Risk Management Calita Gheorghita Cristinel Bucharest 09 - - PowerPoint PPT Presentation

risk management
SMART_READER_LITE
LIVE PREVIEW

Risk Management Calita Gheorghita Cristinel Bucharest 09 - - PowerPoint PPT Presentation

Risk Management Calita Gheorghita Cristinel Bucharest 09 November 2015 Risk Management - content Introduction Risk identification Risk assessment Risk mitigation Conclusions & closing thoughts Q&A 2


slide-1
SLIDE 1
  • Calita Gheorghita Cristinel
  • Bucharest • 09 November 2015

Risk Management

slide-2
SLIDE 2

2

  • Introduction
  • Risk identification
  • Risk assessment
  • Risk mitigation
  • Conclusions & closing

thoughts

  • Q&A

Risk Management - content

slide-3
SLIDE 3

Introduction

slide-4
SLIDE 4

4

  • Concept
  • Short history
  • Frameworks

Introduction

slide-5
SLIDE 5

5

Why we need Risk Management?

Source: http://www.bankinfosecurity.com/chase-a-6356/op-1

Source: http://www.wsj.com/articles/deutsche-bank-mistakenly-transfers-6-billion-to-clients-account-1445283517 Source: http://lifehacker.com/chase-bank-hacked-info-stolen-for-83-million-accounts- 1642063956

slide-6
SLIDE 6

6

Risk Management is defined as the process of identifying risks, assessing their potential impacts on the organization and its mission, determining the likelihood of their

  • ccurrence, communicating findings to management and

developing and implementing risk mitigation strategies to reduce risks to levels that are acceptable to the

  • rganization.

What is Risk Management?

Definition: Goal: Information Risk Management Is the management of the risks involved with manipulating data. Risk Management’s goal is to create a

reference framework that will allow

companies to handle risk and uncertainty.

slide-7
SLIDE 7

7

Related terms

RISK

Likelihood Threat source

Vulnerability

Impact Threat

slide-8
SLIDE 8

8

Risk definition

slide-9
SLIDE 9

9

Information Risk & CIA Triad

The risk of direct or indirect loss resulting from inadequate or failed internal processes, people and systems, or from external events Confidentiality - ensure that data can be accessed only by those who are authorized. Integrity - prevent unauthorised or inadvertent data modification. Availability - ensure that data is always available when we need it The risk of financial and reputational loss due to events leading to breaches

  • f confidentiality, integrity and availability of business processes or

information caused by inadequate information and IT security. IT Risk Operational Risk

slide-10
SLIDE 10

Risk identification

slide-11
SLIDE 11

11

Risk Identification

  • Describe how risks are identified.
  • Risks identified through internal assessments:
  • Business environment assessments
  • Risk and control self assessments
  • IT risk assessments
  • Vulnerability assessments (e.g. scans)
  • Internal control missions/verifications
  • Scenario analysis
  • Risks identified via external assessments:
  • External audit reports;
  • External penetration tests;
  • Responsible disclosure programs;
  • Emerging external trends/factors, sourced
  • from reputable external sources;
slide-12
SLIDE 12

12

Controls

  • A control is a measure, an action, a process, a requirement, etc. that has the final

scope to mitigate a risk.

  • Categories….
  • Technical (control end-user and system

action; e.g. passwords constraints, access control lists, firewalls, data encryption, antivirus software, intrusion prevention software, etc.)

  • Administrative (dictates how the

activities should be performed; e.g. policies, procedures, guidelines, standards, etc.)

  • Operational (e.g. configuration

management, incident response, awareness, etc.)

  • Preventive (attempt to prevent adverse

behavior and actions from occurring; e.g. firewall, IPS, etc.)

  • Deterrent (warn a would-be attacker that he

should not attack; e.g. fence, dog sign, etc.)

  • Detective (detect actual or attempted

violations of system security; e.g. sensors IDS, etc.)

