SlideShare ist ein Scribd-Unternehmen logo
1 von 24
14. it risk landscape
ProblemManagementFoundation
Objectives
• The meerkats and risk
• The Toyota logo
• DA matrix
ProblemManagementFoundation
Risk
• Meerkats have a sentinel or lookout role
performed by non-breeding members of the
community. They watch for possible predators
and other potential threats to the community.
This behaviour is also called the raised guarding
position. This position rotates amongst different
members of the group in no particular order or
structure. Sentinels are usually around when the
group is foraging away from the burrow. The
meerkat on the lookout will sound an alarm by
producing a distinct bark. This allows the
offspring to escape inside the burrows and
under protection of adults.Meerkats are aware
that life is full of risks, like cobra's and eagles
and thus plan to mitigate those risks. In the
workplace a person cannot be ignorant about
the risks associated with problems occurring.
Evaluate what you have done to mitigate those
risks!
Addressing the IT risk management landscape
ProblemManagementFoundation
Risk
• It is crucial to be able mitigate the risk associated with problems and
thus an established risk analysis methodology needs to be adopted
and utilized. How will we know if the problem is required to be
solved or not?
• How will we know which problems need to be worked on and
prioritized over others?
• The risk assessment methodology needs to cover the landscape –
refer the TOYOTA logo
ProblemManagementFoundation
The three ellipses
There are three ellipses visible in the company’s logo. Each
ellipse represents the heart of the customer, the heart of the
product and the heart of technological progress.
ProblemManagementFoundation
The IT landscape / DA matrix
A matrix of overlapping areas with the
areas being people, process and
technology.
Many practitioners concentrate on a
single block but then that only addresses
a small area of risk that will be mitigated.
Each block has a present and future:
• Threat
• Opportunity
These are underpinned by perceived:
• Strengths
• Weaknesses
These blocks can be viewed as there
own SWOT (see example SWOT
template)
Areas
Disciplines
ProblemManagementFoundation
Disciples of risk in the IT
landscape
To be able to highlight threats in each area of the IT landscape there
are three attributes that can be used on focus on:
• Confidentiality. Information and services is accessible only to those
authorized (unauthorized disclosure)(loss)
• Integrity. Safeguarding the accuracy and completeness of information
and services (unauthorized modification or misuse)(error)
• Availability. Authorized customers have access to the information and
services when require (destruction)(failure)
derived from CRAMM
ProblemManagementFoundation
CIA
ProblemManagementFoundation
An example SWOT template
S W
O T
ProblemManagementFoundation
Rapid risk assessment
• Rapid framework
• Provide a mechanism process threats using lights, camera and action
methodology
derived from CRAMM and ITIL
Landscape
/ metric Description Type Assessment* Value Vulnerablity Assessment* Value Threat Risk level Control Countermeasures Decision Mitigation Responsibility Relevant policy
PC
Describe the risk (will maintain
intellectual property) Confidentiality Confidential 3 Loss Moderate 2 6 Medium
Not
applicable Provide countermeasures
Control &
countermeasure Insufficent Not applicable
PI
Describe the risk (sufficiently
trained) Integrity Moderate 2 Errors Significant 3 6 Medium
Not
applicable Provide countermeasures On hold Partial Not applicable
PA
Describe the risk (right seats on
the bus) Availablity Negligible 0 Failures High 4 0 Low
Not
applicable Provide countermeasures
Control &
countermeasure Majority Not applicable
OC
Describe the risk (engineered not
to leak) Confidentiality Secure 4 Loss Moderate 2 8 Medium
Not
applicable Provide countermeasures
Control &
countermeasure Insufficent Not applicable
OI
Describe the risk (without
ambiquity) Integrity Catastrophic 4 Errors Significant 3 12 High
Not
applicable Provide countermeasures
Control &
countermeasure Partial Not applicable
OA Describe the risk (repeatable) Availablity Mandatory 4 Failures High 4 16 High
Not
applicable Provide countermeasures
Control &
countermeasure Majority Not applicable
TC
Describe the risk (system
information protection
requirements) Confidentiality Secure 4 Loss Moderate 2 8 Medium Substitute Provide countermeasures
Control &
countermeasure Insufficent Not applicable
TI
Describe the risk (system
validation requiremenst) Integrity Catastrophic 4 Errors Significant 3 12 High
