Objectives We’ll answer the following: What is a FRAP? Why a FRAP?

Slides:



Advertisements
Similar presentations
Managing Risk: A Framework and Reporting Cycle 2014.
Advertisements

PROJECT RISK MANAGEMENT
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Auditing Concepts.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
U.Va.’s IT Security Risk Management Program (ITS-RM) April 2004 LSP Conference Brian Davis OIT, Security and Policy.
Group 3 John Gregory John Marsh Gerri Houston Samantha McNeily.
Service Design – Section 4.5 Service Continuity Management.
Security Controls – What Works
Project Risk Management
23 January 2003© All rights Reserved, 2002 Understanding Facilitated Risk Analysis Process (FRAP) and Security Policies for Organizations Infocomm Security.
The Information Systems Audit Process
Managing Project Risk.
Chapter 5: Supply Chain Performance Measurement and Financial Analysis
Bureau of Workers’ Comp PA Training for Health & Safety (PATHS)
Hazards Analysis & Risks Assessment By Sebastien A. Daleyden Vincent M. Goussen.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Ship Recycling Facility Management System IMO Guideline A.962
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Chapter 11: Project Risk Management
Basics of OHSAS Occupational Health & Safety Management System
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
HIT241 - RISK MANAGEMENT Introduction
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Section Topics Establish a framework for assessing risk
1. 2 IMPORTANCE OF MANAGEMENT Some organizations have begun to ask their contractors to provide only project managers who have been certified as professionals.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
System Analysis and Design Dr. Taysir Hassan Abdel Hamid Lecture 5: Analysis Chapter 3: Requirements Determination November 10, 2013.
Risk Management Project Management Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
SacProNet An Overview of Project Management Techniques.
Assessing Current Network Concerns Lesson 5. CERT/CC Stats.
IAEA International Atomic Energy Agency. IAEA Outline LEARNING OBJECTIVES REVIEW TEAM AND COUNTERPARTS Team Composition Qualification PREPARATORY PHASE.
IT 499 Bachelor Capstone Week 4. Adgenda Administrative Review UNIT Four UNIT Five Project UNIT Six Preview Project Status Summary.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Risk Management How To Develop a Risk Response Plan alphaPM Inc.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Project Risk Management Planning Stage
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
karRKb;RKghaniP½yrbs;KMerag Project Risks Management
(Project) RISK MANAGEMENT PROCESS SEPTEMBER 5, 2008.
Introduction to Project Management Chapter 9 Managing Project Risk
Requirements Workshop Techniques for E-Business Projects
IAEA International Atomic Energy Agency. IAEA Outline LEARNING OBJECTIVES REVIEW TEAM AMD COUNTERPARTS Team Composition Qualification PREPARATORY PHASE.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Assessing Current Network Concerns Lesson 5. The Assessment Two important elements you will need to determine in order to produce a valuable assessment.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Business Continuity Planning 101
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
1 Working with Project Stakeholders in a Statewide Project PMI-SVC PMO Forum Monthly Meeting Dan Conway, PMP October 22, 2008.
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
Auditing Concepts.
Chapter 8 – Administering Security
Recognization and management of RISK in educational projects
Description of Revision
RST processes Session 5 Presentation 2.
Information Security Risks; All-in-One Terminology
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Facilitated Risk Analysis Process (FRAP) Adapted from Tom Peltier & Associates

Objectives We’ll answer the following: What is a FRAP? Why a FRAP? What are the roles needed for an effective FRAP work group? What is a threat and how do we rank it? What is a control?

What is a FRAP? A FRAP is: A delicious blended coffee beverage served at the always hard-to-find Starbucks.

What is a FRAP? A FRAP is: A formal methodology developed through understanding the previously developed qualitative risk assessment processes and modifying them to be faster and simpler to conduct Facilitator + small group of subject matter experts Consists of these specific steps: Brainstorming Session to identify threats Assigning Impact and Probability scores to each threat Identifying and Assigning Controls/Safeguards Management Summary

FRAP Successful at Adventist Health The FRAP process: Was used to conduct risk analysis for 7 key areas of the HIPAA Security Rule Utilized four facilitators, about 45 SMEs Provided value to AH by: Conducting a full risk analysis in about five days Qualitatively prioritized threats and the corresponding controls Allowed management to make decisions on which projects to approve based on the FRAP and other findings

Why a FRAP? The Value of a FRAP: Takes hours/days instead of weeks or months; Once the resource owner is involved in identifying threats, they generally see the business reason why implementing cost-effective controls to help limit the exposure is necessary The FRAP allows the business units to take control of their resources. It allows them to determine what safeguards are needed and who will be responsible for implementing those safeguards.

What are the Roles in the FRAP groups? Facilitator – trained in FRAP methodology Subject Matter Experts (SMEs) – Small set of users representing a larger group of expert users –Similar to the Delphi Technique in this regard Scribe – Invaluable in documenting all of the major areas of contention as well as off-topic items that can be addressed at another time (including another FRAP session) Ask participants if they have participated in any of the surveys. Possible a separate slide.

