SlideShare ist ein Scribd-Unternehmen logo
1 von 78
Created by Praveen Joseph Vackayil
Praveen Joseph Vackayil
Deepak Umapathy
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
• Explore perspectives and incite thoughts
on the risk assessment process
• Re-visit the basic concepts of risk
• Perform a risk assessment based on a
formal methodology
Created by Praveen Joseph Vackayil
• Questions are welcome
• Share your knowledge
• Mobile phones – you know
what to do
Created by Praveen Joseph Vackayil
• I. An Introduction to Risk Assessment
• II. Basic Concepts
• III. Lunch 
• IV. Case Study: Implementing an NIST SP
800-30 Risk Assessment
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
Created by Praveen Joseph VackayilRisk exists in daily life
Risk may be a part of a profession or sport
Created by Praveen Joseph Vackayil
• We can’t always predict the future. At least
not accurately.
• Risk is a consideration of how something we
value (asset) can be affected
• by a negative entity (threat)
• and lead to a less than ideal outcome
(impact)
• since it is not protected enough
(vulnerability)
Created by Praveen Joseph Vackayil
Threat Source
Threat Outcome
Asset Vulnerability
Created by Praveen Joseph Vackayil
Asset
Interpreted Definition:
Risk is the probability that a threat, exploiting a vulnerability that exists in an
asset of certain value, will cause an undesired impact.
Threat
Undesired Impact
Vulner
ability
RISK ECOSYSTEM
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
• Risk Assessment is nothing but people
being people
• It is an extension of human nature and a
satiation of a basic human need:
Created by Praveen Joseph Vackayil
The jaguar hides its prey atop trees
Created by Praveen Joseph Vackayil
Name some things you see in this picture which remind you of risk assessment
Created by Praveen Joseph Vackayil
• Formalizing a Risk Assessment is a
way of providing it with a
systematic mechanism of
– Measurement (defining metrics)
–Repetition (process-specific and not person-
specific)
–Comparison (between different business
verticals, for instance)
Note: We will be visiting formal methodologies in the later slides
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
If anything can go wrong, it will
Created by Praveen Joseph Vackayil
Case i: I am trying to check all the boxes
in my compliance checklist. I don’t need a
separate risk assessment as such.
–A compliance standard is a universal
set of instructions
–Risk Assessment is the tool through
which the standard is tailored to the
unique circumstances of your
environment Note: Risk assessment is mandated by most
compliance standards today – eg. PCI, ISO
27001, HIPAA, etc.
Created by Praveen Joseph Vackayil
Case ii: We have annual third party
audits. We don’t need risk
assessment.
–Risk assessment ≠ Audit
–An audit is a discovery of what HAS
already gone wrong
–Risk Assessment is the discovery of
what CAN go wrong in the near or
distant future
Created by Praveen Joseph Vackayil
Case iii: I don’t see the point. We did
a risk assessment last year and no
one followed through with
remediation.
–Risk Assessment:
• ‘If you can’t measure it, you can’t manage
it.’
–Risk Management:
• ‘Knowing is not enough, we must apply.’
Created by Praveen Joseph Vackayil
Case iv: Everything eventually boils down
to the numbers. There is a cost involved in
an RA. How do I justify this investment?
RA Cost RA Benefit
• Time and effort
• Productivity is hit when
business team is facing risk
assessors
• RA Training Costs
• RA Consultant
• RA Tool
?
• Not having a security incident is the ROI of any
security investment.
• A key objective of RA is to ensure the security
budget is not exceeded.
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
Risk Frame
Threat Source and
Threat Event
Impact
Likelihood of
Occurrence
Vulnerability
Risk Score Risk Response
Created by Praveen Joseph Vackayil
• Identification of the
– Organizational priorities. Eg. Purpose of the RA
– Scope
– Assets (e.g., organizational entities covered, business functions
affected by the RA)
– Team Structure within the organization
– Assumptions and Constraints
– Information sources
– Risk management guidance on the Risk Model, Analysis
Approach, Assessment Approach, Qualitative Scale to be used
for Risk Score, etc.
– Risk response guidance including, for example, risk tolerance
– Risk monitoring guidance
Created by Praveen Joseph Vackayil
Nature of risks varies with the level of hierarchy being assessed.
Organization
Tier
Business Process
Tier
Information System Tier
Created by Praveen Joseph Vackayil
Asset/Impact-oriented
Threat-oriented
Threat Source
Threat Event
caused by the
Threat Source
Vulnerability Impact
Vulnerability-oriented
Critical Asset
Impact that can
compromise the
Asset
Threat Event
that can cause
the impact
Threat Source
that leads to this
Threat Event
Vulnerabilities and Pre-
disposing Conditions
Threat Event
that exploits the
Vulnerability
Threat Source Impact
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
Qualitative Quantitative
• High Medium Low
• Red, Green, Yellow
Numeric
Easy to calculate May include complex formulae
Less accurate, but gets the job done Precise. Useful in $ estimations
Difficult to convince stakeholders, since it is
based on subjective judgement
Easier to convince stakeholders
Risk = f (Asset Value, Threat probability, Level
of Vulnerability)
Basic concepts to be noted:
SLE=Asset Value x Exposure Factor
ALE= SLE x ARO
Created by Praveen Joseph Vackayil
• Anything of value to the organization
• Perception of value is tied to the purpose of
the risk assessment
– Eg. If in a compliance RA, the value of the asset depends on
the compliance requirement. In PCI, card data is the most
important asset, and hence gets highest Asset Value.
– If the RA aims at capturing process inefficiencies and
optimizing cost, money is the most important asset.
– For the purpose of ISRA, information is usually the most
important asset.
Created by Praveen Joseph Vackayil
Asset Name: DB Server
Asset Category: Supporting
Asset
Asset Type: Hardware
Asset Owner: Head of IT Dept
Asset Custodian: Database
Administrator
Asset Value:
• Impact if C is compromised:
VH
• Impact if I is compromised: VH
• Impact if A is compromised: M
Total Asset Value: VH
Created by Praveen Joseph Vackayil
Malicious outsider defaces the
corporate website
Employee loses company
confidential data in a laptop
Non-adversarial
Threat Source
Adversarial Threat
Source
Intent: To take control of
the web server and deface
the website
Targeting: Web server
Capability: Proficiency in
hacking tools like Metasploit
Knowledge of the systems
architecture
Range of Effects: Loss of
confidential data if the laptop
falls into the wrong and
capable hands
Threat Event
Threat Event
Website is
defaced by a
malicious
outsider
Company data is
misused by an
unknown third
party
Created by Praveen Joseph Vackayil
• Change in attack approach based on
controls perception.
Time
domain
Target
domain
Resource
Domain
Attack
method
Influencers:
• Path of least resistance
• Path with quicker and
more benefit
Created by Praveen Joseph Vackayil
• A vulnerability is a weakness in an information
system, system security procedures, internal
controls, or implementation that could be exploited
by a threat source
Created by Praveen Joseph Vackayil
• Controls are absent
• Controls are not efficient
• Controls are no longer relevant
The ever-changing threat landscape can render
the current control eco-system obsolete. Eg.
Shellshock bash vulnerability.
Created by Praveen Joseph Vackayil
An existing condition within an environment that can
increase or decrease the likelihood of a threat.
Eg.
• Indonesia is prone to earthquakes.
• We use Windows XP on all our desktops. Risk increases
• We operate out of a city with low crime rate
Created by Praveen Joseph Vackayil
Questions to Ask:
• Will the threat event occur/be initiated by a threat
source successfully?
• Will the threat event cause an adverse impact
successfully?
Likelihood of Occurrence=f (Likelihood of Threat Event
Initiation/Occurrence, Likelihood of Threat Event
causing Adverse Impact)
Created by Praveen Joseph Vackayil
• Magnitude of harm caused due to the
disclosure, modification, destruction/loss of
sensitive data.
• Impact may cascade to entities even external to
the scoped environment.
Eg. Financial loss,
reputational loss,
productivity loss,
loss of existing clients.
Created by Praveen Joseph Vackayil
Risk Model
• Threat
• Likelihood
• Vulnerability
• Pre-disposing Condition
• Impact
Risk Factors Risk
Risk models define the risk factors to be
assessed and the relationships among
those factors.
Created by Praveen Joseph Vackayil
Recall the earlier slide
Created by Praveen Joseph Vackayil
• Risk is the
Likelihood
• that a Threat
Source
will exploit
• a
Vulnerability
with Severity
And/or
• A Pre-disposing
Condition with
Pervasiveness
And initiate a
• Threat Event
Leading to
An adverse
Impact
Created by Praveen Joseph Vackayil
• Just before acquiring a new company
• Just before an audit
• Just after deploying new laptops
• Before starting operations in a new facility
• Every month for all assets
• Never. 
You be the Judge
Created by Praveen Joseph Vackayil
• Annual Risk Assessment
• Real-time updates to the Risk
Assessment via a Feedback Loop
Scope
Identify
AssessManage
Document
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
Thoughts
• Does it really work?
– No tracker/reminder on the RA
– Job rotations/staff leave the team
– Disconnect between the risk assessor and the asset
custodians
• Is everyone that committed to security?
– Top management commitment to security may not
drill down to the grass-root levels
Created by Praveen Joseph Vackayil
A Formal Risk Assessment is one that is:
• Measurable
• Comparable
• Repeatable
A Formal approach:
• Is tried and tested
• Reduces re-work in devising new methodologies every
year
• Leads to consistency which in turn allows integration of
RA with audit and other activities
• Establishes a process and reduces people-dependency
Created by Praveen Joseph Vackayil
Do we really need to use a formal risk
assessment methodology?
• Yes
• No
Created by Praveen Joseph Vackayil
Develop a new RA methodology Adopt an existing formal RA methodology
RA METHODOLOGY:
• A new methodology must be developed, tried and
revised. This is in some ways re-invention of the
wheel
• A tried and tested methodology already exists. It needs
to be shortlisted and adopted.
• Corresponding RA template may be available
RISK ASSESSORS:
• Develop an in-house talent pool that is well versed with
the methodology. Training costs extra.
• Hire RA personnel with relevant
experience/certification. Resource costs extra.
COMPATIBILITY :
• It will be created as per the organization’s unique
environment.
• The existing methodology may need to be tweaked to
suit the organization’s environment, structure and
culture.
Eg. Primary and supporting assets may be selected
according to the org-structure.
ASSET OWNERS/CUSTODIANS:
• Factors that encourage user adoption may be built-in
while developing the methodology.
Eg. Qualitative risk calculation is used, since it is easier for all
to understand.
• Ways to enable user adoption of the methodology must
be developed.
Eg. The survey-based approach of OCTAVE may not work in
an organization where people don’t respond to emails.
PREVIOUS REFERENCES:
• Not sure if it will succeed/fail since there is no prior user
experience/reviews to refer to
• Tried and tested. Known to have succeeded.
• Common pitfalls will be readily available based on other
users’ experiences. These can be addressed
accordingly.
Created by Praveen Joseph Vackayil
3 popular RA methodologies:
• ISO 27005
• OCTAVE
• NIST SP 800-30
Created by Praveen Joseph Vackayil
• Developed by International Organization for
Standardization (ISO)
• Suitable for technology as well as process RA
• Concept of primary and supporting asset can
be adapted to most organizational scenarios
• ISRA=Risk Identification->Risk Estimation-
>Risk Evaluation
• It’s USP: Asset Characterization
Created by Praveen Joseph Vackayil
Description
of ISRA
•Scope and
Boundaries
•Org structure
•Risk
Acceptance
Criteria
•RA Team
Risk
Analysis:
Risk
Identificatio
n
•Scope
•Assets
•Threats
•Existing
Controls
•Vulnerabilities
•Impact
Risk
Analysis:
Risk
Estimation
•Qualitative
•Quantitative
Risk
Evaluation
•Risk Value vs
Risk
Acceptance
Criteria
•Accept
•Mitigate
•Transfer
•Avoid
Created by Praveen Joseph Vackayil
• Developed by SEI-CMU
• Most suited for assessing risks within organizational
processes
• Emphasizes a workshop-based approach over a tool
approach
• Built for large organizations, so interviews are broken
across hierarchies and disciplines
• Pareto’s Principle: 80% of the effects come from 20%
of the causes
• It’s USP: Threat Profiling
• OMIG is available for free from CERT.org
Created by Praveen Joseph Vackayil
Organizational
View
• P1: Senior
Management
Knowledge
• P2: Operational
Management
Knowledge
• P3: Staff
Knowledge
• P4: Threat
Profiling
Technological View
• P5: Identify Key
Technoology
Components
within a System
of Interest
• P6: Evaluate
Selected
Components
(Run a VA,
Nipper Scan, run
a DB review tool,
etc.)
Risk Analysis
• Conduct Risk
Analysis
• Develop
Protection
Strategy
Key Outputs:
Assets, Security
Requirements, Areas of
Concern, Vulnerabilities,
Threats
Key Outputs:
Key Technological Assets
and their vulnerabilities
Key Outputs:
Risks and Protection
strategy
Created by Praveen Joseph Vackayil
Created by Praveen Joseph Vackayil
• The Federal Information Security Management Act (FISMA) is an
information security act for all federal bodies in the US
• FISMA requires NIST to develop and issue mandatory standards
for all US federal agencies called FIPS – Federal Information
Processing Standards
– Eg. FIPS 140 talks about Cryptography requirements, FIPS 199
talks about classification of information
• Special Publications (SPs) are guidance documents developed by
NIST to support FIPS.
Created by Praveen Joseph Vackayil
Risk
Likelihood
of
Occurrence
Level of
Impact
Created by Praveen Joseph Vackayil
I. Risk
Framing
II.
Conduct
the RA
III.
Maintain
the RA
I. Identify:
• Purpose of RA
• Scope and
Assets
• Assumptions
and
Constraints
• Information
Sources
• Risk Model
• Analysis
Approach
I. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
II. Calculate
• Likelihood
• Impact
• Risk Level
III.
Communicate
I. Monitor Risk
Factors
II. Update the
RA
Created by Praveen Joseph Vackayil
• Read aloud the case study in the hand-
outs issued to you.
Created by Praveen Joseph Vackayil
CEO
Jeff Antony
COO and CTO
Anup Kumar
Sonia Arora–
Head, Project
Delivery
Rohit Kumar–
Manager, IT
Operations
Manoj Krishna–
Head, Physical
Security
Administration
Priya Thomas–
AVP, HR
CISO
Philip
Williams
Created by Praveen Joseph Vackayil
Servers
AD, AV, SCCM, DHCP
Network
Devices
Firewall, L3 Switch
Desktops
and
Laptops
Created by Praveen Joseph Vackayil
Support
Processes
Server and
desktop
administration
Network device
administration
Physical Security
Management
processes
Personnel
security
processes
Client-facing
Processes
SDLC:
Dev, Testing
Production
Support process
Created by Praveen Joseph Vackayil
I. Risk
Framing
II.
Conduct
the RA
III.
Maintain
the RA
I. Identify:
• Purpose of RA
• Scope and
Assets
• Assumptions
and
Constraints
• Information
Sources
• Risk Model
• Analysis
Approach
II. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
III. Calculate
• Likelihood
• Impact
• Risk Level
IV.
Communicate
V. Monitor Risk
Factors
VI. Update the
RA
Created by Praveen Joseph Vackayil
I. Identify:
• Purpose of RA
• Scope
• Assumptions
and Constraints
• Information
Sources
• Risk Model
• Analysis
Approach
V. Monitor Risk
Factors
VI. Update the
RA
Factors to Consider:
i. Initial RA:
• Purpose can be to identify current
security posture
• Purpose can be to capture the
starting point (baseline) of risks in the
current setup/new setup.
ii. Re-assessment
• Purpose can be to monitor risks as
part of continuous RA
• Purpose can be to evaluate risk
• Purpose can be to perform controls
testing
• Purpose can be to capture new risks
as the environment has undergone a
significant change and update an
existing RA report.
Created by Praveen Joseph Vackayil
I. Identify:
• Purpose of RA
• Scope and
Assets
• Assumptions
and Constraints
• Information
Sources
• Risk Model
• Analysis
Approach
V. Monitor Risk
Factors
VI. Update the
RA
Factors to Consider:
i. Organizational Applicability:
• Business processes within the
organization that are affected
ii. Effectiveness Time-frame
• Time-duration for which the RA
findings are going to be relevant
and can assist in risk based
decisions
iii. Technological Considerations
• With segmentation (VLANs,
firewalls, etc.), the in-scope
network can be reduced.
• In a flat network, the entire
network is in scope.
Created by Praveen Joseph Vackayil
I. Identify:
• Purpose of RA
• Scope and
Assets
• Assumptions
and Constraints
• Information
Sources
• Risk Model
• Analysis
Approach
V. Monitor Risk
Factors
VI. Update the
RA
Factors to Consider:
i. Consider all the stages of the risk
assessment
ii. Clarify on the following:
• The uncertainty surrounding the
risk assessment findings
