Opening Framing
Throughout this course, you've explored the individual components of Governance, Risk, and Compliance: governance structures and strategy, risk assessment and treatment, compliance frameworks and regulations, policy development, audit management, third-party risk, metrics and reporting, and security culture. In this capstone week, you'll integrate all of these components into a cohesive GRC program.
Effective GRC programs don't just manage compliance—they enable the organization to make informed security decisions, allocate resources appropriately, demonstrate due diligence to stakeholders, and continuously improve. The best programs are integrated with business operations, automated where possible, and focused on outcomes rather than activities.
This week brings together everything you've learned. You'll design a comprehensive GRC program for a realistic organization, addressing governance, risk management, compliance, policy, vendor management, metrics, and culture. The result will be a portfolio-ready deliverable demonstrating your GRC expertise.
Key insight: Integration is the key—a GRC program's value comes from how its components work together, not from each component in isolation.
1) GRC Program Integration
Understanding how GRC components integrate creates a unified program rather than disconnected activities:
GRC Integration Model:
INTEGRATED GRC FRAMEWORK:
┌─────────────────────────────────────────────────────────────┐
│ │
│ ┌─────────────────┐ │
│ │ GOVERNANCE │ │
│ │ │ │
│ │ Strategy │ │
│ │ Structure │ │
│ │ Accountability │ │
│ └────────┬────────┘ │
│ │ │
│ ┌──────────────┼──────────────┐ │
│ │ │ │ │
│ ▼ ▼ ▼ │
│ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ │
│ │ RISK │ │ COMPLIANCE │ │ POLICY │ │
│ │ │ │ │ │ │ │
│ │ Assessment │ │ Frameworks │ │ Development │ │
│ │ Treatment │ │ Regulations │ │ Enforcement │ │
│ │ Monitoring │ │ Audit │ │ Exceptions │ │
│ └──────┬──────┘ └──────┬──────┘ └──────┬──────┘ │
│ │ │ │ │
│ └────────────────┼────────────────┘ │
│ │ │
│ ┌─────────────┴─────────────┐ │
│ │ │ │
│ ▼ ▼ │
│ ┌─────────────────┐ ┌─────────────────┐ │
│ │ THIRD-PARTY │ │ METRICS & │ │
│ │ RISK MANAGEMENT │ │ REPORTING │ │
│ └────────┬────────┘ └────────┬────────┘ │
│ │ │ │
│ └─────────────┬─────────────┘ │
│ │ │
│ ▼ │
│ ┌─────────────────┐ │
│ │ CULTURE & │ │
│ │ AWARENESS │ │
│ └─────────────────┘ │
│ │
└─────────────────────────────────────────────────────────────┘
INTEGRATION POINTS:
┌─────────────────────────────────────────────────────────────┐
│ Risk → Compliance: │
│ - Risk assessments inform control selection │
│ - Compliance requirements feed into risk register │
│ - Audit findings become risk items │
│ │
│ Risk → Policy: │
│ - Policies address identified risks │
│ - Risk acceptance documented through exceptions │
│ - Policy effectiveness measured through risk metrics │
│ │
│ Compliance → Policy: │
│ - Regulatory requirements drive policy content │
│ - Policies implement compliance controls │
│ - Audit tests policy adherence │
│ │
│ Governance → All: │
│ - Strategy sets priorities for all components │
│ - Structure defines ownership and accountability │
│ - Board oversight ensures program effectiveness │
│ │
│ Metrics → All: │
│ - Measure effectiveness of each component │
│ - Enable continuous improvement │
│ - Report to governance on program status │
│ │
