O UNIT 6. Risk Management Response. Risk Management, Response, and Recovery for IT Systems

Similar documents
Develop Project Management Plan

Risk Financing Strategy

UNCLASSIFIED. FY 2017 Base FY 2017 OCO FY 2017 OCO. FY 2017 Base

Risk Management: Assessing and Controlling Risk

4.1 Risk Assessment and Treatment Assessing Security Risks

THE REPUBLIC OF TUNISIA MINISTRY OF ENVIRONMENT AND SUSTAINBLE DEVELOPPEMENT GEF GRANT N

Brought to you by Physicians Insurance A Mutual Company April 24, 2012 Presented by: Chris Apgar, CISSP

USF System Compliance & Ethics Program. Risk Assessment Process. Enterprise-Wide Risk Assessment

Department of Defense Fiscal Year (FY) 2019 Budget Estimates

Post-Class Quiz: Information Security and Risk Management Domain

BCS Level 4 Award in Risk Assessment QAN 603/0866/7

UNCLASSIFIED. FY 2017 Base FY 2017 OCO. FY 2017 Base FY 2017 OCO

2013 NATIONAL TECHNICAL ASSISTANCE. Risk Adjustment 101 July 22, 2013

Northwest Regional Data Center

ENTERPRISE RISK MANAGEMENT (ERM) GOVERNANCE POLICY PEDERNALES ELECTRIC COOPERATIVE, INC.

Energize Your Enterprise Risk Management

White Paper: Incident Management. By Michael Miora, CISSP President & CEO ContingenZ Corporation

Risk Management FUN! Humor Me

Security Risk Management

Comparison of Risk Analysis Methods: Mehari, Magerit, NIST and Microsoft s Security Management Guide

Department of Health & Human Services (DHHS) Centers for Medicare & Medicaid Services (CMS) Transmittal 883 Date: April 22, 2011

The Security Risk Analysis Requirement for MIPS. August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist

Taekwondo Australia - Risk Management Policy

Running Head: Information Security Risk Assessment Methods, Frameworks and Guidelines

CHAPTER 4: SECURITY MANAGEMENT

Fraud Risk Management

Information security management systems

Information Security Risk Management

March 1. HIPAA Privacy Policy

13.1 Quantitative vs. Qualitative Analysis

Privacy and Security Standards

The Economic Impact of Advanced Persistent Threats. Sponsored by IBM. Ponemon Institute Research Report

Best Practices in ENTERPRISE RISK MANAGEMENT. [ Managing Risks Holistically ]

Regional development plan

Department of Defense Fiscal Year (FY) 2018 Budget Estimates

U.S. Department of the Interior Office of Inspector General. Advisory Letter. Critical Infrastructure Assurance Program, Department of the Interior

THERE S NO SUCH THING AS A CYBER- RISK

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

Determining Whether You Are a Business Associate

Risk Management: Principles, Methodologies and Techniques. Peter Getugi Internal Audit Manager ILRI

Product Recall Risk Assessment By Tony Munns. Product recall is a key area of risk for today s company. With greater focus

The Risk Assessment Executives Are Begging For. Presentation Overview. Terminology

Using the System Inventory Worksheet

Enterprise Risk Management Focusing on the Right Risks

BUSINESS-DRIVEN S E C U R I T Y

Information Security Risk Assessment by Using Bayesian Learning Technique

IT Security. Chip Moore State Chief Information Security Officer Chris Estes State Chief Information Officer

LCS International, Inc. PMP Review. Chapter 6 Risk Planning. Presented by David J. Lanners, MBA, PMP

FREQUENTLY ASKED QUESTIONS REGARDING 23 NYCRR PART 500

Department of Defense Fiscal Year (FY) 2013 President's Budget Submission

Managing Project Risks. Dr. Eldon R. Larsen, Marshall University Mr. Ryland W. Musick, West Virginia Division of Highways

Cyber Risk Enlightenment through information risk management

H 7789 S T A T E O F R H O D E I S L A N D

DISASTER RECOVERY PLANNING. To print to A4, print at 75%.

