Risk Triage Rod Carney, CRISC 11/13/2014.

Slides:



Advertisements
Similar presentations
The Department of Energy Enterprise Risk Management Model
Advertisements

Credit Risk In A Model World
PROJECT RISK MANAGEMENT
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
Session 3: Security Risk Management Eduardo Rivadeneira IT Pro Microsoft Mexico.
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
1 The Integration of Governance, Risk Management, Compliance and Culture to facilitate the achievement of goals and objectives. Enterprise Risk Management.
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
RSM McGladrey, Inc. is a member firm of RSM International – an affiliation of separate and independent legal entities. Operational Risk Management Framework.
Operational Risk Management Framework Control Self Assessment
PPA 573 – Emergency Management and Homeland Security Lecture 6 – Recovery From Disaster.
Risk Assessment Frameworks
Oversight CHAPTER SIXTEEN Student Version Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Oversight CHAPTER SIXTEEN Student Version Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Security Risk Management Paula Kiernan Ward Solutions.
Change Advisory Board COIN v1.ppt Change Advisory Board ITIL COIN June 20, 2007.
Information Technology Audit
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Treasury’s Role in the Merger Integration Process.
Risk Management & Liability Informa Brownfield Hospital Development Summit June 2009.
Investment Portfolio Methodologies Pertemuan Matakuliah: A Strategi Investasi IT Tahun: 2009.
National Hurricane Conference Training Session Panel: Decision-Making Tools for Risk Management & Assessment Claire Drury, HAZUS Program Manager.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Dr. Charles W. Beadling Central Asia Regional Health Security Conference April 2012 Garmisch-Partenkirchen, Germany.
Hartley, Project Management: Integrating Strategy, Operations and Change, 3e Tilde Publishing Chapter 10 Risk Management Proactively managing the positive.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Presenter’s Name June 17, Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting.
Project Management IV1021Fö5 Risk Management. Agenda Project Risk Project Risk Management The Risk Management Process Goal: get an understanding of basic.
Can Financial Innovation Promote Energy Efficiency? An Impact Analysis for China November 13, 2009 Hiroyuki Hatashima Independent Evaluation Group-IFC.
Project Management 6e..
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Treasury’s Role in the Merger Integration Process.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
ENABLING A COST/ BENEFIT ANALYSIS OF IMPLEMENTING ENCRYPTION- AT-REST USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE 2016.
COST BENEFITS OF IMPLEMENTING CREDIT CARD DATABASE TOKENIZATION USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
RISK MANAGEMENT. CONTENTS  DEFINITION  WHAT IS RISK  TYPES OF RISK  RISK MANAGEMENT PROCESS  APPROACHES TO RISK MANAGEMENT.
S3.1 session day 3 1 training delivered by Oxfam GB, RedR India and Humanitarian Benchmark; January 2012, Yangon, Myanmar approved by the Advisory.
Business Continuity Planning 101
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Quantifying Cyber Security Risk in Dollars and Cents to Optimize Budgets CRM008 Speakers: Chris Cooper, VP, Operational Risk Officer; RGA Reinsurance Company.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
Where We Are Now. Where We Are Now Project Oversight Project Oversight Oversight’s Purposes: A set of principles and processes to guide and improve.
IT Threat and Risk Assessment Overview
HOW MUCH RISK IS ASSOCIATED WITH IT HYGIENE USING FAIR?
and Security Management: ISO 28000
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
CONTINUITY OF OPERATIONS PLANNING WORKSHOP #2
COST BENEFIT ANALYSIS OF IMPROVED PATCHING WINDOW USING FAIR
Project Management 6e..
CRISC Exam Certified in Risk and Information Systems Control (CRISC)
I have many checklists: how do I get started with cyber security?
Align Project Risk Assessment
Where We Are Now. Where We Are Now Project Oversight Project Oversight Oversight’s Purposes: A set of principles and processes to guide and improve.
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
Cybersecurity ATD technical
Effective Risk Management in Decision Making Process
Information Security Risks; All-in-One Terminology
Project Management 6e..
Project Management 6e..
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

Risk Triage Rod Carney, CRISC 11/13/2014

Agenda What is Risk Triage? Developing a Triage Risk Assessment A Risk Triage Tool Approach Risk Triage Example

Triage – What comes to mind?