│ Culture → All: │
│ - People execute all GRC activities │
│ - Culture determines actual vs stated compliance │
│ - Awareness enables informed risk decisions │
└─────────────────────────────────────────────────────────────┘
GRC Maturity Model:
GRC Program Maturity:
MATURITY LEVELS:
┌─────────────────────────────────────────────────────────────┐
│ LEVEL 1 - INITIAL/AD HOC: │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Characteristics: │ │
│ │ - Reactive approach to GRC │ │
│ │ - Siloed activities (risk, compliance, audit separate) │ │
│ │ - Manual, inconsistent processes │ │
│ │ - Limited documentation │ │
│ │ - Individual heroics, not repeatable processes │ │
│ │ │ │
│ │ Indicators: │ │
│ │ - No formal GRC program exists │ │
│ │ - Compliance driven by audit findings │ │
│ │ - Risk discussions happen only after incidents │ │
│ └─────────────────────────────────────────────────────────┘ │
│ │
│ LEVEL 2 - DEVELOPING: │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Characteristics: │ │
│ │ - Basic processes defined │ │
│ │ - Some integration between components │ │
│ │ - Documentation exists but may be incomplete │ │
│ │ - Spreadsheet-based tracking │ │
│ │ - Dedicated resources but limited │ │
│ │ │ │
│ │ Indicators: │ │
│ │ - Policies exist but may not be followed │ │
│ │ - Risk register maintained but not actively used │ │
│ │ - Compliance activities scheduled but reactive │ │
│ └─────────────────────────────────────────────────────────┘ │
│ │
│ LEVEL 3 - DEFINED: │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Characteristics: │ │
│ │ - Formal GRC program with clear structure │ │
│ │ - Integrated processes across components │ │
│ │ - Documented and followed procedures │ │
│ │ - GRC tooling in place │ │
│ │ - Adequate resources │ │
│ │ │ │
│ │ Indicators: │ │
│ │ - Risk-based decision making │ │
│ │ - Proactive compliance management │ │
│ │ - Regular reporting to leadership │ │
│ │ - Control mapping across frameworks │ │
│ └─────────────────────────────────────────────────────────┘ │
│ │
│ LEVEL 4 - MANAGED: │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Characteristics: │ │
│ │ - Quantitative risk management │ │
│ │ - Continuous monitoring and assurance │ │
│ │ - Automated evidence collection │ │
│ │ - Predictive analytics │ │
│ │ - Strong security culture │ │
│ │ │ │
│ │ Indicators: │ │
│ │ - GRC metrics drive business decisions │ │
│ │ - Audit-ready at any time │ │
│ │ - Third-party risk fully integrated │ │
│ │ - Continuous improvement evident │ │
│ └─────────────────────────────────────────────────────────┘ │
│ │
│ LEVEL 5 - OPTIMIZED: │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Characteristics: │ │
│ │ - GRC embedded in business strategy │ │
│ │ - Innovation and continuous optimization │ │
│ │ - Industry leadership │ │
│ │ - Security as competitive advantage │ │
│ │ │ │
│ │ Indicators: │ │
│ │ - GRC enables business, not just protects │ │
│ │ - Security culture is organizational strength │ │
│ │ - Benchmarked as industry leader │ │
│ └─────────────────────────────────────────────────────────┘ │
└─────────────────────────────────────────────────────────────┘
Most organizations are at Level 2-3. Level 4-5 requires
significant investment and organizational commitment.
Key insight: Maturity isn't about having more documentation— it's about how well GRC enables better decisions.