• The constraints faced with
regard to resources – time,
team, etc.
• Assumptions made with the
sampling approach deployed (if
any)
• Assumptions made and
limitations of a qualitative
computation of risk
Created by Praveen Joseph Vackayil
I. Identify:
• Purpose of RA
• Scope and
Assets
• Assumptions
and Constraints
• Information
Sources
• Risk Model
• Analysis
Approach
Factors to Consider:
Consider the methods to be used in risk identification
i. People Risks
• Interviews with relevant personnel
• Review of records ( eg. BGV records)
• External Source: Previous employers
ii. Process Risks
• Walkthrough of the process
• Interviews with relevant personnel
iii. Technology Risks
• Review of desktop hardening
• Review of server config
• Nipper scan of firewall configs
• Vulnerability Assessments
• External Source: Security advisories
from CERT, SANS, etc.
Created by Praveen Joseph Vackayil
I. Identify:
• Purpose of RA
• Scope
• Assumptions
and Constraints
• Information
Sources
• Risk Model
• Analysis
Approach
Factors to Consider:
Recall the earlier slides:
Documentation of a risk model includes:
i. Identification of risk factors – ie threats,
vulnerabilities and pre-disposing conditions,
likelihood and impact
ii. Identification of the relationships between
the above risk factors
Created by Praveen Joseph Vackayil
I. Identify:
• Purpose of RA
• Scope and
Assets
• Assumptions
and Constraints
• Information
Sources
• Risk Model
• Analysis
Approach
Factors to Consider:
Recall the earlier slide:
Created by Praveen Joseph Vackayil
V. Monitor Risk
Factors
VI. Update the
RA
Capture the following aspects:
i. Type of Threat Source
• Adversarial
• Non-adversarial
ii. Characteristics of Threat Source
• Adversarial -> Capability, Intent,
Targeting
• Non-Adversarial -> Range of
Effects (Sweeping, Extensive,
Limited, Minimal, etc.)
iii. Overall Criticality Rating of Threat
Source
• Very High, High, Moderate, Low,
Very Low
II.
Conduct
the RA
I. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
II. Calculate
• Likelihood
• Impact
• Risk Level
III.
Communicate
Created by Praveen Joseph Vackayil
V. Monitor Risk
Factors
VI. Update the
RA
Factors to Consider:
i. Envision various ways through
which the Threat Source can
compromise the Asset and
cause a Threat Event
ii. Study the entire lifecycle of the
Asset to do so
iii. Think of internal and external
links /physical and logical links
from threat source to the asset
II.
Conduct
the RA
I. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
II. Calculate
• Likelihood
• Impact
• Risk Level
III.
Communicate
Created by Praveen Joseph Vackayil
V. Monitor Risk
Factors
VI. Update the
RA
Factors to Consider:
i. Take existing controls into
account when determining level
of vulnerability.
ii. Think of internal and external
entities that are a direct or
indirect characteristic of the
asset.
Eg. Glass is breakable, AC ducts can
serve as escape tunnels, strong
lights can glare out images on CCTV
cameras, etc.
II.
Conduct
the RA
I. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
II. Calculate
• Likelihood
• Impact
• Risk Level
III.
Communicate
Created by Praveen Joseph Vackayil
V. Monitor Risk
Factors
VI. Update the
RA
II.
Conduct
the RA
I. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
II. Calculate
• Likelihood
• Impact
• Risk level
III.
Communicate
Factors to Consider:
i. Be clear on the concept. A Threat Event
occurring is not the same as a Threat
Event causing an adverse impact.
ii. Likelihood of Occurrence implies the
Likelihood that Threat Event occurs/is
initiated AND causes an adverse Impact
iii. Likelihood that a Threat Event occurs/is
initiated depends on the Threat Source
which causes the Threat Event
iv. Likelihood that a Threat Event causes an
adverse Impact depends on the Level of
Vulnerability that affects the exposure to
the Threat Event
Created by Praveen Joseph Vackayil
V. Monitor Risk
Factors
VI. Update the
RA
II.
Conduct
the RA
I. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
II. Calculate
• Likelihood
• Impact
• Risk level
III.
Communicate
Factors to Consider:
i. Consider the most valuable
asset (in this case customer
information) that will get
compromised if the threat
source will exploit the
vulnerability
ii. Impact = f(Asset Value, Level of
Vulnerability)
Created by Praveen Joseph Vackayil
V. Monitor Risk
Factors
VI. Update the
RA
II.
Conduct
the RA
I. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
II. Calculate
• Likelihood
• Impact
• Risk level
III.
Communicate
Factors to Consider:
i. Risk = f (Likelihood of
Occurrence, Level of Impact)
ii. Recall the Risk Response
definitions to decide whether to
accept, mitigate, transfer, avoid a
risk.
Created by Praveen Joseph Vackayil
V. Monitor Risk
Factors
VI. Update the
RA
II.
Conduct
the RA
I. Identify:
• Threat Source
• Threat Event
• Vulnerability &
Pre-disposing
Condition
II. Calculate
• Likelihood
• Impact
• Risk level
III.
Communicate
Factors to Consider:
i. Discuss with senior
management
ii. Ensure the message percolates
down to the grass-root level
Created by Praveen Joseph Vackayil
V. Monitor Risk
Factors
VI. Update the
RA
III.
Maintain
the RA
V. Monitor Risk
Factors
VI. Update the RA
Factors to Consider:
i. Concept of continuous risk
assessment
ii. Link RA with multiple sources–
eg. Threat advisories from
SANS, NIST, CERT, Microsoft
patch updates, Quarterly VA
scans, data discovery scans,
end-point compliance reports,
external audit findings
iii. Update the RA Report
Created by Praveen Joseph Vackayil
Email:
praveen.jvc@gmail.com
deepakumapathy@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesSlideTeam
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101Barry Caplin
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability Resolver Inc.
 
Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...NetZealous LLC
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachGraydon McKee
 
Risk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingRisk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingContentAssets
 
Risk management presentation
Risk management presentationRisk management presentation
Risk management presentationabpeters82
 
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John LiuThe Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John LiuNashvilleTechCouncil
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides SlideTeam
 
Ballot: Risk Assessments Made Simple
Ballot: Risk Assessments Made SimpleBallot: Risk Assessments Made Simple
Ballot: Risk Assessments Made SimpleResolver Inc.
 
Risk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixRisk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixEtQ, Inc.
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
Risk Management and Risk Transfer
Risk Management and Risk TransferRisk Management and Risk Transfer
Risk Management and Risk TransferCBIZ, Inc.
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides SlideTeam
 

Was ist angesagt? (20)

Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
Risk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in ManufacturingRisk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in Manufacturing
 
Risk management presentation
Risk management presentationRisk management presentation
Risk management presentation
 
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John LiuThe Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Risk
RiskRisk
Risk
 
Ballot: Risk Assessments Made Simple
Ballot: Risk Assessments Made SimpleBallot: Risk Assessments Made Simple
Ballot: Risk Assessments Made Simple
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixRisk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk Matrix
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Risk Management and Risk Transfer
Risk Management and Risk TransferRisk Management and Risk Transfer
Risk Management and Risk Transfer
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides
 

Ähnlich wie Formal Risk Assessment Workshop

How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - IDr. Shiv S Tripathi
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesRoger Johnston
 
Security risk management
Security risk managementSecurity risk management
Security risk managementbrijesh singh
 
crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptxdotco
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...Cam Fulton
 
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptxsafetygoodwe
 
Enterprise Risk Management - An Introduction (English)
Enterprise Risk Management - An Introduction (English)Enterprise Risk Management - An Introduction (English)
Enterprise Risk Management - An Introduction (English)Waqas I. YOUSAFZAI
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
 
ppt erm.pdf
ppt erm.pdfppt erm.pdf
ppt erm.pdfRJ231
 
Safety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety AnalysisSafety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety AnalysisC.P Prasanth
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
 
Risk managementslides
Risk managementslidesRisk managementslides
Risk managementslidesAbhilash Jha
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddShepherdChidambaeh
 

Ähnlich wie Formal Risk Assessment Workshop (20)

How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptx
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
 
Enterprise Risk Management - An Introduction (English)
Enterprise Risk Management - An Introduction (English)Enterprise Risk Management - An Introduction (English)
Enterprise Risk Management - An Introduction (English)
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
ppt erm.pdf
ppt erm.pdfppt erm.pdf
ppt erm.pdf
 
Safety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety AnalysisSafety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety Analysis
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Risk managementslides
Risk managementslidesRisk managementslides
Risk managementslides
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Formal Risk Assessment Workshop

