Information Security Risk Management

Slides:



Advertisements
Similar presentations
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Advertisements

A Joint Code of Practice Objectives and Summary Presentation
Risk The chance of something happening that will have an impact on objectives. A risk is often specified in terms of an event or circumstance and the consequences.
Appendix H: Risk training slides (sample). What is Risk? “ Risk is the effect of uncertainty on objectives ” AS/NZS ISO31000:2009.
Environmental Management System Implementation
[Organisation’s Title] Environmental Management System
Chapter 14 Fraud Risk Assessment.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Control and Accounting Information Systems
Control and Accounting Information Systems
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Service Design – Section 4.5 Service Continuity Management.
Operational risk management Margaret Guerquin, FSA, FCIA Canadian Institute of Actuaries 2006 General Meeting Chicago Confidential © 2006 Swiss Re All.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
The Australian/New Zealand Standard on Risk Management
Computer Security: Principles and Practice
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
First Practice - Information Security Management System Implementation and ISO Certification.
1 Risk management and Investigation Peter Roberts
BS EN ISO 14001:2004 Madlen King BSc MSc MIEMA EMS Lead Assessor Lloyd’s Register Quality Assurance Ltd BS EN ISO 14001:2004.
Irish League of Credit Unions, 2012 W E L O O K A T T H I N G S D I F F E R E N T L Y Risk Management for Credit Unions September 2013 Risk Management.
Effectively applying ISO9001:2000 clauses 5 and 8
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
SEC835 Database and Web application security Information Security Architecture.
Qantas Brand Refresh Kristy Dixon – Masters of Applied Project Management University of Adelaide 2013 Results of Risk Analysis Plan Hypothetical Project.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Equity Housing Group Risk Management. 05 August 2002 © MazarsEquity Housing Group: Risk Management 2 Agenda Introduction: what is Risk Management? The.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
GRC - Governance, Risk MANAGEMENT, and Compliance
David N. Wozei Systems Administrator, IT Auditor.
Risk Management For the Board of The Law Society 16 February 2005.
Risk Management in the Built Environment Qualitative and Quantitative Risk Management By Professor Simon Burtonshaw-Gunn – licensed under the Creative.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Risk & Opportunity Management Putting theory into Practice Susy Austin MQM Business Consultant.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Section Topics Risk and control terminology Risk elements
Project management Topic 5 Risk. What is risk? An uncertain outcome – either from a positive opportunity or negative threat Risk management is about:
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Project Management Risk and Quality.
Governance for SMEs Nigeria
-To insert a Zurich picture click on the "camera"-icon in the Zurich CI toolbar and follow the instructions. -To insert a picture from your personal files,
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
PIC EU-28 Conference Paris, 26 – 27 November 2015 PIC An EU Approach Assurance Maps An Introductory workshop Nathan Paget United Kingdom.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Business Continuity Planning 101
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Updated Risk Management template
Security and resilience for Smart Hospitals Key findings
Information Security Management Goes Global
Information Security Program
An Overview on Risk Management
Team 1 – Incident Response
COSO and ERM Committee of Sponsoring Organizations (COSO) is an organization dedicated to providing thought leadership and guidance on internal control,
Current ‘Hot Topics’ in Information Security Governance Auditing
Securing the Law Firm Myth vs. Reality vs. Practicality:
ITPD ISSUE MANAGEMENT PROCESS SEPTEMBER 5, 2008
IS Risk Management Framework Overview
Cybersecurity Threat Assessment
Risk parameters (consequence)
DSC Contract Management Committee Meeting
Robin Youll Office for National Statistics
Presentation transcript:

Information Security Risk Management Stephen Shippey Information Security Risk Manager, Governance Risk Compliance Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 CYBER Definition of Cyber: Relating to or a characteristic of, the culture of computers, information technology and virtual reality Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 IT since 1986. Information Security & Risk Manager since 1998 at a number of Global Financial Services Organisations including GE Global Consumer Finance, HBOS, Lloyds Banking Group. Joined HP as an Information Security Risk Consultant 2013 Disclaimer The views expressed in this presentation are my own and do not necessarily represent those of my employer. Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 Risk Management Agenda What is Risk Management Slide 5 Objectives of Infosec Risk Management vs Generic Risk Management Slide 7 Problems with Risk Management Slide 11 Mitigation Plans vs Contingency Plans Slide 12 Identifying Risks Slide 13 Risk Submissions Slide 16 Managing Risk Slide 17 Any questions Slide 18 Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 What is Risk Management? The identification of Risks and their management by defining: The Risk Description The Risk Owner The Probability of the Risk Event occurring The Risk Impact in terms of cost, loss of assets, Reputation … Failure to meet a Business Objective The most suitable Mitigations that will prevent or reduce the Likelihood of the Risk Event occurring with relation to their costs and the reduction of Risk Exposure The Contingency Plan to recover the Asset once risk is manifested An understanding of Corporate Risk Appetite and where appropriate the application of Risk Tolerance Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 Risk Definitions Risk Definition: A Risk is a potential or future event that, should it occur, will have a (negative) impact on the Business Objectives of an Organisation A risk must have Uncertainty, (in terms of Probability or Likelihood). It might happen A risk must have a measurable Impact, (usually measured in monetary terms, but other criteria are acceptable, reputation for example) “It May Rain Tomorrow” Issue Definition: An Issue is a current event that will have a (negative) impact on the Business Objectives of an Organisation E.g. An Incident, a manifested risk, an Audit Non-Compliance finding, an Equipment or Supplier failure “It is Raining Today” Stephen Shippey 22nd April 2015