  • Compensating (backup controls that

come into play only when other controls have failed; e.g. backup generator)

OR

slide-13
SLIDE 13

Risk assessment

slide-14
SLIDE 14

14

Risk Assessment – likelihood determination

  • Likelihood determination. Based on the:
  • Operating system, application,

database or device affected by the vulnerability

  • Whether local or remote access

is required to exploit the vulnerability

  • The skills and tools required to

exploit the vulnerability

  • Threat source motivational

factors (e.g. financial gain,

  • revenge. Political motivation)
  • Capability (e.g. skills, tools,

knowledge)

  • The effectiveness of the controls

used for preventing the vulnerability exploitation.

Vulnerability Nature Threat source’s motivation and capability Controls in place

slide-15
SLIDE 15

15

Risk Assessment – Impact Analysis (I)

  • Quantitative approach (financial impact)

Factors may include:

  • Range and severity of

issue

  • Perceived importance
  • Budget involved
  • Etc.

ALE: Annual Loss Expectancy

  • The expected

annual loss as a result of a risk to a specific asset

RISK

IMPACT

(in Euro’s)

Number of

  • ccurrences

(absolute nr.

per annum)

=

x Likelihood

(in %) x

slide-16
SLIDE 16

16

Risk Assessment – Impact Analysis (II)

  • Qualitative approach (non-financial impact) – risk rating table

Source: https://ischool2013.wikispaces.com/file/view/risk-table.jpg/472497818/risk-table.jpg

slide-17
SLIDE 17

17

Risk Assessment – risk level-matrix

  • Risk determination

Results from the combination of:

  • The likelihood
  • The magnitude of the impact
  • The effectiveness of the controls in

place

Critical Risk :

  • Major risk to the organization and organizational mission exists
  • Corrective actions are mandatory and should be implemented

immediately.

High Risk :

  • Significant risk to the organization and to organizational mission exists.
  • Strong need for corrective actions
  • Corrective actions to be implemented as soon as possible

Medium Risk :

  • Moderate risk to the organization and to organizational mission exists.
  • There is a need for corrective actions .
  • Corrective actions to be implemented within reasonable time

Low Risk :

  • A low risk to the organization exists.
  • A evaluation needed to determine if the risk should be reduced or it

should be accepted.

  • If it is determined tat the risk should be reduced, corrective actions to

be implemented within reasonable time

slide-18
SLIDE 18

Risk mitigation

slide-19
SLIDE 19

19

Risk Mitigation (I)

  • The risk as it is, before the controls are considered
  • Applicable for new projects, in the planning phase, considering the

source threats present in the environment, only with its generic controls in place.

  • The risk given the effectiveness of the current control environment
  • Requires the identification of all relevant existing specific controls

and the assessment of the controls’ effectiveness

  • If there are no existing controls, the managed risk is the inherent

risk

  • The target risk level after mitigation actions have been

put in place

  • Assessment of the residual risks after planned mitigation

actions and related to the target risk appetite of business management

  • If there are no additional planned mitigation actions, the

residual risk is the managed risk

Inherent Risk Managed Risk Residual Risk Inherent, Managed, and Residual Risk

slide-20
SLIDE 20

20

Ri sk Mi t i gat i on ( II)

Ri sk M Mi t i gat i on S St rat egi es

Managed R Ri sk Ri sk Reduct i on Ri sk A Avoi dance Ri sk T Transf er Ri sk A Accept ance Resi dual R Ri sk Ri sk A Accept ance

Resi dual ri sk w i t hi n appet i t e Residual risk beyond appetite

1. Reduci ng t he l i kel i hood of

  • ccurrence

2. Reduci ng I Im pact

1. Ri sk D Devi at i on 2. Ri sk Accept ances 3. Ri sk W Wai ver

Insurance St op t he act i vi t y t hat generat es t he ri sk Ri sk Reduct i on Ri sk Avoi dance Ri sk Transf er Ri sk Accept ance

slide-21
SLIDE 21

Conclusions & closing thoughts

slide-22
SLIDE 22

22

Risk identification and risk assessment activities should always be documented and presented to company senior management.

Conclusion & closing thoughts

Risk mitigation strategies should be developed by senior management , based on cost-benefit approach. Risks are present in nearly all of company’s financial and economical activities – risk management process is an important part of company’s strategic development.

slide-23
SLIDE 23

Thank you

Any questions?