Risk Tolerance: Balancing Business Needs And Risk CALA Road Show Lucent Worldwide Services Security Practice George G. McBride Managing Principal Lucent.

Slides:



Advertisements
Similar presentations
Microsoft Operations Framework (MOF) 4.0
Advertisements

Planning: Processes and Techniques
PROJECT RISK MANAGEMENT
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Chapter 10 Accounting Information Systems and Internal Controls
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Service Design – Section 4.5 Service Continuity Management.
Security Controls – What Works
Planning and Strategic Management
ISO General Awareness Training
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
The Information Systems Audit Process
Risk Assessment Frameworks
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Systems Engineering Approach to MPS Risk Management Kelly Mahoney Presented at the Workshop for Machine Protection in Linear Accelerators.
Information Systems Controls for System Reliability -Information Security-
The Business Plan : Creating and Starting The Venture
Network security policy: best practices
Consultancy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Information Security Issues at Casinos and eGaming
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security Policies Jim Stracka The Problem Today.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
2011 PK Mwangi Global Consulting Forming a Strategy for your Business. Strategy refers to the plan that needs to be put in place to assist the business.
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Hartley, Project Management: Integrating Strategy, Operations and Change, 3e Tilde Publishing Chapter 10 Risk Management Proactively managing the positive.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
BZUPAGES.COM. Presentation Chapter#7 The Business plan: Creating & Starting the Venture Presented to: Sir Ghulam Abbas.
ENTREPRENEURSHIP Chapter # 07 The Business Plan: Creating and Starting the Venture.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Hazards Identification and Risk Assessment
Training and Development Prof R K Singh AIMA CME.
Analysis and Tools In Which Major Markets Does The Firm Desire To Compete?
Enterprise VoIP Security Threats  Agenda:  Introduction  Why worry?  What do we need to look at?  What have I seen in the past?  What can I do to.
Project Risk Management Planning Stage
ISO/IEC 27001:2013 Annex A.8 Asset management
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
The Second Annual Medical Device Regulatory, Reimbursement and Compliance Congress Presented by J. Glenn George Thursday, March 29, 2007 Day II – Track.
Agenda: What is risk? How can we measure it?
CSI - Principles ITIL v3. CSI & Organizational Change © Crown Copyright 2007 Reproduced under license from OGC.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Track A: Network Security 9AM-10AM May 6, 2004 Security And Next Generation VoIP George G. McBride Senior Manager, Security Practice Lucent Technologies.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
OHSAS Occupational health and safety management system.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.

Risk management.
Description of Revision
Making Information Security Manageable with GRC
IS4680 Security Auditing for Compliance
Cybersecurity ATD technical
Robin Youll Office for National Statistics
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Risk Tolerance: Balancing Business Needs And Risk CALA Road Show Lucent Worldwide Services Security Practice George G. McBride Managing Principal Lucent Worldwide Services Security Practice

Lucent Technologies – CALA RoadShow Agenda  What is risk?  How can we measure it?  How do we know what is an acceptable level of risk?  Making the comparison and dealing with risk  Conclusions  Questions and Answers

Lucent Technologies – CALA RoadShow What is risk?  No universally recognized “Definition”  The exposure/potential/possibility to suffer some loss of an asset  What about likelihood and impact?  Can be qualitative or quantitative  The most important concept: –When talking about “risk”, make sure you agree on what definition you are using!

Lucent Technologies – CALA RoadShow What types of risk are there?  Strategic Risk –Risks that affect an organization’s ability to reach it’s goals  Financial Risk –Risks of a company to suffer unnecessary losses  Environmental (Physical) Risk –Risks of a company moving, of physical damage  Operational Risk  Technical Risk –Business Continuity, Integrity, Change Management, Disclosure  Political/Cultural Risk –Personal agendas, regulatory, customer constraints

Lucent Technologies – CALA RoadShow What do we have to measure?  Threats –Likelihood –Impact  Vulnerabilities  Controls Effectiveness Threat Assessment and Threat Matrix Vulnerability Assessment Controls Assessment The Risk Equation is Simple. Obtaining the Correct Values is Not

Lucent Technologies – CALA RoadShow Asset Identification  What are the assets within an organization? –Systems, buildings, cars, people, products –Business processes, applications, data  How and who determines the assets? –Commissioning, asset management, purchasing records, DHCP records, Active Directory  How often are the assets identified?

Lucent Technologies – CALA RoadShow Asset Ownership and Management  Asset owner is usually the system administrator or someone from the support organization  Should be a business unit representative: –Someone who can identify the data on the system –Someone who determine the users of the system –Someone who understands the data flow (inbound and outbound)

Lucent Technologies – CALA RoadShow Risk Speak  So many terms with so many equally valid definitions: –Threat Agent –Threat Catalyst –Inhibitors / Amplifiers –Catalyst –Capability –Motivation –And More!

