SlideShare a Scribd company logo
Risk mitigation
strategies.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– The why of taking risks.
– Strategies for mitigating risk.
PACE-IT.
Page 4
Risk mitigation strategies.
Page 5
It seems to be a law of nature,
inflexible and inexorable, that
those who will not risk cannot
win.
– John Paul Jones
Page 6
In the marketplace, there is
no reward without taking on
the risk of failure.
This brings up an interesting quandary. Investors
will often reward risk by increasing the value of a
company. On the other hand, failure due to risk
taking often leads to changes in management.
Management will often take on risk to gain the
rewards, while, at the same time, implementing
strategies to mitigate the amount of risk that it is
willing to assume.
Risk mitigation strategies.
Page 7
Risk mitigation strategies.
Page 8
– Change management (CM).
» All change represents a risk to systems—a small change in one
system may have a ripple effect that multiplies through the
whole system.
• CM is implemented in order to evaluate changes for their
effects on the system as a whole.
• CM allows for changes to occur, while, at the same time,
mitigating the risks associated with those changes.
– Review of user rights and user
permissions.
» Users must be granted rights and permissions in order to
function in their positions. These rights and permissions may, in
fact, represent a security risk.
• Periodic reviews should be conducted on user rights and
permissions to ensure that the principle of least privilege is
being followed—thus mitigating risk.
• Periodic reviews should be conducted on user rights and
permissions to ensure that unnecessary user accounts are
removed from the system—also mitigating risk.
Risk mitigation strategies.
Page 9
– Perform routine audits.
» Audits (reviews) of systems should be conducted on a regular
basis in order to reduce risks.
• Security audits can be conducted on many different systems
to evaluate different aspects of risk, including system
configurations and vulnerability assessments.
– Incident management.
» A type of after-the-fact mitigation technique.
• After a security incident has occurred, effective incident
management can help to contain the damage.
• After a security incident has occurred, effective incident
management can help to prevent it from occurring again.
– Enforcing policies and procedures.
» Effective policies and procedures can reduce the chances of a
risk event from ever taking place.
• Proper enforcement of policies and procedures can help to
prevent the loss or theft of data.
Risk mitigation strategies.
Page 10
Data loss prevention (DLP)
systems can be implemented
as a type of technology
control to mitigate the risk
of loss or theft of data.
DLP systems can be a software application or network appliance.
They are designed to analyze information traversing the network
to help ensure that sensitive data remains contained inside the
established safe boundaries.
DLP systems can monitor network links and review what is being
transmitted through protocols associated with instant messaging,
email, FTP, HTTP, etc. DLP systems may also be configured to
scan storage systems to help ensure that data is being stored in
the proper locations.
Risk mitigation strategies.
Page 11
Risk mitigation strategies.
John Paul Jones once said, “It seems to be a law of nature, inflexible and
inexorable, that those who will not risk cannot win.” There is no reward in
the marketplace without taking risks. Investors reward risk, while, at the
same time, punishing failure. Management often takes on risk, while, at the
same time, implementing strategies to mitigate risk and the effects of risk.
Topic
The why of taking risks.
Summary
Any change in a system represents a risk. CM is a mitigation strategy to
reduce the risks associated with changes to systems. Periodic reviews of
users rights and privileges can also mitigate risk. Security audits should be
performed to reduce risks to systems and data. Effective incident
management can restrict the damage that a risk event causes and help to
prevent that event from occurring again. Properly enforcing policies and
procedures can help to prevent the loss or theft of data. DLP systems can
also be put in place to help prevent the loss or theft of sensitive data.
Strategies for mitigating risk.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls

What's hot (20)

PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PPTX
Pace IT - Troubleshooting Security
PDF
Information Security Risk Management
PDF
Incident response methodology
PPTX
PACE-IT: Analyzing Monitoring Reports
DOCX
Generic_Sample_incidentresponseplanIRP_ISS_2016
PPT
Internal Risk Management
PPTX
MISO L008 Disaster Recovery Plan
PDF
L007 Managing System Security (2016)
PDF
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
PPTX
MISO L007 managing system security
PPT
How to improve endpoint security on a SMB budget
PPTX
PACE-IT: Supporting Configuration Management (part 1)
PPTX
Legal and ethical aspects
 
