SlideShare a Scribd company logo
7
Most read
16
Most read
17
Most read
Information Security
Risk Management
1
CYBER
Definition of Cyber:
Relating to or a characteristic of, the culture of computers,
information technology and virtual reality
2
Disclaimer
The views expressed in this presentation are my own and do not necessarily represent
those of my employer.
Stephen Shippey
• IT since 1986.
• Information Security & Risk Manager since 1998 at a
number of Global Financial Services Organisations
including GE Global Consumer Finance, HBOS, Lloyds
Banking Group.
• Joined HP as an Information Security Risk Consultant 2013
3
Agenda
Risk Management
What is Risk Management Slide 5
Objectives of Infosec Risk Management vs Generic Risk Management Slide 7
Problems with Risk Management Slide 11
Mitigation Plans vs Contingency Plans Slide 12
Identifying Risks Slide 13
Risk Submissions Slide 16
Managing Risk Slide 17
Any questions Slide 18
4
What is Risk Management?
The identification of Risks and their management by defining:
• The Risk Description
• The Risk Owner
• The Probability of the Risk Event occurring
• The Risk Impact in terms of cost, loss of assets, Reputation … Failure to meet a
Business Objective
• The most suitable Mitigations that will prevent or reduce the Likelihood of the
Risk Event occurring with relation to their costs and the reduction of Risk
Exposure
• The Contingency Plan to recover the Asset once risk is manifested
• An understanding of Corporate Risk Appetite and where appropriate the
application of Risk Tolerance
5
Risk Definitions
Risk Definition: A Risk is a potential or future event that, should it occur, will
have a (negative) impact on the Business Objectives of an Organisation
A risk must have Uncertainty, (in terms of Probability or Likelihood). It
might happen
A risk must have a measurable Impact, (usually measured in monetary
terms, but other criteria are acceptable, reputation for example)
“It May Rain Tomorrow”
Issue Definition: An Issue is a current event that will have a (negative) impact
on the Business Objectives of an Organisation
E.g. An Incident, a manifested risk, an Audit Non-Compliance finding, an
Equipment or Supplier failure
“It is Raining Today”
6
Objectives of Generic Risk Management
This includes:
• Strategic Risks
• Programme and Project Risks
• Operational Risks (includes
Security and Business
Continuity Risks)
To ensure that all risks to the Business however they are
derived are managed effectively.
Operational Level
(Business as Usual)
Change
Level
Operational Risk
Register
Information
Security Risk
Register
BAU
Business
continuity
Strategic
Level
Strategic Risks
Programme/Project Risks
Operational Risks
Project Risk Register
Strategic Risk Register
7
Objectives of Information Security Risk
Management
To ensure that the risks to the Organisation that are derived from,
Incidents, Threats, Vulnerabilities and Audit non-compliances are
managed effectively.
In Security Terms these are those risks that impact the:
• Confidentiality,
• Integrity,
• Availability, and the
• Traceability of Information whilst:
• At rest
• Whilst being modified
• In transit (around a system, e-mail, media device, telephone etc.)
Risks within service provider environments
Information Security Risk Management
• A risk may have the same Risk Description but two separate impacts
dependent on the Owner
• e.g. Risk: patching may fail to complete in a timely manner
1. Impact on IT Service Provider: Potential Commercial Penalties, Damage to Reputation
2. Impact on Client: Loss of Systems, loss of information, loss of revenue etc. etc.
What is NOT Risk Management!
• Incident Management
• Audit Non-Compliances
• Problem Management
• Threat Management
• Vulnerability Management
• Exception / Waiver Management
These are Issues, no uncertainty!
However, they can be the Source of Infosec Risks
Common Problems (Misunderstandings)?
• Poor Risk Descriptions (Risk vs Issue and Impact
confusion) (Qualification vs Quantification)
• Unachievable, ineffective and disproportionate
Mitigation Actions
• Poor Control, risk owner vs risk mitigation
owner. Stakeholder Involvement
• Reactive vs Proactive Approach
• Reliance on Incidents, Threat and Non-
Compliance Management (Reactive)
• Proactive Risk Identification Workshop
based on Success Criteria
So What!
• Risks occur that could have been managed
• Impact on Assets not understood (BIA, CMDB)
• Mitigation Action Costs do not reflect the Risk
Exposure Reduction
• Systems fail, business and revenue lost,
• Corporate data is unavailable when required –
Loss of Business
• Regulator penalties, reputational damage occurs
• Loss of Customer base and confidence
• Loss of IPR.
Problems with Risk Management
11
Mitigation Plans and Contingency Plans
• Mitigations or Controls are primarily used to prevent the occurrence of
a risk or to reduce the Probability of Risk occurrence - (Reduce
Probability)
• This is why it is so important to describe the risk event clearly.
• Contingency Plans address the Impact of the Risk plans and are used to
recover a system from the effect of a risk should it occur, a mini BCP -
(Reduce Impact)
• This is why it is so important to clearly describe the risk impact separately from
the risk description
Sources of Cyber Security Risks (flip to risks)
Takenfrom some recent ISACA slides, these can be re-wordedas risks
• Proliferation of BYOD and smart devices
• Cloud computing
• Outsourcing of critical business processes to a third party (and lack of
controls around third-party services)
• Disaster recovery and business continuity
• Periodic access reviews
• Log reviews
Source: Cybersecurity - what the Board of Directors need to ask,
IIARF Research Report, 2014
13
Common Cybercriminal Attack Vectors (flip to risks)
• Application vulnerabilities
• Remote access.
• Ineffective patch management
• Weak network security/flat networks
• Lack of real-time security monitoring
• Third parties
• Lack of a data retention policy
SOURCE:HANSHENRIKBERTHING -CyberAssuranceandtheITAuditor Nov2014
14
Where to start
Selectappropriatecontrols/usesecuritystandards
• ISO27000
• PCIDSS
• CObIT
• BITSSIG
• Identifywhatisimportanttothebusiness
15
Encourage Risk Reporting
1. Createriskreportingawarenessfortheworkforce
2. Makeiteasy,createasimpleRiskSubmissionform
3. Assesstherisksubmission,askquestions
4. Ensureitisarisk,notanissue,aservicerequest,achangerequest☺
16
Manage the Risks
1. RecordinaRiskRegister
2. DescribetheRISK
3. AssesstheLikelihood,Impact,andriskrating
4. AgreerecommendedRiskMitigation/Treatment
5. Establishacontingencypositionifpossible
6. AssigntoanappropriateRISKOWNER(usuallyaBusinessStakeholder)
7. AgreeaMitigationOwner
8. Obtainadecision(Reduce,Accept,Avoid,Transfer)
9. Monitormitigationprogressuntiltargetriskisachieved–retainawarenessof
closedormitigatedrisks
10. Producemonthlystatusreports
17
Any Questions?
18
Ersoy.Aksoy@G31000.ae

