CRM Tee
CRM Tee
July 2024
Contents
01 Introduction to course
02 Introduction to risk
04 Risk Impact
07 Risk Criteria
08 Risk Identification
09 Risk Analysis
10 Risk Evaluation
11 Risk Treatment
12 Quiz
Page 2
Introduction to Course
Welcome to the Cybersecurity Risk Management course. Cyber threat has emerged as one of the major threats faced by businesses. The number of
cyber-attacks is increasing along with the cost of mitigation. The goal of Cybersecurity risk management is an ongoing process of identifying, analyzing,
evaluating, and addressing your organization's cybersecurity threats. After successful completion of the course, students will be able to:
• Explain various cybersecurity risk management frameworks and methodologies
• Identify and model cybersecurity risks using various qualitative and quantitative methods
Introduction to
Cybersecurity I II III IV
Risk Management
Introduction to Business
Cybersecurity Risk Risk Management Continuity and
Management Risk Assessment Planning Disaster Recovery
We begin by Gain insights into the Define the objectives and Understand the essential
Risk Assessment
understanding the structured process of risk scope of risk management components and rationale
foundational elements of assessment and its pivotal planning, ensuring behind developing robust
cybersecurity risk, role in establishing alignment with Business Continuity Plans
including threats, effective cybersecurity organizational goals and (BCP) and Disaster
vulnerabilities, and their strategies. regulatory requirements. Recovery Plans (DRP) to
Risk Management potential impact on Establish clear ensure organizational
• Types of Risk
Planning organizational operations responsibilities and resilience.
Assessments
and assets. reporting structures to
• Business Impact
• Evaluation of Threats facilitate transparency and
• Risk Management Analysis
and Countermeasures accountability in risk
Lifecycle management efforts. • Elements of BCP and
Business • Techniques for Risk DRP
• Legal Compliance
Continuity and Management • Best Practices
Disaster Recovery • Risk Prioritization
Page 3 Confidential
Introduction to Course
Welcome to the Cybersecurity Risk Management course. Here, we focus on protecting organizational assets from
cyber threats. You'll gain the knowledge and skills needed to manage risks, maintain business continuity, and
strengthen resilience against changing cybersecurity challenges.
Risk Management
frameworks
V VI VII VIII
Risk Management Cyber Risk & Data Privacy &
Data Governance
frameworks Resilience Security
Cyber Risk & Dive into prominent Differentiate between Examine the critical role of Explore the intersection
Resilience cybersecurity frameworks cyber risk management Data Governance in and differentiation
such as the NIST and cyber resilience, managing and protecting between Risk
Cybersecurity Framework emphasizing the sensitive information, Management, Data
and regulatory guidelines importance of building ensuring data integrity, Privacy, and Data Security,
like the SEC Cybersecurity adaptive strategies to availability, and highlighting how these
Rule, understanding their withstand and recover confidentiality. domains collaborate to
Data Governance roles in guiding effective from cyber incidents. mitigate risks and
• Importance and
cybersecurity practices. safeguard organizational
• Impact of Emerging benefits
data assets.
• Risk management Technologies
• Challenges faced
standards and • Benefits and
• Resilient Decision-
frameworks. • Relationship with risk challenges faced
Making
Data Privacy & management
• Compliance and Best • Differentiation from
Security Practices • DAMA risk management
• ISO 8000 • India’s DPDP Act
Page 4 Confidential
Introduction to Risk
What is Risk?
Any event that can impact the achievement of a “Business Objective” can be termed as “Risk”.
Empirically, it can be calculated as the product of risk likelihood and risk impact i.e.
Risk = Likelihood x Impact
Page 5 Confidential
Risk Occurrence/ Likelihood
Page 6 Confidential
Risk Impact
Information
Security
2 3
Ensuring data or an IT system is not modified or
3 Integrity destroyed. If data is modified or destroyed, it loses its
Availability Integrity value to the company.
Page 7 Confidential
Seven Domains of a Typical IT Infrastructure
LAN LAN-to-WAN
Domain Domain
WAN
Domain
Workstatio
n Domain
Firewall
User
Domain
Remote Access Domain
System Domain
Application
Page 8 Confidential
Relationship between vulnerability, threat and risk
Below, we will understand the relationship between vulnerability, threat and risk through an example.
Attack Vulnerability
Any agent/act that can exploit a vulnerability is threat.
2 Threat
For e.g. An external agent tries to get unauthorized access.
3 Risk For e.g. If external agent exploits this vulnerability, they could
access sensitive data.
Risk Threat
Actual attempt to exploit the vulnerability is called an attack.
Attack For e.g. The external agent gains access to data leading to data
4 leakage.
Page 9 Confidential
Risk Management Lifecycle
Risk management is the practice of identifying, assessing, controlling, and mitigating risks. Threats and
Risk vulnerabilities are key drivers of risk. Identifying the threats and vulnerabilities that are relevant to the
Management organization is an important step. Organisations can then take action to reduce potential losses from these
risks.
• Conduct workshops and • Assess risks by evaluating their • Compare assessed risks • Develop and implement risk
• Define clear risk tolerance likelihood of occurrence and response plans tailored to
levels to guide decision- interviews with stakeholders against predefined risk
potential impact on objectives. address identified risks
making on acceptable risk to brainstorm and document criteria to determine their effectively.
potential risks. • Use qualitative and significance.
exposure. quantitative techniques such • Monitor risk treatment
as risk matrices or scenario activities to ensure timely
• Establish thresholds for risk • Utilize historical data, analysis to prioritize risks. • Consider additional factors execution and effectiveness in
severity and impact to checklists, and expert like risk interdependencies reducing risk exposure.
trigger appropriate judgment to ensure and cumulative effects
responses. comprehensive risk coverage. during evaluation.
Page 10 Confidential
Defining the Risk Criteria
Page 11 Confidential
Risk Identification
1 Identify Threats
Identify
Identify Threat Pairing Threats with
Vulnerabilities
Vulnerabilities
“Threat identification” is the process Potential vulnerabilities can be Threats are matched to existing
of creating a list of threats. The list determined through Audits, vulnerabilities to determine the
attempts to identify all the possible certification records, system logs, likelihood of a risk.
threats to an organization. The list can prior events, Incident response Risk = Threat x Vulnerability
be extensive. teams Total Risk = Threat x
Vulnerability x Asset Value
Page 12 Confidential
Assessing Identified Risks
Page 13 Confidential
Risk Evaluation
3
3 Document risk assessment results
Page 14 Confidential
Risk Treatment
Mitigation aims to reduce the probability or impact of a risk to an acceptable level through proactive measures.
Strategies may include implementing controls, improving processes, enhancing training, or upgrading technology.
1 Mitigation It focuses on addressing the root causes or vulnerabilities that contribute to the risk's occurrence or severity.
Effective mitigation efforts can strengthen resilience and improve the organization's ability to respond to adverse events.
Acceptance involves acknowledging the existence of a risk but deciding not to take action to avoid or mitigate it.
It is suitable when the cost of mitigation outweighs the potential impact of the risk or when the risk falls within acceptable thresholds.
2 Acceptance Organizations may accept risks strategically if they align with their risk appetite and overall business objectives.
Acceptance does not mean ignoring the risk; it involves monitoring and preparing to respond if the risk materializes.
Avoidance seeks to eliminate the risk entirely by altering plans, processes, or activities to circumvent the risk source.
It often involves strategic decisions to not pursue certain activities or ventures that carry high inherent risks.
3 Avoidance By avoiding the risk, organizations can potentially save resources and prevent disruptions to their operations or objectives.
C
Transfer shifts the financial or operational consequences of a risk to another party, typically through contracts, insurance, or outsourcing.
It allows organizations to leverage external expertise or resources to manage risks more effectively.
4 Transfer Insurance policies and indemnification clauses in contracts are common examples of risk transfer mechanisms.
While transferring risk can reduce exposure, organizations must carefully evaluate the terms and costs associated with transferring risks
Page 15 Confidential
Quiz
3
A) Industry reports and benchmarks
Vulnerability B) Stakeholder interviews and brainstorming sessions
Assessment C) Competitor analysis and market trends
D) Customer feedback and surveys
Which risk management technique involves transferring the risk to a third party?
A) Avoidance
Answers:
fdsf 5
Impact Analysis B) Mitigation
C) Acceptance
1.
2.
A
C
D) Transfer
3. B
How is risk prioritization typically conducted? 4. B
A) Based solely on the likelihood of the risk occurring
6
Risk Level
Determination
B) Based solely on the impact of the risk
C) Based on a combination of likelihood and impact
5.
6.
D
C
D) Randomly assigning priorities to risks
August 24
1. Introduction to Risk Assessment
2. Risk Assessment vs Gap Assessment vs Audit
3. Critical Components (Areas) of Risk
Assessment
Contents
Contents 4. Types of Risk Assessments
5. Methods to Identify Threats, vulnerabilities,
and countermeasures
6. Evaluation of Threats, Vulnerability, and
Countermeasures
7. Quiz
Proactive Risk Identification Optimized Resource Allocation Protecting Reputation and Brand
Risk assessment allows organizations to anticipate and Identifying and prioritizing risks assists in allocating Identifying and addressing reputation-related risks
identify potential risks before they materialize. resources efficiently. helps protect an organization's brand image.
By being proactive, organizations can implement Resources can be directed towards high-impact risks, A positive reputation enhances customer trust and
preventive measures to minimize the impact of adverse optimizing risk mitigation efforts. loyalty.
events.