2) GRC Program Design Process
Building a GRC program follows a structured approach:
GRC Program Development:
DESIGN PHASES:
┌─────────────────────────────────────────────────────────────┐
│ │
│ PHASE 1: ASSESS CURRENT STATE │
│ ┌─────────────────────────────────────────────────────────┐│
│ │ Activities: ││
│ │ - Inventory existing GRC activities ││
│ │ - Identify applicable requirements ││
│ │ - Assess current maturity ││
│ │ - Document gaps and pain points ││
│ │ - Understand business context and constraints ││
│ │ ││
│ │ Outputs: ││
│ │ - Current state assessment ││
│ │ - Requirements inventory ││
│ │ - Gap analysis ││
│ └─────────────────────────────────────────────────────────┘│
│ │ │
│ ▼ │
│ PHASE 2: DEFINE TARGET STATE │
│ ┌─────────────────────────────────────────────────────────┐│
│ │ Activities: ││
│ │ - Define program vision and objectives ││
│ │ - Determine target maturity level ││
│ │ - Design governance structure ││
│ │ - Select frameworks and methodologies ││
│ │ - Define integration approach ││
│ │ ││
│ │ Outputs: ││
│ │ - GRC program charter ││
│ │ - Target operating model ││
│ │ - Framework selection ││
│ └─────────────────────────────────────────────────────────┘│
│ │ │
│ ▼ │
│ PHASE 3: PLAN IMPLEMENTATION │
│ ┌─────────────────────────────────────────────────────────┐│
│ │ Activities: ││
│ │ - Prioritize initiatives ││
│ │ - Develop implementation roadmap ││
│ │ - Identify resource requirements ││
│ │ - Select tooling (if applicable) ││
│ │ - Define success metrics ││
│ │ ││
│ │ Outputs: ││
│ │ - Prioritized roadmap ││
│ │ - Resource plan ││
│ │ - Business case ││
│ └─────────────────────────────────────────────────────────┘│
│ │ │
│ ▼ │
│ PHASE 4: IMPLEMENT │
│ ┌─────────────────────────────────────────────────────────┐│
│ │ Activities: ││
│ │ - Execute roadmap in phases ││
│ │ - Build/configure GRC capabilities ││
│ │ - Deploy policies and procedures ││
│ │ - Train personnel ││
│ │ - Communicate and change management ││
│ │ ││
│ │ Outputs: ││
│ │ - Implemented GRC components ││
│ │ - Trained staff ││
│ │ - Operational processes ││
│ └─────────────────────────────────────────────────────────┘│
│ │ │
│ ▼ │
│ PHASE 5: OPERATE AND IMPROVE │
│ ┌─────────────────────────────────────────────────────────┐│
│ │ Activities: ││
│ │ - Run GRC processes ││
│ │ - Monitor metrics ││
│ │ - Conduct reviews and assessments ││
│ │ - Identify improvements ││
│ │ - Adapt to changes ││
│ │ ││
│ │ Outputs: ││
│ │ - Operational GRC program ││
│ │ - Performance reports ││
│ │ - Continuous improvement ││
│ └─────────────────────────────────────────────────────────┘│
│ │
└─────────────────────────────────────────────────────────────┘
GRC Operating Model:
GRC Operating Model Components:
ORGANIZATIONAL STRUCTURE:
┌─────────────────────────────────────────────────────────────┐
│ │
│ ┌─────────────────┐ │
│ │ BOARD │ │
│ │ Risk/Audit │ │
│ │ Committee │ │
│ └────────┬────────┘ │
│ │ Oversight │
│ ▼ │
│ ┌─────────────────┐ │
│ │ EXECUTIVE │ │
│ │ LEADERSHIP │ │
│ │ (CEO, CIO, │ │
│ │ CISO, CRO) │ │
│ └────────┬────────┘ │
│ │ Direction │
│ ▼ │
│ ┌─────────────────────────────────┐ │
│ │ SECURITY STEERING │ │
│ │ COMMITTEE │ │
│ │ (Cross-functional leadership) │ │
│ └────────────────┬────────────────┘ │
│ │ Coordination │
│ ▼ │
│ ┌───────────────────────┼───────────────────────┐ │
│ │ │ │ │
│ ▼ ▼ ▼ │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ │
│ │ GRC │ │ SECURITY │ │ IT │ │
│ │ TEAM │ │ OPS │ │ OPS │ │
│ │ │ │ │ │ │ │
│ │ Risk │ │ SOC │ │ Infra │ │
│ │ Compliance│ │ IR │ │ Apps │ │
│ │ Policy │ │ Vuln Mgmt│ │ Support │ │
│ │ Audit │ │ │ │ │ │
