Risk Management (1) (1).ppt

10,979 views 52 slides Dec 20, 2022
Slide 1
Slide 1 of 52
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52

About This Presentation

Escape from Hacker and create great challenge


Slide Content

•RISK DEFINITION: A Risk is a potential or future event that, should it occur,
will have a (negative) impact on the Business Objectives of an Organisation
oA risk must have Uncertainty, (in terms of Probability or Likelihood). It
might happen
oA risk must have a measurable Impact, (usually measured in monetary
terms, but other criteria are acceptable, reputation for example)
o“It May Rain Tomorrow”
•ISSUE DEFINITION: An Issue is a current event that willhave a (negative)
impact on the Business Objectives of an Organisation
oE.g. An Incident, a manifested risk, an Audit Non-Compliance finding, an
Equipment or Supplier failure
o“It is Raining Today”
RISK DEFINITIONS

3
Risk Life Cycle
Threat Agent
Vulnerability
Risk
Asset
Exposures
Safeguard
Exploits
Leads to
Can damage
And cause an
Can be
countermeasured by a

4
Risk Management Cycle
Identify Risks
Assess Risks
Define Desired
Results
Select Strategy
Implement
Strategy
Monitor
Evaluate and
Adjust
The Process
is iteration
•The Processes are organized
•Each Step output considered
as an input for the next step
Risk Control
Risk Assessment

5

6
Risk Identification
What is the purpose of this phase ?
•The aims of this phase is to identify , classify
and prioritizing the organization’s information
assets ( Know ourselves) and identify all
important types and sources of riskand
uncertainty (know our enemy), associated with
each of the investment objectives.
•This is a crucial phase. If a risk is not identified
it cannot be evaluated and managed

7
Information Assets
IS
Components
People Procedures Data
Transmission
HWSW
Employees
Non-
employees
People at
trusted
organizations
Authorized
Staff
Other staff Strangers
Standard
\Procedures
Sensitive
Procedures
Process
Storage
Application
OS
Security
Component
System
Devises
Net Work

8
Primary sources
of Risk Items
Human Threats
Environmental
Threats
Outside &
Natural Threats
network
based attacks
virus infection,
unauthorized access
floods
Earthquakes
hurricanes
Power failure,
pollution

Risk Analysis
•requiresanentityto,conductanaccurateand
thoroughassessmentofthepotentialrisksand
vulnerabilitiestotheconfidentiality,integrity,and
availabilityofelectronicprotectedinformation
heldbytheentity.
•Riskanalysis,whichisatoolforriskmanagement,
isamethodofidentifyingvulnerabilitiesand
threats,andassessingthepossibledamageto
determinewheretoimplementsecurity
safeguards

10
Risk Assessment
•For each identified component & risk, which has a 'clearly significant'
or 'possibly significant' position, each should be assessto establish
qualitativelyandEstimatethe value

27/05/1444 11
What is Risk Assessment ?
•Assessing risk isthe process of determining the
likelihood of the threat being exercised against the
vulnerabilityand the resulting impact from a successful
compromise , i.e determine the relative risk for each of the
vulnerabilities
•Risk assessmentassigns a risk ratingor score to each
specific information asset, useful in evaluating the relative
riskand making comparative ratings later in the risk control
process.
•Althoughallelementsoftheriskmanagementcycleare
important,riskassessmentsprovidethefoundationforother
elementsofthecycle.Inparticular,riskassessmentsprovide
abasisforestablishingappropriatepoliciesandselecting
cost-effectivetechniquestoimplementthesepolicies

12
Methods of Risk Assessment
There are various methods assessing risk,
First : Quantitative risk assessment:
generally estimates values of Information Systems components as ;
information, systems, business processes, recovery costs, etc., risk
can be measured in terms of direct and indirect costs , based on
(1) the likelihood that a damaging event will occur
(2) the costs of potential losses
(3) the costs of mitigating actions that could be taken.

13
This approach can be taken by defining
–Riskinmoresubjectiveandgeneraltermssuchashigh,
medium,andlow.
–Inthisregard,qualitativeassessmentsdependmoreonthe
expertise,experience,andjudgmentofthoseconductingthe
assessment.
•Qualitative risk assessments typically give risk results of “High”,
“Moderate” and“Low”.However, by providing the impact and
likelihood definition tablesand the description of the impact, it is
possible to adequately communicate the assessment to the
organization’s management.
Second : Qualitative Risk Assessment

14
Third :Quantitative and Qualitative
–It is also possible to use a combination of quantitative and
qualitative method

•The identification of Risks and their management by defining:
The Risk Description
The Risk Owner
The Probability of the Risk Event occurring
The Risk Impact in terms of cost, loss of assets, Reputation … Failure to meet a
Business Objective
The most suitable Mitigations that will prevent or reduce the Likelihood of the Risk
Event occurring with relation to their costs and the reduction of Risk Exposure
The Contingency Plan to recover the Asset once risk is manifested
An understanding of Corporate Risk Appetite and where appropriate the application
of Risk Tolerance
WHAT IS RISK MANAGEMENT?