Business Continuity and Resilience Safeguarding Financial Stability Enhancing Project Management
Risk assessment helps organizations develop robust Assessing financial risks enables organizations to make Risk assessment plays a pivotal role in project
business continuity plans to manage disruptions well-informed financial decisions. management by anticipating project-related risks.
effectively. By safeguarding financial stability, organizations can Proactively managing risks leads to successful project
Being prepared for various risks enhances resilience weather economic uncertainties more effectively. outcomes and minimizes potential setbacks.
and reduces downtime during challenging times.
Risk Assessment
Different Types of Risk
Risk Assessment
Risk Assessment vs Gap Assessment vs Audit
• A risk assessment identifies and • A gap assessment compares the current • An audit is a comprehensive review of
evaluates the threats and vulnerabilities security controls and processes against the organization’s overall security
against an organization’s assets, data the industry best practices and program.
and processes. frameworks. • This helps to understand the current
• This helps us to identify the big risks. • This helps us to know the current effectiveness of the security processes
• Scope: Focuses on specific risks situation in comparison to the target • Scope: Understanding of the security
state. effectiveness
• Scope: Identifies missing controls
Risk Assessment
Critical Components (Areas) of Risk Assessment
• Identify potential threats and vulnerabilities that could exploit the information system's weaknesses.
fdsf
Asset
Identification • This involves understanding the types of attacks, malware, or unauthorized access that could affect the
system.
• Identify potential threats and vulnerabilities that could exploit the information system's weaknesses.
Threat
Identification • This involves understanding the types of attacks, malware, or unauthorized access that could affect the
system.
• Combine the likelihood and impact assessments to determine the overall risk level for each identified threat-
Risk Level vulnerability pair.
Determination
• This step helps prioritize risks based on their severity.
Risk Assessment
Critical Components (Areas) of Risk Assessment
• Based on the risk assessment, recommend appropriate security controls and countermeasures to mitigate or
Control reduce the identified risks.
Recommendations
• These controls could include technical measures, policies, procedures, or user awareness training.
Residual Risk • After implementing security controls, reassess the residual risks—the risks that remain after controls are
Assessment applied—to determine if they are at an acceptable level.
• Document the entire risk assessment process, including the identified risks, assessment results,
Documentation recommended controls, and risk treatment decisions.
and Reporting
• Create clear and concise reports for stakeholders to understand the risk posture of the information system.
• Implement mechanisms for continuous monitoring of the information system's security posture.
Continuous
Monitoring
• Regularly review and update the risk assessment as the threat landscape and the organization's environment
change.
• These components provide a structured approach to managing risks in information systems and are essential for developing effective information
security strategies.
• By following these steps, organizations can identify and address potential threats, vulnerabilities, and risks to protect their information assets
effectively.
Risk Assessment
Types of Risk Assessments
Definition of Quantitative and Qualitative
Quantitative Qualtitative
• A quantitative risk assessment uses numbers such as dollar values. You • A qualitative risk assessment doesn’t assign dollar values. Instead, it
gather data and then enter it into standard formulas. determines the level of risk based on the probability and impact of a
risk.
• The results can help you identify the priority of risks. You can also use the
results to determine the effectiveness of controls. • These values are determined by gathering the opinions of experts.
Quantitative Qualtitative
• Data can be measured using quantities or metrics and is numerical in • Data used in qualitative analysis is typically non-numerical and presented
quantitative analysis. as text, pictures, videos, or narratives.
• It aims to measure and quantify phenomena. • Gaining understanding and recording the intricacies of human behaviour
and experiences are its main goals.
• Structured procedures, such as surveys with closed-ended questions, are
used to gather quantitative data. • Qualitative data is gathered through techniques including focus groups,
interviews, and observations.
• Larger sample numbers are often needed for quantitative analysis to
reach statistical significance. • Smaller sample sizes can be used for qualitative analysis, which
concentrates on in-depth investigation.
• The data are analysed and conclusions are drawn using mathematical
models and statistical methods in quantitative analysis. • To find themes, patterns, and insights, qualitative analysis entails
evaluating textual, visual, or narrative data.
Risk Assessment
Types of Risk Assessments (Qualitative and Quantitative)
Case Study Quantitative and Qualitative
Qualitative Qualitative
• A company issues laptop computers to employees. The value of each laptop is • A company’s web site sells company products. Due to some recent outages, you
$2,000. This includes the hardware, software, and data. About 100 laptops are trying to identify the most important risks to the Web site. Based on feedback
are being used at any time. In the past two years, the company has lost an from several experts, you have come up with a list. You now want to prioritize
average of one laptop per quarter. these risks. The risk categories are:
• The value of each laptop is $2,000, and the SLE is $2,000. One laptop is lost • DoS attack—Any denial of service (DoS) or distributed DoS (DDoS) attack
each quarter resulting in an ARO of 4. The ALE is calculated as $2,000*4, or that results in an outage
$8,000. You can then use the ALE to determine the usefulness of a control. • Web defacing—Modification of the Web site by unauthorized parties
For example, the company could purchase hardware locks for the laptops in • Loss of data from unauthorized access—Any loss of confidentiality.
bulk at a cost of $10 each. The safeguard value is $10*100 laptops, or $1,000.
• This could be from an attacker accessing customer data. It could also be from an
It’s estimated that if the locks are purchased, the ARO will decrease from 4 to
1. Should the company purchase these locks? attacker accessing any internal private data. It does not include the loss of public
data that is freely available.
• Loss of Web site data due to hardware failure—This indicates the loss of any Web
• You can determine the effectiveness of the control using the following
site data. This can include any data used to show the Web pages to customers. It
calculations:
can also include the Web site application used to retrieve and format the data into
• Current ALE- Annual loss expectancy (ALE) ,$8,000 (ARO of 4*$2,000) Web pages.
ARO with control 1 • Calculated by averaging each of the inputs by the different experts. You determine
the risk level by multiplying the Probability*Impact.
• ALE with control $2,000 (ARO of 1 $2,000)
• DoS attack ->100 100 100 (1.0*100)= 100
• Savings with control $6,000 (Current ALE of $8,000 ALE with
• Web defacing-> 50 90 (0.5*90)= 45
control of $2,000)
• Loss of data from unauthorized access ->30 10 (0.3*10)=3
• Safeguard value (cost of control) $1,000 ($10*100)
• Loss of Web site data due to hardware failure-> 30 90 (0.3*90) = 27
• Realized savings of $5,000 (Savings with control of $6,000
safeguard value of $1,000) quarter • Priority now set would be
• DoS>Web defacing> Loss of Web site data due to hardware failure> Loss of
data from unauthorized access.
Risk Assessment
Types of Risk Assessments
Asset-based risk assessment focuses on Process-based risk assessment Context-based risk assessment takes a
identifying and evaluating risks examines risks within the context of broader perspective, considering the
associated with specific assets within an business processes and workflows. It organization's unique environment,
organization, such as hardware, involves: both internal and external. This
software, data, and infrastructure. This • Mapping key business processes. approach includes:
includes: • Identifying information assets • Evaluating the organization's
• Inventorying and categorizing involved in each process. business objectives and strategy.
assets. • Analyzing vulnerabilities and • Addressing industry-specific
• Assessing the value and criticality of threats at each step. regulations and compliance
each asset. • Assessing the impact of security requirements.
• Identifying threats and incidents on processes and overall • Analyzing the broader threat
vulnerabilities related to these business operations. landscape and emerging risks.
assets. • Assessing how different risk factors
• Evaluating the potential impact if interact and impact the
an asset is compromised. organization as a whole.
Risk Assessment
Methods to identify Threats, vulnerabilities and countermeasures
• A threat is any potential danger. The • Vulnerability assessment is the process • A countermeasure is a security control or
danger can be to the data, the of identifying system weaknesses and a safeguard implemented to reduce a
hardware, or the systems. prioritizing relevant vulnerabilities. risk.
• Two primary methods to identify • Assessments are conducted to identify • Controls to be considered when
threats are: and evaluate vulnerabilities. identifying and evaluating
Review historical data • The two primary assessments are: countermeasures:
Threat Modelling Vulnerability assessments
In-place controls
Exploit assessments
Planned controls
Control categories
Risk Assessment
Identification and evaluation of threats – Reviewing historical data
1
Attacks
Past website attacks increase the likelihood of future attacks, but their success depends on the level of protection
implemented since then.
2
Natural Events
If a location experienced hurricanes before, it's likely to face them again, necessitating regular review and
testing of disaster recovery and business continuity plans.
3
Accidents
Accidental events affecting confidentiality, integrity, or availability, like data deletion or user errors,
should be considered in risk assessments.
4
Equipment Failures
Analysing past failures predicts future risks and identifies systems needing more
redundant hardware for improved reliability.
Risk Assessment
Identification and evaluation of threats – Threat modelling
Threat modelling
Reviewing
is a process
historical
used
data
to helps
identify
identifying
possible threats on a system
The system
1 This includes background information on the system
Introduction
Risk Assessment
Identification and evaluation of vulnerabilities
A vulnerability assessment is a process used to discover An exploit assessment attempts to discover what vulnerabilities an
weaknesses in a system. The assessment will then prioritize the attacker can exploit. Exploit assessments are also referred to as
vulnerabilities to determine which weaknesses are relevant. “penetration tests.”