│ └──────────┘ └──────────┘ └──────────┘ │
│ │
└─────────────────────────────────────────────────────────────┘
PROCESS FRAMEWORK:
┌─────────────────────────────────────────────────────────────┐
│ GOVERNANCE PROCESSES: │
│ - Strategy development and review │
│ - Policy lifecycle management │
│ - Committee meetings and decisions │
│ - Board reporting │
│ - Program performance review │
│ │
│ RISK MANAGEMENT PROCESSES: │
│ - Risk assessment (annual + trigger-based) │
│ - Risk treatment and monitoring │
│ - Risk acceptance workflow │
│ - Risk reporting │
│ - Third-party risk management │
│ │
│ COMPLIANCE PROCESSES: │
│ - Regulatory monitoring │
│ - Control assessment │
│ - Evidence collection │
│ - Audit management │
│ - Finding remediation │
│ │
│ OPERATIONAL PROCESSES: │
│ - Exception management │
│ - Vendor assessment │
│ - Awareness and training │
│ - Metrics collection and reporting │
│ - Continuous improvement │
└─────────────────────────────────────────────────────────────┘
TECHNOLOGY ENABLEMENT:
┌─────────────────────────────────────────────────────────────┐
│ GRC Platform Capabilities: │
│ - Risk register and management │
│ - Control library and mapping │
│ - Policy management │
│ - Compliance tracking │
│ - Audit management │
│ - Vendor management │
│ - Workflow automation │
│ - Reporting and dashboards │
│ - Evidence repository │
│ - Integration with security tools │
│ │
│ Common GRC Platforms: │
│ - ServiceNow GRC │
│ - OneTrust │
│ - LogicGate │
│ - Archer │
│ - ZenGRC │
│ - Vanta, Drata, Secureframe (compliance automation) │
│ │
│ Build vs Buy: │
│ - Small orgs: May start with spreadsheets │
│ - Mid-size: Compliance automation tools │
│ - Enterprise: Full GRC platforms │
└─────────────────────────────────────────────────────────────┘
Key insight: Design for your organization's size and maturity— don't over-engineer for a small company or under-build for an enterprise.
3) Capstone Scenario
Your capstone project will design a GRC program for the following organization:
Capstone Organization: MedTech Solutions
COMPANY PROFILE:
┌─────────────────────────────────────────────────────────────┐
│ Company: MedTech Solutions, Inc. │
│ Industry: Healthcare Technology (SaaS) │
│ Size: 350 employees │
│ Revenue: $45 million annually │
│ Founded: 2018 │
│ Headquarters: Boston, MA │
│ Customers: 200+ healthcare organizations (US and EU) │
└─────────────────────────────────────────────────────────────┘
BUSINESS CONTEXT:
┌─────────────────────────────────────────────────────────────┐
│ Products: │
│ - Cloud-based patient engagement platform │
│ - Telehealth integration module │
│ - Healthcare analytics dashboard │
│ │
│ Data Handled: │
│ - Protected Health Information (PHI) │
│ - Patient demographics and contact information │
│ - Treatment and appointment data │
│ - Some payment information (co-pays via Stripe) │
│ - Employee data (HR systems) │
│ │
│ Infrastructure: │
│ - Primary: AWS (US-East) │
│ - DR: AWS (US-West) │
│ - 50+ SaaS applications │
│ - Remote-first workforce │
│ │
│ Growth Plans: │
│ - Series C funding ($30M) recently closed │
│ - Expanding to European market (UK, Germany) │
│ - Planning enterprise sales push │
│ - Potential acquisition targets │
└─────────────────────────────────────────────────────────────┘
CURRENT STATE:
┌─────────────────────────────────────────────────────────────┐
│ Security Team: │
│ - CISO (reports to CTO) │
│ - 2 Security Engineers │
│ - 1 Compliance Analyst │
│ - No dedicated GRC function │
│ │
│ Existing Compliance: │
│ - SOC 2 Type I (completed 6 months ago) │
│ - HIPAA compliance program (basic) │