Not
applicable Provide countermeasures
Control &
countermeasure Partial Not applicable
TA
Describe the risk (system uptime
requirements) Availablity Negligible 0 Failures High 4 0 Low
Not
applicable Provide countermeasures
Control &
countermeasure Majority Not applicable
Evaluation
People
Process
Technology
Mitigation
ActionLights Camera
Impact (consequence
of event)
Vulnerablity
(liklihood of
occurrence) Analysis
ProblemManagementFoundation
Process (lights, camera, action)
ProblemManagementFoundation
Process (lights, camera, action)
• Lights. List all of the dangers or possible situations associated with
the event activity that may expose services or information to threats.
List these in the template. Use experts or experienced people to
advise you on your risk assessment.
• Camera. Rate or assess what the vulnerability (likelihood) is of
services and information being exposed to threats and what the
impact (consequences) could be as a result of the threat occurring.
• Action. Identify what practical measures could be put in place to
eliminate or reduce the likelihood of the threat occurring. This is
where changes are made to the event to reduce the risks. Use the
hierarchy of control system to minimise or eliminate threats by
putting in place potential to manage the threats once you have
assessed their risk level.
ProblemManagementFoundation
Risk – Lights
ProblemManagementFoundation
Risk – Camera
ProblemManagementFoundation
Risk – Camera
ProblemManagementFoundation
Risk – Camera
ProblemManagementFoundation
Impact (consequence of event)
• Catastrophic
• Multiple deaths, escalated and debilitating costs, adverse media coverage
• Major
• Serious health impacts for people or permanent disability, severe costs incurred,
widespread media coverage
• Moderate
• Rehabilitation required for injured persons, costs incurred, media and community
concerned
• Low
• Injuries resulting in lost time and claims, some costs incurred, minor isolated concerns
raised by stakeholders, customers
• Negligible
• Persons requiring first aid, insignificant costs incurred, minimum impact to reputation
ProblemManagementFoundation
Vulnerability (likelihood of occurrence)
• High
• It is expected to occur in most circumstances, availability required (excluding
scheduled maintenance), there is a strong likelihood or danger of reoccurrence
• Significant
• Similar dangers have been recorded on a regular basis, availability recovered in
minutes, considered that it is likely that the event could occur
• Moderate
• Availability recovered in hours, incidents or dangers have occurred infrequently in
the past
• Low
• Very few known incidents of occurrence, availability recovered in days, has not
occurred yet, but it could occur sometime
• Negligible
• No known or recorded incidents of occurrence, remote chance, may only occur in
exceptional circumstance
ProblemManagementFoundation
Risk – Action
ProblemManagementFoundation
Controls
• Eliminate (the threat)
• Remove or stop the threat if possible, remove the cause or source of the threat, by
eliminating the machine, task or work process. If this is not practical, then substitute.
• Substitute (the process)
• Use a less problematic process. If this is not practical, then engineer.
• Engineer (change the technology)
• Introduce different technology. Improve maintenance procedures. If this is not practical, then:
• Isolate
• Separate or isolate the threat from people by relocation or by changing the operation. If this
is not practical, then administer
• Administer
• Design and communicate written or verbal procedures that prevent the threat from occurring.
If this is not practical, then protect
• Protect
• Provide protect measures appropriate to the risk. Provide training information and supervision
to ensure that the measures will be effective and efficient.
ProblemManagementFoundation
Decision
• Control & countermeasures
• Determine what controls are currently in place and which are
appropriate to use in relation to mitigation of issues which are
likely to occur.
• Risk transference
• Transferring the cost of the risk occurring to another party such as an
insurer
• Risk acceptance
• Accepting a risk without implementing any mitigating measures
• Risk avoidance
• Disabling or stopping the activity which contributes most to the risk
potentially occurring.
ProblemManagementFoundation
Risk (special case) – Information
Security
ProblemManagementFoundation
Review
IT Risk involves all aspects of human behaviour as
well as systematic structures and technology.

