Donald Hester February 9, 2010 For audio call Toll Free 1 - 888-886-3951 and use PIN/code 360619 IT Best Practices for Community Colleges Part 1: IT Risk.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

Alex Kissal and Matt Lord February 22, 2010 For audio call Toll Free and use PIN/code Blackboard Managed Hosting Overview.
Marlene Cvetko November 18, 2009 For audio call Toll Free and use PIN/code Make Teaching Easier with Dragon Naturally Speaking.
Osman Parada Senior Technology Support Specialist San Bernardino Community College District November 4, 2009 For audio call Toll Free
Micah Orloff March 17, 2010 For audio call Toll Free and use PIN/code What's New with Blackboard 9: Increase Student Success by.
Marti Atkinson October 29, 2009 For audio call Toll Free and use PIN/code Free and Easy Collaboration Tools.
Photoshop Tips and Tricks, Part 1: Cropping, Selecting, and Improving Quality Donna Eyestone February 27, 2008 For audio call Toll Free
Sean Keegan August 5, 2008 For audio call Toll Free and use PIN/code The ABCs of PDFs Part 3: Creating Accessible PDF Documents.
Donald Hester May 4, 2010 For audio call Toll Free and use PIN/code Windows 7 for IT Professionals Part 1: Security and Control.
Ryan Eash September 30, 2009 For audio call Toll Free and use PIN/code Camtasia for the Mac: Enhancing Online Learning for Mac.
Donald Hester October 21, 2009 For audio call Toll Free and use PIN/code Getting the Most from Word 2007, Part 2: References and.
The Art of PowerPoint, Part 2: Animations and Audio Zachary Schroeder April 9, 2008 For audio call Toll Free and use PIN/code
Janet Davis October 29, 2008 This is a VoIP session. All audio will be through your computer without any phone. The ABCs of PDFs with Acrobat 9, Part 2:
Bill Doherty and Pat James 2/25/2010 For audio call Toll Free and use PIN/code Professional Development on a Shoe String Budget.
The Art of PowerPoint, Part 3: Accessibility and the Web Sean Keegan April 21, 2008 For audio call Toll Free and use PIN/code
The Art of PowerPoint, Part 1: Tools, Views and Master Slides Zachary Schroeder April 2, 2008 For audio call Toll Free and use PIN/code.
Micah Orloff September 21, 2010 For audio call Toll Free and use PIN/code
Donna Eyestone February 23, 2011 For audio call Toll Free and use PIN/code
Gregory Beyrer July 22, 2010 For audio call Toll Free and use PIN/code From Blackboard to Desire2Learn.
Michelle Macfarlane March 5, 2009 For audio call Toll Free and use PIN/code Engaging Millennial Students with Fun Tech: Animoto.
Donna Eyestone 2/24/2010 For audio call Toll Free and use PIN/code Free Podcast Hosting with 3CRSS.
Tony McKinley August 11, 2009 For audio call Toll Free and use PIN/code Save $$ with Nuance's New PDF Converter.
Micah Orloff March 10, 2010 For audio call Toll Free and use PIN/code What's New with Blackboard 9: Increase Student Retention.
Online Tutoring made Easy Kakwasi Somadhi April 29, 2008 For audio call Toll Free and use PIN/code
Donald Hester March 30, 2010 For audio call Toll Free and use PIN/code IT Best Practices for Community Colleges Part 3: Configuration.
Donald Hester March 9, 2010 For audio call Toll Free and use PIN/code IT Best Practices for Community Colleges Part 2: Business.
Richard Mundell November 11, 2009 For audio call Toll Free and use PIN/code Free and Easy Course Authoring with myUDUTU.
Eric Wilson, MS Ed March 16, 2010 For audio call Toll Free and use PIN/code Online Collaborative Groups.
Micah Orloff March 3, 2010 For audio call Toll Free and use PIN/code What's New with Blackboard 9: Getting Acquainted.
The ABCs of PDFs, Part 2: Bookmarks, Forms & Security Eric Wilson, MS Ed April 1, 2008 For audio call Toll Free and use PIN/code
Donna Eyestone 4/21/2010 For audio call Toll Free and use PIN/code The Power of iLife.
Eric Wilson August 5, 2010 For audio call Toll Free and use PIN/code
Micah Orloff July 31, 2008 For audio call Toll Free and use PIN/code The Art of PowerPoint 2007 Part 1: Tools, Views and Master.
Donald Hester April 20, 2010 For audio call Toll Free and use PIN/code IT Best Practices for Community Colleges Part 4: Awareness.
Michelle Macfarlane November 10, 2009 For audio call Toll Free and use PIN/code Building Community Online, Part 5: Social Networking.
Micah Orloff August 7, 2008 For audio call Toll Free and use PIN/code The Art of PowerPoint 2007 Part 2: Animations and Audio.
Micah Orloff July 7, 2009 For audio call Toll Free and use PIN/code What's New on Blackboard: Exploring the Grade Center.
Tahiya Marome October 8, 2009 For audio call Toll Free and use PIN/code Engaging Millennial Students with Fun Tech: Games.
Donald Hester October 7, 2009 For audio call Toll Free and use PIN/code Getting the Most from OneNote 2007.
Michelle Macfarlane September 24, 2009 For audio call Toll Free and use PIN/code Engaging Millennial Students with Fun Tech: Jing.
Donald E. Hester July 23, 2008 For audio call Toll Free and use PIN/code Get up to Speed with 2007 Office Part 2: PowerPoint, Outlook,
Donald Hester October 14, 2009 For audio call Toll Free and use PIN/code Getting the Most from Word 2007, Part 1: Creating and.
Blaine Morrow 3/2/2010 For audio call Toll Free and use PIN/code New Video Collboration with Elluminate.
Anna Stirling and Micah Orloff May 22, 2012 For audio call Toll Free and use PIN/code Take Your Online Teaching to New Heights:
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Donald E. Hester 19-Mar-2010 For audio call Toll Free and use PIN/code
Donald E. Hester October 30, 2009 For audio call Toll Free and use PIN/code Windows 7: The View Beyond Vista is Great.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Catherine Werst July 27, 2010 For audio call Toll Free and use PIN/code
Larry Green July 15, 2010 For audio call Toll Free and use PIN/code Online Math Games and Resources.
Joan Van Duzer April 13, 2011 For audio call Toll Free and use PIN/code
Micah Orloff and Donna Eyestone October 19, 2010 For audio call Toll Free and use PIN/code
Lynn Strand March 30, 2011 For audio call Toll Free and use PIN/code
Marsha Fralick and Keith Franco July 13, 2010 For audio call Toll Free and use PIN/code A College Success Course for New Millennial.
James Glapa-Grossklag July 20, 2010 For audio call Toll Free and use PIN/code
Marsha Fralick and Keith Franco July 13, 2010 For audio call Toll Free and use PIN/code A College Success Course for New Millennial.
EQAA 11th Session Jamil Kalat-Malho Jong Ho Lee
Donna Eyestone February For audio call Toll Free and use PIN/code
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Eric Wilson July 30, 2010 For audio call Toll Free and use PIN/code
Alaa Mubaied Risk Management Alaa Mubaied
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Building an Online Writing Center
TOPIC 3 RISK MANAGEMENT.
IT Best Practices for Community Colleges Part 3: Configuration Management Donald Hester March 30, 2010 For audio call Toll Free and use.
Cybersecurity Threat Assessment
Presentation transcript:

Donald Hester February 9, 2010 For audio call Toll Free and use PIN/code IT Best Practices for Community Colleges Part 1: IT Risk Management

Maximize your CCC Confer window. Phone audio will be in presenter-only mode. Ask questions and make comments using the chat window. Housekeeping

Adjusting Audio 1)If youre listening on your computer, adjust your volume using the speaker slider. 2)If youre listening over the phone, click on phone headset. Do not listen on both computer and phone.

Saving Files & Open/close Captions 1.Save chat window with floppy disc icon 2.Open/close captioning window with CC icon

Emoticons and Polling 1)Raise hand and Emoticons 2)Polling options

CISOA Conference

Donald Hester IT Best Practices for Community Colleges Part 1: IT Risk Management

IT Best Practices for Community Colleges Series 1 Spring 2010 Part 1 Risk Management Part 2 Business Continuity Part 3 Configuration Management Part 4 Awareness Training Series 2 Fall

How do you justify a new firewall? Is it more than you need? Is it less than you need? How does someone outside of IT know it was the right choice? How do you demonstrate due care? 9

Risk: the potential for any loss Asset: something of value Probability: the likelihood of an event Control: something that reduces risk (countermeasure, safeguard) Threat: event that has an undesirable impact, potential danger Vulnerability: weakness Exposure: open to threat Residual risk: risk left over after controls are put in place Acceptable risk: risk accepted by management

Asset Vulnerability Threat Asset Vulnerability Countermeasure

Risk Management: process of reducing risks because it cannot be eliminated Risk Analysis: identify assets and potential losses Risk Assessment: determination of recommended controls that would reduce risk to an acceptable level Vulnerability Assessment: used for the risk analysis, determines vulnerabilities

Process not a goal SDLC (Systems Development Life Cycle) Any change in environment changes your risk level

Managements role Balance cost with operational goals Acceptable levels of risk (risk apatite) Use the risk analysis process for decision- making Cost benefit analysis (ROI) Determine if controls are in place Sign-off forms to take responsibility Risk analysis team

Management can choose how to deal with risk once they have all the information and recommendations. After they have the results form the risk analysis they can determine how they want to mitigate risks. Mitigating risks to an acceptable level. Any risk remaining is residual risk.