│ - No ISO 27001 │
│ - No formal risk management program │
│ │
│ Current Challenges: │
│ - Enterprise customers asking for SOC 2 Type II │
│ - EU expansion requires GDPR compliance │
│ - No formal vendor risk management │
│ - Policies exist but outdated and inconsistent │
│ - Phishing click rate: 18% │
│ - No security metrics reported to board │
│ - Risk discussions are ad hoc │
│ - Audit preparation is chaotic scramble │
│ │
│ Recent Events: │
│ - Near-miss: employee clicked phishing, credentials stolen, │
│ detected before data access (luck, not controls) │
│ - Lost enterprise deal due to lack of SOC 2 Type II │
│ - Board asking CISO to present security posture │
└─────────────────────────────────────────────────────────────┘
STAKEHOLDER REQUIREMENTS:
┌─────────────────────────────────────────────────────────────┐
│ Board: │
│ - Understand security risk posture │
│ - Ensure regulatory compliance │
│ - Protect company reputation and valuation │
│ │
│ CEO: │
│ - Enable growth without security incidents │
│ - Meet customer compliance requirements │
│ - Efficient use of security resources │
│ │
│ Sales: │
│ - Complete security questionnaires quickly │
│ - Have certifications customers require │
│ - Win enterprise deals │
│ │
│ Engineering: │
│ - Clear security requirements │
│ - Efficient security processes (not blockers) │
│ - Understand priorities │
│ │
│ Customers: │
│ - Assurance their data is protected │
│ - Meet their own compliance requirements (HIPAA) │
│ - Incident notification if breached │
└─────────────────────────────────────────────────────────────┘
This scenario reflects real challenges faced by growing healthcare technology companies.
4) Capstone Deliverables
Your capstone project consists of designing a comprehensive GRC program with the following deliverables:
Capstone Deliverables:
DELIVERABLE 1: GRC PROGRAM CHARTER (LO1, LO4)
┌─────────────────────────────────────────────────────────────┐
│ Contents: │
│ - Program vision and mission │
│ - Objectives and scope │
│ - Governance structure │
│ - Roles and responsibilities (RACI) │
│ - Applicable regulations and frameworks │
│ - Success criteria │
│ │
│ Length: 3-5 pages │
│ LOs Assessed: LO1 (governance), LO4 (compliance) │
└─────────────────────────────────────────────────────────────┘
DELIVERABLE 2: RISK MANAGEMENT FRAMEWORK (LO2, LO3)
┌─────────────────────────────────────────────────────────────┐
│ Contents: │
│ - Risk management methodology │
│ - Risk assessment process │
│ - Risk register with 10+ identified risks │
│ - Risk treatment plans for top 5 risks │
│ - Risk appetite statement │
│ - Risk reporting approach │
│ │
│ Length: 5-7 pages + risk register │
│ LOs Assessed: LO2 (assessment), LO3 (treatment) │
└─────────────────────────────────────────────────────────────┘
DELIVERABLE 3: COMPLIANCE ROADMAP (LO4, LO6)
┌─────────────────────────────────────────────────────────────┐
│ Contents: │
│ - Framework selection and justification │
│ - Compliance requirements mapping │
│ - Gap analysis (current vs. required) │
│ - 12-month compliance roadmap │
│ - Audit preparation approach │
│ - Evidence management strategy │
│ │
│ Length: 5-7 pages + mapping spreadsheet │
│ LOs Assessed: LO4 (frameworks), LO6 (audit) │
└─────────────────────────────────────────────────────────────┘
DELIVERABLE 4: POLICY FRAMEWORK (LO5)
┌─────────────────────────────────────────────────────────────┐
│ Contents: │
│ - Policy hierarchy and governance │
│ - Policy inventory (list of required policies) │
│ - 2 complete policies: │
│ * Information Security Policy (umbrella) │
│ * One operational policy of your choice │