Weitere ähnliche Inhalte

Ă„hnlich wie Problem management foundation - IT risk

Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management Seapine Software
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesSlideTeam
 
Performing Risk Assessments1
Performing Risk Assessments1Performing Risk Assessments1
Performing Risk Assessments1Mary Harris
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides SlideTeam
 
Prevention And Control Strategies PowerPoint Presentation Slides
Prevention And Control Strategies PowerPoint Presentation SlidesPrevention And Control Strategies PowerPoint Presentation Slides
Prevention And Control Strategies PowerPoint Presentation SlidesSlideTeam
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityAtlantic Training, LLC.
 
TR crisis management
TR crisis managementTR crisis management
TR crisis managementTurab Rzayev
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesSlideTeam
 
3_orm.ppt
3_orm.ppt3_orm.ppt
3_orm.pptdantx32914
 
Data Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA
 
Risk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation SlidesRisk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation SlidesSlideTeam
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsSounil Yu
 
Risk Management Plan PowerPoint Presentation Slides
Risk Management Plan PowerPoint Presentation SlidesRisk Management Plan PowerPoint Presentation Slides
Risk Management Plan PowerPoint Presentation SlidesSlideTeam
 
Risk Assessment Step PowerPoint Presentation Slides
Risk Assessment Step PowerPoint Presentation SlidesRisk Assessment Step PowerPoint Presentation Slides
Risk Assessment Step PowerPoint Presentation SlidesSlideTeam
 
Risk Management Plan Powerpoint Presentation Slides
Risk Management Plan Powerpoint Presentation SlidesRisk Management Plan Powerpoint Presentation Slides
Risk Management Plan Powerpoint Presentation SlidesSlideTeam
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specificationAryan Ajmer
 

Ă„hnlich wie Problem management foundation - IT risk (20)

Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
 
Performing Risk Assessments1
Performing Risk Assessments1Performing Risk Assessments1
Performing Risk Assessments1
 
Topic 04 risk mangement
Topic 04 risk mangementTopic 04 risk mangement
Topic 04 risk mangement
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
 
Prevention And Control Strategies PowerPoint Presentation Slides
Prevention And Control Strategies PowerPoint Presentation SlidesPrevention And Control Strategies PowerPoint Presentation Slides
Prevention And Control Strategies PowerPoint Presentation Slides
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
 
TR crisis management
TR crisis managementTR crisis management
TR crisis management
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
3_orm.ppt
3_orm.ppt3_orm.ppt
3_orm.ppt
 
Data Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA 2022 - AI Ethics
Data Con LA 2022 - AI Ethics
 
Risk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation SlidesRisk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation Slides
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: Revolutions
 
Risk Management Plan PowerPoint Presentation Slides
Risk Management Plan PowerPoint Presentation SlidesRisk Management Plan PowerPoint Presentation Slides
Risk Management Plan PowerPoint Presentation Slides
 
PERUMIN 31: Bow-tie Risk Analysis
PERUMIN 31: Bow-tie Risk AnalysisPERUMIN 31: Bow-tie Risk Analysis
PERUMIN 31: Bow-tie Risk Analysis
 
Risk Assessment Step PowerPoint Presentation Slides
Risk Assessment Step PowerPoint Presentation SlidesRisk Assessment Step PowerPoint Presentation Slides
Risk Assessment Step PowerPoint Presentation Slides
 
Risk Management Plan Powerpoint Presentation Slides
Risk Management Plan Powerpoint Presentation SlidesRisk Management Plan Powerpoint Presentation Slides
Risk Management Plan Powerpoint Presentation Slides
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
 

Mehr von Ronald Bartels

Implementing a modern Fusion Centre
Implementing a modern Fusion Centre Implementing a modern Fusion Centre
Implementing a modern Fusion Centre Ronald Bartels
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsRonald Bartels
 
The reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offlineThe reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offlineRonald Bartels
 
RADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRonald Bartels
 
Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Ronald Bartels
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorRonald Bartels
 