You can perform vulnerability assessments internally or You usually start an exploit assessment with a vulnerability
externally. assessment. After you discover weaknesses, you attempt
An internal assessment attempts to discover weaknesses the exploit.
from within the network. An external assessment attempts There is a significant difference between the exploit
to discover what attackers outside the company may see. assessment and the vulnerability assessment. Specifically,
A vulnerability assessment often starts by gathering an exploit assessment is intrusive. The goal is to test the
information. exploit.
A vulnerability assessment may have multiple goals, such as:
If the exploit assessment is successful, it can disrupt
operations. With this in mind, you should be cautious
• Identify IP addresses when performing exploit assessments.
• Identify names Many of the popular vulnerability assessment suites
• Identify operating systems include tools you can use to perform exploit assessments.
Risk Assessment
Identification and evaluation of countermeasures
In-place These are controls that are currently installed in the In-Place Controls Planned Controls
1 controls operational system.
These are security controls These are security controls
or measures that have or measures that an
already been implemented organization intends to
within the organization's IT implement in the future but
environment. have not been deployed
Planned These are controls that have a specified yet.
2 controls implementation date.
They are currently active They are part of the
and functioning to address organization's security
specific security risks or strategy and are required to
vulnerabilities. address identified risks or
Controls fall into four primary categories as per vulnerabilities.
Control ISO 27001:2022: Organizational controls,
3 categories Personnel controls, Physical controls and
Technological controls.
Risk Assessment
Control Categories
ISO 27001
► The Standard provides the framework for an effective Information Security Management System (ISMS). It sets out the policies and controls needed to protect organizations
and includes all the risk controls necessary for robust IT security management.
► Below are the control categories as per ISO 27001:2022
5 fdsf
What are examples of
control categories in Risk
A) Legal, ethical, physical and operational C) Organizational, personnel, physical, and technological
Assessment? B) Strategic, tactical, and operational D) Financial, technological, personnel and operational
Answers
1. D 2. A 3. A 4. B 5. C
Risk Assessment
Thankyou!
Risk Management Planning
August 2024
1. Objectives of risk management plan
4. Assigning responsibilities
Contents
Contents
5.
6.
Prioritizing risk elements
8. Incident management
11. Quiz
Risk • Identifying potential risks that the organization may face in its internal and external environments.
1 Identification • These risks can be related to various aspects, such as operational, financial, compliance, reputational, technological, or strategic.
Risk Analysis and • Analyzing the identified risks to understand their potential impact on the organization.
2 Assessment • The risk assessment process involves evaluating the likelihood of occurrence and the potential severity of consequences.
Risk Mitigation • Develop strategies and action plans to minimize the likelihood and impact of identified risks.
3 and Control • This may involve implementing control measures, process improvements, or risk transfer mechanisms (e.g., insurance).
Risk • Ensuring effective communication of risk-related information to stakeholders at all levels within the organization.
4 Communication • This facilitates informed decision-making and promotes a risk-aware culture.
Monitoring and • Regularly monitoring the effectiveness of risk management strategies and reassessing risks as the business environment changes.
5 Review • The continuous review ensures the plan remains relevant and responsive to emerging risks.
2 Risk Categories • Identify the different categories of risks that the plan will address, such as financial, operational, compliance, reputational, and strategic risks. Each
category may require distinct assessment and mitigation approaches.
Roles and
3 Responsibilities
• Clearly outline the responsibilities of individuals or teams involved in the risk management process.
• This includes risk owners, risk managers, risk analysts, and other stakeholders.
Risk Tolerance
4 and Appetite
• Specify the organization's risk tolerance level, which represents the amount of risk the organization is willing to accept to achieve its objectives.
Understanding risk appetite helps in determining the appropriate risk response strategies.
Reporting and
5 Escalation
• Establish the reporting and escalation mechanisms for communicating risk-related information to senior management or the board of directors.
This ensures that key decision-makers are informed about significant risks.
6 Timeframe • Define the timeframe for the risk management plan. Risk management is an ongoing process, but the plan may be reviewed and updated
periodically based on changing circumstances.
What is compliance?
• Compliance is a mitigation control that reduces or neutralizes threats and vulnerabilities to an acceptable level.
• It’s important that an organization knows what laws apply to them. Once these are identified, it’s important to ensure that the organization is in compliance.
• When assessing the impact of compliance issues in your organization, you should take two distinct steps. First, identify what compliance issues apply to your organization.
Second, assess the impact of these issues on your business operations.
Health Insurance Portability and Accountability Family Educational Rights and Privacy Act
4
(FERPA)
1
Act (HIPAA)
HIPAA applies to any organization that handles health information. FERPA applies to all education institutions and agencies that
Fines can range from $100 per violation to $25,000 per year for receive funding under any program administered by the U.S.
mistakes. Intentional data breaches can lead to fines up to Department of Education. Schools must share student records with
$250,000 and 10 years in prison. students or parents upon request.
2 5
The SOX Act applies to any business that is required to be CIPA applies to any school or library that receives funding from the
registered with the Securities and Exchange Commission. This is U.S. E-Rate program. Schools and libraries must filter offensive
any publicly traded company. CEOs and CFOs must personally content to minors. Non-compliance risks losing E-Rate discounts.
verify data accuracy. Compliance expenses averaged $5.1 million Defining "offensive" content using local standards can be
for Fortune 500 companies in 2004. challenging.
Federal Information Security Management Act Payment Card Industry Data Security Standard
6
(PCI DSS)
3
(FISMA)
FISMA applies to all U.S. federal agencies. If you work in a federal PCI DSS is not a law, but a standard created by credit card
agency, FISMA applies. A core requirement of FISMA is to identify, companies. Any organization that accepts credit card payments
certify as compliant, and authorize for operation all IT systems in over the Internet needs to comply. Compliance requires following
the organization. 12 security requirements, primarily IT-related best practices.
• The PM is responsible for the overall success of the plan. Some of the common tasks of a PM are:
• Ensuring costs are controlled • Ensuring information is available to all stakeholders
• Ensuring quality is maintained • Raising issues and problems as they become known
• Ensuring the project stays on schedule • Ensuring others are aware of their responsibilities and deadlines
• Ensuring the project stays within the scope
• Tracking and managing all project issues
• Responsibilities could be assigned for the following activities to the respective project manager:
• Risk Identification - This includes threats and vulnerabilities. The resulting lists of potential risks can be extensive.
• Risk Assessment - This means identifying the likelihood and impact of each risk. A threat matrix is a common method used to assess risks.
• Risk Mitigation Steps - These are steps that can reduce weaknesses. This can also include steps to reduce the impact of the risk.
• Reporting - Report the documentation created by the plan to management. The PM is often responsible for compiling reports.
• One way to identify the most important countermeasures is by prioritizing the risk elements, which are the threats and vulnerabilities. Risks arise when a threat exploits a
vulnerability.
• If the countermeasures have already been matched with the threat/vulnerability pairs, completing this step becomes easier.
Threat/Vulnerability Matrix
Sample
Threats can negatively affect threat/likelihood LOW IMPACT (10) MEDIUM IMPACT (50) HIGH IMPACT (100)
impact-matrix
confidentiality, integrity, or availability.
The severity of the threat is evaluated by
identifying the likelihood it will affect one High threat likelihood 100 10 x 1 = 10 50 x 1 = 50 100 x 1 = 100
of these. The impact is evaluated by percent (1.0)
determining the extent to which it will
affect confidentiality, integrity, or Medium threat likelihood
10 x 0.5 = 5 50 x 0.5 = 25 100 x 0.5 = 50
availability. 50 percent (.50)
Prioritizing Countermeasures
1 Use the threat/vulnerability matrix to prioritize risks and countermeasures. For example, if an organization was not using any
antivirus software, there is a high likelihood that
systems would become infected. If several
Higher risk scores indicate higher potential losses and should be addressed before systems became infected, the impact would also
2 lower-scoring risks. be high. A high likelihood of 100 percent times a
high impact of 100 gives a score of 100.
Evaluate threats and vulnerabilities based on existing countermeasures in place.
3 However, you may have antivirus software
installed on all your systems. In the past year,
The likelihood and impact of a risk determine its score; high likelihood and high imagine that only one malware incident caused
4 impact result in higher scores. problems after a single user disabled the antivirus
software. The malware tried to spread but was
quickly detected by antivirus software on other
Identify critical risks based on their scores and potential impact on the organization. systems. In this example, there is a low likelihood
6 and a low impact giving a score of one.
The threat scores may not be definitive; human judgment is essential to prioritize
7 based on the organization's needs.
• You can then determine if the control should be used with this formula:
Page 45 Confidential
Incident management
• Risk monitoring is the ongoing process of observing, tracking, and assessing risks to an organization's assets, operations, and objectives.
• It involves systematically reviewing risk factors and indicators to detect changes, trends, or new risks that could impact the organization.
Introduction
After collecting data on the risks and recommendations, you need to include it in a report. You will then present this report to management. The primary purpose of the report is to allow management
to decide on what recommendations to use. There are four major categories of reporting requirements. They are:
• Present recommendations—These are the risk response recommendations.
• Document management response to recommendations—Management can accept, modify, or defer any of the recommendations.
• Document and track implementation of accepted recommendations— This becomes the actual risk response plan.
• Plan of action and milestones (POAM)—The POAM tracks the risk response actions.
Present Recommendation
Compile the collected data into a report. It will include the lists of threats, vulnerabilities, and recommendations. You then present this report to management. Management will use this data to decide
what steps to take.
This report should include the following information:
• Findings
• Recommendation cost and time frame
• Cost-benefit analysis
Findings
The findings list the facts. Remember, losses from risks occur when a threat exposes a vulnerability. Risk management findings need to include threats, vulnerabilities, and potential losses. These are
described as cause, criteria, and effect.
• Cause—The cause is the threat. For example, an attacker may try to launch a DoS attack. In this case, the threat is the attacker. When you list the cause, it’s important to identify the root cause. A
successful attack is dependent on an attacker having access and the system being vulnerable. Risk management attempts to reduce the impact of the cause, or reduce the vulnerabilities.
• Criteria—This identifies the criteria that will allow the threat to succeed. These are the vulnerabilities.
•Effect—The effect is often an outage of some type. For example, the effect on a Web site could be that the Web site is not reachable any more.
An important consideration as you document findings is resource availability. It could be that all the discovered issues were previously known. However, money may not have been allocated to purchase
the solutions in the past. It’s also possible that manpower wasn’t adequate to implement the solutions.
Time Frame
The report will include a list of recommendations. These recommendations will address the Document and Track Implementation
potential causes and criteria that can result in the negative effect. of Accepted Recommendations
Each item should include the cost required to implement it. Also include the timeline to
implement the solution. Management will use this data to decide if the solution should be It’s important to document the decisions made by management. As time passes, the
applied. decisions can become distorted if you don’t document them. This is especially true if the
recommendations are deferred or modified.
• It could be a simple document listing the recommendation and the decision. It could
look similar to this:
Risk Statements • Recommendation to purchase AV software.
• Recommendation to hire an IT administrator.
Reports are often summarized in risk statements. You use risk statements to communicate a • Recommendation to purchase $750 firewall.
risk and the resulting impact. They are often written using “if/then” statements. The “if ” part
of the statement identifies the elements of the risk. The “then” portion of the statement
identifies the effect
Each line item could include the following details: • Identify potential solutions: Assigned to ______ Due by ______
• Task name • Approve risk response plan: Assigned to ______ Due by ______
• Associated threat or vulnerability • Scheduled start date
• Begin implementation of plan: Assigned to ______ Due by ______
• Risk level (low, medium, or high) • Actual start date
• Milestone due date • Complete implantation of plan: Assigned to ______ Due by ______
• Step or milestone name
• Assignment of responsibility • Current status Later, when management approves the specific recommendations, you
• Scheduled completion date can create a POAM for the approved and modified recommendations. Each
• Point of contact recommendation within the POAM could have multiple line items. For
• Estimated cost • Actual date of completion example, the task to upgrade the firewall could be the major milestone.
• Comments When all of the tasks are completed, the milestone is met.
• Actual cost
• Estimated person hours to complete task • Actual person hours to complete task • Log current firewall activity: Assigned to ______ Due by ______
• Purchase two SS75 firewalls: Assigned to ______ Due by ______
• Create firewall policy: Assigned to ______ Due by ______
• Test firewalls: Assigned to ______ Due by ______
1 fdsf
What is the primary
purpose of defining the
A) To assign responsibilities to team members C) To establish the goals and boundaries of risk
management activities
objectives and scope of a
risk management plan? B) To identify legal and compliance issues D) To prioritize risk elements based on their severity
5 fdsf
What does incident
management involve in the
A) Assigning responsibilities for risk monitoring C) Developing protocols for detecting, responding to,
and recovering from incidents
context of risk management
planning? B) Prioritizing risk elements for immediate action D) Performing cost benefit analysis after incidents occur
Answers
1. C 2. A 3. B 4. A 5. C
August 2024
1. Introduction, Objective &
Scope to Business Impact
Analysis
2. Steps of Business Impact
Analysis Process
3. BIA approach
► Maximum Acceptable Outage (MAO): ► Risk Identification and Prioritization: BIA helps organizations identify potential risks and
Maximum Acceptable outage is the maximum amount of time a system or service can be down vulnerabilities that could disrupt critical business operations.
before affecting the mission. The MAO is sometimes referred to as maximum tolerable outage ► Resource Allocation: BIA provides data that enables organizations to allocate resources
(MTO) or maximum tolerable period of disruption (MTPOD) strategically.
► Customer Service Delivery Document: ► Cost Management: By understanding the potential financial impact of disruptions,
A service level agreement (SLA) is a document that identifies an expected level of performance. It organizations can develop cost-effective recovery plans.
identifies the minimum uptime or the maximum downtime. Organizations use SLAs as a contract
between a service provider and a customer.
► Reduced Downtime: With a comprehensive BIA, organizations can establish Recovery Time
Objectives (RTOs) and Recovery Point Objectives (RPOs) for critical processes.
► Critical Business Functions (CBFs):
► Compliance and Regulatory Requirements: Identify gaps in the existing compliance
Any functions considered vital to an organization. If a CBF fails, the organization will lose the ability agreements (whether regulatory like HIPAA, GDPR).
to perform essential operations. For example: sell products / services to the customer which in turn
will lead to loss of revenue. ► Reputation Management: BIA exercises helps organisation identify the various critical risk
from IT & Non-IT perspective and acts as an early indicator warning.
► Critical Success Factors (CSFs):
► Other elements include Operational Resilience, Stakeholder Confidence, Decision Support etc.
Any element necessary to perform the mission of an organization. An organization will have a few which brings in more confidence in the customer / client. Ensure that clear decisions are made
elements that must succeed in order for the organization to succeed. Example: Reliable Network regarding any investment in technical aspects and also as a long-term vision of the
Infrastructure. organisation.
Page 55 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Objective
The overall objective of the BIA is to identify the impact of outages. More specifically, the goal is to identify the critical functions that can affect the
organization. After identifying these, you can identify the critical resources that support these functions.
01 02 03 04
Identify Critical Lorem Ipsum Critical
Identify is Lorem IpsumIdentify
is MAO and Identify Recovery
Business Functions simply dummy
Resources simply dummy
Impact Requirements
Determine which business text The critical resources are those
text The MAO helps you determine The recovery requirements show
processes are essential for the that are required to support the which CBFs you need to recover the time frame in which systems
organization's survival and CBFs and restart as soon as possible must be recoverable.
success. after a disaster They also identify the data that
must be recovered.
CBF- Critical Business Function MAO- Maximum Acceptable Outage CSF- Critical Success Factor
Page 56 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Scope
Defining the early scope of a Business Impact Analysis (BIA) is crucial for maintaining focus. The scope depends on the organization's size; smaller ones may
encompass everything, while larger ones might target specific areas. A clear scope statement prevents misinterpretation and ensures the BIA accurately
identifies vital functions for continuity. The following points can help us understand and analyse the scope of BIA:
Page 57 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Process Steps
01 Identify Stakeholders
Stakeholders are those individuals or groups that have a direct stake or interest in the success of a
02
project. A stakeholder can help ensure that you have adequate resources available. This includes simple
matters, such as ensuring personnel are available for interviews for the BIA.
04
Identify Critical Resources
Determine the resources (internal and external) needed to support important business functions.
Personnel, technology, data, buildings, equipment, suppliers, and other dependencies are examples of
resources.
Page 58 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Process Steps
05
Identify Recovery Priorities
06 Prioritize recovery efforts based on the criticality of business functions, resources, and RTOs.
This step aids in the optimal allocation of resources and the concentration of recovery efforts on the most crucial
components.
Page 59 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
BIA approach
Conducted discussions with the Identify Analyzed result of BIA to identify the
identified stakeholders to understand Identified / validated the systems /
crown jewels
Crown Jewels
Discussion applications
Applications/
the activities and processes for each
Systems
business sub-function
Page 60 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
BIA risk framework – impact parameters and scales
The risk framework considers impacts on the following parameters in case The impact scales are defined quantitatively and qualitatively depending on
of loss of CIAP. the impact parameter
Operational
• Loss of management control 1 2 3 4 5
• Costs related to productivity decline Very low Low Medium High Very high
• Loss of assets
• Recovery costs
Strategy • Financial Fraud No loss / Minor loss / Moderate Significant Complete loss /
• Loss of innovation 1 •
•
Decrease of data quality (inconsistency)
Bypass internal automated controls
impact impact loss / impact loss / impact impact
Qualitative
capabilities
• Impact on strategic
growth areas
No manual Limited manual Manual Manual All data is
processing of processing of processing of processing of manually
Reputational / compliance data non-crucial non-crucial crucial data processed
data data
5 • Loss of confidence by suppliers,
stakeholders (e.g. compliance
Quantitative
N/A 8 hours 24 hours 3 days 1 week
• Loss of staff morale
• Total Incidents
Customer No loss 1 staff with light 2-5 staff with 1 staff with More than 1
4 injuries light injuries significant staff with
3 • Delay of service delivery or decreased
service quality
injuries or
more than 5
significant
injuries or 1
• Loss of sales, orders or contracts (revenue) staff with death
light injuries
Page 61 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Definitions: BIA Areas
Whether the data is disclosed to Whether the data is Whether the data is Whether the dataset
unauthorized parties like: maintained: unavailable for: includes:
• Organisations employee - Same
department • Locally • 20 minutes • Personal data
• Organisations employee - • Centrally • 2 hours • Sensitive personal data
Outside department • 8 hours
Impact Criteria • 3rd party (i.e.. Customer / • 1 day
Supplier) • 1 week
• Competition
• Public
Page 62 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Risk Score Matrix
Page 63 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Business Continuity Plan (BCP)
Page 64 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Disaster Recovery Plan
► A “Disaster Recovery Plan (DRP)” is a plan to restore a critical business process or system to operation after a disaster.