Reduce the risk Apply countermeasures and controls (mitigation) Accept the risk Accept the risk with or without controls Transfer the risk Buy insurance (mitigation) Reject the risk Ignore the risks

Purpose 1 st step in Risk Management Ensure that the security program (controls) are adequate and appropriate for the real risks Goals Identify assets Identify risks Connect risks and assets Determine impact Cost vs. benefit Prioritize control selection/implementation

We need to determine what we have, what it is worth, what could happen to it, how often it could happen, what the impact would be if it did happen, so that we could determine what controls should be used based on cost, and document everything we discovered.

Identify assets, determine their value and classify them.

Physical Hardware Buildings Information Data Software Documentation Human Resources Reputation

Acquisition costs Development costs Maintenance costs Value to user, customer Value to enemy Market value (how much someone will pay) Replacement costs Liability Impact to Productivity Usefulness Reputation Operations Competitiveness

Identify the risks associated with the assets. Threat / Vulnerability pare

Physical Loss Theft Environmental Errors and Omissions Humans Software Malfunction Equipment failure Misuse Attacks Internal or External Intentional or unintentional Action or inaction

Impact analysis

Quantitative Formal Numeric Monetary Statistical Qualitative Informal Rating Gut feeling Educated guess Delphi method

Impact What is the asset worth; AV (Asset Value) How bad would it be; EF (Exposure Factor) One time loss; SLE (Single Loss Expectancy) How many times a year; ARO (Annualized Rate of Occurrence) How much loss in a year; ALE (Annualized Loss Expectancy) AV * EF = SLE; SLE * ARO = ALE

Select Risks with the highest probability and the highest impact potential. Meteorite to hit the data center would be a low probability with a high impact Virus would be a high probability with a potential for a high impact

Controls should focus on addressing High probability attack High impact attacks Consistent implementation Automated and continuously monitored Additional technical activities should be used to defend systems Rev1/8/2010

Determine what controls can be used, what the cost associated with each control and recommend controls.

Mitigates the risk ALE before the control ALE after the control Control complexity Cost / Benefit Comparison ROI (Return on Investment) Hidden costs Productivity Maintenance

Limited resources Time Funding Resources Personnel With limited resources choices have to be made about which security controls are most important A prioritized approach in implementing controls is required Prioritized by greatest risk first Rev1/8/2010

How do we prioritize controls Intelligence Knowledge of actual attacks Controls that can prevent know attacks should be given a higher priority A consensus report has been developed to document 20 critical controls Rev1/8/2010

Documentation

Documented Risk Assessment

1.System Characterization 2.Threat Identification 3.Vulnerability Identification 4.Control Analysis 5.Likelihood Determination 6.Impact Analysis 7.Risk Determination 8.Control Recommendation 9.Results Document NIST SP

36 State, local, and tribal governments, as well as private sector organizations, are encouraged to use the guidelines, as appropriate." NIST SP California Information Security Strategic Plan (OCT 2009) "...by adopting the National Institute of Standards and Technology (NIST) guidelines for certification and accreditation of information systems. Applying NIST guidelines to state government systems will demonstrate Californias leadership in building a resilient, secure, and trustworthy digital infrastructure." "Establish a California modified version of the NIST risk management standard as the risk management standard for all state agencies." "Establish a California-modified version of the NIST recommended security controls within all state agencies."

NIST SP Risk Management Guide for IT Systems Information Technology Standards and Practices for Local Governments, September 2007 By Maze & Associates California Information Security Strategic Plan (OCT 2009) Cybersecurity and Privacy Concepts, Strategies & Goals Volume 4 Twenty Critical Controls for Effective Cyber Defense: Consensus Audit Guidelines version 2.1, 11 Aug

Donald E. Hester CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+ Maze & / San Diego City College Q&A

Evaluation Survey Link Help us improve our seminars by filing out a short online evaluation survey at:

Thanks for attending For upcoming events and links to recently archived seminars, check Web site at: IT Best Practices for Community Colleges Part 1: IT Risk Management