CYSM RISK ASSESSMENT TOOLKIT PROCEDURES I David Calduch Project Manager Port planning and Development Dept. VALENCIAPORT FOUNDATION.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Security Requirements
Risk Assessment Management Software Innovation MANAGEMENT FORCE GROUP.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Information Security Policies and Standards
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Risk Management Vs Risk avoidance William Gillette.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
ISA–The Instrumentation, Systems, and Automation Society SP99 Work Group 2 TR#2 “Second Edition” Long Beach Meeting April 28, 2004.
© TecSec® Incorporated 2003 Threat Notification Model for Federal, State and Local Authorities Threat Notification Model for Federal, State and Local Authorities.
Accounting Information System (DBMS Approach) Yohanes Handoko, SE.
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
Process for Analysis  Choose a standard / type  Qualitative / Quantitative Or  Formal / Informal  Select access controls  Match outcome to project.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Engineering Essential Characteristics Security Engineering Process Overview.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
100 th HRMS Payroll Personnel/Payroll Association March 30, 2010 Steve Young Chief Information Officer 1.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Advanced Accounting Information Systems Day 19 Control and Security Frameworks October 7, 2009.
Asset Pricing 9 Credits, Fall 2014 Stefano Herzel.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
SecSDLC Chapter 2.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Administrator Data Entry Training for Maintenance (Mx) LOSA and Ramp LOSA Database Software 11/26/2016.
Course Objectives A strong grounding in computer and network security. Learn the factors related to the plan-protect-respond cycle of IT security. An.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
3 STUDENT ASSESSMENT DEPARTMENT
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Internal Control Process at Geneseo. Objectives Understand the objectives of effective internal controls Describe Geneseo’s internal control program Accurately.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CYSM Risk Assessment Methodology Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme.
1 Dr. Spyros Papastergiou, University of Piraeus (Greece)–Dept. of Informatics M. Zaharias Singular Logic (Greece) CYSM Risk Assessment Methodology.
Primary Steps for Achieving ISO Certification.
CYSM Business Diagrams Dr. Thanos Karantjias Dr. Spyros Papastergiou 1.
Security and resilience for Smart Hospitals Key findings
Headquarters U.S. Air Force
CS457 Introduction to Information Security Systems
ISSeG Integrated Site Security for Grids WP2 - Methodology
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter Three Objectives
HUIT Business Continuity
Azure Identity Premier Fast Start
NDS: National Data System for Child Care
Security: Roles and Users 2015 Astra Ohio Summit Tuesday, June 2, 2015
Upgrading To PowerPoint 2007.
Presentation Test. Second Slide Third Slide It worked.
قانون المنافسة ومنع الاحتكار
Chapter 19: Building Systems with Assurance
Safety plan.
Office of the Comptroller of the Currency
IS4680 Security Auditing for Compliance
Training tool Admin Payroll
What Is VQIP? FDA required to establish a program to provide for the expedited review of food imported by voluntary participants. Eligibility is limited.
How To Identify and Reduce Business Risk
XX XX $ $ Dark Web Scans Simulated Phishing
Workflows Basic Session
Conducting the Assurance Engagement
Presentation transcript:

CYSM RISK ASSESSMENT TOOLKIT PROCEDURES I David Calduch Project Manager Port planning and Development Dept. VALENCIAPORT FOUNDATION

1.CYSM RISK MANAGEMENT PROCEDURE. 2.ADMINISTRATIVE FUNCTIONS AND PROCEDURES. 3.MANAGEMENT FUNCTIONS AND PROCEDURES 4.RISK ASSESSMENT FUNCTIONS AND PROCEDURES

1. CYSM RISK MANAGEMENT PROCEDURE

What is CYSM Platform? Users categories: Administrator Risk Assessment Administration General users. Type of users Information Security Officer Managers of Departments Employees of Departments 1. CYSM Risk Management Procedure

Risk Assessment Administration 1. CYSM Risk Management Procedure Administrator Organizational Calendar Management Configure Organization Structure Configure Risk Assessment Elements

2. ADMINISTRATIVE FUNCTIONS AND PROCEDURES

Administrator Organizational Calendar Management Configure Organization Structure Configure Risk Assessment Elements 2. Administrative Functions and Procedures

8 Organizational Calendar Management Main Options Add New Risk Assessment View Completed Risk Assessments Apply Standards Invite Involved Departments Define applied Sections (ISO27001) Define Level of appliance (ISPS) Define applied Subsections Next Slide 1 st Level Activities 2 nd Level Activities Statement of Applicability 2. Administrative Functions and Procedures

9 Organizational Calendar Management Main Options Add New Risk Assessment View Completed Risk Assessments Apply Standards Invite Involved Departments Previous Slide Definition Departments / Third Parties (names) Applied Managers (names) Applied Employees (names) 1 st Level Activities 2 nd Level Activities Organizational CHART 2. Administrative Functions and Procedures

Administrator Organizational Calendar Management Configure Organization Structure Configure Risk Assessment Elements 2. Administrative Functions and Procedures

Configure Organizational Structure Main Options Configure Internal Departments Configure Third Trusted Parties Add / Edit / Delete Entities (Deps & TTPs) Entity Configuration Entity – (Sub)Section Relation Weight of Entity on (Sub)Section Add / Edit / Delete Entity Managers Add / Edit / Delete Entity Employees Weight of Personnel on (Sub)Section 1 st Level Activities 2 nd Level Activities View

Administrator Organizational Calendar Management Configure Organization Structure Configure Risk Assessment Elements 2. Administrative Functions and Procedures

Configure Risk Assessment Elements Main Options (Configure Assets)* Configure Vulnerabilities Configure AllView Map Assets to Assets’ Categories Map list of Vulnerabilities to Threats 1 st Level Activities 2 nd Level Activities Configure Threats Configure Countermeasures Configure Assets’ Categories Add / Edit / Delete Map Threats to Standard (Sub)Sections* Map Vulnerabilities to Standard (Sub)Sections* Map Countermeasures to Standard (Sub)Sections* Define a Scale of appliance on Countermeasure Map list of Threats to Assets’ Categories Map list of Countermeasures to Vulnerabilities

CYSM RISK ASSESSMENT TOOLKIT PROCEDURES I David Calduch Project Manager Port planning and Development Dept. VALENCIAPORT FOUNDATION