► It is used to respond to a wide range of disasters as per business environment.
Page 65 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Elements of BCP
The purpose of the BCP is to ensure that mission-critical elements Notification/Activation Phase is the point when the disruption has
1 of an organization continue to operate after a disruption. 6 occurred or is imminent.
Just as with any project, you need to define the scope of the BCP. During the recovery phase, the Technical Recovery Team's
The success of the project is dependent on personnel 2 objectives encompass restoring temporary operations to critical 7
understanding the tasks. systems, and repairing damage to the original systems.
Every BCP needs to include some basic assumptions and planning Every BCP needs to include some basic assumptions and planning
3 principles. These are very helpful in the initial development of the 8 principles. These are very helpful in the initial development of the
BCP. They are also useful in the implementation phases. BCP. They are also useful in the implementation phases.
The BCP identifies critical business functions that need to remain Ensure personnel are trained comprehensively on the BCP to
operational during the disruption. Each of these CBFs has 4 impart detailed knowledge; while testing and exercises validate 9
individual systems that support it. the plan's functionality and practical application.
When you assign responsibilities, this makes things clear to all "Plan Maintenance" involves regularly updating and refining the
5 concerned. When tasking is not completed or behind schedule, it 10 Business Continuity Plan (BCP) to ensure its effectiveness over
is easier to get it back on track. time.
Page 66 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Elements of DRP
4 9
Several communications elements Specific recovery procedures are
are important to the success of a identified for all the servers and
DRP i.e Users, customers services in the DRP.
Activities
Page 67 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Benefits of BCP
Many industries have regulatory requirements for business continuity BCP provides a structured framework for decision-making during crises.
planning. Having a BCP in place ensures compliance and helps avoid legal With predefined roles, responsibilities, and procedures, leadership can
and regulatory issues. make informed decisions more efficiently.
Page 68 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Benefits of DRP
Page 69 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Best Practices for BCP
Page 70 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Best Practices for DRP
Developing and maintaining an effective Disaster Recovery Plan (DRP) is crucial for ensuring the continuity of critical business operations in the event
of disasters, disruptions, or unforeseen incidents. Here are some best practices for creating and implementing a DRP:
Page 71 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Overview of ISO 22301
Page 72 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Elements of ISO 22301
In ISO 22301, the key elements related to business continuity management are organized into different clauses and sections of
the standard. Here are the primary areas addressed by ISO 22301
Scope, Normative References, and Terms and Definitions: These sections introduceS the standard, define key terms, and set the scope of the Business
Continuity Management System (BCMS).
Page 73 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Criteria for ISO 22301 Certification
3 8
Create comprehensive Business
Training and Awareness
Continuity Plans (BCPs) and Disaster
Provide training and awareness programs to
employees and relevant stakeholders.
Recovery Plans (DRPs), and regularly test
them.
Page 74 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
NIST 800 - 53
Page 75 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
ISO 27001
Page 76 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Quiz
1 What is the scope of a Business Impact 2 Which approach is commonly used in 3 What does the Business Continuity Plan
Analysis (BIA)? Business Impact Analysis (BIA) to assess (BCP) primarily focus on?
A) Analyzing potential risks to IT infrastructure the impact of disruptions? A) Short-term incident response
B) Assessing the impact of business disruptions on A) Quantitative analysis B) Long-term business growth strategies
operations B) Operational assessment C) Maintaining critical business operations during
C) Evaluating customer satisfaction metrics C) Strategic alignment and after disruptions
D) Defining legal compliance requirements D) Customer satisfaction survey D) IT system development and implementation
4 Which international standard is commonly 5 What is the purpose of a Disaster 6 What is a key component of a Disaster
referenced for Business Continuity Recovery Plan (DRP)? Recovery Plan (DRP) related to IT systems?
Management Systems (BCMS)? A) To identify and mitigate business risks A) Employee training protocols
A) ISO 9001 B) To maintain critical IT systems and B) Marketing and promotional campaigns
B) ISO 27701 infrastructure C) Customer communication strategies
C) ISO 22301 C) To improve customer service standards D) Data backup and restoration procedures
D) ISO 27001 D) To enhance employee training programs
Answers:
7 What is the primary objective of 8 What are the benefits of having a Business
1. B 6. D
Business Impact Analysis (BIA)? Continuity Plan (BCP)?
A) To identify business continuity risks A) Improved employee morale and productivity 2. A 7. C
B) To assess the financial impact of a disaster B) Increased market share and profitability 3. C 8. D
C) To prioritize critical business functions C) Enhanced customer satisfaction and loyalty
D) Minimized financial loss and operational 4. C
D) To develop IT recovery strategies
downtime 5. B
Page 77 Business Impact Analysis (BIA), Business Continuity Plan (BCP) & Disaster Recovery Confidential
Plan (DRP)
Thank you!
Risk Management
Frameworks
October 2024
1. Relevant NIST Frameworks
2. Securities and Exchange Commission (SEC)
Cyber Security Rule
Set of guidelines published by NIST for mitigating organizational cybersecurity risks based on existing
NIST
1 standards, guidelines, and practices
CSF
v1.1 Provides guidance to organizations to better understand, manage, reduce, and communicate cybersecurity
2 risks, in turn guiding the organizations to improve their cybersecurity posture
Assets, Information, Data, Intellectual Partial - Cyber Security Program is Capture the present state and maturity level of the organization
Protect (PR) Tier 1 Ad hoc.
Property Rights, etc. cybersecurity program.
Anomalies, Events, patterns, unauthorised Risk-Informed - Cybersecurity roles are Captures the target or to-be state that the organisation desires to
Detect (DE) Tier 2
actions etc. beginning to be defined achieve.
Incident Response strategy, Test response Repeatable - Cybersecurity program is Assist in conducting an in-depth comparison between the
Respond (RS) Tier 3
plan, Legal reporting, etc. defined in approved policies. current and target state.
Adaptive - Robust cybersecurity program is Identify the gaps in their cybersecurity practices and develop a
Recover(RE) Recovery Planning, Communication with Tier 4 implemented, and the organization desires to roadmap for improvement and prioritize their efforts to enhance
stakeholders, restoration techniques, etc.
achieve readiness for emerging threats their cybersecurity posture.
Once the system is authorized, ongoing Monitor Categorize Organizations select security controls
monitoring and continuous assessment are based on the system's categorization and
crucial. the organization's specific requirements.
Prepare
Authorize Select
Based on the assessment results, the
authorizing official (AO) makes a Organizations need to ensure that the
determination about whether to authorize controls are effectively integrated into the
the system to operate. system's design and operations.
Assess Implement
• It's critical to take note of that the NIST RMF can be custom-made to suit the particular requirements and setting of an association. The degree of
thoroughness applied to each step can fluctuate in view of variables like the awareness of the information, the association's gamble resilience, and its
administrative prerequisites.
Form 8-K Item 1.05 —material Registrants must disclose any cybersecurity incident they experience that is determined to be material, and describe the material
cybersecurity incidents aspects of its:
The following is a • Nature, scope and timing
summary of the • Impact or reasonably likely impact on the registrant, including its financial condition and results of operations
An Item 1.05 Form 8-K must be filed within four business days of determining an incident was material. A registrant may delay filing as
finalized described below, if the United States Attorney General (Attorney General) determines immediate disclosure would pose a substantial
risk to national security or public safety.
cybersecurity Registrants must amend a prior Item 1.05 Form 8-K to disclose any information called for in Item 1.05(a) that was not determined or
was unavailable at the time of the initial Form 8-K filing.
disclosure
requirements Form 20-F Foreign private issuers (FPIs) must:
• Describe the processes, if any, for the assessment, identification and management of material risks from cybersecurity threats, and
describe whether any risks from cybersecurity threats have materially affected or are reasonably likely to materially affect their business
strategy, results of operations or financial condition.
• Describe the board’s oversight of risks from cybersecurity threats.
• Describe management’s role in assessing and managing material risks from cybersecurity threats.
Form 6-K FPIs must furnish information on material cybersecurity incidents promptly on Form 6-K if the information is (1) distributed to
stockholders or to a national exchange (if the information is made public by that exchange) or (2) required to be made public under the
registrant’s domestic laws.
Clauses
This International Standard applies the “Plan-Do-Check-Act” (PDCA) model to planning, establishing,
implementing, operating, monitoring, reviewing, maintaining and continually improving the effectiveness of
an organization’s BCMS. The following figure illustrates a mapping between clauses requirements and the 04 Context of the Organization
PDCA approach:
05 Leadership
06 Planning
M an iew
i sh
ai d
bl )
nt
Interested Interested
ai
Re ct 0 a
st an
n
v ) E l
(P use 7
s
(A se 1
Cl
Parties
au
a
Cl ,5,6
, Parties
PDCA model
4
07 Support
applied to
BCMS
processes
08 Operation
r& Im
ito w pl
on ie ) e
M Rev eck 9 t & me
09
Op
Requirements
h e
( C a us (
er n Managed Performance Evaluation
Cl Cl Do ate
au )
for BC se
8
BC
10 Improvement
ISO 27001:2022 is a framework designed to establish, implement, maintain and continually improve information security management system (ISMS). It
addresses requirements for the assessment and treatment of information security risks tailored to the needs of the organization and preserves the
confidentiality, integrity and availability of information by applying a risk management process .