PDF
Remote Deposit Capture Risk Management & FFIEC Complaince
PPT
Planning and Deploying an Effective Vulnerability Management Program
PDF
Cybersecurity Goverence for Boards of Directors
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PPT
IT Security management and risk assessment
 
DOCX
Cmgt 582 Education Specialist -snaptutorial.com
PACE-IT, Security+1.3: Secure Network Design Elements and Components
Pace IT - Troubleshooting Security
Information Security Risk Management
Incident response methodology
PACE-IT: Analyzing Monitoring Reports
Generic_Sample_incidentresponseplanIRP_ISS_2016
Internal Risk Management
MISO L008 Disaster Recovery Plan
L007 Managing System Security (2016)
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
MISO L007 managing system security
How to improve endpoint security on a SMB budget
PACE-IT: Supporting Configuration Management (part 1)
Legal and ethical aspects
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Planning and Deploying an Effective Vulnerability Management Program
Cybersecurity Goverence for Boards of Directors
Vulnerability Management: What You Need to Know to Prioritize Risk
IT Security management and risk assessment
 
Cmgt 582 Education Specialist -snaptutorial.com
Ad

Viewers also liked (10)

PPTX
Courtney2
PDF
Blik grafisch ontwerp bureaupresentatie
DOCX
Trabajos
PDF
Artificial intelligence and Music
PDF
Pointillism
PPTX
Como instalar un antivirus
PDF
Rodolins
PDF
Les plantes per Aroa i Nuria
PPTX
PACE-IT, Security+ 2.3: Risk Mitigation Strategies
PDF
STEM Education
Courtney2
Blik grafisch ontwerp bureaupresentatie
Trabajos
Artificial intelligence and Music
Pointillism
Como instalar un antivirus
Rodolins
Les plantes per Aroa i Nuria
PACE-IT, Security+ 2.3: Risk Mitigation Strategies
STEM Education
Ad

Similar to PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties (20)

PPT
Testing
PDF
CHAPTER 5 -Information assurance management.pdf
PPT
Risk Assessment And Management
PPTX
Risk Mitigation
PPTX
Selling security to the C-level
PPT
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
PDF
IT Optimization & Risk Management
PDF
2006 issa journal-organizingand-managingforsuccess
PPT
Cyber crime with privention
PPT
Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture
PPTX
Information Security for Business Leaders - Eric Vanderburg - JurInnov
PDF
Vskills Certified Network Security Professional Sample Material
PDF
Security & Risk Management
PPT
Information Security
PPTX
Introduction to Information security ppt
PPTX
Introduction to Information security ppt
PDF
ISO / IEC 27001:2005 – An Intorduction
PPTX
INFRAGARD 2014: Back to basics security
PDF
CIA-Triad-Presentation.pdf
PPTX
Information Systems Policy
Testing
CHAPTER 5 -Information assurance management.pdf
Risk Assessment And Management
Risk Mitigation
Selling security to the C-level
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
IT Optimization & Risk Management
2006 issa journal-organizingand-managingforsuccess
Cyber crime with privention
Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture
Information Security for Business Leaders - Eric Vanderburg - JurInnov
Vskills Certified Network Security Professional Sample Material
Security & Risk Management
Information Security
Introduction to Information security ppt
Introduction to Information security ppt
ISO / IEC 27001:2005 – An Intorduction
INFRAGARD 2014: Back to basics security
CIA-Triad-Presentation.pdf
Information Systems Policy