Triage – What comes to mind? Triage Defined: A process for sorting injured people into groups based on their need for or likely benefit from immediate medical treatment. A system used to allocate a scarce commodity, such as food, only to those capable of deriving the greatest benefit from it. A process in which things are ranked in terms of importance or priority. There are a few definitions for triage, the first of which relates to what is probably the most common thought when you hear the word. You typically think of fast-paced decisions made in a situation where multiple injuries have occurred. How does it work? A process has been established up front, probably rehearsed, where a very few, but very key elements are assessed to make decisions which hopefully, will result in the greatest positive impact. Many times it is a scenario involving a number of casualties. The definition that closely relates to a risk triage is that involving a ranking of things in terms of importance or priority….or in certain cases…risk.

Triage for Risk Analysis What does Triage mean to a risk assessment: Small number of risk elements Most key risk elements Quick assessment for deeper involvement Risk Management Security oversight Quick assessment for efficiency Business decisions Business authorizations How do we relate the concept of triage to assessing risk? Risk, especially technology risk, comes in all shapes & sizes and the process to assess risk can take on many shapes as well. On one extreme, it could involve a full visibility study in an area to develop and document what is known relative to the elements of risk in that area. It could involve a lengthy engagement with a professional Risk Management firm to complete an assessment. A triage is the “Reader’s Digest Condensed Version” of a risk assessment. In terms of prioritizing, it can be used to help determine areas of focused governance by groups such as Risk Management, Information Security or even an Enterprise Architecture group. An example might be assessing a portfolio of 200 projects to determine which pose the greatest risk the organization. To do that quickly and efficiently, you might develop a process, involving a triage risk analysis to help with the prioritization.

Triage for Risk Analysis Applications for Triage Risk Analysis Project implementations Enterprise release implementations Vendor evaluations / risk assessments Vulnerability assessments Considerations for Triage Risk analysis include Project Risk Triage Prioritizing involvement in projects, as mentioned a moment ago Assessing the completion of key elements to minimize risk associated with project implementations Release Risk Traige Assessing the aggregate relative risk of multiple projects implementing within the same implementation window Vendor assessments Assessing the key elements of vendor risk through various points of a vendor relationship Vulnerability assessments Taking into account the relevant layers of controls to determine residual risk associated with vulnerabilities identified by the various tools

Triage for Risk Analysis Why? What’s the benefit? Fast / Efficient Consistent input / analysis Quantitative Defendable Emotionless *** Better Informed Decisions *** Once you develop the triage and the process, it becomes a quick, easy and efficient means of accomplishing your assessment. It is based on real, known data, so that the results are defendable and helps to curb the emotional reactions. At the end of the day, it is all about making better informed decisions.

Planning a Triage Risk Assessment Follow a risk assessment methodology Scale it down to represent a triage Identify the key elements that influence risk Develop a repeatable process Follow a methodology for: - Consistency - Repeatability - Defendable Results There are a number of risk assessment methodologies. If you and your organization use one regularly, stick with it and scale it down into a quick and efficient assessment process. FAIR ISACA COBIT 5 ISO/IEC 31000:2009 and 27005:2011 NIST Special Publication 800-30 OCTAVE Allegro RiskSafe We have settled on the methodology represented with FAIR and through the remainder of the discussion, I’ll describe how we’ve taken the key elements of FAIR and built a process for triage risk assessments. Develop a repeatable process - Data Collection - Assessment through a tool that actually calculates the risk - Reporting Results

Planning a Triage Risk Assessment Categorize the risk being assessed Examples: Confidentiality Availability Integrity Result - a better focused triage assessment One of the first things to consider is categorizing the risk each assessment is focusing on. The reason for this is you want to keep the assessment focused on the key relevant elements and not let the assessment become diluted by elements, even real risk factors, that just don’t apply. For example, consider the Availability Risk associated with a project making architectural changes to a web-facing system supporting your business. For this assessment, you care about things like DR documentation and testing, along with system testing and adherence to architectural standards. Now then, you also care about the results of application vulnerability scanning, but more so for Confidentiality and Integrity risk rather than Availability risk. Sure it may apply, but for an Availability risk assessment, there are other more key assessment factors.

