MODULE II - EXERCISES Carmen R. Cintrón Ferrer © 2014.

Slides:



Advertisements
Similar presentations
EXERCISE IN MITIGATION DECISIONS MODULE 2 THE MULTI-HAZARD ENVIRONMENT.
Advertisements

© Grant Thornton UK LLP. All rights reserved. Review of Partnership Working: Follow Up Review Vale of Glamorgan Council Final Report- November 2009.
PROJECT RISK MANAGEMENT
Guidebook for Risk Analysis Tools and Management Practices to Control Transportation Project Costs Keith R. Molenaar, PhD Stuart D. Anderson, PhD, PE Transportation.
Fig. 4-1, p Fig. 4-2, p. 109 Fig. 4-3, p. 110.
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
IT GOVERNANCE GSI 615 Carmen R. Cintrón Ferrer © 2014.
Knowledge Translation Curriculum Module 3: Priority Setting Lesson 2 - Interpretive Priority Setting Processes.
MODULE V - EXERCISES Carmen R. Cintrón Ferrer © 2014.
P.464. Table 13-1, p.465 Fig. 13-1, p.466 Fig. 13-2, p.467.
Investment Appraisal and Management Chapter 1 The Role of Project Evaluation.
Fig. 11-1, p p. 360 Fig. 11-2, p. 361 Fig. 11-3, p. 361.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Table 6-1, p Fig. 6-1, p. 162 p. 163 Fig. 6-2, p. 164.
Slide 7C.1 Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved. An Introduction to Object-Oriented Systems Analysis and Design with.
Overview and Introduction
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Enhancing the Climate Resilience of Africa’s Infrastructure ACPC Role.
Application Threat Modeling Workshop
What is Business Analysis Planning & Monitoring?
Strategic Information Systems Planning
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Carmen David, Senior BA Business Analysis Carmen David, Senior BA Business Analysis Foundation in Business Analysis Session 9 MAKING BUSINESS AND FINANCIAL.
Please read before using this briefing This presentation forms the basis of a workshop for operational managers and other relevant staff to review quality.
Chapter 10 Contemporary Project Management Kloppenborg
Assurance Case Approach TECNALIA Inspiring Business Novara November, 2013 TRIAL WS.
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction Climate Futures VN Climate Futures approach to the provision of regional climate projection information CMAR/CLIMATE ADAPTATION FLAGSHIP Tim.
MODULE I - EXERCISES Carmen R. Cintrón Ferrer © 2014.
Management & Development of Complex Projects Course Code MS Project Management Risk Management Framework Lecture # 22.
1 California Public Health Preparedness: Lessons from Seven Jurisdictions R. Burciaga Valdez, PhD June 8, 2004.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Proposed Supply Chain Risk Management Process Flow Supply Chain Risk Leadership Council 20 April 2009 DRAFT.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
“Everything is sweetened by risk.” Alexander Smith (1830–1867)
Ensuring efficient and effective security in Australian transport Session 7 Introduction Tim Risbey BITRE.
SOFTWARE PROJECT MANAGEMENT
Module 1: Introducing Windows Server 2003 Network Infrastructure Planning, Tools, and Documentation.
Page 1 JUSTIFY define and validate REQUIRE- MENTS define initial management DOCUMENTS define INFRA- STRUCTURE allocated maintenance changes management.
MODULE VI - EXERCISES Carmen R. Cintrón Ferrer © 2014.
Recommendations for Developing Effective Risk Management Policies for Contaminated Site Cleanup An Overview of Risk Management Concepts and How Risk Management.
Ayumi Konishi Director General, East Asia Department Asian Development Bank CCICED Annual General Meeting 2015 Forum G20 and Green Finance 11 November.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Framework and Toolkit for UN Coherence, Effectiveness and Relevance at Country Level: Step 8 – Communicate about change.
Module 2 Analyze Capabilities, Risks, & Vulnerabilities Planning for Emergencies – For Small Business –
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
ESS Vision 2020 Strategic Risk Management Risk Mitigation Involvement of the DIME-ITDG DIME-ITDG Steering Group – item 07 Luxembourg,
Advanced EFSA Learning Programme Session 4.3. Forecast Analysis & Scenario Development.
Public health, innovation and intellectual property 1 |1 | The Global Strategy on Public Health, Innovation and Intellectual Property Technical Briefing.
FAILURE FINDING TASK Module 5 UNIT III HOW TO PERFORM RCM " Copyright 2002, Information Spectrum, Inc. All Rights Reserved."
FINAL PROJECT Carmen R. Cintrón Ferrer © Final Project – Essay or Article Suggested Topics Carmen R. Cintrón Ferrer, 2014, Reserved Rights 2  Examine.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
IDEA Improving Damage assessments to Enhance cost-benefit Analyses Call Identifier: Prevention 1. Actions on the economics of investing in disaster risk.
Computer Science & Engineering 2111 Database Objects 1 CSE 2111 Introduction to Database Management Systems.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
MEDIUM TERM FINANCIAL PLAN ( ) Date : 8/10/2010 Decision No : 2010/28.
Risk Management For Project Management. What is Risk? Risk (noun): possibility of loss or injury (Merriam-Webster Dictionary)
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
IT INVESTMENT MANAGEMENT FRAMEWORK Pertemuan 3-4
An Overview on Risk Management
Risk management.
Enhancing employers’ involvement in Social Protection policy debates
A200SAM Essential Skills for the project manager
Exercise Module 3b Cost-Benefit-Analysis (CBA)
Machine Learning Session
Probable Impact on Corporation Probability of Occurrence
Example Exercise 2 Cash Payback Method Cash Payback Method
Module 5 Improvement/upgrade plan
Presentation transcript:

MODULE II - EXERCISES Carmen R. Cintrón Ferrer © 2014

IT Risk Exercise (1) Carmen R. Cintrón Ferrer, 2014, Reserved Rights 2  Identify at least two events that pose Security Risks associated with IT infrastructure  Classify and order those risks based upon Probability - Impact  Suggest controls/countermeasures that will prevent/ reduce impact or transfer risk

IT Exercise (1) – Events Matrix Risk EventProbabilityMeasure(s) Recommended Carmen R. Cintrón Ferrer, 2014, Reserved Rights 3

IT Risk Exercise (2) Carmen R. Cintrón Ferrer, 2014, Reserved Rights 4  For the Risks analysed in the Table that follows:  Determine which proposed countermeasures should be implemented, based on Cost-Benefit Analysis.  If resources are limited, Which should be implemented first (prioritize)? Why?

Key FactorsRisk ARisk BRisk CRisk D Successful Event Cost$500K$10K$100K$10K Event Probability80%20%5%70% Estimated Impact Loss$400K$2K$5K$7K Cost of Measure/Control$100K$3K$2K$20K Net Impact (Value)$300K($1K)$3K($13K) Risk Determination? Investment Priority? Tomado de: Panko, Corporate and Computer Security, Fig. 1-9, p.36 IT Exercise (2) – Investment Analysis Carmen R. Cintrón Ferrer, 2014, Reserved Rights

6 Examine the following references:  Introduction of the IRGC Risk Governance Framework, IRGC 2008 Introduction of the IRGC Risk Governance Framework, IRGC 2008  Managing the Risk of Aging Infrastructure by Richard Little, USC (2012) Managing the Risk of Aging Infrastructure by Richard Little, USC (2012) Write an essay that addresses the following questions:  What is the importance of the IRGC Model?  How does it compare to the Cobit/ITGi proposed model?  Was the model applied in the scenarios of Aging Infrastructure considered by Richard Little?  Were there any discernible difference(s) between the two scenarios?  Which key factors played a role in the events, could those risks be managed more effectively/efficiently?  Are there any lessons to be learned from the readings?  Is the Model appropriate for other scenarios? Exercise 3 Risk Management Cases