Applying the risk process in the real world using COBIT

Similar documents
Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking

Best Practices in ENTERPRISE RISK MANAGEMENT. [ Managing Risks Holistically ]

IAASB CAG REFERENCE PAPER IAASB CAG Agenda (December 2005) Agenda Item I.2 Accounting Estimates October 2005 IAASB Agenda Item 2-B

ENTERPRISE RISK MANAGEMENT (ERM) POLICY Republic Glass Holdings Corporation. Purpose. Goals

Client Risk Solutions Going beyond insurance. Risk solutions for Real Estate. Start

MEMORANDUM. To: From: Metrolinx Board of Directors Robert Siddall Chief Financial Officer Date: September 14, 2017 ERM Policy and Framework

Understanding Enterprise Risk Management: An Overview

Break the Risk Paradigms - Overhauling Your Risk Program

ก ก Tools and Techniques for Enterprise Risk Management (ERM)

At the Heart of Cyber Risk Mitigation

Risk Management Policy

Procedures for Management of Risk

Delivering Clarity to Credit Unions Through Expertise and Experience

7/25/2013. Presented by: Erike Young, MPPA, CSP, ARM. Chapter 2. Root Cause Analysis

Risk Management Policy

Business Auditing - Enterprise Risk Management. October, 2018

Applying COSO s Enterprise Risk Management Integrated Framework. September 29, 2004

The working roundtable was conducted through two interdisciplinary panel sessions:

Risk Management. Policy No. 14. Document uncontrolled when printed DOCUMENT CONTROL. SSAA Vic

Energize Your Enterprise Risk Management

OMB Update Enterprise Risk Management. April, 2018

Applying COSO s Enterprise Risk Management Integrated Framework

M_o_R (2011) Foundation EN exam prep questions

BERGRIVIER MUNICIPALITY. Risk Management Risk Appetite Framework

Cyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier

Cyber Risk Quantification: Translating technical risks into business terms

FIRMA Nashville Tennessee April 21, 2015

ENTERPRISE RISK MANAGEMENT Framework

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

ENTERPRISE RISK MANAGEMENT (ERM) GOVERNANCE POLICY PEDERNALES ELECTRIC COOPERATIVE, INC.

Goodman Group. Risk Management Policy. Risk Management Policy

ENTERPRISE RISK MANAGEMENT POLICY

Risk Assessment Process. Information Security

International Standard on Auditing (UK) 540 (Revised June 2016)

Enterprise Risk Management Integrated Framework

SOLID GROUP INC. ENTERPRISE RISK MANAGEMENT POLICY

Enterprise Risk Management for Water Utilities. Justin Carlton, CMA, MBA Financial Analyst Tualatin Valley Water District

West Coast District Municipality. Risk Management Policy

Risk Management Framework

Risk Management Strategy January NHS Education for Scotland RISK MANAGEMENT STRATEGY

Understanding cyber risk management vs uncertainty with confidence in 2017

How we manage risk. Risk philosophy. Risk policy. Risk framework

THERE S NO SUCH THING AS A CYBER- RISK

Business Continuity Management and ERM

TONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD

Approved by: Diocesan Council 17 December 2015

Society of Actuaries - ERM Forum, 10 May 2016 A regulatory perspective on consumer risk

SRI LANKA AUDITING STANDARD 540 AUDITING ACCOUNTING ESTIMATES, INCLUDING FAIR VALUE ACCOUNTING ESTIMATES, AND RELATED DISCLOSURES CONTENTS

Kidsafe NSW Risk Management Plan. August 2014

The Country Risk Manager as Chief Risk Officer for the Government. Swiss Re, 3 June 2014

Cyber Incident Response When You Didn t Have a Plan

Property business interruption (technology) Policy wording

Client Risk Solutions Going beyond insurance. Risk solutions for Financial Institutions. Start

Risk Associated with Meetings

Risk Management at the Deutsche Bundesbank March 2011

Cyber Risk Enlightenment through information risk management

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management

Consumer Risk Index. An annual survey of the risks Americans believe are most prevalent in their lives

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017

DEBUNKING MYTHS FOR CYBER INSURANCE

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Auditing Accounting Estimates, Including Fair Value Accounting Estimates, and Related Disclosures

Risk Management Policy and Procedures.

