Quantifying Cyber Security Risk in Dollars and Cents to Optimize Budgets CRM008 Speakers: Chris Cooper, VP, Operational Risk Officer; RGA Reinsurance Company.

Slides:



Advertisements
Similar presentations
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Advertisements

Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
A Robust Process Model for Calculating Security ROI Ghazy Mahjub DePaul University M.S Software Engineering.
Operational risk management Margaret Guerquin, FSA, FCIA Canadian Institute of Actuaries 2006 General Meeting Chicago Confidential © 2006 Swiss Re All.
The Risk Intelligent Enterprise
Risk Assessment Frameworks
CORPORATE RISK MANAGEMENT & INSURANCE BY R P BLAH D.G.M. INCHARGE THE ORIENTAL INSURANCE COMPANY LIMITED REGIONAL OFFICE BHUBANESWAR.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Security Awareness and Communication in the C-Suite EDUCAUSE Live
Presenting The Broker-Dealer Certification Tool The Compliance Department Inc. Broker Dealer Compliance Consultants Compliance SCORE Powered by Keane BRMS.
Chapter 11: Project Risk Management
EQAA 11th Session Jamil Kalat-Malho Jong Ho Lee
1 Enterprise Risk Management (ERM) Program PNM Resources, Inc. March 29, 2007 Presentation to American Public Power Association March 2007 Austin, Texas.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
Enterprise Risk Management Expectations Outpacing Capabilities and The Audit Committee’s Role July 30, 2013 Presented by: Suzette E. Ramsden (B.Sc., CISA,
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
The 2009 HIMSS Security Survey: Insights into the Status of Healthcare Security Implementation sponsored by Symantec Meeting of the HIT Standards Committee,
1602: Current Trends in Risk Management for Life Insurance Companies LOOKING BACK…focused on the future.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Disaster Planning The Ten Commandments of Success June 2014.
Project Management IV1021Fö5 Risk Management. Agenda Project Risk Project Risk Management The Risk Management Process Goal: get an understanding of basic.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
Larry Clinton Operations Officer Internet Security Alliance
Project Risk Management Planning Stage
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
NEACS: CRO Perspective William Feher Vice President, Internal Audit and Chief Risk Officer October 27, 2015.
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
Enterprise Risk Management An Introduction Frank Reynolds, Reynolds, Thorvardson, Ltd.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
ENABLING A COST/ BENEFIT ANALYSIS OF IMPLEMENTING ENCRYPTION- AT-REST USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE 2016.
COST BENEFITS OF IMPLEMENTING CREDIT CARD DATABASE TOKENIZATION USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE
USING FAIR, DOES TRAINING HELP REDUCE SPEAR PHISHING RISK? CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE
Risk Triage Rod Carney, CRISC 11/13/2014.
Risk Management Bill Ferguson, Ray Farmer, Tim Morris, Marty Wingate Insurance Summit
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Trinity Industries, Inc. FEI Presentation May 31, 2012.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Headquarters U.S. Air Force
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Overview and Services March 2015
HOW MUCH RISK IS ASSOCIATED WITH IT HYGIENE USING FAIR?
How can an Enterprise Risk Management (ERM), programme enable organizations achieve strategic objectives more effectively? Dr P S Sahota  
Enterprise risk management
Cyber Security: State of the Nation
Can Cyber Insurance Stand in the Data Breach
Compliance with hardening standards
COMP3357 Managing Cyber Risk
Board Concerns About Cyber Security
COST BENEFIT ANALYSIS OF IMPROVED PATCHING WINDOW USING FAIR
RISK ASSESSMENT TOOL PREVIEW
CMGT 430 Competitive Success/snaptutorial.com
CMGT 430 Education for Service/snaptutorial.com
CMGT 430 Teaching Effectively-- snaptutorial.com.
I have many checklists: how do I get started with cyber security?
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Cyber Risk & Cyber Insurance - Overview
GRC - A Strategic Approach
Session 8: Innovative Uses of Captives: Cyber and Beyond
Figuring out CyberSecurity Return On Investment
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Quantifying Cyber Security Risk in Dollars and Cents to Optimize Budgets CRM008 Speakers: Chris Cooper, VP, Operational Risk Officer; RGA Reinsurance Company Steven Tabacek, President, RiskLens, Inc.