Physical Controls
Technology Controls
► Physical security
► Privileged access rights
perimeters Migrating ensures compliance with
► Data masking the latest security protocols,
► Securing offices, rooms and
demonstrating a commitment to
14 facilities 34 ► Secure system architecture
protecting sensitive information The updated standard provides a
► Equipment maintenance and engineering principles more comprehensive and advanced
and maintaining industry
► Management of technical standards. approach to security, which
► Secure disposal or re-use minimizes the risk of data breaches
vulnerabilities
of equipment and cyber-attacks.
• 1 Split Control A.7.4 Physical security monitoring Premises needs to be continuously monitored for unauthorised physical access.
A.8.9 Configuration management Configuration of all the hardware, software, network and services needs to be documented.
A.8.11 Data masking Data masking techniques should be implemented to mask the PII or sensitive PII data.
Web filtering tools needs to be installed and network logs and incident logs to be documented
A.8.23 Web filtering which were raised due to accessing malicious websites.
Operational Security
Capabilities Domains Secure coding standards and guidelines to be documented and communicated to the
A.8.28 Secure coding developers and periodic review to be performed to code to identify and address vulnerabilities.
An ISO 27001 audit involves reviewing the ISMS and testing whether it meets the requirements of the standard. The standard requires that an
organisation is required to plan and conduct a internal audit in order to be compliant to the standard. If an organisation wants to achieve certification,
external audit is required to be carried out by a certification body
What is involved in Internal Audit? The processes for external audit is Types and stages of external audit
essentially the same as for the ► Stage 1 audit – “Documentation Review” to
internal audit but usually carried out establish that the organisation has the required
1 for the purpose of achieving and documentation for an operational ISMS.
maintaining certification. ► Stage 2 audit – “Certification Audit” – an
2 evidential audit to confirm that the
Documentation Evidential organisation is operating the ISMS in
The relevant auditor will provide a
Review Audit accordance with the standard. This evidential
plan of the audit and once this is
audit is conducted on a sampling basis.
confirmed by the organisation, ► Surveillance audit – Also known as “Periodic
resources will be allocated and dates, Audits”, these are carried out on a scheduled
Steps times and locations agreed. The audit basis in between certification and
5 will then be conducted following the recertification audits and will focus on one or
Management Analysis audit plan. more areas of the ISMS.
Review ► Recertification audit – Carried out before the
certification period expires and is a more
3 thorough review than those carried out during
Audit report a surveillance audit. It covers all areas of the
standard.
ISO/IEC 27701:2019 provides guidance for establishing, implementing, maintaining and continually improving - a PIMS (privacy information
management system) based on the requirements, control objectives and controls in the information security management standard ISO/IEC
27001:2013, and extended by a set of privacy-specific requirements, control objectives and controls.
ISO 31000:2018 is an international standard for risk management that provides a framework and set of principles for
organizations to establish and implement effective risk management.
Risk
Risk evaluation
evaluation
Risk Treatment
The following details provides high level overview of the steps for achieving FedRamp authorization
1 2 3 4 5
Answers
1. A 2. B 3. A 4. C 5. D
July 2023
1. Cyber Risk vs Cyber Resilience
2. Impact of Emerging Technologies on Cyber Risk
and Resilience
3. Challenges in Cyber Risk Management and
Contents Resilience
4. Future Trends and Opportunities
5. Risk-Informed Decision Making
6. Resilience-Informed Decision Making
7. Quiz
Differentiating between cyber risk and cyber resilience ensures a balanced approach to cybersecurity, encompassing
prevention, mitigation, response, and recovery strategies.
Minimizing the likelihood of successful attacks Minimizing the likelihood of an impact from an incident
Cyber risk management activities are often preventive and Cyber resilience efforts are responsive and ongoing, with
ongoing, with regular assessments and adjustments to continuous monitoring and adjustment to recovery and
security measures. continuity plans
Cyber risk management is typically proactive and ongoing, Cyber resilience often involves a more reactive and adaptive
focusing on identifying and mitigating risks before they approach, aiming to minimize downtime and disruptions
materialize. during and after incidents.
Present Recommendation
► IoT devices, operating on diverse platforms and protocols, complicate secure integration into existing cybersecurity frameworks.
► Security vulnerabilities like default credentials and insufficient encryption in IoT devices pose significant risks to organizational data and systems.
► Effective management and regular updates are crucial to mitigate these vulnerabilities and enhance the security posture of IoT deployments within organizations.
Example
► The Mirai botnet exploited vulnerabilities in IoT devices, leveraging default credentials to orchestrate large-scale DDoS attacks in 2016, causing significant disruptions to major
internet services.
► This incident underscores the critical importance of implementing robust security measures for IoT devices to prevent exploitation and mitigate potential risks effectively.
► Organizations must adopt proactive risk management strategies to identify and address vulnerabilities in IoT devices before they can be exploited by malicious actors.
► Enhancing cybersecurity measures for IoT devices involves regular updates, strong authentication practices, and continuous monitoring to safeguard against similar threats in
the future.
Enhancing Cybersecurity
► AI technologies like machine learning and predictive analytics bolster cybersecurity defenses by automating the detection and response to threats.
► These AI-powered systems excel in real-time analysis of extensive data sets, enabling quicker identification of anomalies and potential threats compared to conventional methods.
► Leveraging AI for cybersecurity enhances the ability to proactively detect and mitigate emerging threats before they escalate.
► Implementing AI-driven solutions requires continuous refinement and integration with existing security frameworks to maximize effectiveness and adaptability in combating
evolving cyber threats.
Risks of AI in Cyberattacks
► Cybercriminals are leveraging AI for sophisticated attacks, including AI-generated phishing emails and adaptive malware designed to evade detection.
► The integration of AI in cyberattacks presents significant challenges to traditional cybersecurity approaches, necessitating adaptive and proactive defense strategies.
► Defending against AI-driven cyber threats requires continuous monitoring, advanced AI-powered detection tools, and adaptive security protocols to effectively mitigate evolving
risks.
Example
► Deep learning techniques used in AI-driven malware can replicate human behavior, enabling them to evade detection and carry out precise, targeted attacks.
► Recognizing the capabilities of AI-driven threats is essential for devising robust cybersecurity strategies that effectively mitigate risks.
► Developing resilient cybersecurity strategies involves integrating AI-powered detection and response mechanisms to counter sophisticated AI-driven threats.
► Continuous education and adaptation of defense strategies are critical in staying ahead of evolving AI-driven malware tactics and maintaining robust cybersecurity posture.
Trend
The adoption of AI and machine learning for automated threat detection, analysis, and response is rapidly
growing.
Increased
Automation in Opportunity
Automated systems can detect and respond to cyber threats in real-time, improving incident response
Cybersecurity times and reducing manual intervention.
Defenses
Benefit
Organizations can benefit from enhanced accuracy and efficiency in identifying and mitigating cyber
threats, thereby strengthening overall cybersecurity posture.
Trend
Blockchain's decentralized and immutable ledger is increasingly being explored for enhancing
cybersecurity in transactions and data management.
Blockchain
Opportunity Technology for
Blockchain ensures the integrity and transparency of transactions by eliminating the need for
intermediaries and providing cryptographic security.
Secure
Transactions
Benefit
Applications extend beyond financial transactions to supply chain management, identity verification, and
secure data sharing, offering new avenues for bolstering cyber resilience.
Trend
Continuous advancements in threat intelligence platforms and analytics capabilities are improving
organizations' ability to proactively detect and mitigate cyber threats.
Advancements
in Threat Opportunity
Enhanced threat visibility and predictive capabilities enable organizations to anticipate and mitigate
Intelligence and emerging threats before they escalate.
Analytics
Benefit
Investment in advanced analytics tools and threat intelligence platforms empowers organizations to stay
ahead of evolving cyber threats and strengthen their cybersecurity defenses.
Trend
The integration of cybersecurity considerations into digital transformation initiatives is becoming a
strategic imperative for organizations.
Integration of
Opportunity Cybersecurity
By embedding cybersecurity into digital initiatives from the outset, organizations can ensure that security into Digital
measures are aligned with business objectives and regulatory requirements. Transformation
Benefit Strategies
Proactively addressing cybersecurity in digital transformation strategies enhances resilience, reduces risk,
and supports sustainable growth in an increasingly digital economy.
Risk-informed decision making is a structured approach that evaluates options based on associated risks, including insights from probabilistic risk
assessment, alongside other factors. It prioritizes safety and risk considerations, promoting awareness and comprehensive decision-making. Benefits
include uncovering unexpected issues, enabling clear conversations, aiding decision-makers, offering a holistic view, and providing fresh perspectives.
Methods
Conduct a risk assessment This involves analyzing the potential risks associated with different options or alternatives. A thorough risk assessment
helps to identify and prioritize risks, and provides a basis for decision making
Research and develop Based on the results of the risk assessment, research and develop recommendations for mitigating the identified risks. For
recommendations each risk, define what addressing it will cost in terms of time, effort, and money
At the end of the discussion with stakeholders, create action items and add agreed-upon recommendations to your annual
Develop an annual strategic plan strategic plan
Communicate risks and their Communicate the risks and their implications to stakeholders and decision makers. This helps to ensure that everyone
implications involved in the decision-making process is aware of the risks and can make informed decisions
Implement risk mitigation Implement measures to reduce or mitigate the identified risks. This may involve investing in new technology, improving
measures processes, or changing organizational culture.
