SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Information Risk Management  August 2008 Elvin Chan Marsh Risk Consulting – Asia
Recent Concerns about Personal Data Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some Statistics about Personal Data Privacy # of internal personally identifiable information violations per year ,[object Object],[object Object],Source: 2007 Privacy and Data Protection Survey, DTT # of records lost in a single most significant data breach
Some Statistics about Personal Data Privacy Elements implemented in the information risk management system ,[object Object],[object Object],Source: 2007 Privacy and Data Protection Survey, DTT
Question? Despite the effort spent in different elements of the information risk management system, there are still a significant number of data breach, especially internally WHY?
Personal Data (Privacy) Ordinance  Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Data (Privacy) Ordinance  Implications of some judgments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Risk vs Information Risk Management Beyond Information Technology and Cyber Risks: Systems & People COMPLIANCE PROTECTION TECHNOLOGY MANAGEMENT SYSTEM CULTURE PRACTICES & PROCEDURES EFFICIENCY GROWTH INFORAMTION LEAKAGE INTELLECTUAL PROPERTY THEFT UNAUTHORIZED ACCESS IDENTITY THEFT
Information Risk Management  Core Issues – Systems and People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Risk Management  The Four Pillars ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Risk Management  The Four Pillars ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Risk Management  The Four Pillars ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Risk Management  The Four Pillars ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An Illustrative Example  Consumer Credit Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An Illustrative Example  Issues at activity level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An Illustrative Example  Issues at process and organizational levels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.marsh.com.hk

Weitere ähnliche Inhalte

Was ist angesagt?

1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesTony Moroney
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Sharique Rizvi
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle ManagementBarry Caplin
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and toolsVibhor Raut
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 

Was ist angesagt? (20)

1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Role management
Role managementRole management
Role management
 
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
insider threat research
insider threat researchinsider threat research
insider threat research
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 

Andere mochten auch

Risk management and personal values
Risk management and personal valuesRisk management and personal values
Risk management and personal valuesLieda Dsi
 
Personal risk assessment training 1 day programme generic
Personal risk assessment training 1 day programme genericPersonal risk assessment training 1 day programme generic
Personal risk assessment training 1 day programme genericAndy Neal
 
Agile Risk Management : Presented by Ankit Tandon
Agile Risk Management : Presented by Ankit TandonAgile Risk Management : Presented by Ankit Tandon
Agile Risk Management : Presented by Ankit TandonoGuild .
 
Personal Risk Management
Personal Risk ManagementPersonal Risk Management
Personal Risk ManagementTyson Rose
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsSharing Slides Training
 
Chapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database SystemChapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database Systemrefidelia19
 
The Critical Value of Project Risk Management - Why do we have to manage Proj...
The Critical Value of Project Risk Management - Why do we have to manage Proj...The Critical Value of Project Risk Management - Why do we have to manage Proj...
The Critical Value of Project Risk Management - Why do we have to manage Proj...Torsten Koerting
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administratorTheZayne92
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governancedigitallibrary
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administratorKhang-Ling Loh
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
A PROJECT REPORT ON RISK ANALYSIS AND RISK MANAGEMENT IN INVESTING IN INSUR...
 A  PROJECT REPORT ON RISK ANALYSIS AND RISK MANAGEMENT IN INVESTING IN INSUR... A  PROJECT REPORT ON RISK ANALYSIS AND RISK MANAGEMENT IN INVESTING IN INSUR...
A PROJECT REPORT ON RISK ANALYSIS AND RISK MANAGEMENT IN INVESTING IN INSUR...Abhishek Raj
 

Andere mochten auch (20)

Risk management and personal values
Risk management and personal valuesRisk management and personal values
Risk management and personal values
 
Personal risk assessment training 1 day programme generic
Personal risk assessment training 1 day programme genericPersonal risk assessment training 1 day programme generic
Personal risk assessment training 1 day programme generic
 
USAG RC and Area I Personal Risk Management Summer Guide
USAG RC and Area I Personal Risk Management Summer GuideUSAG RC and Area I Personal Risk Management Summer Guide
USAG RC and Area I Personal Risk Management Summer Guide
 
Agile Risk Management : Presented by Ankit Tandon
Agile Risk Management : Presented by Ankit TandonAgile Risk Management : Presented by Ankit Tandon
Agile Risk Management : Presented by Ankit Tandon
 
Personal Risk Management
Personal Risk ManagementPersonal Risk Management
Personal Risk Management
 
ISO Diagram
ISO DiagramISO Diagram
ISO Diagram
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
 
Sop 7
Sop 7Sop 7
Sop 7
 
Chapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database SystemChapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database System
 
The Critical Value of Project Risk Management - Why do we have to manage Proj...
The Critical Value of Project Risk Management - Why do we have to manage Proj...The Critical Value of Project Risk Management - Why do we have to manage Proj...
The Critical Value of Project Risk Management - Why do we have to manage Proj...
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governance
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administrator
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
A PROJECT REPORT ON RISK ANALYSIS AND RISK MANAGEMENT IN INVESTING IN INSUR...
 A  PROJECT REPORT ON RISK ANALYSIS AND RISK MANAGEMENT IN INVESTING IN INSUR... A  PROJECT REPORT ON RISK ANALYSIS AND RISK MANAGEMENT IN INVESTING IN INSUR...
A PROJECT REPORT ON RISK ANALYSIS AND RISK MANAGEMENT IN INVESTING IN INSUR...
 

Ähnlich wie Information Risk Management Overview

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
Web Analytics and Privacy
Web Analytics and Privacy Web Analytics and Privacy
Web Analytics and Privacy Piwik PRO
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul LanoisAIIM International
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxcomstarndt
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfKarpagam Institute
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare OrganizationsAvePoint
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfSoumodeep Nanee Kundu
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protectionmeritnorthwest
 
Data governance, Information security strategy
Data governance, Information security strategyData governance, Information security strategy
Data governance, Information security strategyvasanthi4ever
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxSteveNgigi2
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
Accelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based CareAccelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based Careibi
 

Ähnlich wie Information Risk Management Overview (20)

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Web Analytics and Privacy
Web Analytics and Privacy Web Analytics and Privacy
Web Analytics and Privacy
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
EDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records ManagementEDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records Management
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdf
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
Data governance, Information security strategy
Data governance, Information security strategyData governance, Information security strategy
Data governance, Information security strategy
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Accelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based CareAccelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based Care
 

Information Risk Management Overview

  • 1. Information Risk Management August 2008 Elvin Chan Marsh Risk Consulting – Asia
  • 2.
  • 3.
  • 4.
  • 5. Question? Despite the effort spent in different elements of the information risk management system, there are still a significant number of data breach, especially internally WHY?
  • 6.
  • 7.
  • 8. Information Risk vs Information Risk Management Beyond Information Technology and Cyber Risks: Systems & People COMPLIANCE PROTECTION TECHNOLOGY MANAGEMENT SYSTEM CULTURE PRACTICES & PROCEDURES EFFICIENCY GROWTH INFORAMTION LEAKAGE INTELLECTUAL PROPERTY THEFT UNAUTHORIZED ACCESS IDENTITY THEFT
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.