Must cost less than possible Impact

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

PhoenixPro Procurement. technology. contracts. projects.
Risk Assessment What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling.
PII Breach Management and Risk Assessment
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Principles of Information Security, 2nd Edition1 Risk Management.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Risk Assessment Frameworks
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
R-1 Project Risk Management. R-2  Qualitative Risk Analysis  Quantitative Risk Analysis  Risk Response Planning  Sticky note technique  Risk matrix.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
PRM 702 Project Risk Management Lecture #28
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Information Systems Security Computer System Life Cycle Security.
EQAA 11th Session Jamil Kalat-Malho Jong Ho Lee
Security Risk Assessment Applied Risk Management July 2002.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
SEC’s Cybersecurity Risk Alert Part 2 of 3 How-To: Assessing Cybersecurity Risk Thomas J. DeMayo, CISSP, CIPP, CEH, CPT, MCSE Director, IT Audit and Consulting.
Systems and Software Consortium | 2214 Rock Hill Road, Herndon, VA Phone: (703) | FAX: (703) Best.
Hartley, Project Management: Integrating Strategy, Operations and Change, 3e Tilde Publishing Chapter 10 Risk Management Proactively managing the positive.
APRICOT 2015 Security Day Cooperation between Security Teams and Network Operators: Actionable Intelligence on ShellShock Arnold S. Yoon Information Security.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
COM333 – IKBS3 SWOT Analysis. Identify key opportunities and Threats SWOT Analysis –Model for assessing Strengths, Weaknesses, Opportunities and Threats.
Eliza de Guzman HTM 520 Health Information Exchange.
© Mahindra Satyam 2009 Risk Management QMS Training.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Alaa Mubaied Risk Management Alaa Mubaied
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling  OCTAVE Risk/Threat.
1 What does Cybersecurity Risk Management at UW-Madison look like? Initiate DesignImplement Operate & Maintain Operate it Securely Build it Right RMF Categorize.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
The process of identifying and controlling the risks is called Risk Management.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Updated Risk Management template
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Information Security Management Goes Global
Cybersecurity: Risk Management
Introduction and implementation OWASP Risk Rating Management
An Overview on Risk Management
Risk management.
Liberty International Underwriters
Grid Security Risks Mike Surridge
Chapter Three Objectives
COMP3357 Managing Cyber Risk
Business Continuity Plan Training
Security Management Practices
Cybersecurity EXERCISE (CE) ATD Scenario intro
I have many checklists: how do I get started with cyber security?
[insert category name] [insert date]
#IASACFO.
Insuring Against Catastrophes
Cybersecurity ATD Scenario conclusion
Effective Risk Management in Decision Making Process
Risk Articulation Articulation Translation to Risk Register
HIPAA Security Risk Assessment (SRA)
Likelihood 4 Allow 8 Mitigate 12 Avoid 16 3 Accept Severity
Presentation transcript:

Must cost less than possible Impact Risk Analysis Likelihood Impact Risk = X High High High Reputation Financial Life Productivity Likelihood Reduced after Controls implemented Impact Reduced after Risk Transfer Medium Risk Reduced after Risk Transfer and/or Controls implemented Medium Low Reputation Financial Life Productivity Low That Can be Reducing causing Threats Human, Natural Technical, Physical Environmental, Operational Information Transferred Mitigated Accepted by Executive and compromise to with classified for External - Insurance - Contracted Out Must cost less than possible Impact Value & Importance Will exploit Confidentiality Low Medium High and/or To attack Integrity Low Medium High Attack Surface Targets People Places Processes Systems and/or Controls Vulnerabilities Low Medium High Availability - Administrative - Technical - Physical Must cost less than possible Impact Attack Surface Vulnerabilities Reduced after Controls implemented Reducing Reducing ©Hugh Burley – Thompson Rivers University - 2008