  • 1. Created by Praveen Joseph Vackayil Praveen Joseph Vackayil Deepak Umapathy Created by Praveen Joseph Vackayil
  • 2. Created by Praveen Joseph Vackayil
  • 3. Created by Praveen Joseph Vackayil • Explore perspectives and incite thoughts on the risk assessment process • Re-visit the basic concepts of risk • Perform a risk assessment based on a formal methodology
  • 4. Created by Praveen Joseph Vackayil • Questions are welcome • Share your knowledge • Mobile phones – you know what to do
  • 5. Created by Praveen Joseph Vackayil • I. An Introduction to Risk Assessment • II. Basic Concepts • III. Lunch  • IV. Case Study: Implementing an NIST SP 800-30 Risk Assessment
  • 6. Created by Praveen Joseph Vackayil
  • 7. Created by Praveen Joseph Vackayil
  • 8. Created by Praveen Joseph Vackayil
  • 9. Created by Praveen Joseph VackayilRisk exists in daily life Risk may be a part of a profession or sport
  • 10. Created by Praveen Joseph Vackayil • We can’t always predict the future. At least not accurately. • Risk is a consideration of how something we value (asset) can be affected • by a negative entity (threat) • and lead to a less than ideal outcome (impact) • since it is not protected enough (vulnerability)
  • 11. Created by Praveen Joseph Vackayil Threat Source Threat Outcome Asset Vulnerability
  • 12. Created by Praveen Joseph Vackayil Asset Interpreted Definition: Risk is the probability that a threat, exploiting a vulnerability that exists in an asset of certain value, will cause an undesired impact. Threat Undesired Impact Vulner ability RISK ECOSYSTEM
  • 13. Created by Praveen Joseph Vackayil
  • 14. Created by Praveen Joseph Vackayil • Risk Assessment is nothing but people being people • It is an extension of human nature and a satiation of a basic human need:
  • 15. Created by Praveen Joseph Vackayil The jaguar hides its prey atop trees
  • 16. Created by Praveen Joseph Vackayil Name some things you see in this picture which remind you of risk assessment
  • 17. Created by Praveen Joseph Vackayil • Formalizing a Risk Assessment is a way of providing it with a systematic mechanism of – Measurement (defining metrics) –Repetition (process-specific and not person- specific) –Comparison (between different business verticals, for instance) Note: We will be visiting formal methodologies in the later slides
  • 18. Created by Praveen Joseph Vackayil
  • 19. Created by Praveen Joseph Vackayil If anything can go wrong, it will
  • 20. Created by Praveen Joseph Vackayil Case i: I am trying to check all the boxes in my compliance checklist. I don’t need a separate risk assessment as such. –A compliance standard is a universal set of instructions –Risk Assessment is the tool through which the standard is tailored to the unique circumstances of your environment Note: Risk assessment is mandated by most compliance standards today – eg. PCI, ISO 27001, HIPAA, etc.
  • 21. Created by Praveen Joseph Vackayil Case ii: We have annual third party audits. We don’t need risk assessment. –Risk assessment ≠ Audit –An audit is a discovery of what HAS already gone wrong –Risk Assessment is the discovery of what CAN go wrong in the near or distant future
  • 22. Created by Praveen Joseph Vackayil Case iii: I don’t see the point. We did a risk assessment last year and no one followed through with remediation. –Risk Assessment: • ‘If you can’t measure it, you can’t manage it.’ –Risk Management: • ‘Knowing is not enough, we must apply.’
  • 23. Created by Praveen Joseph Vackayil Case iv: Everything eventually boils down to the numbers. There is a cost involved in an RA. How do I justify this investment? RA Cost RA Benefit • Time and effort • Productivity is hit when business team is facing risk assessors • RA Training Costs • RA Consultant • RA Tool ? • Not having a security incident is the ROI of any security investment. • A key objective of RA is to ensure the security budget is not exceeded.
  • 24. Created by Praveen Joseph Vackayil
  • 25. Created by Praveen Joseph Vackayil Risk Frame Threat Source and Threat Event Impact Likelihood of Occurrence Vulnerability Risk Score Risk Response
  • 26. Created by Praveen Joseph Vackayil • Identification of the – Organizational priorities. Eg. Purpose of the RA – Scope – Assets (e.g., organizational entities covered, business functions affected by the RA) – Team Structure within the organization – Assumptions and Constraints – Information sources – Risk management guidance on the Risk Model, Analysis Approach, Assessment Approach, Qualitative Scale to be used for Risk Score, etc. – Risk response guidance including, for example, risk tolerance – Risk monitoring guidance
  • 27. Created by Praveen Joseph Vackayil Nature of risks varies with the level of hierarchy being assessed. Organization Tier Business Process Tier Information System Tier
  • 28. Created by Praveen Joseph Vackayil Asset/Impact-oriented Threat-oriented Threat Source Threat Event caused by the Threat Source Vulnerability Impact Vulnerability-oriented Critical Asset Impact that can compromise the Asset Threat Event that can cause the impact Threat Source that leads to this Threat Event Vulnerabilities and Pre- disposing Conditions Threat Event that exploits the Vulnerability Threat Source Impact
  • 29. Created by Praveen Joseph Vackayil
  • 30. Created by Praveen Joseph Vackayil Qualitative Quantitative • High Medium Low • Red, Green, Yellow Numeric Easy to calculate May include complex formulae Less accurate, but gets the job done Precise. Useful in $ estimations Difficult to convince stakeholders, since it is based on subjective judgement Easier to convince stakeholders Risk = f (Asset Value, Threat probability, Level of Vulnerability) Basic concepts to be noted: SLE=Asset Value x Exposure Factor ALE= SLE x ARO
  • 31. Created by Praveen Joseph Vackayil • Anything of value to the organization • Perception of value is tied to the purpose of the risk assessment – Eg. If in a compliance RA, the value of the asset depends on the compliance requirement. In PCI, card data is the most important asset, and hence gets highest Asset Value. – If the RA aims at capturing process inefficiencies and optimizing cost, money is the most important asset. – For the purpose of ISRA, information is usually the most important asset.
  • 32. Created by Praveen Joseph Vackayil Asset Name: DB Server Asset Category: Supporting Asset Asset Type: Hardware Asset Owner: Head of IT Dept Asset Custodian: Database Administrator Asset Value: • Impact if C is compromised: VH • Impact if I is compromised: VH • Impact if A is compromised: M Total Asset Value: VH
  • 33. Created by Praveen Joseph Vackayil Malicious outsider defaces the corporate website Employee loses company confidential data in a laptop Non-adversarial Threat Source Adversarial Threat Source Intent: To take control of the web server and deface the website Targeting: Web server Capability: Proficiency in hacking tools like Metasploit Knowledge of the systems architecture Range of Effects: Loss of confidential data if the laptop falls into the wrong and capable hands Threat Event Threat Event Website is defaced by a malicious outsider Company data is misused by an unknown third party
  • 34. Created by Praveen Joseph Vackayil • Change in attack approach based on controls perception. Time domain Target domain Resource Domain Attack method Influencers: • Path of least resistance • Path with quicker and more benefit
  • 35. Created by Praveen Joseph Vackayil • A vulnerability is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source
  • 36. Created by Praveen Joseph Vackayil • Controls are absent • Controls are not efficient • Controls are no longer relevant The ever-changing threat landscape can render the current control eco-system obsolete. Eg. Shellshock bash vulnerability.