│ - Exception management process │
│ - Policy lifecycle management │
│ │
│ Length: 3-4 pages framework + 2 complete policies │
│ LOs Assessed: LO5 (policy development) │
└─────────────────────────────────────────────────────────────┘
DELIVERABLE 5: THIRD-PARTY RISK PROGRAM (LO7)
┌─────────────────────────────────────────────────────────────┐
│ Contents: │
│ - Vendor tiering methodology │
│ - Assessment approach by tier │
│ - Vendor inventory template │
│ - Assessment questionnaire (abbreviated) │
│ - Contract security requirements │
│ - Ongoing monitoring approach │
│ │
│ Length: 4-5 pages + templates │
│ LOs Assessed: LO7 (third-party risk) │
└─────────────────────────────────────────────────────────────┘
DELIVERABLE 6: METRICS AND REPORTING (LO8)
┌─────────────────────────────────────────────────────────────┐
│ Contents: │
│ - Metrics strategy │
│ - KRIs for board reporting (5-7) │
│ - KPIs for management (10-15) │
│ - Board report template │
│ - Executive dashboard mockup │
│ - Metrics collection approach │
│ │
│ Length: 4-5 pages + dashboard mockup │
│ LOs Assessed: LO8 (metrics) │
└─────────────────────────────────────────────────────────────┘
DELIVERABLE 7: AWARENESS AND CULTURE PLAN (LO9)
┌─────────────────────────────────────────────────────────────┐
│ Contents: │
│ - Awareness program strategy │
│ - Training curriculum outline │
│ - Phishing simulation program design │
│ - Security champions program │
│ - Culture assessment approach │
│ - Awareness metrics │
│ │
│ Length: 4-5 pages │
│ LOs Assessed: LO9 (awareness/culture) │
└─────────────────────────────────────────────────────────────┘
DELIVERABLE 8: EXECUTIVE PRESENTATION (All LOs)
┌─────────────────────────────────────────────────────────────┐
│ Contents: │
│ - GRC program overview │
│ - Business case and value proposition │
│ - Implementation roadmap │
│ - Resource requirements │
│ - Quick wins and long-term vision │
│ - Recommendations to leadership │
│ │
│ Length: 10-15 slides │
│ LOs Assessed: All - synthesis and communication │
└─────────────────────────────────────────────────────────────┘
These deliverables represent what a real GRC program design project would produce.
5) Capstone Guidance
Guidance for completing each deliverable successfully:
Capstone Success Criteria:
QUALITY CRITERIA FOR ALL DELIVERABLES:
┌─────────────────────────────────────────────────────────────┐
│ Completeness: │
│ - All required sections addressed │
│ - Appropriate depth for each topic │
│ - No major gaps in coverage │
│ │
│ Relevance: │
│ - Tailored to MedTech Solutions scenario │
│ - Addresses stated challenges │
│ - Considers constraints (size, resources, industry) │
│ │
│ Practicality: │
│ - Implementable recommendations │
│ - Realistic timelines and resources │
│ - Appropriate for company maturity │
│ │
│ Integration: │
│ - Components work together │
│ - Cross-references between deliverables │
│ - Consistent approach throughout │
│ │
│ Professionalism: │
│ - Clear writing and organization │
│ - Appropriate formatting │
│ - Free of errors │
│ - Business-appropriate tone │
└─────────────────────────────────────────────────────────────┘
COMMON MISTAKES TO AVOID:
┌─────────────────────────────────────────────────────────────┐
│ ✗ Generic content not tailored to scenario │
│ ✗ Overbuilding for company size (enterprise solutions │
│ for 350-person company) │
│ ✗ Ignoring stated constraints (budget, team size) │
│ ✗ Focusing only on one area, neglecting integration │
│ ✗ Technical jargon in executive presentation │
│ ✗ Unrealistic timelines │
│ ✗ Missing key regulations (HIPAA, GDPR) │