Making the Jump to Risk Management. Jeff Blackmon, FBCI, CISSP, CBCP, ITIL Strategic Continuity Solutions, LLC.

Disasters and Localities. Dr. Tonya T. Neaves Director Centers on the Public Service Schar School of Policy and Government

Defining a Risk Appetite That Works

GCC RAILWAY DEVELOPMENT: A VISION TO INTEGRATION. Ramiz Al Assar, Ph.D.

Commercial Crime. Are you prepared for the financial cost on your business following a Crime?

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 14 Security Policies and Training

UNITED NATIONS SECURITY MANAGEMENT SYSTEM

2015 HCCA Compliance Institute Sunday, April 19, 2015 (9AM 12AM) Session P7. The Wonderful NIST ! Guide for Conducting Risk Assessments

INFORMATION AND CYBER SECURITY POLICY V1.1

RISK FACTORS RISKS RELATING TO PARTICIPATION IN THE TOKEN SALE

LOCAL HAZARD MITIGATION PLAN REVIEW WORKSHEET FEMA REGION 2 Jurisdiction: Jurisdiction: Title of Plan: Date of Plan: Address:

2015 EMEA Cyber Impact Report

2019 EXECUTIVE SUMMARY / 1

E-Approval Failure Modes and Effects Analysis (FMEA)

Risk Management For Projects

EFFECTIVE TECHNIQUES IN RISK MANAGEMENT. Joseph W. Mayo, PMP, RMP, CRISC September 27, 2011

MANAGING RISKS TO PHYSICAL ASSETS A PRACTICAL

S M U MARIZ E YOUR SAFETY P R E F R O MANCE

Strategic Security Management: Risk Assessments in the Environment of Care. Karim H. Vellani, CPP, CSC

Cyber Risk Quantification: Translating technical risks into business terms

Below is a brief description of NSPE s service levels for state partners, depending on their level of need:

NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES

There are many definitions of risk and risk management.

Department of Health & Human Services (DHHS) Centers for Medicare & Medicaid Services (CMS) Transmittal 912 Date: July 14, 2011

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

Project Management for the Professional Professional Part 3 - Risk Analysis. Michael Bevis, JD CPPO, CPSM, PMP

Business Auditing - Enterprise Risk Management. October, 2018

Launching a Hedge Fund: 10 Keys to Success. from marketing to technology, the top tips for achieving startup success

Risk Management & FMEAs. By Jay P. Patel, ASQ Fellow CEO & President QPS Institute

Protecting Your Clients from a DATA DISASTER

IT auditing Principles of Risk Management Conducted by

Nationwide 2017 Business Owners Attitudes & Usage (A&U) Study UNDER EMBARGO UNTIL 8/22 AT 10:00 A.M. ET

United Nations Environment Programme

Security Shifts in Thinking

MEMORANDUM. To: From: Metrolinx Board of Directors Robert Siddall Chief Financial Officer Date: September 14, 2017 ERM Policy and Framework

Fulton County Schools Capital Program IV Execution Strategy. May 8, 2012

Heerema Marine Contractors

4. Which statement is true regarding disaster planning and business continuity management?

Pickering Whole-Site Risk

Ball State University

DISASTER MANAGEMENT. The Complete Package

Climate risk management plan. Towards a resilient business

How to Compile and Maintain a Risk Register

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen

Committee Staff Procurement Backup Book FY 2005 Budget Estimates. February 2004 AIRCRAFT PROCUREMENT, AIR FORCE VOLUME I OPR: SAF/FMB

A Look at the Trends in Healthcare Payments Sixth Annual Report: June 22, InstaMed. All rights reserved.