  • 37. Created by Praveen Joseph Vackayil An existing condition within an environment that can increase or decrease the likelihood of a threat. Eg. • Indonesia is prone to earthquakes. • We use Windows XP on all our desktops. Risk increases • We operate out of a city with low crime rate
  • 38. Created by Praveen Joseph Vackayil Questions to Ask: • Will the threat event occur/be initiated by a threat source successfully? • Will the threat event cause an adverse impact successfully? Likelihood of Occurrence=f (Likelihood of Threat Event Initiation/Occurrence, Likelihood of Threat Event causing Adverse Impact)
  • 39. Created by Praveen Joseph Vackayil • Magnitude of harm caused due to the disclosure, modification, destruction/loss of sensitive data. • Impact may cascade to entities even external to the scoped environment. Eg. Financial loss, reputational loss, productivity loss, loss of existing clients.
  • 40. Created by Praveen Joseph Vackayil Risk Model • Threat • Likelihood • Vulnerability • Pre-disposing Condition • Impact Risk Factors Risk Risk models define the risk factors to be assessed and the relationships among those factors.
  • 41. Created by Praveen Joseph Vackayil Recall the earlier slide
  • 42. Created by Praveen Joseph Vackayil • Risk is the Likelihood • that a Threat Source will exploit • a Vulnerability with Severity And/or • A Pre-disposing Condition with Pervasiveness And initiate a • Threat Event Leading to An adverse Impact
  • 43. Created by Praveen Joseph Vackayil • Just before acquiring a new company • Just before an audit • Just after deploying new laptops • Before starting operations in a new facility • Every month for all assets • Never.  You be the Judge
  • 44. Created by Praveen Joseph Vackayil • Annual Risk Assessment • Real-time updates to the Risk Assessment via a Feedback Loop Scope Identify AssessManage Document
  • 45. Created by Praveen Joseph Vackayil
  • 46. Created by Praveen Joseph Vackayil Thoughts • Does it really work? – No tracker/reminder on the RA – Job rotations/staff leave the team – Disconnect between the risk assessor and the asset custodians • Is everyone that committed to security? – Top management commitment to security may not drill down to the grass-root levels
  • 47. Created by Praveen Joseph Vackayil A Formal Risk Assessment is one that is: • Measurable • Comparable • Repeatable A Formal approach: • Is tried and tested • Reduces re-work in devising new methodologies every year • Leads to consistency which in turn allows integration of RA with audit and other activities • Establishes a process and reduces people-dependency
  • 48. Created by Praveen Joseph Vackayil Do we really need to use a formal risk assessment methodology? • Yes • No
  • 49. Created by Praveen Joseph Vackayil Develop a new RA methodology Adopt an existing formal RA methodology RA METHODOLOGY: • A new methodology must be developed, tried and revised. This is in some ways re-invention of the wheel • A tried and tested methodology already exists. It needs to be shortlisted and adopted. • Corresponding RA template may be available RISK ASSESSORS: • Develop an in-house talent pool that is well versed with the methodology. Training costs extra. • Hire RA personnel with relevant experience/certification. Resource costs extra. COMPATIBILITY : • It will be created as per the organization’s unique environment. • The existing methodology may need to be tweaked to suit the organization’s environment, structure and culture. Eg. Primary and supporting assets may be selected according to the org-structure. ASSET OWNERS/CUSTODIANS: • Factors that encourage user adoption may be built-in while developing the methodology. Eg. Qualitative risk calculation is used, since it is easier for all to understand. • Ways to enable user adoption of the methodology must be developed. Eg. The survey-based approach of OCTAVE may not work in an organization where people don’t respond to emails. PREVIOUS REFERENCES: • Not sure if it will succeed/fail since there is no prior user experience/reviews to refer to • Tried and tested. Known to have succeeded. • Common pitfalls will be readily available based on other users’ experiences. These can be addressed accordingly.
  • 50. Created by Praveen Joseph Vackayil 3 popular RA methodologies: • ISO 27005 • OCTAVE • NIST SP 800-30
  • 51. Created by Praveen Joseph Vackayil • Developed by International Organization for Standardization (ISO) • Suitable for technology as well as process RA • Concept of primary and supporting asset can be adapted to most organizational scenarios • ISRA=Risk Identification->Risk Estimation- >Risk Evaluation • It’s USP: Asset Characterization
  • 52. Created by Praveen Joseph Vackayil Description of ISRA •Scope and Boundaries •Org structure •Risk Acceptance Criteria •RA Team Risk Analysis: Risk Identificatio n •Scope •Assets •Threats •Existing Controls •Vulnerabilities •Impact Risk Analysis: Risk Estimation •Qualitative •Quantitative Risk Evaluation •Risk Value vs Risk Acceptance Criteria •Accept •Mitigate •Transfer •Avoid
  • 53. Created by Praveen Joseph Vackayil • Developed by SEI-CMU • Most suited for assessing risks within organizational processes • Emphasizes a workshop-based approach over a tool approach • Built for large organizations, so interviews are broken across hierarchies and disciplines • Pareto’s Principle: 80% of the effects come from 20% of the causes • It’s USP: Threat Profiling • OMIG is available for free from CERT.org
  • 54. Created by Praveen Joseph Vackayil Organizational View • P1: Senior Management Knowledge • P2: Operational Management Knowledge • P3: Staff Knowledge • P4: Threat Profiling Technological View • P5: Identify Key Technoology Components within a System of Interest • P6: Evaluate Selected Components (Run a VA, Nipper Scan, run a DB review tool, etc.) Risk Analysis • Conduct Risk Analysis • Develop Protection Strategy Key Outputs: Assets, Security Requirements, Areas of Concern, Vulnerabilities, Threats Key Outputs: Key Technological Assets and their vulnerabilities Key Outputs: Risks and Protection strategy
  • 55. Created by Praveen Joseph Vackayil
  • 56. Created by Praveen Joseph Vackayil • The Federal Information Security Management Act (FISMA) is an information security act for all federal bodies in the US • FISMA requires NIST to develop and issue mandatory standards for all US federal agencies called FIPS – Federal Information Processing Standards – Eg. FIPS 140 talks about Cryptography requirements, FIPS 199 talks about classification of information • Special Publications (SPs) are guidance documents developed by NIST to support FIPS.
  • 57. Created by Praveen Joseph Vackayil Risk Likelihood of Occurrence Level of Impact
  • 58. Created by Praveen Joseph Vackayil I. Risk Framing II. Conduct the RA III. Maintain the RA I. Identify: • Purpose of RA • Scope and Assets • Assumptions and Constraints • Information Sources • Risk Model • Analysis Approach I. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition II. Calculate • Likelihood • Impact • Risk Level III. Communicate I. Monitor Risk Factors II. Update the RA
  • 59. Created by Praveen Joseph Vackayil • Read aloud the case study in the hand- outs issued to you.
  • 60. Created by Praveen Joseph Vackayil CEO Jeff Antony COO and CTO Anup Kumar Sonia Arora– Head, Project Delivery Rohit Kumar– Manager, IT Operations Manoj Krishna– Head, Physical Security Administration Priya Thomas– AVP, HR CISO Philip Williams
  • 61. Created by Praveen Joseph Vackayil Servers AD, AV, SCCM, DHCP Network Devices Firewall, L3 Switch Desktops and Laptops
  • 62. Created by Praveen Joseph Vackayil Support Processes Server and desktop administration Network device administration Physical Security Management processes Personnel security processes Client-facing Processes SDLC: Dev, Testing Production Support process