More Related Content

PPTX
Security risk management
PPT
IT Security management and risk assessment
 
PPTX
Information Security Risk Management
PPTX
Information risk management
PPT
Chapter 5 Planning for Security-students.ppt
PDF
IT Risk Management
PDF
Wildfang Case Study
PPTX
Mastering Information Technology Risk Management
Security risk management
IT Security management and risk assessment
 
Information Security Risk Management
Information risk management
Chapter 5 Planning for Security-students.ppt
IT Risk Management
Wildfang Case Study
Mastering Information Technology Risk Management

What's hot (20)

PDF
Cybersecurity Roadmap Development for Executives
PDF
Risk Assessments
PPTX
Information security management system
PPT
Security policy
PPTX
Security Policies and Standards
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PDF
Enterprise Security Architecture for Cyber Security
PDF
Basics of Cyber Security
PPTX
Business continuity & disaster recovery planning (BCP & DRP)
PPT
Software security engineering
PPTX
Risk Management Approach to Cyber Security
PPTX
Iso27001 Risk Assessment Approach
PPTX
Information Security Governance and Strategy
PPTX
Protection of critical information infrastructure
PPTX
INFORMATION SECURITY
PPTX
ISA/IEC 62443: Intro and How To
PDF
NIST cybersecurity framework
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Roadmap Development for Executives
Risk Assessments
Information security management system
Security policy
Security Policies and Standards
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity Attack Vectors: How to Protect Your Organization
Enterprise Security Architecture for Cyber Security
Basics of Cyber Security
Business continuity & disaster recovery planning (BCP & DRP)
Software security engineering
Risk Management Approach to Cyber Security
Iso27001 Risk Assessment Approach
Information Security Governance and Strategy
Protection of critical information infrastructure
INFORMATION SECURITY
ISA/IEC 62443: Intro and How To
NIST cybersecurity framework
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Ad

Similar to Information Security Risk Management (20)

PPT
Risk Management (1) (1).ppt
PPT
ENTERPRISE risk management AWARENESS.ppt
PPT
project_risk_mgmt_final.ppt
PPT
project_risk_mgmt_final.ppt
PPT
PMI project_risk_management_final_2022.ppt
PPT
project_risk_mgmt_final 1.ppt
PPTX
Operational Risk Management - A Gateway to managing the risk profile of your...
PPTX
Risk Management
PPTX
Operational Risk : Take a look at the raw canvas
PDF
Microsoft InfoSec for cloud and mobile
PPTX
CRISC Course Preview
PDF
Beyond PMP: Risk Management
PPTX
Stay Ahead of Threats with Advanced Security Protection - Fortinet
PDF
51_operational_risk
PPTX
Level 2
PPTX
Level 2
PPTX
Crash Course: Managing Cyber Risk Using Quantitative Analysis
PDF
IS-Risk-Management-Lecture-2.pdf
PPTX
Risky Business
PDF
Strategic Cybersecurity
Risk Management (1) (1).ppt
ENTERPRISE risk management AWARENESS.ppt
project_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
PMI project_risk_management_final_2022.ppt
project_risk_mgmt_final 1.ppt
Operational Risk Management - A Gateway to managing the risk profile of your...
Risk Management
Operational Risk : Take a look at the raw canvas
Microsoft InfoSec for cloud and mobile
CRISC Course Preview
Beyond PMP: Risk Management
Stay Ahead of Threats with Advanced Security Protection - Fortinet
51_operational_risk
Level 2
Level 2
Crash Course: Managing Cyber Risk Using Quantitative Analysis
IS-Risk-Management-Lecture-2.pdf
Risky Business
Strategic Cybersecurity
Ad

Recently uploaded (20)