Problem management foundation - Introduction
Problem management foundation - IntroductionProblem management foundation - Introduction
Problem management foundation - IntroductionRonald Bartels
 
Problem management foundation - Overview
Problem management foundation - OverviewProblem management foundation - Overview
Problem management foundation - OverviewRonald Bartels
 
Problem management foundation - Perceptions
Problem management foundation - PerceptionsProblem management foundation - Perceptions
Problem management foundation - PerceptionsRonald Bartels
 
Problem management foundation - Engineering
Problem management foundation - EngineeringProblem management foundation - Engineering
Problem management foundation - EngineeringRonald Bartels
 
Problem management foundation - Tiger teams
Problem management foundation - Tiger teamsProblem management foundation - Tiger teams
Problem management foundation - Tiger teamsRonald Bartels
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Ronald Bartels
 
Problem management foundation - Tools
Problem management foundation - ToolsProblem management foundation - Tools
Problem management foundation - ToolsRonald Bartels
 
Problem management foundation - Analysing
Problem management foundation - AnalysingProblem management foundation - Analysing
Problem management foundation - AnalysingRonald Bartels
 
Problem management foundation Simulation
Problem management foundation SimulationProblem management foundation Simulation
Problem management foundation SimulationRonald Bartels
 
Problem management foundation - Continious improvement
Problem management foundation - Continious improvementProblem management foundation - Continious improvement
Problem management foundation - Continious improvementRonald Bartels
 
Problem management foundation - Mission control
Problem management foundation - Mission controlProblem management foundation - Mission control
Problem management foundation - Mission controlRonald Bartels
 
Problem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technologyProblem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technologyRonald Bartels
 
Problem management foundation Budget
Problem management foundation BudgetProblem management foundation Budget
Problem management foundation BudgetRonald Bartels
 
Problem management foundation Communications
Problem management foundation CommunicationsProblem management foundation Communications
Problem management foundation CommunicationsRonald Bartels
 

Mehr von Ronald Bartels (20)

Implementing a modern Fusion Centre
Implementing a modern Fusion Centre Implementing a modern Fusion Centre
Implementing a modern Fusion Centre
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
 
The reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offlineThe reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offline
 
RADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press Release
 
Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
 
Problem management foundation - Introduction
Problem management foundation - IntroductionProblem management foundation - Introduction
Problem management foundation - Introduction
 
Problem management foundation - Overview
Problem management foundation - OverviewProblem management foundation - Overview
Problem management foundation - Overview
 
Problem management foundation - Perceptions
Problem management foundation - PerceptionsProblem management foundation - Perceptions
Problem management foundation - Perceptions
 
Problem management foundation - Engineering
Problem management foundation - EngineeringProblem management foundation - Engineering
Problem management foundation - Engineering
 
Problem management foundation - Tiger teams
Problem management foundation - Tiger teamsProblem management foundation - Tiger teams
Problem management foundation - Tiger teams
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle
 
Problem management foundation - Tools
Problem management foundation - ToolsProblem management foundation - Tools
Problem management foundation - Tools
 
Problem management foundation - Analysing
Problem management foundation - AnalysingProblem management foundation - Analysing
Problem management foundation - Analysing
 
Problem management foundation Simulation
Problem management foundation SimulationProblem management foundation Simulation
Problem management foundation Simulation
 
Problem management foundation - Continious improvement
Problem management foundation - Continious improvementProblem management foundation - Continious improvement
Problem management foundation - Continious improvement
 
Problem management foundation - Mission control
Problem management foundation - Mission controlProblem management foundation - Mission control
Problem management foundation - Mission control
 
Problem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technologyProblem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technology
 
Problem management foundation Budget
Problem management foundation BudgetProblem management foundation Budget
Problem management foundation Budget
 
Problem management foundation Communications
Problem management foundation CommunicationsProblem management foundation Communications
Problem management foundation Communications
 

KĂĽrzlich hochgeladen

VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...Pooja Nehwal
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxSaqib Mansoor Ahmed
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girladitipandeya
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 

