Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.

Slides:



Advertisements
Similar presentations
INFORMATION RISK MANAGEMENT
Advertisements

Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Information Security Principles & Applications
Weakness is a better teacher than strength.
Risk Management: Identifying and Assessing Risk Chapter 4 Once we know our weaknesses, they cease to do us any harm. -- G.C. (GEORG CHRISTOPH) LICHTENBERG.
Introducing Computer and Network Security
Risk Management: Assessing and Controlling Risk Chapter 5
Principles of Information Security, 2nd Edition1 Risk Management.
Lecture 8: Risk Management Controlling Risk
Controlling Risk Welcome to IST-456 Topic 9 – Controlling Risk.
Risk Management.
PRINCIPLES OF INOFORMATION SECURITY
CMPS 319 Risk Management: Identifying and Assessing Risk Chapter 4
Risk Management Chapter 4.
Introduction to Network Defense
Learning Objectives Upon completion of this material, you should be able to:
Principles of Information Security, Fifth Edition
Risk Management - Security
ITC358 ICT Management and Information Security
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
An Overview of Risk Management
TEL2813/IS2820 Security Management
Principals of Information Security, Fourth Edition
Conostix S.A. Sensible defence.
Risk Management and Risk Control
Risk Management (Risk Identification)
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Lecture 32 Risk Management (Cont’d)
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Chapter 11: Project Risk Management
Risk Analysis & Management
Risk Management: Controlling Risk
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 2 Risk Identification and Risk Assessment.
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Slide 1 Risk Management: Identifying and Assessing Risk  “ Once we know our weakness, they cease to do us an harm” Greg Lichen.
MANAGEMENT of INFORMATION SECURITY Third Edition CHAPTER 8 RISK MANAGEMENT: IDENTIFYING AND ASSESSING RISK Once we know our weaknesses, they cease to do.
1 Risk Management 2 n IEEE defines risk as: “the likelihood of an event, hazard, threat or situation occurring and its undesirable consequences” [Std.
Question Four: Project Risk Management PMBOK definition of Project Risk Project risk management is the art and science of identifying, analyzing, and responding.
Alaa Mubaied Risk Management Alaa Mubaied
Project Risk Management Planning Stage
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Risk Identification and Risk Assessment
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part II.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Principles of Information Security, Fourth Edition
Principles of Information Security, Fourth Edition Risk Management Ch4 Part I.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 9 R ISK M ANAGEMENT : C ONTROLLING R ISK Weakness is a better teacher than strength. Weakness.
Principles of Information Security, Fourth Edition
Principles of Information Security, Fifth Edition
CompTIA Security+ Study Guide (SY0-401)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
MANAGEMENT of INFORMATION SECURITY Second Edition.
INFORMATION RISK MANAGEMENT
TOPIC 3 RISK MANAGEMENT.
Principles of Information Security
Steven Hartman State Information Security Officer State of Nebraska
Risk Management Principles of Information Security, 2nd Edition
The Importance of Project Risk Management
Risk Management: Principles of risk, Types of risk and Risk strategies
Principles of Information Security, Fifth Edition
Cybersecurity Threat Assessment
Presentation transcript:

Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg

Risk management and Sun Tzu… “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu Know Yourself Know the Enemy

What is risk management? Risk Management consist of identifying and controlling the risks facing an organization Risk Management Risk Identification Risk Control Risk Assessment Selecting Strategy Inventory Assets Justifying Controls Classifying Assets Identifying Threats

Outline 1. Risk Identification 2. Risk Assessment 3. Risk Control Strategies

Risk Identification Plan and organize the process 2) - Asset Identification - Information Asset Classification Categorize system components 3) - Information Asset Valuation - Listing Assets in Order of Importance - Data Classification and Management Inventory/ Categorize assets Identify threats Specify vulnerable assets 4) - Identify and Prioritize Threats 5) - Vulnerability Identification

Risk Assessment Risk estimation Factors of risk: Assess a risk: to assign a risk rating or score to each information asset Risk estimation Factors of risk: Dico: to mitigate= atténuer Uncertainty of current knowledge of the vulnerability Likelihood of the occurrence of vulnerabilities Value of information asset Percentage of risk mitigated by current controls + *

Risk Assessment Example of risk estimation 1 50 10% 0,5 100 50% 20% Asset A vulnerability is rated at 55 55= (50*1)-[(50*1)*0]+[(50*1)*0,1] Asset B vulnerability is rated at 35 likelihood Value Current Control Uncertainty ASSET A 1 50 10% ASSET B 0,5 100 50% 20%

Documenting the Results of Risk Management Risk Assessment Documenting the Results of Risk Management Ranked vulnerability risk worksheet

Risk Control Stategies Avoidance Transference Mitigation Incident Response Plan Disaster Response Plan Business Continuity Plan Acceptance

Selecting a Risk Control Strategy selecting one of the four risk control strategies for each vulnerability the level of threat and the value of the asset play a major role in strategy selection Once a control strategy has been implemented, it should be monitored and measured  a cyclical process to ensure that risk are controlled.

Feasibility Studies & CBA (Cost Benefit Analysis) (1) Aim: used to determine the costs associated with protecting an asset An organization should not spend more to protect an asset then the asset is worth Items that affect the cost of a control - Cost of development & acquisition of software, hardware and services - Training fees - Cost of implementation (install, configure, test) - Service costs (maintenance & upgrade)

Feasibility Studies & CBA (Cost Benefit Analysis) (2) Benefit = the value that an organization realizes by using controls to prevent losses associated with a specific vulnerability. Asset valuation = the process of assigning financial value or worth to each information asset. E.g.1: cost to replace a network switch – simple to determine E.g.2: the dollar value of the loss in market share if information on new product offerings is released prematurely

Risk Assessment & CBA Single Loss Expectancy SLE = Asset Value x Exposure Factor Website value: 1.000.000 euros , Exposure factor = 10% SLE= 100.000 euros Annualized Loss Expectancy ALE = SLE x ARO ARO= 0.5 ALE= 100.000 x 0.5 = 50.000 euros Cost Benefit Analysis (CBA) CBA= ALE(prior)- ALE(post) - ACS

Benchmarking alternative method to the economic feasibility analysis that seeks out and studies the practices used in other organizations that produce the results desired in an organization. Measures to compare practices: metric-based: comparisons based on numerical standards process-based : less focused on numbers and more strategic Two categories of benchmarks are used in InfoSec: standards of due care & due diligence best practices

Applying Best Practices & Benchmarking Does the organization resemble the identified target organization with the best practice under consideration? Does the organization face similar challenges as the target? Is its organizational structure similar to the target’s? Are the resources the organization can expend similar to those identified with the best practice? No two organizations are identical; Best practices are a moving target; Security is a managerial problem, not a technical one.

Delphi Technique What? - Technique for accurately estimating scales and values How? By a group who rates or ranks a set of information. Responses are complied and returned for a new iteration Final: entire group is satisfies with the result Quantitative assessment – actual values or estimates Qualitative assessment – no numeric values, scales (A-Z, 0-10, low, medium, high, very high)

Conclusion “Security is an investment, not an expense. Investing in computer and network security measures that meet changing business requirements and risks makes it possible to satisfy changing business requirements without hurting the business viability.” (F. Avolio, “Best Practices in Network Security”)