is full of vague references to “hacking,” “email threats,” and “data breaches” with no clear owners or next steps, you’re in good company.
Most companies start out with the best of intentions. They know they need a risk register for ISO 27001 or privacy compliance, so they find a template, copy it across, and tick the box. And then… it quietly gathers digital dust.
Let’s be honest: a bad risk register is worse than no risk register. Why? Because it gives you a false sense of security and makes audits harder, not easier.
You’ve probably seen one. The “fiction section” of compliance. Maybe it started as all good fiction should…once upon a time, we [insert over-inflated fairytale here]. It’s probably filled with:
It may have looked good enough to tick a box during your last audit. But, if a breach occurred tomorrow, it wouldn’t hold up under scrutiny.
Your risk register isn’t just something you create to keep your certification auditor happy. It’s the starting point of everything.
Every control you apply, every security decision you make, every dollar you spend on cyber or privacy protections, it all starts with what you’re actually trying to protect and what could go wrong.
When done well, a risk register tells a powerful story. It shows that your organisation understands its environment, that it’s thought through the consequences of failure, and that it’s actively doing something about it.
In short: it’s the spine of your compliance and security narrative.
Here are the five biggest mistakes we see, and how to fix them:
Start simple. What are the top five things that could go wrong in your organisation when it comes to data, systems, and people? Document those. Assign owners. Decide what to do about them.
Then iterate (yes, we’re leaning into the pun here). A good risk register is alive, not archived. It grows with your business. You can always add more risks as your understanding matures, but you have to start somewhere.
Use categories to keep things manageable (like operational, reputational, technical, third-party, legal) and define clear criteria for impact and likelihood so you’re not making it up as you go along.
Let’s be honest, spreadsheets weren’t built for this. de.iterate brings your risk register into the 21st century with:
Because when the auditor comes knocking, or a real risk becomes reality, you want more than a pretty list. You want a defensible, dynamic, and usable risk management process.
If your risk register feels more like a compliance prop than a strategic asset, it’s time to change the narrative. Stop pretending. Start prioritising. Because real privacy and security starts with understanding what you’re up against, and actually doing something about it.
And if you’re ready to ditch the fiction? We’ve got the platform to help. Book a demo now, or contact the team.