SlideShare a Scribd company logo
An Overview of IT Risk & Control
Presented at the HH Internal Auditor’sCOP.
By
Ismail Oduoye CISA,CISSP
December, 2019
Outlines
01
02
03
Introduction
Definition of IT Risk
Objective
What is IT Risk and Control
IT Risk and Control
An overview of IT Risk and
Control/IT Risk Management
04
05
06
Risk Response plan
Discussion of various risk
management approach.
IT Risk Identification
Activities involved in the
detection of risk in the
enterprise IT asset.
Questions
Rubbing mind session
Objectives
An overview of the IT Risk & Control and discussion of various
activities involved in the identification of risk in an enterprise IT
asset.
Introduction
What is Risk?
 Risk can be view as a challenge or obstacle to
achieving set objectives.
 ISO called risk “the effect of uncertainty on
objectives”
 IT Risk is view as a negative event.
 IT Risk is the potential that a given threat will
exploit vulnerabilities of an asset or group of
assets and thereby cause harm to organization.
IT Risk and Control/Management
IT Risk and Control/IT Risk management
is defined as the coordinated activities to
direct and control an enterprise with
regards to risk.
It is a set of activities undertaken to
predict challenges and lower the chance
of risk occurrence or its impact.
IT Risk management is a cyclical process.
Risk Response
Negative risk or threat
 Negative risk or threat
 Avoid
 Transfer
 Mitigate
 Accept
Positive risk or opportunity
 Exploit
 Share
 Enhance
IT Risk Identification
1. IT ASSET INVENTORY AND
ENUMERATION
 IT Asset Review
 Method and technique of detecting active
devices on the network.
 Asset Classification based on criticality to
the enterprise business operation.
2. ENTERPRISE NETWORK SECURITY
 Enterprise network architecture review and
assessment.
 Firewall logs review and analysis.
 Firewall configuration review .
 How to use basic network scanners, NMAP,
Angry IP, etc.
 Improving network access security .
The following activities are involved in the risk identification stage of the IT
Risk Management cycle.
3. DATABASE REVIEWAND MONITORING
 Basic database monitoring tools.
 What to know while deploying DAM.
 What to look for while monitoring your
organization database.
 Database Vulnerability Test and Management.
4. MALWARE ACTIVITIES MONITORINGAND
REVIEW
 Need for an enterprise antivirus solution
equipped with endpoints protection.
 Antivirus logs review and analysis.
 Gaining insight into users ‘activities on the
Enterprise network.
5. VULNERABILITY MANAGEMENT
 Methods and Techniques of detecting
Vulnerabilities in the system
 Ports and services scanning
 Servers configuration review
 System patch review
 Automation of vulnerability Management with
tools such as Qualys Guard and Nessus.
 VAPT of web application using OWASP or free
available tools on the internet.
6. SIEM (SECURITY INFORMATION EVENT
MANAGEMENT)
 SIEM implementation and requirement gathering
 Automation of security tool’s log review and
analysis.
 Active directory activities monitoring.
 Office 365 activities monitoring.
 Incident detection and reporting.
7. APPLICATION REVIEW TECHNIQUIES
 Functional testing.
 Application architecture and positioning on the
enterprise network.
 Code documentation and review.
 VAPT using Burp suite or OWASP tools
 SSL Certificate vulnerability assessment
 Free online web application scanner
8. USER ACCESS REVIEW ON CORE BUSINESS
APPLICATION
 Separation of duty technique.
 Inventory of active and Inactive users
 Secure password requirement.
 User profiles modification review.
 Approval should be in place for each user created.
 Exited staff profile review across the various platforms.
 Implementation of 2fa.
9. Other activities expected of IT Security Professionals
 Crawl the internet for detection of clone websites.
 Daily search on social media platforms for detection
impersonated profiles/pages.
 Policies and other administrative framework review.
Questions
Thank you