KĂĽrzlich hochgeladen (20)

Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptx
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdfImagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 

Problem management foundation - IT risk

  • 1. 14. it risk landscape
  • 2. ProblemManagementFoundation Objectives • The meerkats and risk • The Toyota logo • DA matrix
  • 3. ProblemManagementFoundation Risk • Meerkats have a sentinel or lookout role performed by non-breeding members of the community. They watch for possible predators and other potential threats to the community. This behaviour is also called the raised guarding position. This position rotates amongst different members of the group in no particular order or structure. Sentinels are usually around when the group is foraging away from the burrow. The meerkat on the lookout will sound an alarm by producing a distinct bark. This allows the offspring to escape inside the burrows and under protection of adults.Meerkats are aware that life is full of risks, like cobra's and eagles and thus plan to mitigate those risks. In the workplace a person cannot be ignorant about the risks associated with problems occurring. Evaluate what you have done to mitigate those risks!
  • 4. Addressing the IT risk management landscape
  • 5. ProblemManagementFoundation Risk • It is crucial to be able mitigate the risk associated with problems and thus an established risk analysis methodology needs to be adopted and utilized. How will we know if the problem is required to be solved or not? • How will we know which problems need to be worked on and prioritized over others? • The risk assessment methodology needs to cover the landscape – refer the TOYOTA logo
  • 6. ProblemManagementFoundation The three ellipses There are three ellipses visible in the company’s logo. Each ellipse represents the heart of the customer, the heart of the product and the heart of technological progress.
  • 7. ProblemManagementFoundation The IT landscape / DA matrix A matrix of overlapping areas with the areas being people, process and technology. Many practitioners concentrate on a single block but then that only addresses a small area of risk that will be mitigated. Each block has a present and future: • Threat • Opportunity These are underpinned by perceived: • Strengths • Weaknesses These blocks can be viewed as there own SWOT (see example SWOT template) Areas Disciplines
  • 8. ProblemManagementFoundation Disciples of risk in the IT landscape To be able to highlight threats in each area of the IT landscape there are three attributes that can be used on focus on: • Confidentiality. Information and services is accessible only to those authorized (unauthorized disclosure)(loss) • Integrity. Safeguarding the accuracy and completeness of information and services (unauthorized modification or misuse)(error) • Availability. Authorized customers have access to the information and services when require (destruction)(failure) derived from CRAMM
  • 11. ProblemManagementFoundation Rapid risk assessment • Rapid framework • Provide a mechanism process threats using lights, camera and action methodology derived from CRAMM and ITIL Landscape / metric Description Type Assessment* Value Vulnerablity Assessment* Value Threat Risk level Control Countermeasures Decision Mitigation Responsibility Relevant policy PC Describe the risk (will maintain intellectual property) Confidentiality Confidential 3 Loss Moderate 2 6 Medium Not applicable Provide countermeasures Control & countermeasure Insufficent Not applicable PI Describe the risk (sufficiently trained) Integrity Moderate 2 Errors Significant 3 6 Medium Not applicable Provide countermeasures On hold Partial Not applicable PA Describe the risk (right seats on the bus) Availablity Negligible 0 Failures High 4 0 Low Not applicable Provide countermeasures Control & countermeasure Majority Not applicable OC Describe the risk (engineered not to leak) Confidentiality Secure 4 Loss Moderate 2 8 Medium Not applicable Provide countermeasures Control & countermeasure Insufficent Not applicable OI Describe the risk (without ambiquity) Integrity Catastrophic 4 Errors Significant 3 12 High Not applicable Provide countermeasures Control & countermeasure Partial Not applicable OA Describe the risk (repeatable) Availablity Mandatory 4 Failures High 4 16 High Not applicable Provide countermeasures Control & countermeasure Majority Not applicable TC Describe the risk (system information protection requirements) Confidentiality Secure 4 Loss Moderate 2 8 Medium Substitute Provide countermeasures Control & countermeasure Insufficent Not applicable TI Describe the risk (system validation requiremenst) Integrity Catastrophic 4 Errors Significant 3 12 High Not applicable Provide countermeasures Control & countermeasure Partial Not applicable TA Describe the risk (system uptime requirements) Availablity Negligible 0 Failures High 4 0 Low Not applicable Provide countermeasures Control & countermeasure Majority Not applicable Evaluation People Process Technology Mitigation ActionLights Camera Impact (consequence of event) Vulnerablity (liklihood of occurrence) Analysis