RISK MANAGEMENT FRAMEWORK

An Introductory Presentation for ECU Staff

SCCE 2012 COMPLIANCE & ETHICS INSTITUTE. Workshop Agenda

INTEGRATED RISK MANAGEMENT GUIDELINE

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

An Overview of Cyber Insurance at AIG

Enhancing Our Risk Appetite Framework. A Case Study

An Introduction to Risk

Property business interruption Policy wording

INTERNAL AUDIT AND OPERATIONAL RISK T A C K L I N G T O D A Y S E M E R G I N G R I S K S T O G E T H E R

COMPARISON WITH 1997 NATIONAL SURVEY OF PUBLIC ATTITUDES TOWARD INSURANCE FRAUD 1

University Risk Management Policy

The Risk Assessment Executives Are Begging For. Presentation Overview. Terminology

Guidelines for Financial Assurance Planning

INTEGRATING RISK MANAGEMENT AND BUSINESS CONTINUITY

CAPITAL MANAGEMENT GUIDELINE

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen

Master Class: Construction Health and Safety: ISO 31000, Risk and Hazard Management - Standards

The Guide to Budgeting for Insider Threat Management

Right Sizing Your Reserves: A Better Way

RISK MANAGEMENT POLICY AND STRATEGY

4.1 Risk Assessment and Treatment Assessing Security Risks

Marine Terrorism. A re-evaluation of the risks. Tim Allmark Engineering Manager ABS Consulting Europe & Middle East

RISK MANAGEMENT FRAMEWORK

PRESENTATION TO CLASS 2 CREDIT UNIONS, BY DIRECTORS GLOBAL & BY BPS RESOLVER

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

Insurance Contracts for 831(b) Enterprise Risk Captives Policies and Pooling Agreements

Risk Management: Assessing and Controlling Risk

Federal Banking Agencies Request Comment on Enhanced Cybersecurity Standards

White Paper: Incident Management. By Michael Miora, CISSP President & CEO ContingenZ Corporation

The Internet of Everything: Building Cyber Resilience in a Connected World

Longevity Risk - Tolerances and Appetites. CIA Pension Seminar November 5, 2012

Federal Banking Agencies Issue Advanced Notice of Proposed Rulemaking on Enhanced Cybersecurity Standards

Disclosure Prudential Disclosure Report. 12/31/2017 Derayah Financial

HIPAA SECURITY RISK ANALYSIS

How Much Should You Invest in Patents?

MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT

Transcription:

Applying the risk process in the real world using COBIT Christian Dinesen NNIT A/S CiD@nnit.com

#Who Am I Last 4 years @ NNIT 2 years as Security Auditor 2 years as Security Advisor/Architect Hacker since 1994 CISA, CISM

Hacker Cyber Criminal? A hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. A hacker is someone who experiments with the limitations of systems for intellectual curiosity Bruce Schneier, Secrets and Lies 2000

Shout Out Inspiration and context

Disclaimer The views and opinions expressed in this presentation are those of the authors and do not necessarily represent official policy or positions at the authors workplace.

