Lesson 2 Risk Management Issues.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

1 of 21 Information Strategy Developing an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy Developing.
Jump to first page NIST Risk Management Guide for Information Technology Systems Reference:
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Risk Management Introduction Risk Management Fundamentals
What to Provide to OMB History of the rule Problem to be addressed –Quantitative and qualitative analysis “Significant Regulatory Action” under 12866(3)(f)
© QinetiQ North America, Inc QinetiQ North America, Inc. 1 Implementing an Enterprise Security Framework – Safeguarding Your Most.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Investment Appraisal and Management Chapter 1 The Role of Project Evaluation.
Information Security Policies Larry Conrad September 29, 2009.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Computer Security: Principles and Practice
Lecture 8: Risk Management Controlling Risk
Managing Risk in Information Systems Strategies for Mitigating Risk
Project Closure CHAPTER FOURTEEN Student Version Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Complying With The Federal Information Security Act (FISMA)
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
United States Coast Guard Port Security Assessment Program Evaluability Assessment LaKeshia Allen Alexandra Sommers May 2, 2005.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Assurance Case Approach TECNALIA Inspiring Business Novara November, 2013 TRIAL WS.
Enterprise Risk Management & IT Compliance March 30, 2010 Presented by: Ken Rowe, Director Enterprise Systems Assurance & Chief Security Officer University.
NMS Certification and Accreditation (C&A) Removal of Material Weakness for NMS Security and Access Controls Jim Craft USAID ISSO.
December 14, 2011/Office of the NIH CIO Operational Analysis – What Does It Mean To The Project Manager? NIH Project Management Community of Excellence.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Economic security of enterprise.. By economic security of the enterprise (ESE) we mean the state of protection of it’s vital interests from internal and.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Project Report. Suggested TOC Executive Summary Project Background and Assumptions Vision and Mission Statements Objectives SWOT Analysis Recommended.
Working with HIT Systems
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Defense Security Service Joint Industrial Security Awareness Council March 20, 2015.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Acquisition and Assistance Management Review Entrance Briefing Name of office reviewed Date of Review.
Chapter 19 Other Applications of Security at Work.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Risk Management For Project Management. What is Risk? Risk (noun): possibility of loss or injury (Merriam-Webster Dictionary)
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Successfully Managing Customer Expectations Change is expected to occur during the life of any project, but this change must be controlled and managed.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
CJS 250 Week 9 Final Project The Security Plan Check this A+ tutorial guideline at 250-Week-9-Final-Project-The-Security-Plan.
Headquarters U.S. Air Force
Computer Security Division Information Technology Laboratory
Risk management.
Risk Assessment in NORDUnet
Factors for Decision Making
Initiating systems development
SEC 400 Competitive Success/snaptutorial.com
SEC 400 Education for Service-- snaptutorial.com.
SEC 400 Teaching Effectively-- snaptutorial.com
UKAS Customer Satisfaction Survey
UKAS Customer Satisfaction Survey
Counter-activations Compromise proposal for counter-activations in the mFRR- and aFRR-Platforms.
إدارة المخاطر في المؤسسات المالية الإسلامية
D-Lab Fall 2004.
Instrument PDR Summary of Objectives
New Data Innovation Projects: Data Privacy and Data Protection
Chapter 5 Chapter 3 Chapter 1 Chapter 2 Basic Concepts and
Why important? Heavy reliance on IT Pressure to deliver IT services Increasing range of threats.
Costs & benefits of investments in OSH: MSEs
UKAS Customer Satisfaction Survey
UKAS Customer Satisfaction Survey
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Office of Health, Safety and Security
Presentation transcript:

Lesson 2 Risk Management Issues

Objective 3 At the end of Lesson 2, you will understand and be able to discuss some of the issues surrounding the use of risk management by organizations.

Issue Number One Risk Management allows us to perform the organization’s mission with a reduced impact of harmful acts caused by others or nature.

Risk Analysis is Required OMB Circular A-130 Requires risk-based approach to determine adequate security Include major factors in risk management: value of the system to mission threats vulnerabilities effectiveness of current or proposed safeguards OMB Cir A-130, Appendix III, Security of Federal Automated Information Systems

As Never Before -We Operate in A Changing Environment political social economic technical

Risk Management Takes Time and Money -- and should be worth every second and penny

More Effective and Efficient than Risk Avoidance Risk Management

Risk management needs data Data needs analysis Analysis needs synthesis Need for analysis and synthesis of large volume of complex data Risk Assessment Data Risk Assessment 1. 2. 3. 4.

Enlightenment Through Risk Management Better understanding of organization Acceptance of decisions by workforce Heightened security awareness Other benefits

Better Understanding of the Organization Mission Threats Vulnerabilities Security Countermeasures

Better Acceptance of Decisions Countermeasures

Heightened Awareness of Security

Other Risk Management Benefits consistency of assessment process customer involvement customer satisfaction improved security services that are: really needed really work really reduce risk

Summary Risk Management Issues Issues affect how the risk management process is conducted and how effective it is There are many issues Many issues are not not obvious