  • 13. ProblemManagementFoundation Process (lights, camera, action) • Lights. List all of the dangers or possible situations associated with the event activity that may expose services or information to threats. List these in the template. Use experts or experienced people to advise you on your risk assessment. • Camera. Rate or assess what the vulnerability (likelihood) is of services and information being exposed to threats and what the impact (consequences) could be as a result of the threat occurring. • Action. Identify what practical measures could be put in place to eliminate or reduce the likelihood of the threat occurring. This is where changes are made to the event to reduce the risks. Use the hierarchy of control system to minimise or eliminate threats by putting in place potential to manage the threats once you have assessed their risk level.
  • 18. ProblemManagementFoundation Impact (consequence of event) • Catastrophic • Multiple deaths, escalated and debilitating costs, adverse media coverage • Major • Serious health impacts for people or permanent disability, severe costs incurred, widespread media coverage • Moderate • Rehabilitation required for injured persons, costs incurred, media and community concerned • Low • Injuries resulting in lost time and claims, some costs incurred, minor isolated concerns raised by stakeholders, customers • Negligible • Persons requiring first aid, insignificant costs incurred, minimum impact to reputation
  • 19. ProblemManagementFoundation Vulnerability (likelihood of occurrence) • High • It is expected to occur in most circumstances, availability required (excluding scheduled maintenance), there is a strong likelihood or danger of reoccurrence • Significant • Similar dangers have been recorded on a regular basis, availability recovered in minutes, considered that it is likely that the event could occur • Moderate • Availability recovered in hours, incidents or dangers have occurred infrequently in the past • Low • Very few known incidents of occurrence, availability recovered in days, has not occurred yet, but it could occur sometime • Negligible • No known or recorded incidents of occurrence, remote chance, may only occur in exceptional circumstance
  • 21. ProblemManagementFoundation Controls • Eliminate (the threat) • Remove or stop the threat if possible, remove the cause or source of the threat, by eliminating the machine, task or work process. If this is not practical, then substitute. • Substitute (the process) • Use a less problematic process. If this is not practical, then engineer. • Engineer (change the technology) • Introduce different technology. Improve maintenance procedures. If this is not practical, then: • Isolate • Separate or isolate the threat from people by relocation or by changing the operation. If this is not practical, then administer • Administer • Design and communicate written or verbal procedures that prevent the threat from occurring. If this is not practical, then protect • Protect • Provide protect measures appropriate to the risk. Provide training information and supervision to ensure that the measures will be effective and efficient.
  • 22. ProblemManagementFoundation Decision • Control & countermeasures • Determine what controls are currently in place and which are appropriate to use in relation to mitigation of issues which are likely to occur. • Risk transference • Transferring the cost of the risk occurring to another party such as an insurer • Risk acceptance • Accepting a risk without implementing any mitigating measures • Risk avoidance • Disabling or stopping the activity which contributes most to the risk potentially occurring.
  • 23. ProblemManagementFoundation Risk (special case) – Information Security
  • 24. ProblemManagementFoundation Review IT Risk involves all aspects of human behaviour as well as systematic structures and technology.