Lucent Technologies – CALA RoadShow Traditional Risk Management  Mitigate all risks to effectively reduce risk to ZERO –Risk > 0 Becomes Unacceptable  Extremely costly  Slow to mitigate the risks  Generally shuts the business down. –How do you remove the risk of a production system Risk Asset Criticality and Sensitivity 0 Unacceptable

Lucent Technologies – CALA RoadShow Risk Management as an Enabler  Allows a business to measure the level of risk that they are “comfortable with”  Drive to mitigate risks to below the acceptable level, not zero  Acceptable level of risk may be by asset, physical location of device, corporate posture, etc.  Business enabler Risk Asset Criticality and Sensitivity 0 Unacceptable Acceptable Risk Tolerance

Lucent Technologies – CALA RoadShow Acceptable Levels of Risk Factors  How does a company determine their acceptable level of risk? –Organization Risk Tolerance: Is the company a former brick & mortar type firm with a conservative approach or a progressive Silicon Valley firm looking to be the first to market? –Personnel Tolerance: Individuals within the organization will affect the tolerance levels –Reaction to Previous Events: What were the results of any previous compromises/intrusions/breaches? –Policy, Regulations, Legal Issues: These may determine what level of risk a company can deal with –Risk Scope: An organization may be focused on a particular system, but need to be aware of additional connectivity issues

Lucent Technologies – CALA RoadShow Advantages of “Acceptable Risk”  Truly serves as a business enabler –This is redefines the concept of “business vs security”  Competitive Advantage? –Absolutely! Get services to market first!  Focus on fixing the risks that you have to address  May maintain various levels of acceptable risk –Logical & Physical Location, Scope, Connectivity, Customer Base and usage

Lucent Technologies – CALA RoadShow Risk Management  What stays the same? –Still need a Risk Management Program –Still need to know what the assets are –Still need to have some type of risk assessment methodology –Still need a risk management organization –Still need to agree on a measurement mechanism Quantitative or Qualitative –Risk Measurement is not a one-off effort Trigger points should initiate risk analysis at potential risk value change points during the asset lifecycle –Still need to mitigate the risk

Lucent Technologies – CALA RoadShow Risk Management Lifecycle Identify Assets / Ownership Vulnerability Assessment Threat Assessment Assess Risk Determine and Implement Controls Monitor

Lucent Technologies – CALA RoadShow Risk Management Program Plan  Develop a “Risk Management Program Plan” –Defines the overall structure and program of the risk management efforts of the organization –Describes the organizational structure, roles and responsibilities of the members –Provides metrics, governance, compliance issues, reporting mechanisms, etc. –Should place a “Risk Management Director/Officer” with the overall Corporate level responsibility manages the risk management organization and activities –Database may be used to support the Program

Lucent Technologies – CALA RoadShow Risk Database  Maintains Threats, Vulnerabilities, Controls, Likelihood, Impacts  Can be utilized for Quantitative and Qualitative efforts  Can prompt for periodic assessment reminders  Integrate with, or be, the Asset Database  Can be used to provide Enterprise Risk Management functions including: –Dashboard –Tiered and Segmented Reporting  Is extremely valuable to malicious individuals and must be protected accordingly  Supports compliance and governance matters

Lucent Technologies – CALA RoadShow Trigger Points  You can’t just measure the risk of an asset every year or two. Certain changes must trigger a risk measurement of the asset.  A “Trigger Point” is a Risk Management program call that is inserted into other operations and programs to ensure that Risk Management is considered as part of certain programs and at the appropriate times. –Business Impact Analysis –Change Management –Acquisitions –System Commissioning or Decomissioning

Lucent Technologies – CALA RoadShow Risk Methodologies  Many different types. Some fit better in particular companies or industries than others. –OCTAVE: Operationally Critical Threat, Asset, and Vulnerability Evaluation ( –SPRINT, SARA, FIRM ( –CRAMM ( –RiskWatch, COBRA, and many others  Choose the one that works the best for you. –Industry / Business Sector – Some tools work better than others –Collateral Support - Including tools and training availability –Industry Support – Who recognizes which methodologies

Lucent Technologies – CALA RoadShow Risk Management – What Must Change  Modifications of the existing risk management program: –Ensure that acceptable risk doesn’t slide below an agreed upon threshold –Security analysts need to business and operations savvy to understand business drivers –Continuously monitor external resources such as new regulations, technologies, and what the competition is doing –Process to determine whether to continue to mitigate further below “Acceptable Risk” or to move on

Lucent Technologies – CALA RoadShow Summary  Know Your Assets!  Devote the required resources  Determine your “Acceptable Level of Risk” –Use a consistent measurement unit Your “Medium” may not be somebody else’s “5” –Determine the scope of the Acceptable Level Is it for all assets or particular assets –Measure the level of risk

Lucent Technologies – CALA RoadShow Any questions? Lucent Technologies Bell Labs Innovations Lucent Technologies Inc. Room 1B-237A 101 Crawfords Corner Road Holmdel, NJ Phone: George McBride Managing Principal Lucent Worldwide Services  Contact me at with any questions that you may