To ensure that all risks to the Business
however they are derived are
managed effectively.
•This includes:
•Strategic Risks
•Programme and Project Risks
•Operational Risks (includes Security
and Business Continuity Risks)
OBJECTIVES OF GENERIC RISK MANAGEMENT
Operational Level
(Business as Usual)
Change
Level
Operational
Risk Register
Information
Security Risk
Register
BAU
Business
continuity
Strategic
Level
Strategic
Risks
Programme/Project Risks
Operational Risks
Project Risk
Register
Strategic Risk Register

To ensure that the risks to the Organisation that are derivedfrom,
Incidents, Threats, Vulnerabilities and Audit non-compliances are
managed effectively.
In Security Terms these are those risks that impact the:
•Confidentiality,
•Integrity,
•Availability, and the
•Traceability of Information whilst:
•At rest
•Whilst being modified
•In transit (around a system, e-mail, media device, telephone etc.)
OBJECTIVES OF INFORMATION SECURITY
RISK MANAGEMENT

Incident Management
Audit Non-Compliances
Problem Management
Threat Management
Vulnerability Management
Exception / Waiver Management
!However, they can be the Source of Infosec
So, these are issues, NO uncertainty!
WHAT IS NOTRISK MANAGEMENT?

RISK MATRIX
IMPACT
High Medium High High
Medium Low Medium High
Low Low Low Medium
Low Medium High
LIKELIHOOD

COMMON PROBLEMS
(MISUNDERSTANDINGS)?
•Poor Risk Descriptions (Risk vsIssue and
Impact confusion) (Qualification vs
Quantification)
•Unachievable, ineffective and
disproportionate Mitigation Actions
•Poor Control, risk owner vsrisk
mitigation owner. Stakeholder
Involvement
•Reactive vsProactive Approach
•Reliance on Incidents, Threat and
Non-Compliance Management
(Reactive)
•Proactive Risk Identification
Workshop based on Success Criteria
SO WHAT!
•Risks occur that could have been
managed
•Impact on Assets not understood (BIA,
CMDB)
•Mitigation Action Costs do not reflect the
Risk Exposure Reduction
•Systems fail, business and revenue lost,
•Corporate data is unavailable when
required –Loss of Business
•Regulator penalties, reputational damage
occurs
•Loss of Customer base and confidence
•Loss of IPR.
PROBLEMS WITH RISK MANAGEMENT

oMitigations or Controls are primarily used to preventthe occurrence of a risk
or to reducethe Probability of Risk occurrence -(Reduce Probability).
oThis is why it is so important to describe the risk event clearly.
oContingency Plans address the Impact of the Risk plans and are used to
recovera system from the effect of a risk should it occur, a mini BCP -
(Reduce Impact)
oThis is why it is so important to clearly describe the risk impact separately from
the risk description
MITIGATION PLANS & CONTINGENCY PLANS

oProliferation of BYOD and smart devices
oCloud computing
oOutsourcing of critical business processes to a third party (and lack of
controls around third-party services)
oDisaster recovery and business continuity
oPeriodic access reviews
oLog reviews
SOURCE: Cyber-security -What the Board of Directors need to ask?,
IIARF Research Report, 2014
SOURCES OF CYBER SECURITY RISKS

oApplication vulnerabilities
oRemote access.
oIneffective patch management
oWeak network security/flat networks
oLack of real-time security monitoring
oThird parties
oLack of a data retention policy
SOURCE: HANS HENRIK BERTHING
Cyber Assurance and the IT Auditor Nov 2014
COMMON CYBER -CRIMINAL ATTACK VECTORS

Select appropriate Controls / use Security Standards:
ISO27000
PCI DSS
COBIT
HIPAA
WHERE TO START?

1.Create risk reporting awareness for the workforce
2.Make it easy, create a simple Risk Submission form
3.Assess the risk submission, ask questions
4.Ensure it is a RISK, not an issue, a service request, a change request 
ENCOURAGE RISK REPORTING

1.Record in a Risk Register
2.Describe the RISK
3.Assess the Likelihood, Impact, and risk rating
4.Agree recommended Risk Mitigation / Treatment
5.Establish a contingency position if possible
6.Assign to an appropriate RISK OWNER (usually a Business Stakeholder)
7.Agree a Mitigation Owner
8.Obtain a decision (Reduce, Accept, Avoid, Transfer)
9.Monitor mitigation progress until target risk is achieved –retain awareness
of closed or mitigated risks
10.Produce monthly status reports
MANAGE THE RISKS …