02 - Risk Identification v 2.0
02 - Risk Identification v 2.0
Overview
Risk Management Life Cycle
IT Risk Identification
CONSISTENT
STRUCTURED
RISK
MANAGEMENT
ENTERPRISE-WIDE
CONTINUOUSLY
IMPROVING
Risk Practitioner Responsibilities
UNDERSTAND
Document controls
COMPLETE UP-TO-DATE
AUDITABLE MANAGED
Provides ability of
management to provide
Avoid a false sense of security
governance and effective risk
response
Assist with:
- Business continuity and disaster
recovery
- Compliance and policy reviews
- Security awareness programs
- Ensuring that risk management is
built into all new business
processes, applications and ventures
RACI Models
Responsible Accountable
the individual responsible for managing the individual that ensures the job was
the risk – getting the job done done – oversight of responsible person
Consulted Informed
provides advice, feedback, input not directly responsible for the task but
are informed of status and progress
aging the risk – getting the job done
Determination of Risk Acceptance Levels
Influence behaviors
- Openness?
- Fear?
- Blame?
- Ruthless?
- Careless?
Ethics, Laws and Standards
Ethics
Confidentiality Integrity
Availability Authentication
Risk Practitioner Concerns
Tangible assets
- Cash, equipment, buildings
Intangible assets
- Reputation, brand, morale
Change in asset value
Threat Identification
Intentional Internal
Accidental External
Circumstantial Supply chain
Natural Market conditions
Utilities Financial conditions
Equipment New technologies
Man-made
Vulnerability Identification
Try to ‘break-in’
Simulate the approach
of an attacker
Possible risk
- Creative
- Threat modeling
- Realistic
- Top-down approach – risk to
business
- Bottom-up approach – IT risk
Management Responsibilities and
Awareness
Risk Ownership
Awareness affects:
- Culture
- Ethics
- Direction and guidance
Risk Awareness Topics