Security Risk Management

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

1 INCOSE HRA Advanced Risk Management Conference 2007 Courtney Lane INCOSE HRA Risk Management Conference November 9, 2007 Its More Than Just Numbers:
PROJECT RISK MANAGEMENT
Copyright 2010, The World Bank Group. All Rights Reserved. Statistical Project Monitoring Section B 1.
Note: See the text itself for full citations. Information Technology Project Management, Seventh Edition.
Session 3: Security Risk Management Eduardo Rivadeneira IT Pro Microsoft Mexico.
Security Risk Management Steve Lamb Technical Security Advisor
SQM - 1DCS - ANULECTURE Software Quality Management Software Quality Management Processes V & V of Critical Software & Systems Ian Hirst.
Auditing A Risk-Based Approach To Conducting A Quality Audit
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Security Risk Management Jamie Sharp CISSP Security Advisor Microsoft Australia.
Chapter 2 A Strategy for the Appraisal of Public Sector Investments.
Security Risk Management Paula Kiernan Ward Solutions.
Introduction to Network Defense
1 Security Risk Management Liping Cai 02/01/2006.
Challenges Faced in Developing Audit Plans and Programs 21 st March, 2013.
PRM 702 Project Risk Management Lecture #28
The Microsoft Office 2007 Enterprise Project Management Solution:
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Project Risk and Cost Management. IS the future certain? The future is uncertain, but it is certain that there are two questions will be asked about our.
Chapter 11: Project Risk Management
Conostix S.A. Sensible defence.
Risk Management and Risk Control
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Risk Analysis vs Security Controls. Security Controls Risk assessment is a flawed safeguard selection method. There is a tendency to confuse security.
Chapter 10 Contemporary Project Management Kloppenborg
GBA IT Project Management Final Project - Establishment of a Project Management Management Office 10 July, 2003.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Hartley, Project Management: Integrating Strategy, Operations and Change, 3e Tilde Publishing Chapter 10 Risk Management Proactively managing the positive.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
1 TenStep Project Management Process ™ PM00.7 PM00.7 Project Management Preparation for Success * Manage Risk *
(c) 2007 Charles G. Gray1 TCOM 5253 / MSIS 4253 Survey of Current Practices 6 September 2007 Charles G. Gray IT Risk Management, Planning and Mitigation.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
MANAGEMENT of INFORMATION SECURITY Second Edition.
12/10/15.  It is a Cross Life Cycle Activity (CLCA) that may be performed at any stage ◦ In fact, some part of it (e.g. risk analysis and management)
Project Portfolio Management Business Priorities Presentation.
Implementation and follow up Critically important but relatively neglected stages of EIA process Surveillance, monitoring, auditing, evaluation and other.
Lesson 20-Risk Management. Background  Risk management can be described as a decision-making process.  Effective risk management avoids costly oversights.
SOFTWARE PROJECT MANAGEMENT
Introduction to Information Security
Project Risk Management Planning Stage
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Project Management Processes for a Project Chapter 3 PMBOK® Fourth Edition.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part II.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Business Continuity Planning 101
Risk Assessment: A Practical Guide to Assessing Operational Risk
Managing Project Risk – A simplified approach Presented by : Damian Leonard.
THINK DIFFERENT. THINK SUCCESS.
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Systems Analysis and Design in a Changing World, 4th Edition
Identify the Risk of Not Doing BA
Air Carrier Continuing Analysis and Surveillance System (CASS)
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Information Security Risks; All-in-One Terminology
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

Security Risk Management

Agenda Overview Reactive Vs. Proactive approaches Quantitative risk management or qualitative risk management Assessing Risk Conducting Decision Support Implementing Controls Measuring Program Effectiveness

Reactive Approaches to Risk Management Protect human life and people’s safety should always be your first priority. Contain the harm that the attack caused helps to limit additional damage. Determine the extent of the damage that the attack caused right after you contain the situation and duplicate the hard disks. Understand the resources at which attack was aimed and what vulnerabilities were exploited to gain access or disrupt services. Damage should be repaired as quickly as possible to restore normal business operations and recover data lost during the attack. Review the process thoroughly. Determine with your team the steps that were executed successfully and what mistakes were made.

Proactive Approaches to Risk Management Instead of waiting for bad things to happen and then responding to them afterwards, you minimize the possibility of the bad things ever occurring in the first place. Common high-level procedures: -- Identify business assets; -- Determine what damage an attack against an asset could cause to the organization. -- Identify the security vulnerabilities that the attack could exploit. -- Determine how to minimize the risk of attack by implementing appropriate controls.