Learning Objectives At the end of this session, you will: Understand the Challenges of Cyber Risk Analysis Today Cyber Risk Communication Common Risk Analysis tools & methodologies Is compliance working? Learn what is Factor Analysis of Information Risk (FAIR) About FAIR Benefits of cyber risk quantification Building a cyber risk quantification analysis scenario See an example putting the FAIR model into practice Cyber Risk Analysis Scenario Composition Cyber Risk Analysis Data Communicating Analysis Results

CISO “Eχουμε πάνω από δέκα χιλιάδες τρωτά σημεία, είναι συμβατό με το ογδόντα τοις εκατό” CFO “How much loss exposure do we have? Are we spending too little or too much on mitigation?” CIO “Are we spending our cybersecurity budget on the right things?” ERM “Do we have enough cyber insurance?” BOARD/CEO “We don’t want to be the next news headline. Are we doing enough to minimize risk?” The Communication Challenge

Cyber Risk = Business Risk Cyber risk = business risk. A primary responsibility for a CIO or CISO when talking to the CEO or board of directors is to articulate how cyber security translates into dollars and cents. Putting monetary value on security events, and tying security to real-life business cases, can show senior executives the potential impact of a cyber event in terms that make sense to them. Make security everyone’s business. 1 2

Risk Assessment Today… Qualitative Checklists Governance, Risk & Compliance G R C Very Low Low Moderate High Very High == 1 2 The way most information security professionals measure risk today fails to quantify cyber-risk in terms the business can understand and use

Is Compliance Working?

Defining Cyber Risk Risk... The probable frequency and probable magnitude of future loss In other words... How often bad things are likely to happen, and how bad they’re likely to be when they do happen

Cyber Risk Quantification RISK Threat Event Frequency Vulnerability Level Primary Loss Secondary Loss Loss Event Frequency Loss Magnitude FAIR Factor Analysis of Information Risk An ontology for information and operational risk Standard nomenclature for risk terms A framework for establishing data collection criteria Integrates into a computational engine for calculating risk

Building a Cyber Risk Scenario 1.Asset at risk 2.Threat Actors 3.Threat Effect: Confidentiality, Integrity, Availability

Use Case: Attack on Web App Asset At Risk Threat Community Threat TypeThreat Effect Customer Web Application MaliciousConfidentiality General Hackers Purpose Determine the level of risk associated with attacks against a customer web application for a specialty service. The above information would serve as the basis for determining if current resources are appropriate to resolve identified vulnerabilities.

Attack on Web Application MinimumMost LikelyMaximumConfidence 12 p/yr.26 p/yr.Low19 p/yr. Threat Event Frequency = TEF -Data from threat intelligence application RISK Threat Event Frequency Vulnerability Level Primary Loss Secondary Loss Loss Event Frequency Loss Magnitude

Mitigation - Controls Effectiveness of Controls The web application firewall effectively mitigates the largest percentage of threats events. Other factors to reduce vulnerability for an attack on this web application: Based on review, the web application has a number of identified vulnerabilities that have not been patched within 180 days. Some user’s accounts are known to use simple-to-guess passwords that still meeting required criteria (ex. Spring.16)

Attack on Web Application MinimumMost LikelyMaximumConfidence 0%2%High1% Vulnerability = VULN -Other measurably effective resistive controls RISK Threat Event Frequency Vulnerability Level Primary Loss Secondary Loss Loss Event Frequency Loss Magnitude

Attack on Web Application MinimumMost LikelyMaximumConfidence 0%2%High1% Loss Event Frequency = LEF -This is a calculated field from the distributions of threat event frequency and vulnerability -LEF = ~Once every 3 years RISK Threat Event Frequency Vulnerability Level Primary Loss Secondary Loss Loss Event Frequency Loss Magnitude

MinimumMost LikelyMaximumConfidence RISK Threat Event Frequency Vulnerability Level Primary Loss Secondary Loss Loss Event Frequency Loss Magnitude Loss Magnitude = LM Primary Loss Magnitude -Productivity (employee) -Loss Revenue -Initial Response $20K$45K Moderate $37K Attack on Web Application

MinimumMost LikelyMaximumConfidence RISK Threat Event Frequency Vulnerability Level Primary Loss Secondary Loss Loss Event Frequency Loss Magnitude Loss Magnitude = LM Secondary Loss Magnitude -Fines & Judgements -Secondary Response -Credit Monitoring $819K$4.8M Low $2.6M Attack on Web Application

Tactical vs. Strategic Analysis Tactical Single scenario pre-mitigation analysis such as the previous example of the “Attack on Web Application” Post-mitigation analysis following control improvements Strategic Multiple scenario analysis providing a probabilistic view of enterprise risk supporting case studies such as: Reporting “Top-Ten Risks and Aggregate Loss Exposure to the Board Tracking Departmental or Enterprise Loss Exposure over Time to establish ROI of security budgets and performance of managers.

Risk Quantification Benefits USE CASES ROI Understand Loss Exposure Preserve business value Assess ROI of security initiatives Optimize cyber security investments Effectively Assess Third Party RiskReduce supply-chain risk Prioritize Risk MitigationsMaximize risk reduction Optimize Cyber Insurance Coverage Facilitate risk transfer

Aggregate Enterprise Risk

Are we adequately insured?

Are we reducing risk over time? 2015 Q Q Q Q Q1 Loss Exposure over Time

Reference Material Comparing Methodologies for IT Risk Assessment and Analysis G Cyber Risk Community