More Related Content

PPTX
Prevent Insider Threats with User Activity Monitoring
PPTX
ObserveIT Webinar: Privileged Identity Management
PPTX
Cybersecurity Audit
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
PPSX
Next-Gen security operation center
PPTX
Cybersecurity Metrics: Reporting to BoD
PDF
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Prevent Insider Threats with User Activity Monitoring
ObserveIT Webinar: Privileged Identity Management
Cybersecurity Audit
Optimizing Security Operations: 5 Keys to Success
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Next-Gen security operation center
Cybersecurity Metrics: Reporting to BoD
Intel Presentation from NIST Cybersecurity Framework Workshop 6

What's hot (20)

PPTX
Security operation center
PPTX
Challenges of Vulnerability Management
PPTX
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
NASA OIG Report
PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
PPTX
I.T. Geeks Can't Talk to Management
PDF
Governance of security operation centers
PPTX
Ins and outs of ObserveIT
PPTX
Unintentional Insider Threat featuring Dr. Eric Cole
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPSX
Does audit make us more secure
PDF
When and How to Set up a Security Operations Center
PPTX
How to implement NIST cybersecurity standards in my organization
PDF
Nist cybersecurity framework isc2 quantico
DOCX
Catalyst research institute
PPTX
CyberSecurity Strategy For Defendable ROI
PDF
2017 IT Control Environment for Local Gov
PPTX
Security posture: Dashboard Implementation through Wireframe
Security operation center
Challenges of Vulnerability Management
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
Effective Security Operation Center - present by Reza Adineh
NASA OIG Report
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
I.T. Geeks Can't Talk to Management
Governance of security operation centers
Ins and outs of ObserveIT
Unintentional Insider Threat featuring Dr. Eric Cole
Top 20 Security Controls for a More Secure Infrastructure
Security operations center-SOC Presentation-مرکز عملیات امنیت
Does audit make us more secure
When and How to Set up a Security Operations Center
How to implement NIST cybersecurity standards in my organization
Nist cybersecurity framework isc2 quantico
Catalyst research institute
CyberSecurity Strategy For Defendable ROI
2017 IT Control Environment for Local Gov
Security posture: Dashboard Implementation through Wireframe
Ad

Similar to An Overview of IT Risk and Control (20)

PPTX
Security assessment isaca sv presentation jan 2016
PDF
Weakest links of an organization's Cybersecurity chain
PDF
Cyber presentation spet 2019 v8sentfor upload
PPTX
CRISC Course Preview
PDF
SMB270: Security Essentials for ITSM
PPT
S nandakumar
PPT
S nandakumar_banglore
PPTX
Information System Audit and Control
PDF
(Ebook) CIS Critical Security Controls by Center for Internet Security
PPTX
Security assessment with a hint of CISSP Prep
PDF
CCA study group
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
PPT
Information Serurity Risk Assessment Basics
PPT
SOC presentation- Building a Security Operations Center
PDF
Cyber Security Interview Analyst Questions.pdf
PDF
Cybersecurity Analyst Interview Questions.pdf
PDF
Cybersecurity Analyst Interview Questions and Answers.pdf
PDF
Cybersecurity Analyst Interview Questions By InfosecTrain
PDF
Aujas incident management webinar deck 08162016
PDF
InfosecTrain Cybersecurity Analyst Interview Questions
Security assessment isaca sv presentation jan 2016
Weakest links of an organization's Cybersecurity chain
Cyber presentation spet 2019 v8sentfor upload
CRISC Course Preview
SMB270: Security Essentials for ITSM
S nandakumar
S nandakumar_banglore
Information System Audit and Control
(Ebook) CIS Critical Security Controls by Center for Internet Security
Security assessment with a hint of CISSP Prep
CCA study group
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
Information Serurity Risk Assessment Basics
SOC presentation- Building a Security Operations Center
Cyber Security Interview Analyst Questions.pdf
Cybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions By InfosecTrain
Aujas incident management webinar deck 08162016
InfosecTrain Cybersecurity Analyst Interview Questions
Ad

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
sap open course for s4hana steps from ECC to s4
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx

An Overview of IT Risk and Control

  • 1. An Overview of IT Risk & Control Presented at the HH Internal Auditor’sCOP. By Ismail Oduoye CISA,CISSP December, 2019
  • 2. Outlines 01 02 03 Introduction Definition of IT Risk Objective What is IT Risk and Control IT Risk and Control An overview of IT Risk and Control/IT Risk Management 04 05 06 Risk Response plan Discussion of various risk management approach. IT Risk Identification Activities involved in the detection of risk in the enterprise IT asset. Questions Rubbing mind session
  • 3. Objectives An overview of the IT Risk & Control and discussion of various activities involved in the identification of risk in an enterprise IT asset.
  • 4. Introduction What is Risk?  Risk can be view as a challenge or obstacle to achieving set objectives.  ISO called risk “the effect of uncertainty on objectives”  IT Risk is view as a negative event.  IT Risk is the potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to organization.
  • 5. IT Risk and Control/Management IT Risk and Control/IT Risk management is defined as the coordinated activities to direct and control an enterprise with regards to risk. It is a set of activities undertaken to predict challenges and lower the chance of risk occurrence or its impact. IT Risk management is a cyclical process.
  • 6. Risk Response Negative risk or threat  Negative risk or threat  Avoid  Transfer  Mitigate  Accept Positive risk or opportunity  Exploit  Share  Enhance
  • 7. IT Risk Identification 1. IT ASSET INVENTORY AND ENUMERATION  IT Asset Review  Method and technique of detecting active devices on the network.  Asset Classification based on criticality to the enterprise business operation. 2. ENTERPRISE NETWORK SECURITY  Enterprise network architecture review and assessment.  Firewall logs review and analysis.  Firewall configuration review .  How to use basic network scanners, NMAP, Angry IP, etc.  Improving network access security . The following activities are involved in the risk identification stage of the IT Risk Management cycle.
  • 8. 3. DATABASE REVIEWAND MONITORING  Basic database monitoring tools.  What to know while deploying DAM.  What to look for while monitoring your organization database.  Database Vulnerability Test and Management. 4. MALWARE ACTIVITIES MONITORINGAND REVIEW  Need for an enterprise antivirus solution equipped with endpoints protection.  Antivirus logs review and analysis.  Gaining insight into users ‘activities on the Enterprise network.
  • 9. 5. VULNERABILITY MANAGEMENT  Methods and Techniques of detecting Vulnerabilities in the system  Ports and services scanning  Servers configuration review  System patch review  Automation of vulnerability Management with tools such as Qualys Guard and Nessus.  VAPT of web application using OWASP or free available tools on the internet.
  • 10. 6. SIEM (SECURITY INFORMATION EVENT MANAGEMENT)  SIEM implementation and requirement gathering  Automation of security tool’s log review and analysis.  Active directory activities monitoring.  Office 365 activities monitoring.  Incident detection and reporting. 7. APPLICATION REVIEW TECHNIQUIES  Functional testing.  Application architecture and positioning on the enterprise network.  Code documentation and review.  VAPT using Burp suite or OWASP tools  SSL Certificate vulnerability assessment  Free online web application scanner
  • 11. 8. USER ACCESS REVIEW ON CORE BUSINESS APPLICATION  Separation of duty technique.  Inventory of active and Inactive users  Secure password requirement.  User profiles modification review.  Approval should be in place for each user created.  Exited staff profile review across the various platforms.  Implementation of 2fa. 9. Other activities expected of IT Security Professionals  Crawl the internet for detection of clone websites.  Daily search on social media platforms for detection impersonated profiles/pages.  Policies and other administrative framework review.

Editor's Notes

  • #3: © Copyright PresentationGO.com – The free PowerPoint template library
  • #4: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  • #5: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  • #6: © Copyright PresentationGo.com – The free PowerPoint template library
  • #7: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  • #8: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  • #9: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  • #10: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  • #11: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  • #12: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  • #13: © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library