│ ✗ Not addressing stated challenges │
└─────────────────────────────────────────────────────────────┘
TIPS FOR STRONG DELIVERABLES:
┌─────────────────────────────────────────────────────────────┐
│ GRC Charter: │
│ - Make governance structure clear with diagram │
│ - Be specific about who is accountable for what │
│ │
│ Risk Framework: │
│ - Include healthcare-specific risks │
│ - Quantify where possible (FAIR concepts) │
│ - Risk treatments should be actionable │
│ │
│ Compliance Roadmap: │
│ - SOC 2 Type II is immediate priority │
│ - Don't forget GDPR for EU expansion │
│ - Show how frameworks map together │
│ │
│ Policy Framework: │
│ - Policies should be realistic for 350-person company │
│ - Include HIPAA-specific requirements │
│ │
│ Third-Party Risk: │
│ - Consider cloud providers, SaaS tools │
│ - Healthcare-specific requirements (BAAs) │
│ │
│ Metrics: │
│ - Board cares about risk, compliance, trends │
│ - Include healthcare-relevant metrics │
│ │
│ Awareness: │
│ - Address the 18% phishing click rate │
│ - Consider HIPAA training requirements │
│ │
│ Executive Presentation: │
│ - Lead with business value │
│ - Be clear about resource asks │
│ - Show quick wins alongside long-term vision │
└─────────────────────────────────────────────────────────────┘
Approach this as if you were a consultant hired to design MedTech's GRC program—be practical and business-focused.
Real-World Context
Case Study: GRC Program Build at Similar Company
A 400-person healthcare SaaS company faced similar challenges: SOC 2 Type I but customers demanding Type II, HIPAA compliance that was more paperwork than practice, no formal risk program, and a small security team. Their approach: hired a GRC manager as first dedicated resource, implemented a compliance automation platform (Vanta) to reduce manual effort, created unified control framework mapping SOC 2, HIPAA, and GDPR, established monthly risk reviews with leadership, and deployed phishing simulations with targeted training. Within 18 months, they achieved SOC 2 Type II with clean opinion, passed HIPAA audits, reduced phishing click rates from 22% to 6%, and could respond to security questionnaires in days instead of weeks. Key success factors: executive commitment, right-sized solutions, and automation.
GRC Program Design Principles:
GRC Design Principles:
START WHERE YOU ARE:
- Assess current state honestly
- Build on what exists (don't throw everything away)
- Quick wins build momentum and credibility
RIGHT-SIZE FOR YOUR ORGANIZATION:
- 350-person company doesn't need enterprise GRC platform
- Focus on essentials before nice-to-haves
- Grow maturity incrementally
INTEGRATE FROM THE START:
- Don't build silos that must be integrated later
- Common control framework from day one
- Shared evidence across compliance needs
AUTOMATE WHERE POSSIBLE:
- Manual evidence collection doesn't scale
- Compliance automation tools pay for themselves
- But don't automate bad processes
FOCUS ON OUTCOMES:
- Compliance is necessary but not sufficient
- Real security improvement, not just checkboxes
- Business enablement, not just protection
COMMUNICATE VALUE:
- Speak business language to executives
- Show ROI and risk reduction
- Celebrate wins and progress
BUILD CULTURE:
- GRC isn't just the GRC team's job
- Security champions extend reach
- Positive engagement, not fear
The best GRC programs enable the business to move faster with appropriate risk management, not slower with bureaucracy.
Capstone Lab: GRC Program Design
Complete all eight deliverables for MedTech Solutions as described in Section 4.