  • 63. Created by Praveen Joseph Vackayil I. Risk Framing II. Conduct the RA III. Maintain the RA I. Identify: • Purpose of RA • Scope and Assets • Assumptions and Constraints • Information Sources • Risk Model • Analysis Approach II. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition III. Calculate • Likelihood • Impact • Risk Level IV. Communicate V. Monitor Risk Factors VI. Update the RA
  • 64. Created by Praveen Joseph Vackayil I. Identify: • Purpose of RA • Scope • Assumptions and Constraints • Information Sources • Risk Model • Analysis Approach V. Monitor Risk Factors VI. Update the RA Factors to Consider: i. Initial RA: • Purpose can be to identify current security posture • Purpose can be to capture the starting point (baseline) of risks in the current setup/new setup. ii. Re-assessment • Purpose can be to monitor risks as part of continuous RA • Purpose can be to evaluate risk • Purpose can be to perform controls testing • Purpose can be to capture new risks as the environment has undergone a significant change and update an existing RA report.
  • 65. Created by Praveen Joseph Vackayil I. Identify: • Purpose of RA • Scope and Assets • Assumptions and Constraints • Information Sources • Risk Model • Analysis Approach V. Monitor Risk Factors VI. Update the RA Factors to Consider: i. Organizational Applicability: • Business processes within the organization that are affected ii. Effectiveness Time-frame • Time-duration for which the RA findings are going to be relevant and can assist in risk based decisions iii. Technological Considerations • With segmentation (VLANs, firewalls, etc.), the in-scope network can be reduced. • In a flat network, the entire network is in scope.
  • 66. Created by Praveen Joseph Vackayil I. Identify: • Purpose of RA • Scope and Assets • Assumptions and Constraints • Information Sources • Risk Model • Analysis Approach V. Monitor Risk Factors VI. Update the RA Factors to Consider: i. Consider all the stages of the risk assessment ii. Clarify on the following: • The uncertainty surrounding the risk assessment findings • The constraints faced with regard to resources – time, team, etc. • Assumptions made with the sampling approach deployed (if any) • Assumptions made and limitations of a qualitative computation of risk
  • 67. Created by Praveen Joseph Vackayil I. Identify: • Purpose of RA • Scope and Assets • Assumptions and Constraints • Information Sources • Risk Model • Analysis Approach Factors to Consider: Consider the methods to be used in risk identification i. People Risks • Interviews with relevant personnel • Review of records ( eg. BGV records) • External Source: Previous employers ii. Process Risks • Walkthrough of the process • Interviews with relevant personnel iii. Technology Risks • Review of desktop hardening • Review of server config • Nipper scan of firewall configs • Vulnerability Assessments • External Source: Security advisories from CERT, SANS, etc.
  • 68. Created by Praveen Joseph Vackayil I. Identify: • Purpose of RA • Scope • Assumptions and Constraints • Information Sources • Risk Model • Analysis Approach Factors to Consider: Recall the earlier slides: Documentation of a risk model includes: i. Identification of risk factors – ie threats, vulnerabilities and pre-disposing conditions, likelihood and impact ii. Identification of the relationships between the above risk factors
  • 69. Created by Praveen Joseph Vackayil I. Identify: • Purpose of RA • Scope and Assets • Assumptions and Constraints • Information Sources • Risk Model • Analysis Approach Factors to Consider: Recall the earlier slide:
  • 70. Created by Praveen Joseph Vackayil V. Monitor Risk Factors VI. Update the RA Capture the following aspects: i. Type of Threat Source • Adversarial • Non-adversarial ii. Characteristics of Threat Source • Adversarial -> Capability, Intent, Targeting • Non-Adversarial -> Range of Effects (Sweeping, Extensive, Limited, Minimal, etc.) iii. Overall Criticality Rating of Threat Source • Very High, High, Moderate, Low, Very Low II. Conduct the RA I. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition II. Calculate • Likelihood • Impact • Risk Level III. Communicate
  • 71. Created by Praveen Joseph Vackayil V. Monitor Risk Factors VI. Update the RA Factors to Consider: i. Envision various ways through which the Threat Source can compromise the Asset and cause a Threat Event ii. Study the entire lifecycle of the Asset to do so iii. Think of internal and external links /physical and logical links from threat source to the asset II. Conduct the RA I. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition II. Calculate • Likelihood • Impact • Risk Level III. Communicate
  • 72. Created by Praveen Joseph Vackayil V. Monitor Risk Factors VI. Update the RA Factors to Consider: i. Take existing controls into account when determining level of vulnerability. ii. Think of internal and external entities that are a direct or indirect characteristic of the asset. Eg. Glass is breakable, AC ducts can serve as escape tunnels, strong lights can glare out images on CCTV cameras, etc. II. Conduct the RA I. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition II. Calculate • Likelihood • Impact • Risk Level III. Communicate
  • 73. Created by Praveen Joseph Vackayil V. Monitor Risk Factors VI. Update the RA II. Conduct the RA I. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition II. Calculate • Likelihood • Impact • Risk level III. Communicate Factors to Consider: i. Be clear on the concept. A Threat Event occurring is not the same as a Threat Event causing an adverse impact. ii. Likelihood of Occurrence implies the Likelihood that Threat Event occurs/is initiated AND causes an adverse Impact iii. Likelihood that a Threat Event occurs/is initiated depends on the Threat Source which causes the Threat Event iv. Likelihood that a Threat Event causes an adverse Impact depends on the Level of Vulnerability that affects the exposure to the Threat Event
  • 74. Created by Praveen Joseph Vackayil V. Monitor Risk Factors VI. Update the RA II. Conduct the RA I. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition II. Calculate • Likelihood • Impact • Risk level III. Communicate Factors to Consider: i. Consider the most valuable asset (in this case customer information) that will get compromised if the threat source will exploit the vulnerability ii. Impact = f(Asset Value, Level of Vulnerability)
  • 75. Created by Praveen Joseph Vackayil V. Monitor Risk Factors VI. Update the RA II. Conduct the RA I. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition II. Calculate • Likelihood • Impact • Risk level III. Communicate Factors to Consider: i. Risk = f (Likelihood of Occurrence, Level of Impact) ii. Recall the Risk Response definitions to decide whether to accept, mitigate, transfer, avoid a risk.
  • 76. Created by Praveen Joseph Vackayil V. Monitor Risk Factors VI. Update the RA II. Conduct the RA I. Identify: • Threat Source • Threat Event • Vulnerability & Pre-disposing Condition II. Calculate • Likelihood • Impact • Risk level III. Communicate Factors to Consider: i. Discuss with senior management ii. Ensure the message percolates down to the grass-root level
  • 77. Created by Praveen Joseph Vackayil V. Monitor Risk Factors VI. Update the RA III. Maintain the RA V. Monitor Risk Factors VI. Update the RA Factors to Consider: i. Concept of continuous risk assessment ii. Link RA with multiple sources– eg. Threat advisories from SANS, NIST, CERT, Microsoft patch updates, Quarterly VA scans, data discovery scans, end-point compliance reports, external audit findings iii. Update the RA Report
  • 78. Created by Praveen Joseph Vackayil Email: praveen.jvc@gmail.com deepakumapathy@gmail.com