Transcription:

6 isk anagement esponse isk anagement, esponse, and ecovery for ystems

opics for this nit Quantitative and qualitative risk assessment approaches Business impact analysis (B) Business continuity plan (BP) Disaster recovery plan (DP) lements of an incident response plan

Basic ules ever spend more to protect an asset ever spend more to protect an asset than it is worth Don t waste money on risks without a Don t waste money on risks without a reasonable probability of it occurring

erminology isk the probability that something bad will happen Vulnerability flaw or weakness that t can be exploited hreat the potential that a vulnerability will be exploited mpact the harm that can be done by a threat if it happens

isk anagement ssessment -process used to identify and evaluate risks isks are quantified based on importance or impact severity isks are prioritized voidance preventing known risks eduction reducing the impact of known risks when they can not be avoided itigation minimizing the damage

isk ssessment teps dentify threats and vulnerabilities. dentify the likelihood that a risk will occur dentify asset values Determine the impact of a risk Determine the usefulness of a safeguard or control

isk ssessment pproaches Quantitative ses numbers, such as dollar values Qualitative o dollar values Determines risk level based on probability and impact of a risk

Quantitative isk ssessment L X = L ingle loss expectancy (L) otal loss expected from a single incident nnual rate of occurrence () umber of times an incident is expected to occur in a year nnual loss expectancy (L) xpected loss for a year

Qualitative isk ssessment isk level = Probability X mpact Probability Likelihood a threat will exploit a vulnerability mpact egative result if a risk occurs

ountermeasure trategies isk assignment insurance or using hosted services isk acceptance decide that the cost of preventing is too expensive isk avoidance not take the risk at all

ountermeasure osts Product cost initial price and maintenance mplementation cost additional infrastructure t changes ompatibility cost usually training nvironmental cost power consumption, cooling, etc raining costs Productivity cost higher help desk cost, slower response, etc

ountermeasure ontrols Detective recognize that a threat is present. D (intruder detection systems) are examples Preventive can block firewalls and D orrective can take steps to prevent future attacks. P (ntruder prevention systems) are examples

mportance of isk ssessments s part of the overall risk management process Helps you evaluate control effectiveness upports decision making an help organizations remain in compliance with laws and regulations

Business ontinuation Plan (BP) plan designed to help an organization continue to operate during and after a disruption overs all functions of a business: systems, facilities, and personnel Generally includes only mission-critical systems

BP lements Purpose and scope ssumptions and planning principles ystem description and architecture esponsibilities otification or activation phase ecovery and reconstitution phases Plan training, testing, and exercises Plan maintenance

Disaster ecovery Plan (DP) ncludes the specific steps and procedures to recover from a disaster s part of a BP mportant terms: ritical business function (B) aximum acceptable outage () ecovery time objectives ()

DP lements Purpose and scope Disaster or emergency declaration ommunications mergency response and activities ecovery steps and procedures ritical business operations ecovery operations ritical operations, customer service, and operations recovery

Business mpact nalysis (B) study that identifies the Bs and s of a DP tudies include interviews, surveys, meetings, and so on. dentifies the impact to the business if one or more functions fails dentifies the priority of different critical systems

B lements cope bjectives t is affected by size of the organization. or small organization, scope could include entire organization. or larger organizations, scope may include only certain areas.

Plan omputer ncident esponse eam () plan outlines steps taken during a response effort and the roles and responsibilities of the team ncludes the five Ws + H: Who launched the attack? What type of attack occurred? Where the attack occurred? When the attack occurred? Why the attack occurred? How the attack occurred?

Personnel eam Leader - his individual takes charge of the incident and directs other members' activities nformation ecurity embers people trained in network security devices and recovery procedures etwork dministrators know the network resources Physical ecurity Personnel - know the different types of surveillance methods, such as recording cameras, used within the organization

Personnel Legal Personnel - provide advice on the organization s legal responsibilities and legal remedies Human esources (H) - if an employee violates the acceptable use policy (P), they know the company policy for dealing with the problem Public elations (P) provide damage control to the company s image to customers, vendors, and stockholders of the organization

ncident esponse Plan otification otification esponse ecovery and follow-up D t ti Documentation

ummary ou can protect data and business functions with a BP, DP, B, and incident response plan. isk assessments include quantitative and qualitative approaches.

Lab 6 oday s lab is also your homework assignment ach group will be given a fictitious company and it will beuptoyou your team toceatet create the following: Business mpact nalysis isk nalysis Business continuity it Plan Disaster ecovery Plan ext week each group will give a 10 minute presentation on your plan