Planning a Triage Risk Assessment The FAIR Methodology….. As I mentioned, we’ve based our triage assessments on the FAIR methodology. FAIR, in a slide, looks like this and the full taxonomy is even more involved than what you see here. The key for a triage is focusing on the highest elements that contribute to risk. We’ll focus on those elements that make up Loss Event Frequency and Loss Magnitude.

Scaling it Down for Triage Risk Loss Event Frequency Loss Magnitude Now that you understand the key components of the risk scenario, this is how they fit together for a triage risk analysis…. Loss Event Frequency and Loss Magnitude are the top level components of Risk in a FAIR assessment. These relate to what you traditionally think of with Likelihood and Impact when thinking of Risk assessments. These are calculated values based on threats, value/liability represented for the asset and controls intended to mitigate the threats and liability. For a triage assessment, we’ll take it down just 1 level to look at the elements that contribute to them. Loss Event Frequency is determined by the probable threats relevant to the scenario and the related vulnerability. Controls typically contribute significantly to the vulnerability assessment, plus with many of our triage assessments we’ve developed, we are looking specifically for evidence of the control activities, the triage diagram replaces Vulnerability in the FAIR taxonomy with Controls. We have a similar relationship with loss and control activities which are expected to reduce impact, should issues manifest themselves into loss. Threat Event Frequency Controls Primary / Secondary Loss Controls

Building a Triage Risk Assessment Articulate the risk scenario Identify the associated Asset Understand / define the potential loss associated with the risk scenario As with any risk assessment, you really can’t effectively get started without a few foundational components. You have to: First, Describe and document the scenario which could manifest itself into loss. If there is no scenario in which a loss could occur, there probably isn’t an analysis to be done. The most important part of the risk scenario is the asset involved or that which could be impacted. Have an idea of what the probable loss “looks or feels like.” Is it a financial loss… is it a property loss… Is loss in the form of an injury… Examples: Risk Scenario Project Implementations Release risk assessments Asset Financial Data Sensitive PII data An online system through which customers go for service Loss System outage Breach of sensitive customer Information Financial Loss

Building a Triage Risk Assessment Know the Threats Are there controls or expected actions to mitigate the threats or minimize impact? Once you know these things, you can start looking at the elements that actually act in such a way as to cause loss to occur. These elements are the THREATS. You should be able to quantify the threats and, by nature, these are the things that, by their existence, can increase the probability that some form of loss will occur, if not properly managed. Many of the triage assessments we’ve developed actually serve the purpose of monitoring activities that are expected as standard process to reduce the likelihood that loss will result from successful threats Examples: Threats Poorly written code or code with vulnerabilities Non-standard or unsupported system components Internet threats (DDOS) Controls Security standards compliance Up to date and tested tech recovery plans Testing complete with no high or critical rated defects

Building a Triage Risk Assessment Identify key triage THREAT and LOSS elements Keep the number of elements to no more than 3 per risk factor Qualify their severity in simple terms Yes/No Low/Moderate/High In just a moment, I’ll show you how the triage elements are arranged on a spreadsheet table for a Bayesian type analysis. But first, there are a few key guidelines to go over for consideration….strong consideration….as your analysis tool comes together. Generally, keep the elements for triage for each of the factors small in number and simple in response options. Remember – this is a Triage. When we look at some Bayes table examples, this will become clear.

Building a Triage Risk Assessment Identify key control elements Actions intended to mitigate against the effect of elements contributing to risk Keep the number of control elements to no more than 3 per risk factor Qualify as “control strength” in simple terms Yes/No High/Moderate/Low *** Caution *** This can become confusing Same guidance applies to the Control elements and just one additional word of caution. As you discuss Risk, Threats and Severity, we naturally equate the word “High” with the negative, or increasing risk. When we discuss Control Strength, Highs actually serve to decrease overall severity and risk. It’s just something that has tripped us up from time to time.