Suggested Approach:
- Read the scenario carefully; note all requirements and constraints
- Start with the GRC Charter to establish overall direction
- Complete Risk Framework and Compliance Roadmap together (they inform each other)
- Develop Policy Framework building on compliance requirements
- Design Third-Party Risk program considering SaaS-heavy environment
- Create Metrics and Reporting that align with governance structure
- Design Awareness program addressing stated phishing problem
- Synthesize everything into Executive Presentation
Time Estimate:
- GRC Charter: 2-3 hours
- Risk Framework: 3-4 hours
- Compliance Roadmap: 3-4 hours
- Policy Framework: 3-4 hours
- Third-Party Risk: 2-3 hours
- Metrics and Reporting: 2-3 hours
- Awareness Plan: 2-3 hours
- Executive Presentation: 2-3 hours
- Total: 20-27 hours
Reflection Questions:
- What trade-offs did you make given resource constraints?
- How did you prioritize competing requirements?
- What would you do differently with unlimited resources?
- How did this exercise integrate concepts from throughout the course?
Week Outcome Check
By the end of this week, you should be able to:
- Design integrated GRC programs that align with business objectives
- Create governance structures appropriate for organization size
- Develop comprehensive risk management frameworks
- Build compliance roadmaps addressing multiple frameworks
- Establish policy frameworks with appropriate hierarchy
- Design third-party risk management programs
- Create metrics and reporting for different audiences
- Develop security awareness and culture programs
- Communicate GRC program value to executives
🎯 Hands-On Labs (Free & Essential)
Synthesize all GRC knowledge into a comprehensive program design—your capstone portfolio piece.
🏗️ GRC Program Design Capstone
What you'll do: Design end-to-end GRC program—governance structure, risk
framework, compliance mapping, policies, metrics, culture.
Why it matters: This capstone demonstrates your ability to build enterprise
GRC programs from scratch.
Time estimate: 6-8 hours
📊 GRC Maturity Assessment
What you'll do: Assess GRC program maturity—evaluate current state, identify
gaps, create multi-year roadmap for improvement.
Why it matters: Maturity models provide frameworks for continuous GRC
program evolution.
Time estimate: 3-4 hours
💼 Executive GRC Presentation
What you'll do: Present your GRC program to simulated board—justify investment,
demonstrate value, address stakeholder concerns.
Why it matters: GRC program success depends on executive buy-in—practice
getting it.
Time estimate: 2-3 hours
💡 Lab Strategy: Your capstone should be portfolio-ready—document it professionally as evidence of GRC expertise for employers.
Resources
Checkpoint Questions
- How do the components of a GRC program integrate with each other? Give three examples of integration points.
- What factors determine appropriate GRC program maturity for an organization? Why isn't Level 5 always the goal?
- For MedTech Solutions, what are the top 3 compliance priorities and why?
- How would you structure the GRC team for a 350-person company with the stated constraints?
- What quick wins would you recommend to build credibility for the GRC program?
- How would you present the GRC program to the board in a way that resonates with their concerns?
Week 12 Quiz
Test your understanding of GRC Program Design, integration strategies, and maturity models.
Format: 10 multiple-choice questions. Passing score: 70%. Time: Untimed.
Take QuizCourse Reflection
This capstone brings together everything you've learned about Governance, Risk, and Compliance. As you complete your deliverables, reflect on the entire course.
Reflect on the following in 300-400 words:
- How has your understanding of GRC evolved from the beginning of the course? What concepts were most challenging or surprising?
- GRC is often seen as bureaucratic overhead. How would you articulate its value to skeptical stakeholders?
- What aspects of GRC do you find most interesting or want to explore further in your career?
- How does GRC connect with the technical security knowledge from earlier courses? Why is the combination important?
- What would you do differently if designing a GRC program for a different type of organization (e.g., financial services, manufacturing, government)?
A strong final reflection demonstrates integrated understanding of GRC as a system that enables better security decisions and business outcomes.
Verified Resources & Videos
- Building a GRC Program — Program development walkthrough (45 min)
- GRC for Healthcare — Healthcare compliance considerations (40 min)
- CISO Executive Communication — Presenting to boards and executives (35 min)
- COBIT 2019 Framework — IT governance framework
- OCEG GRC Resources — GRC capability model and resources