Hinweis der Redaktion

  1. Meerkats have a sentinel or lookout role performed by non-breeding members of the community. They watch for possible predators and other potential threats to the community. This behaviour is also called the raised guarding position. This position rotates amongst different members of the group in no particular order or structure. Sentinels are usually around when the group is foraging away from the burrow. The meerkat on the lookout will sound an alarm by producing a distinct bark. This allows the offspring to escape inside the burrows and under protection of adults.Meerkats are aware that life is full of risks, like cobra's and eagles and thus plan to mitigate those risks. In the workplace a person cannot be ignorant about the risks associated with problems occurring. Evaluate what you have done to mitigate those risks!
  2. Addressing the IT risk management landscape
  3. It is crucial to be able mitigate the risk associated with problems and thus an established risk analysis methodology needs to be adopted and utilized. How will we know if the problem is required to be solved or not? How will we know which problems need to be worked on and prioritized over others? The risk assessment methodology needs to cover the landscape – refer the TOYOTA logo
  4. There are three ellipses visible in the company’s logo. Each ellipse represents the heart of the customer, the heart of the product and the heart of technological progress.
  5. A matrix of overlapping areas with the areas being people, process and technology. Many practitioners concentrate on a single block but then that only addresses a small area of risk that will be mitigated. Each block has a present and future: Threat Opportunity These are underpinned by perceived: Strengths Weaknesses These blocks can be viewed as there own SWOT (see example SWOT template)
  6. To be able to highlight threats in each area of the IT landscape there are three attributes that can be used on focus on: Confidentiality. Information and services is accessible only to those authorized (unauthorized disclosure)(loss) Integrity. Safeguarding the accuracy and completeness of information and services (unauthorized modification or misuse)(error) Availability. Authorized customers have access to the information and services when require (destruction)(failure) derived from CRAMM
  7. Reference: https://lnkd.in/e3Wu8hc
  8. SWOT
  9. Download from www.deesmith.co.za Under Resources Tools, Rapid Risk Assessment Tool
  10. Lights, camera, action
  11. Lights. List all of the dangers or possible situations associated with the event activity that may expose services or information to threats. List these in the template. Use experts or experienced people to advise you on your risk assessment. Camera. Rate or assess what the vulnerability (likelihood) is of services and information being exposed to threats and what the impact (consequences) could be as a result of the threat occurring. Action. Identify what practical measures could be put in place to eliminate or reduce the likelihood of the threat occurring. This is where changes are made to the event to reduce the risks. Use the hierarchy of control system to minimise or eliminate threats by putting in place potential to manage the threats once you have assessed their risk level.
  12. Lights
  13. Camera
  14. Camera
  15. Camera
  16. Catastrophic Multiple deaths, escalated and debilitating costs, adverse media coverage Major Serious health impacts for people or permanent disability, severe costs incurred, widespread media coverage Moderate Rehabilitation required for injured persons, costs incurred, media and community concerned Low Injuries resulting in lost time and claims, some costs incurred, minor isolated concerns raised by stakeholders, customers Negligible Persons requiring first aid, insignificant costs incurred, minimum impact to reputation
  17. High It is expected to occur in most circumstances, availability required (excluding scheduled maintenance), there is a strong likelihood or danger of reoccurrence Significant Similar dangers have been recorded on a regular basis, availability recovered in minutes, considered that it is likely that the event could occur Moderate Availability recovered in hours, incidents or dangers have occurred infrequently in the past Low Very few known incidents of occurrence, availability recovered in days, has not occurred yet, but it could occur sometime Negligible No known or recorded incidents of occurrence, remote chance, may only occur in exceptional circumstance
  18. Action
  19. Eliminate (the threat) Remove or stop the threat if possible, remove the cause or source of the threat, by eliminating the machine, task or work process. If this is not practical, then substitute. Substitute (the process) Use a less problematic process. If this is not practical, then engineer. Engineer (change the technology) Introduce different technology. Improve maintenance procedures. If this is not practical, then: Isolate Separate or isolate the threat from people by relocation or by changing the operation. If this is not practical, then administer Administer Design and communicate written or verbal procedures that prevent the threat from occurring. If this is not practical, then protect Protect Provide protect measures appropriate to the risk. Provide training information and supervision to ensure that the measures will be effective and efficient.
  20. Control & countermeasures Determine what controls are currently in place and which are appropriate to use in relation to mitigation of issues which are likely to occur. Risk transference Transferring the cost of the risk occurring to another party such as an insurer Risk acceptance Accepting a risk without implementing any mitigating measures Risk avoidance Disabling or stopping the activity which contributes most to the risk potentially occurring.
  21. Information Security
  22. Review