Consider risks alongside other When making decisions, consider the risks alongside other factors such as cost, benefits, and stakeholder perspectives. This
factors helps to ensure that decisions are made with an awareness of the risks associated with each option
Resilience informed decision making is an approach to decision-making that takes into account the ability of a system to withstand and recover from
disruptions and stresses. It is particularly important in the early design stages, where informed decisions must be made to ensure that the developed
system will be resilient. Resilience informed decision-making can be enabled through gamification techniques, resilience assessments, and application
to critical infrastructure networks.
Methods
Develop modelling and design One approach to resilience informed decision making is to develop modelling and design frameworks that enable the
frameworks consideration of features such as system reconfiguration and functional redundancy.
Another approach is to use gamification techniques to integrate decision-making theory with serious gaming, which can help
Use gamification enable resilient informed decision making.
Conduct experimental Conducting experimental investigations can help to understand how people make decisions in the context of repeated
investigations disruptive events, which can inform resilience decision making
Resilience-informed decision making can be applied to critical infrastructure networks to manage inter-dependencies
Critical infrastructure networks and ensure resilience.
Create trauma-informed Trauma and resilience informed tips can be used to create environments that are sensitive to the needs of individuals
environments who have experienced trauma, which can help to promote resilience
1 fdsf
What is the primary focus of
cyber resilience compared
A) Preventing cyber attacks C) Assessing vulnerabilities
B) Recovering from cyber incidents D) Monitoring network traffic
to cyber risk?
3 What is a significant
challenge in cyber risk A) Lack of cybersecurity regulations C) Complexity and rapid evolution of cyber threats
management and B) Slow adoption of emerging technologies D) Excessive budget allocation for cybersecurity
resilience?
5 fdsf
How does resilience-
informed decision making A) It focuses on preventing cyber incidents C) It does not consider potential risks
differ from risk-informed B) It involves reactive measures after incidents occur D) It aims to recover quickly from cyber incidents
decision making?
Answers
1. B 2. B 3. C 4. A 5. D
July 2024
1. Understanding Data Governance
2. Benefits and Challenges of Data
Governance
Contents
Contents 3. Relationship between risk management
and data governance
4. Understanding DAMA Data Governance
5. Understanding ISO 8000
6. Quiz
Data Governance
Data Governance
Introduction
Background Requirement
Data governance is the collection of processes, policies, roles, metrics, and Data governance plays an essential role in regulatory compliance, ensuring that
standards that ensures an effective and efficient use of information. This also helps organizations are consistently compliant with all levels of regulatory
establish data management processes that keep your data secured, private, requirements. This is key for minimizing risks and reducing operational costs.
accurate, and usable throughout the data life cycle.
At its core, data governance leads to improved data quality, decreased data
A robust data governance strategy is crucial for any organization that uses data to management costs, and increased access to data for all stakeholders. The result
drive business growth, make improved decision-making, and ensure successful is better decision making and better business outcomes.
outcomes in a competitive market.
1 2 3
A big part of data governance is building a Though the rewards are great, creating a data The future of Data Governance is one in which
program that breaks down data silos through a governance solution may feel difficult. Some of governance practices, roles, and
collaborative process with stakeholders from those challenges include company wide acceptance, responsibilities are organized around attaining
disconnected business units. It offers many poor data management, standardization and many business objectives. It is a future in which the
benefits including improved data quality, more. We will dive deeper into the details of various aspects of governance (stewardship,
compliance, data management etc. challenges of data governance in the further slides. governance councils, metadata) are mastered
and benefits are determined by business value.
Data Governance
Data Governance: Strengthening Confidence in Data
Goal of Data Governance
The primary goal of data governance is to build trust in data, emphasizing stakeholders' confidence in how data Discoverability Security
is collected, analysed, published, and used. To ensure this trust, a data governance strategy must focus on
three crucial aspects: discoverability, security, and accountability.
Metadata Data Privacy
Management
Discoverability involves making technical metadata, lineage information, and a
business glossary readily available. Business-critical data must be correct and
Data Quality Data Security
complete. Master data management ensures precise classification, offering protection
Discoverability against inadvertent or malicious changes or leakage. This is explained further in
Session 2. Master data
Management
Depending on the business domain and dataset, regulatory compliance, sensitive data
management (such as personally identifiable information), and prevention of data Classification and access control
security breaches are vital. Security measures are tailored to the specific needs and
Security
risks associated with the data.
Accountability
Once discoverability and security are established, accountability is then crucial,
requiring an operating model that defines ownership and accountability boundaries Data – based
Accountability within data domains. This ensures clear responsibility for data integrity and usage governance
throughout its lifecycle.
Data Governance
Data Governance: Aspects
1 2 3 4 5
6 7 8 9 10
Data Governance
Data Governance: Benefits
Data Governance
Data Governance: Challenges
⮚ Getting buy-in and participation from ⮚ Implementing robust data governance requires
stakeholders across the organization can be dedicated resources, including personnel, tools,
Cultural challenging. Resource and technology.
Resistance Constraints
⮚ Resistance to change or lack of awareness about ⮚ Limited budgets or inadequate resources can
the importance of data governance may hinder hinder the establishment of comprehensive
its successful implementation. governance frameworks.
⮚ Ensuring data quality and integrity across ⮚ Data stored in isolated silos across departments
different systems and processes is a significant or systems can impede cohesive governance
Data Quality challenge. Data Silos & efforts.
& Integrity Fragmentation
⮚ Inconsistent data quality standards, data ⮚ Integrating and unifying these disparate data
duplication, and errors can undermine the sources is essential for effective governance but
effectiveness of data governance efforts. can be challenging.
Data Governance
Relationship between Data Governance and Risk Management
Data Governance
DAMA Data Governance
• DAMA is applicable across industries (finance, healthcare, retail, and other sectors) for
effective data management. Data
Metadata
• It guides organizations in implementing comprehensive data management practices by Modelling &
Management
providing a structured approach to managing data throughout its lifecycle. Design
DAMA Principles:
Data
DAMA
• Alignment with Business Objectives: Integrates data management with organizational goals
Warehousing Data storage
and strategies. Ensures data initiatives support business growth and innovation.
& BI
• Compliance and Risk Management: Ensures compliance with data regulations (e.g., GDPR,
HIPAA). Manages data-related risks and ensures data protection.
Data Governance
Relationship between Data Governance and Data Quality
Data Governance
ISO 8000: A New International Standard for Data Quality
Data Governance
ISO 8000: Parts
⮚ Data Standards are an essential part of Data Governance as they
provide a uniform and standard framework that can be used across
systems, databases and even organizations to help govern how data is
managed, used, represented, defined, formatted, structured and
transmitted.
⮚ They are crucial for an organization that wants to maintain a high level
of data quality for decision making.
Data Governance
Quiz
1 fdsf
What are common
challenges in implementing
A) Data integration and metadata management C) Data analysis and performance indicators alignment
Data Governance? B) Role definition and organizational resistance D) Data security and compliance audits
4 How does ISO 8000 relate A) It defines standards for data quality management. C) It regulates data storage practices.
to Data Governance? B) It specifies guidelines for data encryption. D) It outlines data integration strategies.
5 fdsf
What role does compliance A) It ensures alignment with industry best practices. C) It defines security measures for data protection.
play in Data Governance? B) It focuses on data encryption and access control. D) It ensures adherence to regulatory requirements.
Answers
1. B 2. B 3. C 4. A 5. D
Data Governance
Thankyou!
Dimensions of Risk Management
(Data Privacy and Security)
July 2024
1. Understanding Data Privacy
2. Understanding Data Security
3. Benefits and Challenges of Data Privacy
Contents
Contents & Security
4. Risk Management vs data privacy vs data
security
5. Understanding India’s DPDP Act
6. Quiz
Background Requirement
Data privacy refers to the policies, procedures, and controls put in place to protect Effective data privacy practices are essential to safeguard individuals' rights and
personal information from unauthorized access, use, and disclosure. It ensures that foster trust with stakeholders and customers. Organizations must implement
individuals have control over how their personal data is collected, stored, and robust policies and procedures to ensure compliance with data privacy
shared. regulations such as GDPR (General Data Protection Regulation) and CCPA
Data privacy is fundamental to maintaining trust with stakeholders and customers, (California Consumer Privacy Act).
as it safeguards sensitive information such as personally identifiable information These regulations mandate transparent data handling practices, including
(PII), health records, and financial data. Compliance with data privacy regulations, informed consent for data collection, clear disclosures on data usage, and the
like GDPR and CCPA, is critical to avoid legal ramifications and maintain ethical right to access and rectify personal information. By prioritizing data privacy,
standards in data handling. organizations not only mitigate the risk of legal penalties and regulatory fines
but also enhance customer confidence and loyalty.
1 2 3
By prioritizing data privacy, organizations ensure Implementing effective data privacy measures faces In the future, data privacy will evolve towards
that personal data, such as names, financial challenges such as gaining company-wide aligning practices, roles & responsibilities with
details, etc. is protected from unauthorized acceptance of policies, addressing poor data achieving business goals. The success of data
access, or use. This commitment is crucial for management practices, and navigating diverse privacy initiatives will be measured by their
maintaining trust with stakeholders and regulatory requirements. Standardizing privacy ability to deliver tangible business value,
customers, as it shows respect for individuals' practices and staying abreast of evolving laws and ensuring compliance with regulations while
privacy rights and regulatory compliance. technologies are also critical hurdles. fostering trust with stakeholders and
enhancing organizational reputation.
Objective
• Ensure the protection of personal information from unauthorized access, use, or disclosure.
• Uphold individuals' rights to control how their data is collected, processed, and shared.