Approaches to Risk Prioritization -- Quantitative Risk Management The goal is to try to calculate objective numeric values for each of the components gathered during the risk assessment and cost – benefit analysis. Valuing Assets: The overall of the asset to your organization; The immediate financial impact of losing the asset; The indirect business impact of losing the asset. Determining the Single Loss Expectancy(SLE) : SLE is the total amount of revenue that is lost from a single occurrence of the risk. Determining the Annual Rate of Occurrence(ARO): ARO is the number of times that you reasonably expect the risk to occur during one year. Determining Annual Loss Expectance(ALE): The ALE is the total amount of money that your organization will lose in one year if nothing is done to mitigate the risk. Determining Cost of Controls: requires accurate estimates on how much acquiring, testing, deploying, operating, and maintaining each control would cost. Return on security Investment: ROSI = ALE before control – ALE after control – annual cost of controls. The results of the quantitative Risk analyses: -- Assigned monetary values for asset -- A comprehensive list of significant threats -- The probability of each threat occurring -- The loss potential for the company on a per-threat basis over 12 months. -- Recommended safeguards, control, and actions.

Approaches to Risk Prioritization -- Qualitative Risk Management The basic process is very similar to what happens in the quantitative approach. The difference is in the details: -- You calculate relative values not assign hard financial values to assets, expected losses, and cost of controls. -- Risk analysis is usually conducted through a combination of questionnaires and collaborative workshops involving people from a variety of groups within the organization;  The results are presented to management for consideration during a cost-benefit analysis.

Comparing two approaches: Quantitative Qualitative Benefits – Risks are prioritized by financial impact; assets are prioritized by financial values. –Results facilitate management of risk by return on security investment. –Results can be expressed in management-specific terminology (e.g., monetary values and probability expressed as a specific percentage). –Accuracy tends to increase over time as the organization builds historic record of data while gaining experience. – Enables visibility and understanding of risk ranking. – Easier to reach consensus. – Not necessary to quantify threat frequency. – Not necessary to determine financial values of assets. – Easier to involve people who are not experts on security or computers. Drawbacks –Impact values assigned to risks are based on subjective opinions of participants. – Process to reach credible results and consensus is very time consuming. – Calculations can be complex and time consuming. –Results are presented in monetary terms only, and they may be difficult for non-technical people to interpret. –Process requires expertise, so participants cannot be easily – Insufficient differentiation between important risks. – Difficult to justify investing in control implementation because there is no basis for a cost-benefit analysis. – Results are dependent upon the quality of the risk management team that is created.

Microsoft Security Risk Management Process Is a hybrid approach that joins the best elements of the 2 traditional approaches. Significantly simpler than traditional quantitative risk management. Minimize resistance to results of the risk analysis and decision support phases. Enabling consensus to be achieved more quickly and maintained throughout the process.

Risk Management vs. Risk Assessment Goal Manage risks across business to acceptable level Identify and prioritize risks Cycle Overall program across all four phases Single phase of risk management program Schedule Ongoing As needed Alignment Aligned with budgeting cycles N/A

Communicating Risk

Determining Risk Management Maturity Level There are 6 levels -- 0 non existed. -- 1 Ad Hoc -- 2 Repeatable -- 3 Defined Process -- 4 Managed -- 5 Optimized Self assessment: given a questions list, for each question, score your organization from 0 to 5 based on the definition, then add all of the score together.

Defining Roles and Responsibilities

Assessing Risk -- Identify and prioritize risks to the business Planning —Building the foundation for a successful risk assessment. Facilitated data gathering — Collecting risk information through facilitated risk discussions. Risk prioritization — Ranking identified risks in a consistent and repeatable process.

Assessing Risk -- Planning Alignment: Proper timing aids in building consensus during the assessment because it allows stakeholders to take active roles in the planning process. Proper alignment of the risk management process with the budget planning cycle also benefit internal and external auditing activities. Scope: the risk assessment scope should document all organization functions included in the risk assessment. Stakeholder Acceptance: A best practice to enlist stakeholder support is to pre-sell the concept and the activities within the risk assessment Preparing for success: Setting reasonable expectations is critical if the risk assessment is to be successful. Embracing Subjectivity

Facilitated Data Gathering Keys to success: Building support; Discussing vs. Interrogating; Building Goodwill Risk Discussion Preparation: -- Identify Risk Assessment Inputs -- Identify and classifying Assets -- Organizing Risk Information -- Organizing by Defense-in-Depth Layers -- Defining Threats and Vulnerabilities -- Estimating Asset Exposure -- Estimating Probability of Threats Facilitating Risk Discussions

Conducting Decision Support Define functional requirements. Select control solutions. Review solutions against the requirements. Estimate the degree of risk reduction that each control provides. Estimate costs of each solution. Select the risk mitigation strategy.

Implementing Controls and Measuring Program Effectiveness Implementing Controls phase -- Deploy and operate control solutions to reduce risk to the business. -- Seek holistic approach – Incorporate people, process, and technology in mitigation solution. -- Organize by defense-in-depth – Organize mitigation solutions across the business. Measuring Program Effectiveness phase -- is an ongoing one in which the Security Risk Management Team periodically verifies that the controls implemented during the preceding phase are actually providing the expected degree of protection. -- Analyze the risk management process for effectiveness and verify that controls are providing the expected degree of protection.   -- Evaluate the risk management program for opportunities to improve. -- Develop risk scorecard – Understand risk posture and progress.

Level of Effort