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Cell Types and Its function , kingdom of life
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Pre independence Education in Inndia.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
RMMM.pdf make it easy to upload and study
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Lesson notes of climatology university.
PDF
Computing-Curriculum for Schools in Ghana
Basic Mud Logging Guide for educational purpose
O5-L3 Freight Transport Ops (International) V1.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Cell Types and Its function , kingdom of life
Renaissance Architecture: A Journey from Faith to Humanism
Anesthesia in Laparoscopic Surgery in India
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Institutional Correction lecture only . . .
Pre independence Education in Inndia.pdf
Microbial diseases, their pathogenesis and prophylaxis
Module 4: Burden of Disease Tutorial Slides S2 2025
Final Presentation General Medicine 03-08-2024.pptx
Sports Quiz easy sports quiz sports quiz
RMMM.pdf make it easy to upload and study
102 student loan defaulters named and shamed – Is someone you know on the list?
TR - Agricultural Crops Production NC III.pdf
Cell Structure & Organelles in detailed.
Lesson notes of climatology university.
Computing-Curriculum for Schools in Ghana

PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – The why of taking risks. – Strategies for mitigating risk. PACE-IT.
  • 5. Page 5 It seems to be a law of nature, inflexible and inexorable, that those who will not risk cannot win. – John Paul Jones
  • 6. Page 6 In the marketplace, there is no reward without taking on the risk of failure. This brings up an interesting quandary. Investors will often reward risk by increasing the value of a company. On the other hand, failure due to risk taking often leads to changes in management. Management will often take on risk to gain the rewards, while, at the same time, implementing strategies to mitigate the amount of risk that it is willing to assume. Risk mitigation strategies.
  • 8. Page 8 – Change management (CM). » All change represents a risk to systems—a small change in one system may have a ripple effect that multiplies through the whole system. • CM is implemented in order to evaluate changes for their effects on the system as a whole. • CM allows for changes to occur, while, at the same time, mitigating the risks associated with those changes. – Review of user rights and user permissions. » Users must be granted rights and permissions in order to function in their positions. These rights and permissions may, in fact, represent a security risk. • Periodic reviews should be conducted on user rights and permissions to ensure that the principle of least privilege is being followed—thus mitigating risk. • Periodic reviews should be conducted on user rights and permissions to ensure that unnecessary user accounts are removed from the system—also mitigating risk. Risk mitigation strategies.
  • 9. Page 9 – Perform routine audits. » Audits (reviews) of systems should be conducted on a regular basis in order to reduce risks. • Security audits can be conducted on many different systems to evaluate different aspects of risk, including system configurations and vulnerability assessments. – Incident management. » A type of after-the-fact mitigation technique. • After a security incident has occurred, effective incident management can help to contain the damage. • After a security incident has occurred, effective incident management can help to prevent it from occurring again. – Enforcing policies and procedures. » Effective policies and procedures can reduce the chances of a risk event from ever taking place. • Proper enforcement of policies and procedures can help to prevent the loss or theft of data. Risk mitigation strategies.
  • 10. Page 10 Data loss prevention (DLP) systems can be implemented as a type of technology control to mitigate the risk of loss or theft of data. DLP systems can be a software application or network appliance. They are designed to analyze information traversing the network to help ensure that sensitive data remains contained inside the established safe boundaries. DLP systems can monitor network links and review what is being transmitted through protocols associated with instant messaging, email, FTP, HTTP, etc. DLP systems may also be configured to scan storage systems to help ensure that data is being stored in the proper locations. Risk mitigation strategies.
  • 11. Page 11 Risk mitigation strategies. John Paul Jones once said, “It seems to be a law of nature, inflexible and inexorable, that those who will not risk cannot win.” There is no reward in the marketplace without taking risks. Investors reward risk, while, at the same time, punishing failure. Management often takes on risk, while, at the same time, implementing strategies to mitigate risk and the effects of risk. Topic The why of taking risks. Summary Any change in a system represents a risk. CM is a mitigation strategy to reduce the risks associated with changes to systems. Periodic reviews of users rights and privileges can also mitigate risk. Security audits should be performed to reduce risks to systems and data. Effective incident management can restrict the damage that a risk event causes and help to prevent that event from occurring again. Properly enforcing policies and procedures can help to prevent the loss or theft of data. DLP systems can also be put in place to help prevent the loss or theft of sensitive data. Strategies for mitigating risk.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.