Building a Triage Risk Assessment Loss Event Frequency Loss Magnitude Medium Risk High Low Control Strength Threat Event Frequency Medium Risk High Low Control Strength Primary / Secondary Loss I mentioned that, for many of our triage assessments, one of the goals is to provide evidence that expected control activities either exist or are being performed. It’s important to the triage assessment to define how the control or the strength of controls combines with Threat Event Frequency and loss elements to determine the Loss Event Frequency and Loss Magnitude. You see here that, the Lower the control strength, the Higher the severity.

Building a Triage Risk Assessment Medium Risk High Low Loss Magnitude Loss Event Frequency As you assess the effects of Loss Event Frequency and Loss Magnitude on risk, it stands to reason that, as they both increase, so does the risk. No surprises here. Loss Event Frequency (probability a threat will act in such a way as to cause loss) Loss Magnitude (impact or extent of loss given successful action by a threat)

Risk Assessment Example The Scenario What is the RISK associated with a project involving an upgrade or change to an internal Human Resources system? For this example, Availability Risk Consider a change that may be an application upgrade or some infrastructure upgrade that may be adding capacity in terms of adding servers or perhaps a change involving a database upgrade. These types of changes all pose some loss exposure in the event of issues resulting from the planned changes. Remember to categorize the Risk: This example focuses on Availability Risk, not taking into account the elements of Confidentiality or Integrity Risk for the scenario

Bayes Table Analysis Threat Event Frequency Control Strength Input TEF Element Severity Required Recovery Time Mod Low High Project / System Complexity Vendor supported Yes Y N LLY LLN LMY LMN LHY LHN MLY MLN MMY MMN MHY MHN HLY HLN HMY HMN HHY HHN INPUT OUTPUT Control Strength A table is laid out with all possible combinations and permutations of the various inputs so that each has a corresponding output. This is an example of possible Threat and control elements that contribute to Availability Risk associated with a Technology project implementation. For Threats, the output is a Threat Severity level. The way it works is as follows: A severity is entered for each The combination of inputs is captured as the first character of each of the inputs Each combination of inputs is represented on the table with a resulting corresponding severity An HLOOKUP formula determines, from the input combination, the resulting severity from the table and that becomes the output to represent the Threat Event Frequency The same process takes place to establish Control Strength, based on controls input. The outputs are carried forward to another table to determine Loss Event Frequency. Input Combination Controls - TEF System testing No Yes   Standards Alignment Aligned A N YA YN NA NN Mod High Low

Bayes Table Analysis Loss Event Frequency Threat Event Frequency H M L TEF High Low Mod Controls - TEF LH LM LL MH MM ML HH HM HL Threat Event Frequency H M L Control Strength

Bayes Table Analysis Primary Value/Liability # Employees Mod Low High Financial transactions No Yes LN LY MN MY HN HY Secondary Value/Liability # Customers None Federal reporting deadlines NN NY Controls - LM Disaster recovery testing Operational support YY YN Primary Loss and Secondary Loss follow the same definitions as those defined by FAIR.

Bayes Table Analysis And Finally….. Risk Loss Event Frequency Loss Magnitude Controls - LM Low High Mod Primary LM Secondary LM HLL HLM HLH HML HMM HMH HHL HHM HHH MLL MLM MLH MML MMM MMH MHL MHM MHH LLL LLM LLH LML LMM LMH LHL LHM LHH And Finally….. The Loss Magnitude table clearly illustrates why it’s important to keep the number of input elements and possible inputs for each to a maximum of 3. We do have a couple of tables with 4 input elements, but the really become unwieldy. Finally, the Loss Event Frequency and Loss Magnitude come together to determine the associated risk. Risk Loss Event Frequency High Low Mod Loss Magnitude LL LM LH ML MM MH HL HM HH

Questions….. Rod Carney Huntington National Bank rod.carney@huntington.com