Objectives of Generic Risk Management To ensure that all risks to the Business however they are derived are managed effectively. Strategic Level Strategic Risk Register Strategic Risks Programme/Project Risks Operational Risks This includes: Strategic Risks Programme and Project Risks Operational Risks (includes Security and Business Continuity Risks) Project Risk Register Change Level Operational Risk Register Information Security Risk Register BAU Business continuity Operational Level (Business as Usual) Stephen Shippey 22nd April 2015

Objectives of Information Security Risk Management To ensure that the risks to the Organisation that are derived from, Incidents, Threats, Vulnerabilities and Audit non-compliances are managed effectively. In Security Terms these are those risks that impact the: Confidentiality, Integrity, Availability, and the Traceability of Information whilst: At rest Whilst being modified In transit (around a system, e-mail, media device, telephone etc.) Unlike Project Risk Management the objectives for Security Risk Management are fairly well defined

Information Security Risk Management Risks within service provider environments A risk may have the same Risk Description but two separate impacts dependent on the Owner e.g. Risk: patching may fail to complete in a timely manner Impact on IT Service Provider: Potential Commercial Penalties, Damage to Reputation Impact on Client: Loss of Systems, loss of information, loss of revenue etc. etc.

What is NOT Risk Management! Incident Management Audit Non-Compliances Problem Management Threat Management Vulnerability Management Exception / Waiver Management These are Issues, no uncertainty! However, they can be the Source of Infosec Risks

Problems with Risk Management Common Problems (Misunderstandings)? So What! Poor Risk Descriptions (Risk vs Issue and Impact confusion) (Qualification vs Quantification) Unachievable, ineffective and disproportionate Mitigation Actions Poor Control, risk owner vs risk mitigation owner. Stakeholder Involvement Reactive vs Proactive Approach Reliance on Incidents, Threat and Non- Compliance Management (Reactive) Proactive Risk Identification Workshop based on Success Criteria Risks occur that could have been managed Impact on Assets not understood (BIA, CMDB) Mitigation Action Costs do not reflect the Risk Exposure Reduction Systems fail, business and revenue lost, Corporate data is unavailable when required – Loss of Business Regulator penalties, reputational damage occurs Loss of Customer base and confidence Loss of IPR. Stephen Shippey 22nd April 2015

Mitigation Plans and Contingency Plans Mitigations or Controls are primarily used to prevent the occurrence of a risk or to reduce the Probability of Risk occurrence - (Reduce Probability) This is why it is so important to describe the risk event clearly. Contingency Plans address the Impact of the Risk plans and are used to recover a system from the effect of a risk should it occur, a mini BCP - (Reduce Impact) This is why it is so important to clearly describe the risk impact separately from the risk description

Stephen Shippey 22nd April 2015 Sources of Cyber Security Risks (flip to risks) Taken from some recent ISACA slides, these can be re-worded as risks Proliferation of BYOD and smart devices Cloud computing Outsourcing of critical business processes to a third party (and lack of controls around third-party services) Disaster recovery and business continuity Periodic access reviews Log reviews Source: Cybersecurity - what the Board of Directors need to ask, IIARF Research Report, 2014 Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 Common Cybercriminal Attack Vectors (flip to risks) Application vulnerabilities Remote access. Ineffective patch management Weak network security/flat networks Lack of real-time security monitoring Third parties Lack of a data retention policy SOURCE: HANS HENRIK BERTHING - Cyber Assurance and the IT Auditor Nov 2014 Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 Where to start Select appropriate controls / use security standards ISO27000 PCI DSS CObIT BITS SIG Identify what is important to the business Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 Encourage Risk Reporting Create risk reporting awareness for the workforce Make it easy, create a simple Risk Submission form Assess the risk submission, ask questions Ensure it is a risk, not an issue, a service request, a change request  Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 Manage the Risks Record in a Risk Register Describe the RISK Assess the Likelihood, Impact, and risk rating Agree recommended Risk Mitigation / Treatment Establish a contingency position if possible Assign to an appropriate RISK OWNER (usually a Business Stakeholder) Agree a Mitigation Owner Obtain a decision (Reduce, Accept, Avoid, Transfer) Monitor mitigation progress until target risk is achieved – retain awareness of closed or mitigated risks Produce monthly status reports Stephen Shippey 22nd April 2015

Stephen Shippey 22nd April 2015 Any Questions? Stephen Shippey 22nd April 2015