PPTX
Course Overview of the Course Titled.pptx
PPTX
Chapter Three for international political
PPTX
Supervisory Styles and When to Use Them!
PPTX
Concluding Session_Wrapup-NA May 5 2024-Oct 10 2025 ZS.pptx
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PDF
How does risk management integrate with project control?
PPT
Claims and Adjustment Business_Communication.pptx.ppt
PPTX
School Annual day Presentation, Logo, Animation
PDF
Human resources management is a best management
PDF
Features of Effective decision making in Management
PDF
Organisational Behaviour And it's concepts
PPTX
Human Resource Management | Introduction,Meaning and Definition
PDF
Phillips model training for evaluation pdf
PPTX
Empowering Project Management Through Servant Leadership - PMI UK.pptx
PDF
ORGANIZATIONAL communication -concepts and importance._20250806_112132_0000.pdf
PDF
Equity at the Helm_ Guiding Schools Through Inclusive Leadership by Dr.pdf
PDF
Leveraging Intangible Assets Through Campus Entrepreneurship and Tech Transfer
PDF
Timeless Leadership Principles from History’s Greatest Figures by Alfonso Ken...
PDF
The Cyber SwarmShield by Stéphane Nappo
PDF
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
Course Overview of the Course Titled.pptx
Chapter Three for international political
Supervisory Styles and When to Use Them!
Concluding Session_Wrapup-NA May 5 2024-Oct 10 2025 ZS.pptx
_ISO_Presentation_ISO 9001 and 45001.pptx
How does risk management integrate with project control?
Claims and Adjustment Business_Communication.pptx.ppt
School Annual day Presentation, Logo, Animation
Human resources management is a best management
Features of Effective decision making in Management
Organisational Behaviour And it's concepts
Human Resource Management | Introduction,Meaning and Definition
Phillips model training for evaluation pdf
Empowering Project Management Through Servant Leadership - PMI UK.pptx
ORGANIZATIONAL communication -concepts and importance._20250806_112132_0000.pdf
Equity at the Helm_ Guiding Schools Through Inclusive Leadership by Dr.pdf
Leveraging Intangible Assets Through Campus Entrepreneurship and Tech Transfer
Timeless Leadership Principles from History’s Greatest Figures by Alfonso Ken...
The Cyber SwarmShield by Stéphane Nappo
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...