Session Facilitation Led by an experienced facilitator This individual will lead the team through the identification of threats, the establishment of a risk level by determining probability and impact and then select possible safeguards or controls. Because of qualitative risk assessment’s subjective nature, it will be the responsibility of the facilitator to lead the team into different areas of concern to ensure as many threats as possible are identified Assists in keeping the group on topic On the clock as the official timekeeper Acts as referee

Session Facilitation Basic facilitation rules must be observed by all facilitators if the FRAP is to be successful. FRAP leaders must observe carefully and listen to all that the team says and does. Recognize all input and encourage participation. Be observant for non-verbal responses. Do not lecture, listen and get the team involved. Never loose sight of the objective. Stay neutral (or always appear to remain neutral).

Subject Matter Experts By convening a balanced team of internal subject matter experts the FRAP will rely on the organization’s own people to complete the risk assessment process. These experts may include the business managers who are familiar with mission needs of the asset under review and the staff who have a detailed understanding of potential threats and related controls related to the subject matter. Should be able to function in a team setting TIP: SME should conduct a quick informal poll in their dept./area regarding the topic they are going to discuss in the FRAP group

FRAP Definitions Threat–an undesirable event that could impact the business objectives or mission of the risk assessment asset. Probability – a measure of how likely it is that some event will occur Impact – the potential effect a risk may have on our assets Control/Safeguard – measure taken to detect, prevent, minimize, or eliminate risk

What is a Threat? A threat an undesirable event that could impact the business objectives or mission of the risk assessment asset. Examples: Natural: Local Flooding, Tornado, Earthquake Human: Accidental Explosion – on site, Human error, Programming, loss of key staff Environmental: Power outage, HVAC failure, Water Leak Confidentiality: Internal theft of information

Probability Definitions Can be modified to fit situation High Probability: very likely that the threat will occur within the next year Medium Probability: possible that the threat may occur during the next year Low Probability: highly unlikely that the threat will occur during the next year.

Impact Definitions Can be modified to fit situation High impact: Entire business or mission affected Medium impact: Loss is limited to single business unit or objectives Low impact: Business as usual

What is a Control/Safeguard? A control or safeguard is the protection employed to reduce the risk associated with a specific vulnerability. Examples: Pumps placed in basement (flood) Regular back ups of systems (programming errors) UPS (back up power supplies) installed (power outage) Regular Audits of system usage (theft of info by employees)

FRAP Agenda FRAP Session Agenda Responsibility Explain the FRAP process and cover definitions Facilitator Identify roles and introduction Team Review scope statement Owner Brainstorm for threats Establish risk levels (probability and impact) Prioritize threats Identify possible safeguards Create Management Summary Report

FRAP Techniques Brainstorming Techniques Remain neutral at all times Don’t judge ideas (NO bad answers) Get input from everyone Write down all ideas and post them Be prepared - have flip charts ready Help participants visualize the situation Keep the meeting fast paced

FRAP Tool IMPACT P R O B A I L T Y High High Medium High Low Medium High - Corrective action must be implemented Medium - Corrective action should be implemented Low - No action required at this time

Control Recommendations During this step the controls that could mitigate or eliminate the identified risks, as appropriate to the organization’s operations, are identified. The goal of the recommended controls is to reduce the level of risk to an acceptable level. The following factors should be considered in recommending controls and alternative solutions to minimize or eliminate identified risks: Effectiveness of recommended controls Legislation and regulation Operational impact Safety and reliability

Brief Demonstration of FRAP Situation: Accountants R Us Franchisee Accountant with a single computer connected to the internet via non-wireless modem in a one room office in an office complex. Assets: Computer contains personal, sensitive information of all clients in MS Spreadsheets.

FRAP Definitions Probability Impact High : very likely that the threat will occur within the next year Medium : possible that the threat may occur during the next year Low : highly unlikely that the threat will occur during the next year. Impact High : Business would need to close Medium : Business would continue after some delay Low : Business as usual

Brainstorming Session Threat Prob/Impact A: External Hacker Probability: Low Impact: High B: Teenage Son likes to hack for fun Probability: Low Impact: Med C: Computer located in the basement & in a flood plain Probability: Med Impact: High

FRAP Tool IMPACT P R O B A I L T Y High High Medium High [C] Low Med [A] Low [B] Low High - Corrective action must be implemented Medium - Corrective action should be implemented Low - No action required at this time

Brainstorming Session Threat Prob/Impact Control A: External Hacker Probability: Low Impact: High Install Firewall, Anti-Virus SW B: Teenage Son likes to hack for fun Probability: Low Impact: Med No Action Required at this time C: Computer located in the basement & in a flood plain Probability: Med Impact: High Install sump pump Take back up tapes home

Management Summary High Level Summary of: Methodology used Prioritized Threats and Corresponding Controls Recommendation from SMEs Other pertinent information

Questions?? For more info on FRAPs: http://www.peltierassociates.com/frap_course.htm

Facilitated Risk Analysis Process (FRAP) THANK YOU FOR YOUR PARTICIPATION