mgs696 tech consulting for social impact
play

MGS696 - Tech Consulting for Social Impact Develop a system using - PowerPoint PPT Presentation

MGS696 - Tech Consulting for Social Impact Develop a system using Salesforce for a local non profit Learn to be a consultant Undergrads & Grads welcomed! Talk to Alex after class Risk Management BY Y ALE LEXANDER BIT BITAR


  1. MGS696 - Tech Consulting for Social Impact • Develop a system using Salesforce for a local non profit • Learn to be a consultant • Undergrads & Grads welcomed! • Talk to Alex after class

  2. Risk Management BY Y ALE LEXANDER BIT BITAR

  3. Is Skydiving risky?

  4. Skydiving Statistics Skydiving Estimated Fatalities Per Year Fatalities in U.S. Annual Jumps 1,000 Jumps 2017 24 3.2 million 0.0075 2016 21 3.2 million 0.0065 2015 21 3.5 million 0.0061 2014 24 3.2 million 0.0075

  5. What is risk?

  6. Risk • The potential of losing something of value . • Information security risks – are risks as they apply to data assets.

  7. IT Risk Management • Information Security Policies ■ Communications Security • Organization of Information ■ System Acquisition, Development, Security and Maintenance • Human Resources Security ■ Supplier Relationships • Asset Management ■ Information Security Incident Management • Access Control ■ Information Security Aspects of • Encryption Business Continuity Management • Physical and Environmental ■ Compliance Security ■ Career and Workforce Development • Operations Security ■ Security Awareness

  8. Risks are not only external or technical.. • Financial – Loss of Revenue • Vendor Driven – 3 rd Party Risk (Target Breach) • Accidental – Oops I opened a email with ransomware • Internal – Corporate Espionage, Internal Threats • Legal – Geopoliticial • Natural Disasters or Environmental – Nice firewall

  9. How to Calculate Risk: Im Impact x Likelihood • Impact - If a threat were to materialize, how could it affect our business? • Likelihood – what is the probability of a threat materializing? • Risk = Likelihood x Impact • Likelihood - chance of a risk event occurring • Impact - Financial impact of the risk event

  10. What Do We Do With Risk? • Take the risk • Avoid the risk • Accept the risk • Ignore the risk • Transfer the risk • Exploit the risk • ******Register the Risk******

  11. Context: • Threat Agents- Malicious hacker, Employees, Other Organizations, etc. • Threats – something that can cause harm to an organization. Can be internal or External • DDOS Attack • Snow storm • Owners - People within the organization that are responsible for an asset or process • Director of Payroll • Assets – anything of value to an organization • Web Servers • Payroll Applications • Counter Measures – Any controls that are put in place to reduce the threat • MFA • Privileged Access Management process

  12. What should we do about risk? • Counter Measures – Any controls that are put in place to reduce the threat • 2FA/MFA • Privileged Access Management process • AD Password Policy • Inventory List • PAM and Normal User list • Etc… • Controls – Are put in place to mitigate risk

  13. Cybersecurity: 3 Lines of Defense • Recommended by Risk management • Assured by Internal Audit • 3 Lines of Defense • Sec Ops • Risk • Audit Security IT Risk IT Audit Operations Management Internal Audit

  14. Threats • Internal to our organization ■ External to our organization o Regulatory o Budget loss for needed o Legal projects o Environmental / Weather related o Systems growing overly o Utility related complex o Natural disasters o System failures o Economic o Staff turnover o Geo-political o Insider threats o Civil unrest o Politics/Agendas o Cybersecurity events

  15. Vulnerabilities • Similar to Threats, But within our control • Weaknesses or gap • Not just technical controls • Usually specific • What is the Likelihood of exploitation? • How can it be exploited?

  16. Risk Identification & Risk Analysis • Follow consistent criteria and measurements • Prioritize and plan (risk treatment) • Risk Register & Matrix • Impact • Likelihood • Security Frameworks

  17. Impact x Likelihood • Impact - If a threat were to materialize, how could it affect our business? • Likelihood – what is the probability of a threat materializing? • Risk = Likelihood x Impact • Likelihood - chance of a risk event occurring • Impact - Financial impact of the risk event

  18. Qualitative Risk Assesment Asset Threats Vulnerabilities Impact Likelihood Risk UBHub Failure Too much access Medium Low Medium - - Insider Threats No Documentation - - Overly Complex Misconfigured - - Regulations and Lack of Knowledge - - Legal Exchange Regulations and Misconfigured, Patching Medium Low Medium - - (Email) Legal behind System Failure Too much access - - Complexity Lack of knowledge - - Staff Turnover Stored PII - - Insider Threats - Server Natural Disasters Physical Access High Medium High - - Rooms Utilities Location - - Civil Unrest Older HVAC - - Staff Turnover Older equipment - - Budgets, $$$$ No Documentation - -

  19. Quantitative Assessment Asset Threats Vulnerabilities Impact Likelihood Risk UBHub Failure Too much access $1.5M 3 $1.5M x 3 = - - Insider Threats No Documentation - - Overly Complex Misconfigured - - $4.5M Regulations and Legal Lack of Knowledge - - Exchange Regulations and Legal Misconfigured, Patching $1M 2 $1M x 2 = - - (Email) System Failure behind - Complexity Too much access $2M - - Staff Turnover Lack of knowledge - - Insider Threats Stored PII - - Server Natural Disasters Physical Access $3M 6 $3M x 6 = - - Rooms Utilities Location - - Civil Unrest Older HVAC - - $18M Staff Turnover Older equipment - - Budgets, $$$$ No Documentation - -

  20. Risk Response Avoid Transfer/Share Mitigate Accept

  21. Monitoring Risk Yearly reviews/audits ● Change in policies ● New risk assessment criterias ● Change in criminal landscape ● Risk Dashboards ● E-GRC ● Governance ○ Risk ○ Compliance ○

  22. Information and Data | Handling and Classification At Rest Public ● ● In Transit Internal ● ● Disposal Departmental ● ● Hard Copy Confidential/Sensitive ● ● Electrical Format Highly Restricted ● ● Storage Media ● Need to Know ● Least Privilege ●

  23. Nano Case Study: Driving a car • What risk do we deal with when driving a car? • Threats? • Vulnerabilities? • Likelihood? • Impact? • Response? • How to deal with those risks? • What controls are in place to mitigate those risks?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend