risk assessment for
play

RISK ASSESSMENT FOR EXTERNAL VENDORS Luciano Ferrari, CISSP, MBA - PowerPoint PPT Presentation

RISK ASSESSMENT FOR EXTERNAL VENDORS Luciano Ferrari, CISSP, MBA lferrari@lufsec.com www.lufsec.com November, 2013 Risk Assessment is Difficult Multiple scenarios Interpreted as a negative activity Single method/tool not practical


  1. RISK ASSESSMENT FOR EXTERNAL VENDORS Luciano Ferrari, CISSP, MBA lferrari@lufsec.com www.lufsec.com November, 2013

  2. Risk Assessment is Difficult • Multiple scenarios • Interpreted as a negative activity • Single method/tool not practical • Requires key competencies

  3. Categorize your cases • Standardization/Consistency is good • Less complexity, less risk • Experience is a key element

  4. Prerequisites for selection a toolbox • Typical use cases for Risk Assessment • The various approaches for risk assessments • The characteristics of available methods/tools Gather info Analyze Report

  5. Selecting the tools/methods • Characterize use cases Analyze primary • Group similar use cases use cases • Aim for three to five • Characterize typical Map against assessment methods assessment • Map against case model requirements • Functionality criteria Derive evaluation • Practicality, actionability and criteria compatibility requirements • 2-4 that will Select satisfy most tools/approaches cases

  6. Examples – functionality assessment Cases Project/ DRP/BCP ERM Rollup/ Security Procurement Compliance Prioritization Explore: One-to-one Survey Scenario Survey People interviews and questionnaire planning and questionnaire scenario collective and one-to- planning brainstorm one interviews Explore: Risk inventory Vulnerability Threat Threat Systems analysis and inventory inventory threat inventory Assess: - What-if- Deviance and Ranking and Qualitative modeling intuitive intuitive Assess: Automated - - Quantitative calculation Express Absolute/ Scenarios Dashboard Heat map and scalar ALE and heat map projects/ actions

  7. Tools/Methods Explore Assess Express Collective brainstorm Intuitive/discussion/ranking Scenarios and actions FRAP (facilitated workshop) Deviance Questionnaires/scorecards Quantitative: Scorecards ISF SARA and Intuitive/discussion, SPRINT deviance from controls/standards Workshops Qualitative: Scenario-based Status reports and ISF IRAM discussion/brainstorm controls Questionnaires/scorecards Qualitative: Intuitive, Status/heat maps, Citicus ONE deviance from action plan controls/standards Collective brainstorm Qualitative: intuitive against Action Scenarios, OCTAVE (facilitated workshop) threat profile, catalog of projects/actions vulnerabilities Scenario planning Qualitative: Delphic what-if Scenarios GRAM modeling Survey Questionnaire Qualitative: Deviance from Risk status reports, RiskWatch standards. Quantitative: absolute ALE, return on Monte Carlo simulation investment, actions Asset register, Qualitative: deviance, what Actions: Scenarios: CRAMM threat/vulnerability if modeling, automated controls, risk profile, inventory,questionnaire, calculation. Qualitative: BIA register, risk score workshop

  8. Information Classification • If you don’t know what to protect and where it is how can you protect?

  9. Information Security is not an island • Formal engage with other areas is key • Risk Management • Legal • HR • Procurement

  10. Risk Assessment for Cloud Providers Control implications of different models Accountability cannot be outsourced

  11. Master Agreement / SLAs

  12. Tree of Provider Chains • Are you aware of all the parties? • Will you be notified when parties change? • Does your contract require all parties to comply with it? • Do you force clauses applying to the entire chain of providers? • How visible are the finances of the parties?

  13. What service level to look for? • Planned Downtime • Service Availability • Support/Mean time to restore service • Data recovery • RTO/RPO

  14. Risk Assessment on Social Media

  15. Top Social Media issues • Employee productivity • Record Retention • Company reputation/image • Inappropriate content posted by employees • Compliance with regulation/laws • Discovering and assessing social media risks

  16. How and what to monitor? • Analysis • Assessment • Mitigation

  17. Action Plans • Don’t wait for a call from marketing to get involved. • Think of social media as your most popular cloud platform. • Integrate social media processes and drivers into risk assessment processes. • Accept the reality that your enterprise has social risks to manage.

  18. Regulation • HIPAA • PII • PCI • GBA • SOX

  19. • Use the new grouping model • Engage other areas or your organization • Promote Risk Assessment Awareness • Use it for vendor selection criteria • Continuous Improvement

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend