SlideShare a Scribd company logo
1 of 42
Download to read offline
Phillip Banks PE, CPP © The Banks Group Inc. - 2017
“If we don’t understand vulnerability we
won’t understand risk.”
Unknown
“Risk management is a systematic response
to uncertainty.”1
1CSE/RCMP Harmonized Threat and Risk Assessment Methodology, October 23rd, 2007
Risk
Is a person or situation
that poses a possible
threat to the security of
something.
The effect of
uncertainty on
objectives1.
Vulnerability
Is a weakness or gap in
a security protections,
control measures or
processes that can be
exploited by an
adversary to remove,
damage or destroy an
asset.
1Risk Management Principles and Guidelines, AS NZS ISO 31000:2009
Risk has three key characteristics1:
It looks ahead into the future;
There is an element of uncertainty e.g. a
condition or a situation exists that might
cause a problem for the project in the future;
It is related to the outcome.
1Project Complexity and Risk Assessment Tool, Version 1.4,. Treasury Board of Canada Secretariat
Risk = P x I
Risk = P x I x V
Risk = PA (1 – PI) C
Risk = P x I x M
Risk = Probability x Impact
Security Controls
Risk = P X E (Exploitability of Protection)
Adversary?
Threat(s)?
Adversary
Objectives?
Capabilities
and Strengths?
Adversary
Determination?
Knowledge,
Training and
Experience?
Timeline?
???????
© The Banks Group Inc. - 2016
Risk is never static.
Risk can be within or outside
our sphere of control.
Risk is affected by both the
adversary and the target.
A convertible asset requires
multi-stage “risk continuum”
consideration.
What can be done to positively
affect the “risk triangle”?
Corporate “Risk Appetite”?
Probability
Quantifiable Risk
Risk we can precisely measure
and record with numbers:
How many security controls are
present?
Is the control strength rated?
How many attacks per day do we
see?
How many times did this happen
in the past?
How many vulnerabilities exist?
etc.
Qualifiable Risk
Risk we have an idea about
but can't accurately measure
and is thus subjective:
How confident are we with the
code-base?
Do we think the project has had
sufficient review?
Do we think this control is
efficient?
etc.
Possibility – An event
that could occur.
Probability – The
likelihood of the event
occurring.
A “possibility” is any event which has a
“probability” of occurrence which is greater
than “0”.
A threat-event will take
place?
The threat-event will be
mitigated to some degree?
The adversary will be 100%
successful?
What probability?
Impossible?
Even Chance?
Certain?
Historical record
Anecdotal info
Police sources
Industry sources
Networking
Credible intelligence
Security technology
inputs
Industry experience
…………………….?
Probability of a six being
on the upper surface of
one dice…?
Probability of two sixes
being on the upper
surface of two dice…?
Probability of three sixes
being on the upper
surface of three dice…?
A system with three
components fails if one
or more components fail.
The probability that any
given component will fail
is 1/10.
What is the probability
that the system will fail?
Business impact analysis
S.W.O.T analysis
Past experience
Risk manager
In-house counsel
Public relations
Employees
Etc...
Probability
Impact
Critical
Medium
Low
High
• R = Risk to the facility of an adversary gaining access to
assets (ranges from 0 to 1.0).
• PA = Probability of an adversary attack during a period of
time.
• PE = Probability of Preventing the Event.
• = P(I) INTERUPTION x P(N) NEUTRALIZATION
• C = Consequence Value.
Note: If PE is the probability of preventing the event then [1-PE] must be the
probability of the adversary being successful
R = PA * [1-(PE)] *C
* The Design and Evaluation of Physical Security Systems, Garcia, Mary Lynn, Butterworth-Heinemann, 2001
Risk = Probability Vulnerability Impact
Vulnerabilities are
always present?
Vulnerabilities are not
static.
Vulnerabilities
become transparent
if not treated.
Vulnerabilities are
measurable.
Control Measures
Vulnerability Parameters?
What is vulnerable?
Why is it vulnerable?
What makes it vulnerable?
Is the vulnerability easily exercised?
Can the vulnerability be mitigated?
Management and Measurement
Identify vulnerabilities.
Establish parameters.
Identify options.
Implement options.
Measure outcome.
Remediate as required.
Monitor and report.
Vulnerability Register.
Vulnerability
Vulnerability
Type
Threat
Relationship
Dependency
?
Remediation
WHAT IS IT? P, P or T
Tailgating People Daily Operations
Access
Management
Protocol
Education and
Awareness,
Signage, Anti-
Passback
Pareto Analysis
Pair-wise Comparison
Fault Tree Analysis
Attack Tree Analysis
Failure Mode & Effect Analysis
Failure Modes, Effects & Criticality
Analysis
C.A.R.V.E.R (modified)
Cause & Effect (Ishikawa)
Monte Carlo Simulation
_____________________?
Qualitative vs Quantitative
Fit-for-Purpose:
A protection/control measure which is
formally selected and mitigates the
known and reasonably foreseeable
threats.
State-of-Readiness:
A protection/control measure which is
implemented, operated, maintained and
demonstrably capable of mitigating
known or reasonably foreseeable
threats.
Rating
Fit-for-Purposes
Scoring Rationale
5
Protection selected based on
recognized standard or leading
practice. A formal performance
level was identified and is still
being met or exceeded.
3
Protection not specifically
appropriate for the threat,
operational or functional
environment or it is only nominally
achieving the required level of
performance.
1
Protection is inappropriate for
threat, operational or functional
environment or is not meeting a
required level of performance.
Rating
State-of-Readiness
Scoring Rationale
5
Protection is functioning as
designed and is operational in all
respects. There is little or no
down-time and there is no record
of it being compromised.
3
Protection is primarily functioning
as designed although there is
occasional down-time due to loss-
of-service or periodic break-
down.
1
Protection is not functioning or
not being in a State-of-Readiness
due to periodic loss-of-service or
break-down.
Fit-for-Purpose and State-of-Readiness ratings are
independent so the overall rating is the product of the
two.
A protection which is both fully Fit-for-Purpose and in
a complete State-of-Readiness should achieve a score
of 25.
If the assessor believes Fit-for-Purpose = 5 but the
State-of-Readiness = 3 then the overall rating of the
protection is 15 or 60% effective and it has a
vulnerability level of 40%.
1. Develop the protection design to meet
DBT.
2. Identify appropriateelements of the
design.
3. Identify how protection system will be
evaluated for effectiveness over time.
Characteristic Insider Criminal Organized Crime
Objective Steal assets such as tools, parts. Steal large quantity of valuable assets. Steal large quantities of finished product.
Motivation Personal gain, revenge. Personal gain. Large gain for criminal organization.
Base Enhanced Base Enhanced Base Enhanced
Planning/System
Knowledge
Good depending on
position.
Significant. Some, opportunistic.
Significant if in
collusion with
insider.
Good to high level.
Extensive
information and
level of access.
Weapons None Edged weapons Edged weapons
Hand guns, shot
guns
Unlikely
Wide array of
weapons
Tools and Equipment
Access keys or
credentials.
Access keys,
credentials &
combinations.
Hand tools or readily
available tools at the
facility.
Hand and power
tools.
Hand tools or
readily available
tools at the facility.
Access keys,
credentials and
combinations. Hand
and power tools.
Contaminants N/A N/A N/A N/A N/A N/A
IMPACT (damage) to
Asset(s)
Minimal Notable Notable Significant
Notable to
Significant
Significant to Critical
Injury to Persons No
Possible but
unintentional
Possible but
unintentional
Possible
Possible but
unintentional
Possible and
intentional
Fatalities No No No
Possible but
unintentional
Possible but
unintentional
Possible and
intentional
1The Design and Evaluation of Physical Protection Systems, Mary Lynn Garcia, Sandia National Laboratories, Albuquerque, New Mexico, Butterworth- Heinemann, 2001
Define the Context – Measuring What?
Identify all contributing security
element(s).
Use known or reasonably foreseeable
threat(s).
Step through the process and assign
scores – Does it make sense?
Team approach/peer review.
Protection Deter Deny Detect Delay Respond Protection
Score
%
Cont.
Comments
Fence 3 3 0 3 0 9 11
Bldg Const. 5 5 0 5 0 15 19
AM & IDS 1 3 5 3 3 15 19
CCTV 3 1 5 0 5 14 18
Sec Guards 5 3 3 3 5 19 24
Employees 1 0 3 0 3 7 9
18 15 16 14 16
Actual Score = 79
Possible Score = 115
Overall Effectiveness = 69%
PROBABILITY
IMPACT
VULNERABILITY
1. Collecting, recording and analyzing
information and data to develop security
intelligence.
2. Networking and contact development.
3. Modeling and threat forecasting
1. Business impact analysis.
2. Identification of critical structures,
operations and people.
3. Implementation and maintenance of
organizational resilience.
1. Criticality analysis.
2. Threat and threat event identification.
3. Vulnerability analysis e.g. Pareto, CARVER
& Monte Carlo Simulation etc.
4. Vulnerability assessment and reduction.
Practice risk management or become
very good at crisis management.
Your choice…..
Risk
Management
Crisis
Management?
Phillip Banks PE, CPP
The Banks Group Inc.
#4 – 1310 Wilkinson Road
Comox, British Columbia
Canada
V9M 0B3
604.762.5852
pbanks@thebanksgroup.ca www.thebanksgroup.ca
© The Banks Group Inc. - 2017
Protection of Assets Manual, ASIS International
Industry Guidelines on a Framework for Risk Related Decision Support, UKOOA, 1999
GRiP – A flexible approach for calculating risk as- a function of consequence, vulnerability and Threat, R.G. Whitfield, W.A.
Beuhring and G.W. Bassett, Argon National Laboratory, ANL/DIS -113, Decision and Information Services Division, January 2011.
Maturity Framework for Assuring Resiliency Under Stress, Carnegie-Mellon University, Don O’Neill, 2008
Pareto-Optimal Situation Analysis for Selection of Security Measures, Andres Ojamaa, Enn Tyugu, Jyri Kivimaa, IEEE, 2008
Concept of Vulnerability in Chemical Plants, Journal of Chemical & Pharmaceutical Research, 6(7); 1448-1454, Dongfen Zhao, Su
Hu, Cong An, Shuang Chen, Yifei Meng - 2004
Quantified Risk is a Weak Hypothesis, “A critical survey of results and assumptions”, Vilhelm Verendel, Chalmers University, 2009
General Security Risk Assessment Guideline, ASIS International Guidelines Committee, 2003
Indicators and criteria for measuring vulnerability: Theoretical Basis and Requirements, Jӧrn Birkmann, 2006
Defining and assessing quantifying security risk measures using vulnerability lifecycle and CVSS metrics, Hyun Chul Jon and
Yashwant K. Malaiya, Colorado State University, Fort Collins, Colorado, USA, 2011
Risk Analysis and the Security Survey, Third Edition, James F. Broder, CPP, Butterworth-Heinemann, 2006
AS/NZS ISO 31000:2009 Standard, Risk Management Principles and Guidelines (Superseding AS/NZS4360:2004)
AS/NZS HB 167:2006 Security Risk Management Standard Handbook
The Design and Evaluation of Physical Protection Systems, Mary-Lynn Garcia, Sandia National Laboratories, 2001
Risk Assessment and Management for Critical Asset Protection (RAM-CAP), ASME Innovative Technologies Institute LLC,
Washington, DC, 2004
Business Risk Assessment, David McNamee, The Institute of Internal Auditors, 1998
w3.epa.gov, Defining Risk Characterization
http://www.algebra.com/algebra/homework/Probability-and-statistics/Probability-and-statistics.faq.question.419808.html

More Related Content

What's hot

Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Managementansula
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Diane Christina
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides SlideTeam
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskOsama Salah
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
 
Human Factors as Driver for Safety Management, Engineering, and Risk Governance
Human Factors as Driver for Safety Management, Engineering, and Risk GovernanceHuman Factors as Driver for Safety Management, Engineering, and Risk Governance
Human Factors as Driver for Safety Management, Engineering, and Risk GovernanceThe Windsdor Consulting Group, Inc.
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Richard Swartzbaugh
 
Integrating Strategy and Risk Management
Integrating Strategy and Risk ManagementIntegrating Strategy and Risk Management
Integrating Strategy and Risk ManagementAndrew Smart
 
Safety Management System framework
Safety Management System  frameworkSafety Management System  framework
Safety Management System frameworkS P Singh
 
Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides SlideTeam
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsResolver Inc.
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementECC International
 
Risk Assessment Step PowerPoint Presentation Slides
Risk Assessment Step PowerPoint Presentation SlidesRisk Assessment Step PowerPoint Presentation Slides
Risk Assessment Step PowerPoint Presentation SlidesSlideTeam
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk managementSubhendu Datta
 
Safety Management Systems (SMS) Fundmentals: Safety Risk Management Component
Safety Management Systems (SMS) Fundmentals: Safety Risk Management ComponentSafety Management Systems (SMS) Fundmentals: Safety Risk Management Component
Safety Management Systems (SMS) Fundmentals: Safety Risk Management ComponentFAA Safety Team Central Florida
 

What's hot (20)

Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Risk management
Risk managementRisk management
Risk management
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Human Factors as Driver for Safety Management, Engineering, and Risk Governance
Human Factors as Driver for Safety Management, Engineering, and Risk GovernanceHuman Factors as Driver for Safety Management, Engineering, and Risk Governance
Human Factors as Driver for Safety Management, Engineering, and Risk Governance
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
 
Integrating Strategy and Risk Management
Integrating Strategy and Risk ManagementIntegrating Strategy and Risk Management
Integrating Strategy and Risk Management
 
Safety Management System framework
Safety Management System  frameworkSafety Management System  framework
Safety Management System framework
 
Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Risk Assessment Step PowerPoint Presentation Slides
Risk Assessment Step PowerPoint Presentation SlidesRisk Assessment Step PowerPoint Presentation Slides
Risk Assessment Step PowerPoint Presentation Slides
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk management
 
SMS - Safety Management Systems
SMS - Safety Management SystemsSMS - Safety Management Systems
SMS - Safety Management Systems
 
Safety Management Systems (SMS) Fundmentals: Safety Risk Management Component
Safety Management Systems (SMS) Fundmentals: Safety Risk Management ComponentSafety Management Systems (SMS) Fundmentals: Safety Risk Management Component
Safety Management Systems (SMS) Fundmentals: Safety Risk Management Component
 

Similar to Risk Management and Security Controls Manual

Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis"Apolonio \"Apps\"" Garcia
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxClintonKelvin
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101Barry Caplin
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesRoger Johnston
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementPriyanka Aash
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementPriyanka Aash
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment MythsRoger Johnston
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfChinatu Uzuegbu
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItEmerson Exchange
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and securityM. Isaiah McGowan
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadOpenDNS
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced AnalyticsHaystax Technology
 

Similar to Risk Management and Security Controls Manual (20)

Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptx
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
R af d
R af dR af d
R af d
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and security
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 

More from Resolver Inc.

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsResolver Inc.
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsResolver Inc.
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementResolver Inc.
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityResolver Inc.
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate SettingResolver Inc.
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceResolver Inc.
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationResolver Inc.
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeResolver Inc.
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementResolver Inc.
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreResolver Inc.
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses ResolverResolver Inc.
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringResolver Inc.
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyResolver Inc.
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationResolver Inc.
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk AssessmentResolver Inc.
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceResolver Inc.
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationResolver Inc.
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data CleanResolver Inc.
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Resolver Inc.
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)Resolver Inc.
 

More from Resolver Inc. (20)

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 

Recently uploaded

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 

Recently uploaded (20)

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 

Risk Management and Security Controls Manual

  • 1.
  • 2. Phillip Banks PE, CPP © The Banks Group Inc. - 2017
  • 3. “If we don’t understand vulnerability we won’t understand risk.” Unknown “Risk management is a systematic response to uncertainty.”1 1CSE/RCMP Harmonized Threat and Risk Assessment Methodology, October 23rd, 2007
  • 4. Risk Is a person or situation that poses a possible threat to the security of something. The effect of uncertainty on objectives1. Vulnerability Is a weakness or gap in a security protections, control measures or processes that can be exploited by an adversary to remove, damage or destroy an asset. 1Risk Management Principles and Guidelines, AS NZS ISO 31000:2009
  • 5. Risk has three key characteristics1: It looks ahead into the future; There is an element of uncertainty e.g. a condition or a situation exists that might cause a problem for the project in the future; It is related to the outcome. 1Project Complexity and Risk Assessment Tool, Version 1.4,. Treasury Board of Canada Secretariat
  • 6.
  • 7. Risk = P x I Risk = P x I x V Risk = PA (1 – PI) C Risk = P x I x M Risk = Probability x Impact Security Controls Risk = P X E (Exploitability of Protection)
  • 9. © The Banks Group Inc. - 2016
  • 10.
  • 11. Risk is never static. Risk can be within or outside our sphere of control. Risk is affected by both the adversary and the target. A convertible asset requires multi-stage “risk continuum” consideration. What can be done to positively affect the “risk triangle”? Corporate “Risk Appetite”? Probability
  • 12. Quantifiable Risk Risk we can precisely measure and record with numbers: How many security controls are present? Is the control strength rated? How many attacks per day do we see? How many times did this happen in the past? How many vulnerabilities exist? etc. Qualifiable Risk Risk we have an idea about but can't accurately measure and is thus subjective: How confident are we with the code-base? Do we think the project has had sufficient review? Do we think this control is efficient? etc.
  • 13. Possibility – An event that could occur. Probability – The likelihood of the event occurring. A “possibility” is any event which has a “probability” of occurrence which is greater than “0”.
  • 14. A threat-event will take place? The threat-event will be mitigated to some degree? The adversary will be 100% successful? What probability? Impossible? Even Chance? Certain?
  • 15. Historical record Anecdotal info Police sources Industry sources Networking Credible intelligence Security technology inputs Industry experience …………………….?
  • 16. Probability of a six being on the upper surface of one dice…? Probability of two sixes being on the upper surface of two dice…? Probability of three sixes being on the upper surface of three dice…?
  • 17. A system with three components fails if one or more components fail. The probability that any given component will fail is 1/10. What is the probability that the system will fail?
  • 18. Business impact analysis S.W.O.T analysis Past experience Risk manager In-house counsel Public relations Employees Etc...
  • 20. • R = Risk to the facility of an adversary gaining access to assets (ranges from 0 to 1.0). • PA = Probability of an adversary attack during a period of time. • PE = Probability of Preventing the Event. • = P(I) INTERUPTION x P(N) NEUTRALIZATION • C = Consequence Value. Note: If PE is the probability of preventing the event then [1-PE] must be the probability of the adversary being successful R = PA * [1-(PE)] *C * The Design and Evaluation of Physical Security Systems, Garcia, Mary Lynn, Butterworth-Heinemann, 2001 Risk = Probability Vulnerability Impact
  • 21. Vulnerabilities are always present? Vulnerabilities are not static. Vulnerabilities become transparent if not treated. Vulnerabilities are measurable.
  • 22.
  • 24. What is vulnerable? Why is it vulnerable? What makes it vulnerable? Is the vulnerability easily exercised? Can the vulnerability be mitigated?
  • 25. Management and Measurement Identify vulnerabilities. Establish parameters. Identify options. Implement options. Measure outcome. Remediate as required. Monitor and report. Vulnerability Register.
  • 26. Vulnerability Vulnerability Type Threat Relationship Dependency ? Remediation WHAT IS IT? P, P or T Tailgating People Daily Operations Access Management Protocol Education and Awareness, Signage, Anti- Passback
  • 27. Pareto Analysis Pair-wise Comparison Fault Tree Analysis Attack Tree Analysis Failure Mode & Effect Analysis Failure Modes, Effects & Criticality Analysis C.A.R.V.E.R (modified) Cause & Effect (Ishikawa) Monte Carlo Simulation _____________________? Qualitative vs Quantitative
  • 28. Fit-for-Purpose: A protection/control measure which is formally selected and mitigates the known and reasonably foreseeable threats. State-of-Readiness: A protection/control measure which is implemented, operated, maintained and demonstrably capable of mitigating known or reasonably foreseeable threats.
  • 29. Rating Fit-for-Purposes Scoring Rationale 5 Protection selected based on recognized standard or leading practice. A formal performance level was identified and is still being met or exceeded. 3 Protection not specifically appropriate for the threat, operational or functional environment or it is only nominally achieving the required level of performance. 1 Protection is inappropriate for threat, operational or functional environment or is not meeting a required level of performance. Rating State-of-Readiness Scoring Rationale 5 Protection is functioning as designed and is operational in all respects. There is little or no down-time and there is no record of it being compromised. 3 Protection is primarily functioning as designed although there is occasional down-time due to loss- of-service or periodic break- down. 1 Protection is not functioning or not being in a State-of-Readiness due to periodic loss-of-service or break-down.
  • 30. Fit-for-Purpose and State-of-Readiness ratings are independent so the overall rating is the product of the two. A protection which is both fully Fit-for-Purpose and in a complete State-of-Readiness should achieve a score of 25. If the assessor believes Fit-for-Purpose = 5 but the State-of-Readiness = 3 then the overall rating of the protection is 15 or 60% effective and it has a vulnerability level of 40%.
  • 31. 1. Develop the protection design to meet DBT. 2. Identify appropriateelements of the design. 3. Identify how protection system will be evaluated for effectiveness over time.
  • 32. Characteristic Insider Criminal Organized Crime Objective Steal assets such as tools, parts. Steal large quantity of valuable assets. Steal large quantities of finished product. Motivation Personal gain, revenge. Personal gain. Large gain for criminal organization. Base Enhanced Base Enhanced Base Enhanced Planning/System Knowledge Good depending on position. Significant. Some, opportunistic. Significant if in collusion with insider. Good to high level. Extensive information and level of access. Weapons None Edged weapons Edged weapons Hand guns, shot guns Unlikely Wide array of weapons Tools and Equipment Access keys or credentials. Access keys, credentials & combinations. Hand tools or readily available tools at the facility. Hand and power tools. Hand tools or readily available tools at the facility. Access keys, credentials and combinations. Hand and power tools. Contaminants N/A N/A N/A N/A N/A N/A IMPACT (damage) to Asset(s) Minimal Notable Notable Significant Notable to Significant Significant to Critical Injury to Persons No Possible but unintentional Possible but unintentional Possible Possible but unintentional Possible and intentional Fatalities No No No Possible but unintentional Possible but unintentional Possible and intentional
  • 33.
  • 34. 1The Design and Evaluation of Physical Protection Systems, Mary Lynn Garcia, Sandia National Laboratories, Albuquerque, New Mexico, Butterworth- Heinemann, 2001
  • 35. Define the Context – Measuring What? Identify all contributing security element(s). Use known or reasonably foreseeable threat(s). Step through the process and assign scores – Does it make sense? Team approach/peer review.
  • 36. Protection Deter Deny Detect Delay Respond Protection Score % Cont. Comments Fence 3 3 0 3 0 9 11 Bldg Const. 5 5 0 5 0 15 19 AM & IDS 1 3 5 3 3 15 19 CCTV 3 1 5 0 5 14 18 Sec Guards 5 3 3 3 5 19 24 Employees 1 0 3 0 3 7 9 18 15 16 14 16 Actual Score = 79 Possible Score = 115 Overall Effectiveness = 69%
  • 37.
  • 38.
  • 39. PROBABILITY IMPACT VULNERABILITY 1. Collecting, recording and analyzing information and data to develop security intelligence. 2. Networking and contact development. 3. Modeling and threat forecasting 1. Business impact analysis. 2. Identification of critical structures, operations and people. 3. Implementation and maintenance of organizational resilience. 1. Criticality analysis. 2. Threat and threat event identification. 3. Vulnerability analysis e.g. Pareto, CARVER & Monte Carlo Simulation etc. 4. Vulnerability assessment and reduction.
  • 40. Practice risk management or become very good at crisis management. Your choice….. Risk Management Crisis Management?
  • 41. Phillip Banks PE, CPP The Banks Group Inc. #4 – 1310 Wilkinson Road Comox, British Columbia Canada V9M 0B3 604.762.5852 pbanks@thebanksgroup.ca www.thebanksgroup.ca © The Banks Group Inc. - 2017
  • 42. Protection of Assets Manual, ASIS International Industry Guidelines on a Framework for Risk Related Decision Support, UKOOA, 1999 GRiP – A flexible approach for calculating risk as- a function of consequence, vulnerability and Threat, R.G. Whitfield, W.A. Beuhring and G.W. Bassett, Argon National Laboratory, ANL/DIS -113, Decision and Information Services Division, January 2011. Maturity Framework for Assuring Resiliency Under Stress, Carnegie-Mellon University, Don O’Neill, 2008 Pareto-Optimal Situation Analysis for Selection of Security Measures, Andres Ojamaa, Enn Tyugu, Jyri Kivimaa, IEEE, 2008 Concept of Vulnerability in Chemical Plants, Journal of Chemical & Pharmaceutical Research, 6(7); 1448-1454, Dongfen Zhao, Su Hu, Cong An, Shuang Chen, Yifei Meng - 2004 Quantified Risk is a Weak Hypothesis, “A critical survey of results and assumptions”, Vilhelm Verendel, Chalmers University, 2009 General Security Risk Assessment Guideline, ASIS International Guidelines Committee, 2003 Indicators and criteria for measuring vulnerability: Theoretical Basis and Requirements, Jӧrn Birkmann, 2006 Defining and assessing quantifying security risk measures using vulnerability lifecycle and CVSS metrics, Hyun Chul Jon and Yashwant K. Malaiya, Colorado State University, Fort Collins, Colorado, USA, 2011 Risk Analysis and the Security Survey, Third Edition, James F. Broder, CPP, Butterworth-Heinemann, 2006 AS/NZS ISO 31000:2009 Standard, Risk Management Principles and Guidelines (Superseding AS/NZS4360:2004) AS/NZS HB 167:2006 Security Risk Management Standard Handbook The Design and Evaluation of Physical Protection Systems, Mary-Lynn Garcia, Sandia National Laboratories, 2001 Risk Assessment and Management for Critical Asset Protection (RAM-CAP), ASME Innovative Technologies Institute LLC, Washington, DC, 2004 Business Risk Assessment, David McNamee, The Institute of Internal Auditors, 1998 w3.epa.gov, Defining Risk Characterization http://www.algebra.com/algebra/homework/Probability-and-statistics/Probability-and-statistics.faq.question.419808.html