QUOTE Turning IT Risk into Business Risk Mapping Business Risk to Business goals

Risk perception & definitions Assessing Risk w/examples Governance vs. Management Risk Process & Scenarios w/examples Respond to Risk Risk Capacity & Profile w/examples

Risk perception Why are we so bad at assessing risk? Risks that are Abstract Slowly progressing Kind of unlikely Like Cancer Car accidents Hacker attacks Are perceived way to small!! Actual Risk Perceived Risk

Risk Definitions Risk the possibility of a situation or event with uncertain frequency and magnitude of loss (or gain) occurring that is associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise Threat Vulnerability Risk Appetite Risk Tolerance Risk Optimization Risk Hierarchy

Categories in Assessing Risk Inherent Risk Residual Risk Control Risk Detection Risk The risk associated with an event when no controls are in place The risk that is associated with an event after controls have been applied Results from the internal control systems failure to prevent, detect or correct an incident in a timely manner Prescribed controls, substantive testing or monitoring will fail to detect an error that could be material

Defacements of.dk websites 2017-09-04

Governance vs. Management Ensure that IT-related enterprise risk does not exceed risk appetite and risk tolerance, the impact of IT risk to enterprise value is identified and managed, and the potential for compliance failures is minimized o o o Evaluate risk management Direct risk management Monitor risk management Integrate the management of IT-related enterprise risk with overall ERM, and balance the costs and benefits of managing IT-related enterprise risk o o o o o o o Collect data Analyze risk Maintain a risk profile Articulate risk Define a risk management action portfolio Respond to risk

Risk Management Process Identify Risk Assess Risk Respond to Risk Control & Monitor

Risk Scenarios Top-down and Bottom-up Both approaches are complementary and should be used simultaneously. Risk scenarios must be relevant and linked to real business risk. Specific risk items for each enterprise and critical business requirements need to be considered in the enterprise risk scenarios. COBIT 5 for Risk provides a comprehensive set of generic risk scenarios. These should be used as a reference to reduce the chance of overlooking major/common risk scenarios.

COBIT 5 Risk Scenario Structure

Risk Scenarios Identify Risk Scenarios Threat Types Malicious Accidental Error / Failure Nature External requirement Actors Internal External Event Disclosure Interruption Modification Theft Inappropriate use

Attack on the mobile platform and data

Phising emails

Assess Scenarios

Timeline on WannaCry 2013 AUG 2016 JAN 2016 FEB 2017 FEB 2017 MAY 12 2017 NSA Tools Stolen Shadow Brokers Emerges Shadow Brokers announces auction of NSA tools Microsoft cancels Patch Tuesday for the first time Microsoft releases SMC updates for supported OS s WannaCry outbreak begins First WannaCry samples seen in VirusTotal

Linking Enterprise and IT Risk

Goals Cascade Overview

Respond to Risk Accept Avoid Mitigate Share/Transfer

Accept the Risk?

Types of Controls

Risk Capacity Risk Appetite The broad-based amount of risk in different aspects that an enterprise is willing to accept in pursuit of its mission Risk Tolerance The acceptable level of variation that management is willing to allow for any particular risk as it pursues objectives Risk Capacity The cumulative loss an enterprise can tolerate without risking its continued existence. As such, it differs from risk appetite, which is more on how much risk is desirable.

Risk Capacity Left diagram A relatively sustainable situation Risk appetite is lower than risk capacity Actual risk exceeds risk appetite in a number of situations, but always remains below the risk capacity Right diagram An unsustainable situation Risk appetite is defined at a level beyond risk capacity; this means that management is prepared to accept risk well over its capacity to absorb loss As a result, actual risk routinely exceeds risk capacity even when staying almost always below the risk appetite level. This usually represents an unsustainable situations

Maintain Risk Profile Maintain the inventory of known risks and their attributes (including expected frequency, potential impact and responses) as well as resources, capabilities and current control activities Register Resulting from risk analysis, consists of a list of risk scenarios and their associated estimates for impact and frequency Action Plan Includes action items, status, responsible, deadline, etc Loss Events Loss data related to events occurring over the last reporting period(s) Risk Factors Both contextual risk factors and capabilityrelated risk factors Independent Assessment Findings Result of independent assessments (e.g., audit findings, self assessments)

Risk profile towards IoTs

QUOTE Turning IT Risk into Business Risk Mapping Business Risk to Business goals

Christian Dinesen CiD@NNIT.com