TOWARDS A MODERN APPROACH TO RISK MANAGEMENT Alex Hutton - - - PowerPoint PPT Presentation

towards a modern approach to risk management
SMART_READER_LITE
LIVE PREVIEW

TOWARDS A MODERN APPROACH TO RISK MANAGEMENT Alex Hutton - - - PowerPoint PPT Presentation

TOWARDS A MODERN APPROACH TO RISK MANAGEMENT Alex Hutton - @alexhutton I AM HERE ON MY OWN. I AM NOT SPEAKING ON BEHALF OF ZIONS BANCORP First, some inspiration: A New Approach for Managing Operational Risk Addressing the Issues Underlying


slide-1
SLIDE 1
slide-2
SLIDE 2

TOWARDS A MODERN APPROACH TO RISK MANAGEMENT

Alex Hutton - @alexhutton

slide-3
SLIDE 3

I AM HERE ON MY OWN. I AM NOT SPEAKING ON BEHALF OF ZIONS BANCORP

slide-4
SLIDE 4

First, some inspiration:

A New Approach for Managing Operational Risk

Addressing the Issues Underlying the 2008 Global Financial Crisis Sponsored by: Joint Risk Management Section Society of Actuaries Canadian Institute of Actuaries Casualty Actuarial Society

www.soa.org/files/pdf/research-new-approach.pdf

slide-5
SLIDE 5

Not “where is the risk?” but... “how much risk do we have?”

slide-6
SLIDE 6

Not “where is the risk?” but... “how much risk do we have?” and... ”why?”

slide-7
SLIDE 7

Some level setting...

slide-8
SLIDE 8

There is no “risk free” (no “secure”) Risk is (currently) a hypothetical construct There are different “risk” approaches

slide-9
SLIDE 9

WHAT IS RISK?

slide-10
SLIDE 10
slide-11
SLIDE 11

How do most people view “risk”?

slide-12
SLIDE 12

Financial Risk

slide-13
SLIDE 13

financial risk has potential for both positive and negative returns

slide-14
SLIDE 14

Financial Risk Engineering Risk

slide-15
SLIDE 15
slide-16
SLIDE 16

engineering risk: rate of decay

slide-17
SLIDE 17

Financial Risk Engineering Risk

A Symptom or Audit-Driven Approach? (“where is the risk”)

slide-18
SLIDE 18

ENGINEERING RISK MANAGEMENT : FIND THE WEAKNESS AND REINFORCE IT

slide-19
SLIDE 19

19

slide-20
SLIDE 20

RCSA as commonly performed

slide-21
SLIDE 21

Inherent risk - Controls = Residual Risk

RCSA as commonly performed

slide-22
SLIDE 22

Inherent risk - Controls = Residual Risk

HIGH Strong Low How awesome is your bridge?

RCSA as commonly performed

slide-23
SLIDE 23

Financial Risk Engineering Risk

except...

slide-24
SLIDE 24

24

Wind has no motivation

slide-25
SLIDE 25

25

Rain does not try to evade

  • ur umbrella
slide-26
SLIDE 26

26

If the system is faulty by design... Reinforcement addresses only symptoms

slide-27
SLIDE 27

Financial Risk Engineering Risk

does it give a good view of risk in the whole system?

slide-28
SLIDE 28

Complex (adaptive) Systems

slide-29
SLIDE 29

Complex (adaptive) Systems

a system composed of interconnected parts that as a whole exhibit one

  • r more

properties not

  • bvious from the

properties of the individual parts

slide-30
SLIDE 30

Complex (adaptive) Systems

a system composed of interconnected parts that as a whole exhibit one

  • r more

properties not

  • bvious from the

properties of the individual parts

SOUND FAMILIAR?

slide-31
SLIDE 31

Financial Risk Engineering Risk

unintended consequences as emergent properties

slide-32
SLIDE 32
slide-33
SLIDE 33
slide-34
SLIDE 34

Complex (adaptive) Systems

We May be dealing with a complex, adaptive system.

slide-35
SLIDE 35

Financial Risk Engineering Risk

another problem

slide-36
SLIDE 36

Science vs. Engineering?

The science of information security & risk management is hard

slide-37
SLIDE 37
  • somewhat random fact

gathering (mainly of readily accessible data)

  • a“morass”of interesting,

trivial, irrelevant observations

  • a variety of theories (that are

spawned from what he calls philosophical speculation) that provide little guidance to data gathering

Pseudo-Science vs. Proto-Science

slide-38
SLIDE 38

At our present skill in measurement of security, we generally have an ordinal scale at best, not an interval scale and certainly not a ratio scale. In plain terms, this means we can say whether X is better than Y but how much better and compared to what is not so easy. – Dan Geer

slide-39
SLIDE 39

The ¡First ¡(and ¡most ¡important) ¡ Measurement: ¡

Survival

39

slide-40
SLIDE 40

The ¡Second ¡Measurement: ¡

comparison

40

slide-41
SLIDE 41

The ¡Third ¡Measurement: ¡ ¡ units

Our observable factors that correlate well with the construct of speed happen to be time and distance.

41

slide-42
SLIDE 42

Science is based on inductive observations to derive meaning and understanding and measurement on quality (ratio) scales, so what about InfoSec? Where do we sit in the family of sciences?

slide-43
SLIDE 43

We’re the Crazy Uncle with tinfoil hat antennae used to talk to the space aliens of Regulus V, has 47 cats, and who too frequently (but benignly) forgets to wear pants.

slide-44
SLIDE 44

Take, for example, CVSS

slide-45
SLIDE 45

“the Base Equation multiplies Impact by 0.6 and Exploitability by 0.4”

slide-46
SLIDE 46

= Shiny Jet Engine X Peanut Butter

slide-47
SLIDE 47

“the Base Equation multiplies Impact by 0.6 and Exploitability by 0.4”

slide-48
SLIDE 48

48

adding one willy-nilly doesn’t suddenly transform

  • rdinal rankings

into ratio values. decimals aren’t magic.

slide-49
SLIDE 49

Financial Risk Engineering Risk

another problem

slide-50
SLIDE 50

Complex (adaptive) Systems

a system composed of interconnected parts that as a whole exhibit one

  • r more

properties not

  • bvious from the

properties of the individual parts

SOUND FAMILIAR?

slide-51
SLIDE 51

Inherent risk - Controls = Residual Risk

RCSA as commonly performed

slide-52
SLIDE 52

Inherent risk - Controls = Residual Risk

HIGH Strong Low

RCSA as commonly performed

slide-53
SLIDE 53

Inherent risk - Controls = Residual Risk

HIGH Strong Low A Point Probability

RCSA as commonly performed

slide-54
SLIDE 54

54

You’re making point probabilities in Complex Systems? How Adorable!

Friedrich ¡Hayek ¡Says:

slide-55
SLIDE 55

55

COMPLEX SYSTEMS ARE BEST UNDERSTOOD BY EXAMINING THE PATTERNS IN THE DATA

slide-56
SLIDE 56

Inherent risk - Controls = Residual Risk

HIGH Strong Low

RCSA as commonly performed

slide-57
SLIDE 57

57

Much of (Engineering) Risk Management is a Cargo Cult

slide-58
SLIDE 58

Much of (Engineering) Risk Management is a Cargo Cult

slide-59
SLIDE 59

Financial Risk Engineering Risk

must be augmented with something else

slide-60
SLIDE 60

Financial Risk Engineering Risk Medical Risk

slide-61
SLIDE 61

Financial Risk Engineering Risk Medical Risk (Criminology, too)

slide-62
SLIDE 62

EPIDEMIOLOGY

slide-63
SLIDE 63

EPIDEMIOLOGY

Risk Factors (Determinants)

Variables associated with increased frequency of event.

Risk Markers

Variable that is quantitatively associated with a disease or other outcome, but direct alteration of the risk marker does not necessarily alter the risk of the

  • utcome.

Correlation vs. Causation

Risk factors or determinants are correlational and not necessarily causal, because correlation does not prove causation.

slide-64
SLIDE 64

EPIDEMIOLOGY

Risk Factors (Determinants)

Variables associated with increased frequency of event.

Risk Markers

Variable that is quantitatively associated with a disease or other outcome, but direct alteration of the risk marker does not necessarily alter the risk of the

  • utcome.

Correlation vs. Causation -

Risk factors or determinants are correlational and not necessarily causal, because correlation does not prove causation.

THE MEANS TO FIND PATTERNS

slide-65
SLIDE 65

is designed to address the problems we face in understanding complex systems Medical Risk

slide-66
SLIDE 66
  • DR. RICHARD

COOK MEDICAL RISK & COMPLEX SYSTEMS FAILURE

slide-67
SLIDE 67

http://www.ctlab.org/documents/How%20Complex%20Systems%20Fail.pdf

slide-68
SLIDE 68

Complex systems contain changing mixtures of failures latent within them.

The complexity of these systems makes it impossible for them to run without multiple flaws being present. ... individually insufficient to cause failure ...failures change constantly because of changing technology, work organization, and efforts to eradicate failures. Complex systems run in degraded mode.

slide-69
SLIDE 69

Risk is a characteristic of systems and not of their components

Risk is an emergent property of systems; it does not reside in a person, device or department of an organization or system. ... it is not a feature that is separate from the other components of the system. ...the state of Risk in any system is always dynamic

slide-70
SLIDE 70

Inherent risk - Controls = Residual Risk

HIGH Strong Low How awesome is your bridge?

RCSA as commonly performed

slide-71
SLIDE 71

We may want to re-think our approach to risk & risk management

slide-72
SLIDE 72

Serious Question: Can you imagine if your doctor operated in the same way we approach risk management?

slide-73
SLIDE 73
slide-74
SLIDE 74

Examples of “Medical Risk” in Information T echnology

slide-75
SLIDE 75

Data: Visible OPS for Security

slide-76
SLIDE 76

Example of a medical approach:

  • Dr. Peter Tippett & Verizon DBIR
slide-77
SLIDE 77

A security incident (or threat scenario) is modeled as a series

  • f events. Every event

is comprised of the following 4 A’s:

Agent: Whose actions affected the asset Action: What actions affected the asset Asset: Which assets were affected Attribute: How the asset was affected VERIS (Vocabulary for Event Recording & Incident Sharing)

77

slide-78
SLIDE 78

Object-Oriented Modeling

78

1 2 3 4 5

>" >" >" >"

Incident as a chain of events >"

VERIS (Vocabulary for Event Recording & Incident Sharing)

slide-79
SLIDE 79

VERIS: Classification of Events by Risk Factor

slide-80
SLIDE 80

Complex System?

VERIS FOUND PATTERNS!

slide-81
SLIDE 81

Inherent risk - Controls = Residual Risk

HIGH Strong Low How awesome is your bridge?

RCSA as commonly performed

slide-82
SLIDE 82

The data says that capability to manage (not necessarily the breadth of controls) is the key determinant

slide-83
SLIDE 83

Inherent risk - Controls = Residual Risk

HIGH Strong Low How much are you associated with Failure?

Evidence-Based Analysis

slide-84
SLIDE 84

Inherent risk - Controls = Residual Risk

HIGH Strong Low How GOOD is your lifestyle?

Evidence-Based Analysis

slide-85
SLIDE 85

Shall we talk about change?

slide-86
SLIDE 86

The Modern Approach to Risk Management

slide-87
SLIDE 87

The Modern Approach to Risk Management: A Manifesto

slide-88
SLIDE 88

Premise: Risk Management must provide value, address the need, & be ethical.

The Modern Approach to Risk Management: A Manifesto

slide-89
SLIDE 89

Clause One: T

  • be ethical, the risk

manager must be, first and foremost, a data scientist.

The Modern Approach to Risk Management: A Manifesto

slide-90
SLIDE 90

Statistics & Probability Ryan Gosling Says:

slide-91
SLIDE 91

threat landscape asset landscape impact landscape controls landscape

risk What to study: Sources of Knowledge

slide-92
SLIDE 92

Framework Models Data

=

slide-93
SLIDE 93

Framework Models Data

=

slide-94
SLIDE 94

94

We quickly figured out:

slide-95
SLIDE 95

95

We quickly figured out: 1.) The means to address the system must be data-driven, and

Data

slide-96
SLIDE 96

96

We quickly figured out: 1.) The means to address the system must be data-driven, and 2.) We must study the individual parts,

slide-97
SLIDE 97

97

We quickly figured out: 1.) The means to address the system must be data-driven, and 2.) We must study the individual parts, then the relationships between parts

slide-98
SLIDE 98

98

We quickly figured out: 1.) The means to address the system must be data-driven, and 2.) We must study the individual parts, then the relationships between parts, then and only then we can discuss the whole

slide-99
SLIDE 99

Framework Models Data

=

VERIS+

slide-100
SLIDE 100

100

VERIS WILL ALLOW US TO: 1.) Describe the elements of banking operations (using Basel-esque high level categorization) 2.) Fully categorize whatever we’re looking at 3.) Collect data in a same to same fashion

slide-101
SLIDE 101

101

We quickly figured out: 1.) The means to address the system must be data-driven, and 2.) We must study the individual parts, then the relationships between parts before we can discuss the whole, and 3.) We’re looking at a boat-load

  • f data.
slide-102
SLIDE 102

102

How big is a boat-load?

slide-103
SLIDE 103

How big is a boat-load?

slide-104
SLIDE 104

How big is a boat-load?

ZIONS HAS MILLIONS OF “SQUARES”

slide-105
SLIDE 105

We’re going to need a bigger boat

slide-106
SLIDE 106

Security Data Warehousing

slide-107
SLIDE 107

Framework Models Data

=

VERIS+ How will we deal with a boat-load?

slide-108
SLIDE 108

Framework Models Data

=

Data Warehousing+ How will we deal with a boat-load?

slide-109
SLIDE 109

109

How will we deal with a boat-load?

slide-110
SLIDE 110

110

How will we deal with a boat-load?

Data MapReduce Process Analytics & Reporting

Threat Intel Feeds Control Data Control Logs System Logs Event ¡History ¡& ¡Loss Loss ¡DistribuJon ¡Dev. B.I.A. Control Data Control Logs System Logs Configuration Data Vulnerability Data HR Information Process Behaviors

XML CSV EDI LOG SQL JSON Text Binary Objects

create map reduce

Rapid Access Database Systems Workflow Analytics Reporting

slide-111
SLIDE 111

How will we deal with a boat-load?

slide-112
SLIDE 112

How will we deal with a boat-load?

slide-113
SLIDE 113

How will we deal with a boat-load?

slide-114
SLIDE 114

114

Example: Vendor-owned SaaS application

slide-115
SLIDE 115

Genomic ¡sequencing for ¡operaJonal ¡risk

slide-116
SLIDE 116

Clause 2: T

  • provide value the

modern approach has to support counter-threat operations.

The Modern Approach to Risk Management: A Manifesto

slide-117
SLIDE 117

financial ¡reporJng technology financial ¡crime ¡/ ¡ security regulatory ¡/ ¡legal business ¡conJnuity people vendor ¡management

  • peraJons

customer ¡treatment

data in

agent acJon asset aVribute/Loss controls belongs to one of the following basic classifications of data: intelligence, scenario development request, incident information, issue management

classified

new input from any source

categorized

being proactive here will mean identifying regular, recurring sources and setting up processes.

broken into elements

the analyst then identifies the following elements relevant to each data object per the selected categories taxonomy of: And is then categorized in TOPS Op Risk Categories TRM will have to come up with the taxonomies on the left for each

  • f the categories
  • n the right.

VERIS is probably 60-75% of what we need.

Processed

As a historical incident, scenario,

  • r KRI

Modeled

Given meaning through model of scenario, added or modifying KRIs, or added to historical register.

Reported

Output is either back to the input when they’ve requested development, or reported in a regular report/ dashboard/ scorecard the right tool here will make it easy to slice and dice reports and “auto-update.”

slide-118
SLIDE 118

Risk Management is an intelligence function

slide-119
SLIDE 119

duh.

slide-120
SLIDE 120

120

3 types of intel functions for Operational Risk

Type of Intel Real Time Tactical Strategic Audience (counter threat

  • perations)

(Security Operations) (Security & Executive Management) Risk’s Role low medium high Main Information Types asset (TO focuses on threat) asset, threat, control time, money Tools controls, hadoop, storm, kafka, hive, dremel, drill controls, hadoop, hive, R Hadoop, R

slide-121
SLIDE 121

121

3 types of intel functions for Operational Risk

Type of Intel Real Time Tactical Strategic Audience (counter threat

  • perations)

(Security Operations) (Security & Executive Management) Risk’s Role low medium high Main Information Types asset (TO focuses on threat) asset, threat, control time, money Tools controls, hadoop, storm, kafka, hive, dremel, drill controls, hadoop, hive, R Hadoop, R

slide-122
SLIDE 122

122

3 types of intel functions for Operational Risk

Type of Intel Real Time Tactical Strategic Audience (counter threat

  • perations)

(Security Operations) (Security & Executive Management) Risk’s Role low medium high Main Information Types asset (TO focuses on threat) asset, threat, control time, money Tools controls, hadoop, storm, kafka, hive, dremel, drill controls, hadoop, hive, R Hadoop, R

slide-123
SLIDE 123

123

3 types of intel functions for Operational Risk

Type of Intel Real Time Tactical Strategic Audience (counter threat

  • perations)

(Security Operations) (Security & Executive Management) Risk’s Role low medium high Main Information Types asset (TO focuses on threat) asset, threat, control time, money Tools controls, hadoop, storm, kafka, hive, dremel, drill controls, hadoop, hive, R Hadoop, R

slide-124
SLIDE 124

124

How will we deal with a boat-load?

