Risk Assessment and Risk Management

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

Risk Management and Types of Risks By Tony Collins Edited by Memory Reed Georgia CTAE Resource Network 2010.
Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning.
BACKING UP YOUR COMPUTER What, Why, Where and How.
Everything your business needs to know but probably doesn’t.
John Sell March 17, Disaster Recovery Emergency Management Incident Control including all Press Releases Communication to all employees Temporary.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Remote On-line Backup Service. How safe is your business data?
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Saving Your Business from a Data Loss Randy Clark.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Termination Process Team 1: Anuj Kumar Agrawal Mohaammed Al-baqmi
ROLE OF THE IT FUNCTION: COSTS, ANALYSIS, DEVELOPMENT Based on materials by David Schuff.
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
Chapter 34 risk management Section 34.1 Business Risk Management
What to do “After” your IT guy gets hit by a truck! April 1, 2005.
8.01 Summarize the concept of risk management. Risk Possibility of a _____ loss or failure Individuals or companies willing to take risk because of opportunity.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
Human Resources BDI3C. TO FIND THE RIGHT PEOPLE ask:  What needs to be done?  What can I do myself?  What can be done by people who are already on.
Natural Risks By: Kevin Simpson, Ally Caesare, Ben Zmolik.
SECURITY CONSULTING /DISASTER RECOVERY SERVICE The “Must Have Plans” for a Business in the World of Tomorrow.
The Money Pit! Carr, Chapter 6. How Dependent are we on infrastructures? Imagine having no running water -- How about no electricity --
Computer security By Isabelle Cooper.
Back ups Megan Wilkinson. What data can be held on a computer? Personal data / files: 1.Bank info 2. address and passwords 3.Bank passwords and wage.
Introduction to Information Security
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
{ Risk Management Entrepreneurship/Marketing.  Managing risk that may affect your business or your lifestyle.  Types of Risks  Crimes  Robbery, employee.
E. PLANNING AND PREPARING TO MANAGE A SMALL BUSINESS Identify business risks Explain business risk.
A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.
Work LESSON 4: EMERGENCIES AT WORK. Emergencies What is an emergency? An emergency is any unplanned event that threatens employees, customers,
By Mahdi, Josh, and Garrett.  Are risks that are caused by natural occurrences.  Can result in loss or damage of property and may cause a business to.
  Define Risk and Risk Management  List and Describe 3 Types of Risks  Know and Understand 4 Basic Ways to Handle and Control these Risks  List 3.
Risk Assessment and Risk Management James Taylor COSC 316 Spring 2008.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
When Disaster Strikes LIS2214 Disaster Planning and Response.
5.02 – Determine Factors Affecting Business Risks
8.01 Summarize the concept of risk management. Risk Possibility of a financial loss or failure Individuals or companies willing to take risk because of.
HAVING GOOD CONSUMER HABITS. DISCIPLINED SPENDING To minimize expenditure you need to have a plan every time you hit the shops, so you don’t get caught.
Auto Insurance
5.02 – Determine Factors Affecting Business Risks
4.04 Understand the Marketplace Experience
Technology and Business Continuity
Planning for Application Recovery
Risk Management for Perils Involving Property
4.04 Understand the Marketplace Experience
Systems Analysis and Design in a Changing World, 4th Edition
Business Counter-Intelligence
Chapter 34 risk management Section 34.1 Business Risk Management
8.01 Summarize the concept of risk management
5.02 – Determine Factors Affecting Business Risks
Unit 4 IT Security.
5.02 – Determine Factors Affecting Business Risks
Reasons You Need An Attorney After A Car Accident.
Computer Security for Businesses
Ten Reasons You Should Start Your Own Business
Severe Weather and other Natural Disasters
Entrepreneurs BMI3CI/BMX3EI.
4.04 Understand the Marketplace Experience
5.02 – Determine Factors Affecting Business Risks
Home and Motor Vehicle Insurance
Risk Management and Human Relations
COMPANY NAME Business Continuity Plan Date Presented by.
Why important? Heavy reliance on IT Pressure to deliver IT services Increasing range of threats.
Computer System Security
Presentation transcript:

Risk Assessment and Risk Management By: Steve Drochek IV

Summary Risk assessment is the idea of assessing what you need to protect due to the risks associated with it.

3 Easy Steps 1) What are you trying to protect? 2) What are you protecting against? 3) What are you willing to spend to protect said items

Assessing your Assets! Tangible Intangible Hard Drives Computers Printers Modems Etc Intangible Knowledge of Key personnel Motivation of employees

Note on Assessing Consult a Lawyer on legal actions that are available Research common threats in the area, be it weather or other

Identify Threat Don’t just assume threats have to be people Natural Disasters Hurricane Flood Fires Earthquake Tornadoes You don’t need to protect for hurricane in Wyoming!

Identifying Threats cont. Building Structural Failure Other Building Maintanence Personal Care of Employees Backup for loss of key personnel Make sure someone else can do their job

To Sum up Threats Threats are things that will delay the production of your organization… Cost your organization a lot of money Some threats have the capability of totally shutting down your organization

Review your Risks Prioritize! Prioritize your risks so that you have the protection you need the most.

Rev. the Risks cont. Again, some risks can be detrimental to your organization Consider a loss and the cost of that loss Consider the probability of that loss Consider the cost of protection

Example If you would lose a lot of money in a few hours due to a power failure Get a UPS (Uninterruptible Power Source) If you wouldn’t lose a lot of money it is not worth getting a UPS Maybe just get battery backups for your systems so that you can save data.

Thanks for Listening! All in all, risk assessment and management is very important to a companies future as every company will experience some sort of loss, be it personnel or hardware. It is important to make sure you take the proper measures to protect your companies functionality.

Questions???