Information Security Risk Management

  • 2. CYBER Definition of Cyber: Relating to or a characteristic of, the culture of computers, information technology and virtual reality 2
  • 3. Disclaimer The views expressed in this presentation are my own and do not necessarily represent those of my employer. Stephen Shippey • IT since 1986. • Information Security & Risk Manager since 1998 at a number of Global Financial Services Organisations including GE Global Consumer Finance, HBOS, Lloyds Banking Group. • Joined HP as an Information Security Risk Consultant 2013 3
  • 4. Agenda Risk Management What is Risk Management Slide 5 Objectives of Infosec Risk Management vs Generic Risk Management Slide 7 Problems with Risk Management Slide 11 Mitigation Plans vs Contingency Plans Slide 12 Identifying Risks Slide 13 Risk Submissions Slide 16 Managing Risk Slide 17 Any questions Slide 18 4
  • 5. What is Risk Management? The identification of Risks and their management by defining: • The Risk Description • The Risk Owner • The Probability of the Risk Event occurring • The Risk Impact in terms of cost, loss of assets, Reputation … Failure to meet a Business Objective • The most suitable Mitigations that will prevent or reduce the Likelihood of the Risk Event occurring with relation to their costs and the reduction of Risk Exposure • The Contingency Plan to recover the Asset once risk is manifested • An understanding of Corporate Risk Appetite and where appropriate the application of Risk Tolerance 5
  • 6. Risk Definitions Risk Definition: A Risk is a potential or future event that, should it occur, will have a (negative) impact on the Business Objectives of an Organisation A risk must have Uncertainty, (in terms of Probability or Likelihood). It might happen A risk must have a measurable Impact, (usually measured in monetary terms, but other criteria are acceptable, reputation for example) “It May Rain Tomorrow” Issue Definition: An Issue is a current event that will have a (negative) impact on the Business Objectives of an Organisation E.g. An Incident, a manifested risk, an Audit Non-Compliance finding, an Equipment or Supplier failure “It is Raining Today” 6
  • 7. Objectives of Generic Risk Management This includes: • Strategic Risks • Programme and Project Risks • Operational Risks (includes Security and Business Continuity Risks) To ensure that all risks to the Business however they are derived are managed effectively. Operational Level (Business as Usual) Change Level Operational Risk Register Information Security Risk Register BAU Business continuity Strategic Level Strategic Risks Programme/Project Risks Operational Risks Project Risk Register Strategic Risk Register 7
  • 8. Objectives of Information Security Risk Management To ensure that the risks to the Organisation that are derived from, Incidents, Threats, Vulnerabilities and Audit non-compliances are managed effectively. In Security Terms these are those risks that impact the: • Confidentiality, • Integrity, • Availability, and the • Traceability of Information whilst: • At rest • Whilst being modified • In transit (around a system, e-mail, media device, telephone etc.)
  • 9. Risks within service provider environments Information Security Risk Management • A risk may have the same Risk Description but two separate impacts dependent on the Owner • e.g. Risk: patching may fail to complete in a timely manner 1. Impact on IT Service Provider: Potential Commercial Penalties, Damage to Reputation 2. Impact on Client: Loss of Systems, loss of information, loss of revenue etc. etc.
  • 10. What is NOT Risk Management! • Incident Management • Audit Non-Compliances • Problem Management • Threat Management • Vulnerability Management • Exception / Waiver Management These are Issues, no uncertainty! However, they can be the Source of Infosec Risks
  • 11. Common Problems (Misunderstandings)? • Poor Risk Descriptions (Risk vs Issue and Impact confusion) (Qualification vs Quantification) • Unachievable, ineffective and disproportionate Mitigation Actions • Poor Control, risk owner vs risk mitigation owner. Stakeholder Involvement • Reactive vs Proactive Approach • Reliance on Incidents, Threat and Non- Compliance Management (Reactive) • Proactive Risk Identification Workshop based on Success Criteria So What! • Risks occur that could have been managed • Impact on Assets not understood (BIA, CMDB) • Mitigation Action Costs do not reflect the Risk Exposure Reduction • Systems fail, business and revenue lost, • Corporate data is unavailable when required – Loss of Business • Regulator penalties, reputational damage occurs • Loss of Customer base and confidence • Loss of IPR. Problems with Risk Management 11
  • 12. Mitigation Plans and Contingency Plans • Mitigations or Controls are primarily used to prevent the occurrence of a risk or to reduce the Probability of Risk occurrence - (Reduce Probability) • This is why it is so important to describe the risk event clearly. • Contingency Plans address the Impact of the Risk plans and are used to recover a system from the effect of a risk should it occur, a mini BCP - (Reduce Impact) • This is why it is so important to clearly describe the risk impact separately from the risk description
  • 13. Sources of Cyber Security Risks (flip to risks) Takenfrom some recent ISACA slides, these can be re-wordedas risks • Proliferation of BYOD and smart devices • Cloud computing • Outsourcing of critical business processes to a third party (and lack of controls around third-party services) • Disaster recovery and business continuity • Periodic access reviews • Log reviews Source: Cybersecurity - what the Board of Directors need to ask, IIARF Research Report, 2014 13
  • 14. Common Cybercriminal Attack Vectors (flip to risks) • Application vulnerabilities • Remote access. • Ineffective patch management • Weak network security/flat networks • Lack of real-time security monitoring • Third parties • Lack of a data retention policy SOURCE:HANSHENRIKBERTHING -CyberAssuranceandtheITAuditor Nov2014 14
  • 15. Where to start Selectappropriatecontrols/usesecuritystandards • ISO27000 • PCIDSS • CObIT • BITSSIG • Identifywhatisimportanttothebusiness 15
  • 16. Encourage Risk Reporting 1. Createriskreportingawarenessfortheworkforce 2. Makeiteasy,createasimpleRiskSubmissionform 3. Assesstherisksubmission,askquestions 4. Ensureitisarisk,notanissue,aservicerequest,achangerequest☺ 16
  • 17. Manage the Risks 1. RecordinaRiskRegister 2. DescribetheRISK 3. AssesstheLikelihood,Impact,andriskrating 4. AgreerecommendedRiskMitigation/Treatment 5. Establishacontingencypositionifpossible 6. AssigntoanappropriateRISKOWNER(usuallyaBusinessStakeholder) 7. AgreeaMitigationOwner 8. Obtainadecision(Reduce,Accept,Avoid,Transfer) 9. Monitormitigationprogressuntiltargetriskisachieved–retainawarenessof closedormitigatedrisks 10. Producemonthlystatusreports 17