Data MapReduce Process Analytics & Reporting

Threat Intel Feeds Control Data Control Logs System Logs Event ¡History ¡& ¡Loss Loss ¡DistribuJon ¡Dev. B.I.A. Control Data Control Logs System Logs Configuration Data Vulnerability Data HR Information Process Behaviors

XML CSV EDI LOG SQL JSON Text Binary Objects

create map reduce

Traditional RDBMS Systems Workflow Analytics Reporting

FEEDBACK LOOPS

slide-125
SLIDE 125

125

The primary control of the future might just be the combination of behavioral analytics and machine learning

slide-126
SLIDE 126

126

BIG DATA IS NOT THE SOLUTION! Data Science is.

slide-127
SLIDE 127

Example of current success

slide-128
SLIDE 128

Internal employee behaviors systems connecting (tactical, real time)

time of connection (real time) riskiest cost center (strategic)

slide-129
SLIDE 129

Clause 3: T

  • address the need the

modern approach has support rational decision making.

The Modern Approach to Risk Management: A Manifesto

slide-130
SLIDE 130

Rational Decision Making requires multiple models, multiple perspectives. Scenario Analysis: FAIR State Analysis: Homebrew

slide-131
SLIDE 131

Rational Decision Making requires multiple models, multiple perspectives. Scenario Analysis: FAIR (how much risk do I have) State Analysis: (how well am I living)

slide-132
SLIDE 132

FAIR Analysis

slide-133
SLIDE 133

FAIR Analysis

slide-134
SLIDE 134

FAIR Analysis

slide-135
SLIDE 135

Touchpoint Scorecard

PSG Risk PM Risk InfoSec Operations Issue Mgmt Compliance Upcoming Vendors New Vendors Existing Vendor Dependencies Existing Projects New Projects Long term Short term IT Desires Events Applications Systems New Existing Owners Functions Reporting Changes Owners risk Vuln New Existing Owners Functions Reporting Changes Owners risk Vuln Fin Reporting (SOX) Events Strategic Reputation audit findings Areas of Risk for mitigation upcoming compliance upcoming audit PCI GLBA FFIEC HIPAA SARS Red Flags Events

Scorecard

slide-136
SLIDE 136

Touchpoint Scorecard

PSG Risk PM Risk InfoSec Operations Issue Mgmt Compliance Upcoming Vendors New Vendors Existing Vendor Dependencies Existing Projects New Projects Long term Short term IT Desires Events Applications Systems New Existing Owners Functions Reporting Changes Owners risk Vuln New Existing Owners Functions Reporting Changes Owners risk Vuln Fin Reporting (SOX) Events Strategic Reputation audit findings Areas of Risk for mitigation upcoming compliance upcoming audit PCI GLBA FFIEC HIPAA SARS Red Flags Events

Scorecard

slide-137
SLIDE 137

AN EASY TO USE TOOL TO HELP YOU FRAME THE PROBLEM-SPACE

slide-138
SLIDE 138

The RiskFish

slide-139
SLIDE 139

The problem space can be confusing to talk about.

slide-140
SLIDE 140

People naturally gravitate towards fixing the easy symptom rather than the hard problem

slide-141
SLIDE 141

Kaoru Ishikawa father of quality circles and the fish diagram

slide-142
SLIDE 142

Fish (Ishikawa) diagram for root cause analysis in manufacturing

slide-143
SLIDE 143

Fish (Ishikawa) diagram for root cause analysis for risk using VERIS

slide-144
SLIDE 144

(description)

Issue: Agent Asset Impact Controls

productivity response replacement fines/judgments competitive advantage reputation increased operational expenses Threat Agent (internal, external, partner) Motiviation Capability Description Type (Server, User Device, People, Offline, etc.) specific controls control capability prevention detection response Ownership/location/management Information/Transaction, Amount

Attribute

Confidentiality Possession/Control Integrity Authenticity Availability Utility Types of Action Categories Vector(s)/Path(s)/etc.

Action RISK FISH

This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/.

Categories (Hacking, Malware, Social, Misuse…)

slide-145
SLIDE 145

VERIS RiskFish Resources Society of Information Risk Analysts

http://www.societyinforisk.org

VERIS Community

http://www.veriscommunity.net/

slide-146
SLIDE 146

Moment of Zen

slide-147
SLIDE 147

The point at which you can remove the word risk from your vocabulary is the point at which you become a risk master.