Crucial Aspects
Background Requirement
Data security encompasses the protective measures and strategies employed to Robust data security measures are critical to protect sensitive information from
safeguard data integrity, confidentiality, and availability against unauthorized evolving cyber threats and unauthorized access. Organizations must adopt
access, cyberattacks, and other threats. comprehensive strategies that encompass encryption, access controls, multi-
factor authentication, and intrusion detection systems to safeguard data
Data security is paramount in preventing unauthorized access, data breaches, and integrity, confidentiality, and availability. Compliance with industry-specific
cyber threats that could compromise sensitive information. It involves regulations such as PCI DSS (Payment Card Industry Data Security Standard) and
implementing encryption, access controls, authentication mechanisms, and HIPAA (Health Insurance Portability and Accountability Act) is paramount to
cybersecurity protocols to ensure data remains protected throughout its lifecycle. ensure the secure handling of financial data and protected health information.
By investing in robust data security frameworks, organizations can mitigate the
risk of data breaches, financial losses, and operational disruptions.
1 2 3
Key components of data security include Ensuring robust data security encounters challenges The effectiveness of data security measures
encryption, strong access controls, multi-factor like fostering organization-wide commitment to will be gauged by their capacity to mitigate
authentication, regular security audits, and security protocols, mitigating vulnerabilities from evolving cyber threats, ensure regulatory
incident response protocols. By prioritizing data poor security practices, and navigating diverse compliance, and uphold stakeholder trust.
security, organizations can mitigate risks regulatory requirements. Standardizing security Ultimately, the future of data security will
associated with cyberattacks, data theft, and measures and keeping pace with evolving threats prioritize business resilience and continuity in
operational disruptions. and technologies are also critical challenges. an increasingly interconnected and digital
world.
Objective
• Protect organizational data assets from unauthorized access, breaches, and cyber threats.
• Ensure the confidentiality, integrity, and availability of data across its lifecycle.
Crucial Aspects
1 2 3 4 5
Data Security
1 2 3 4 5
Monitoring and
Confidentiality Integrity Authentication Encryption Auditing
Ensuring that data is Maintaining the accuracy and Verifying the identity of users Protecting data by converting Continuously monitoring data
accessible only to authorized consistency of data and systems accessing data it into a form that cannot be access and usage, and assessing
individuals or systems throughout its lifecycle helps prevent unauthorized easily understood without compliance with security
prevents unauthorized access ensures that data is reliable access and ensures data authorization ensures that policies and regulations, helps
and protects sensitive and trustworthy. confidentiality. even if data is intercepted, it detect and respond to security
information. remains secure. incidents promptly.
The relationship between data privacy and data security is crucial in safeguarding sensitive information and maintaining trust with stakeholders. Here’s
how they are interconnected
1
Protection Goals: Both data privacy and data security aim to protect data, but they focus on different aspects. Data privacy focuses on protecting the
privacy rights of individuals, ensuring that personal data is collected, processed, and used in accordance with legal requirements and individual’s
expectations. Data security, on the other hand, focuses on protecting data from unauthorized access, breaches, and cyber threats, ensuring its
confidentiality, integrity, and availability.
2
Implementation Measures: Data privacy and data security are implemented through complementary measures. Data privacy measures
include obtaining consent for data processing, implementing purpose limitation, and ensuring transparency in data handling practices. Data
security measures include implementing access controls, encryption, authentication mechanisms, and monitoring systems to protect data from
cyberattacks.
3
Compliance and Regulations: Both domains are governed by regulatory requirements and standards. Data privacy regulations
(e.g., GDPR, CCPA) mandate organizations to protect individuals' privacy rights and personal data. Compliance with these
regulations often requires implementing robust data security measures to protect personal data from unauthorized access,
breaches, and other threats.
4
Mutual Reinforcement: Effective data privacy practices contribute to enhancing data security. By implementing data minimization,
encryption, and access controls as part of data privacy measures, organizations can strengthen their overall data security posture. Similarly,
robust data security measures support data privacy by ensuring that personal data is protected against unauthorized access and breaches, thus
maintaining individuals' privacy rights.
5
Trust and Reputation: Together, data privacy and data security help build and maintain trust with stakeholders, including customers, employees, and
partners. Demonstrating a commitment to protecting personal data through comprehensive data privacy and security measures enhances organizational
reputation and fosters trust. Conversely, data breaches or privacy incidents can damage trust and reputation, highlighting the interconnectedness of data
privacy and security in safeguarding organizational credibility.
⮚ Compliance with diverse and evolving data ⮚ There is a delicate balance between ensuring
Complex privacy laws (e.g., GDPR, CCPA) can be complex Balancing data privacy and maximizing the utility of data
Regulatory and resource-intensive. Privacy with for legitimate purposes such as research.
Landscape ⮚ Organizations need to stay updated with Data Utility ⮚ Organizations must navigate this balance
regulatory requirements and adapt their policies carefully while respecting individuals' privacy
and practices accordingly. rights.
⮚ Technology evolves rapidly, presenting both ⮚ Data breaches can have severe financial, legal,
Rapid opportunities and challenges for data security. and reputational consequences.
⮚ New technologies such as IoT (Internet of Data Breach ⮚ The impact of a breach extends beyond
Technological
Things) devices and AI introduce new Impact immediate financial losses to include regulatory
Advancements
vulnerabilities that require careful management fines, litigation costs, loss of customer trust, and
and proactive security measures. damage to brand reputation.
Risk Management
Risk management involves identifying, assessing, and prioritizing risks to an
organization's data assets and implementing strategies to mitigate or manage
those risks effectively. It encompasses both data privacy and data security
considerations, along with broader organizational risks. Key aspects of risk
management include risk assessment, risk mitigation, incident response,
continuous monitoring and improvement.
► Data Fiduciary may process personal data ► The Act imposes certain duties on data
► This Act mentions the below points as principals such as:
the primary grounds for processing for certain legitimate uses such as:
personal data 1. Data Principal has voluntarily 1. they must not lodge a false or
provided her personal data, has not frivolous complaint, furnish any false
1. Consent particulars or impersonate another
indicated, she does not consent to
2. Legitimate use of data the use of her personal data person in specified cases
2. for the purposes of employment or 2. Violation of duties will be punishable
those related to safeguarding the with a penalty of up to Rs 10,000
employer from loss or liability, such
2 Consent
as prevention of corporate espionage,
maintenance of confidentiality of
► Personal data will be processed only for trade secrets, intellectual property,
lawful purpose upon consent of an classified information or provision of
individual any service or benefit sought by a
Data Principal who is an employee
6 Data transfer outside India
► Notice must be given before seeking
consent ► The Act allows transfer of personal data
► Consent can be withdrawn at any point of outside India, except to countries
time 4 Rights of Data Principal restricted by the central government
► The data principal may give, manage, through notification
review or withdraw consent through a ► The Act grants certain rights to individuals ► The Act also specifies that if there exist
consent manager and shall be accountable including: any other law which provides a higher
to the data principal 1. Right to obtain information degree of protection with respect to
► The consent manager shall be registered transfer of personal data outside India,
2. Right to seek correction and erasure
with the board then such regulations will be considered.
3. Right to grievance redressal
► For individuals under 18 years of age,
consent will be provided by the parent or 4. Right to nominate
the legal guardian
2 Why is foresight important A. To eliminate all potential threats. C. To share data openly with competitors.
in data security? B. To prepare for future cyberattacks and vulnerabilities. D. To increase data storage costs.
5 fdsf
What penalties does India's
DPDP Act impose for non-
A. Warning and corrective action by the Data Protection
Authority (DPA).
C. Monetary fines up to a certain percentage of annual
turnover or a fixed amount.
compliance?
B. Suspension of data processing activities for a specified D. Community service and public disclosure of non-
period. compliance.
Answers
1. C 2. B 3. A 4. B 5. C
Page 143
Introduction
The National Institute of Standards and Technology (NIST) is a U.S. federal agency responsible for developing and
promoting standards and guidelines to advance technology, measurement, and cybersecurity. NIST's work influences a
wide range of industries and plays a key role in enhancing innovation and security in the United States.
Testing and Certifications
NIST conducts tests and provides certifications for
organisations to ensure they meet established
standards.
Calibration services
Educational outreach
NIST engages in educational activities to
promote science and technology education
4 NIST provides calibration services to ensure
that instruments used are accurate.
3 5
Collaboration with industry and
academia
Research and Innovation Key NIST works closely with industry and
NIST conducts research to drive innovation
and economic growth
2 Functio
n
6 academic institutions to foster innovation
and transfer technology to the
marketplace.
Page 144
NIST Frameworks
The National Institute of Standards and Technology (NIST) has developed several frameworks and guidelines to help
organizations manage and reduce cybersecurity risks. Three key documents among these are the NIST Cybersecurity
Framework (CSF), NIST Special Publication 800-53, and NIST Special Publication 800-171.
1
Rev. 5: Controls for Federal
Information Systems and
Organizations' Security and
Privacy
2
of guidelines published by NIST for
mitigating organizational
cybersecurity risks based on existing
standards, guidelines, and practices
3
NIST Special Publication 800-171
Rev. 3: Safeguarding Controlled
Unclassified Information in Non-
federal Systems and
Organizations
Page 145
NIST Frameworks
• Business Operations: Aims to • Business Operations: May necessitate • Business Operations: Directly impacts
strengthen cybersecurity without significant changes to IT infrastructure how organizations handle government
disrupting business operations and processes data
Page 146
2
NIST
800-171
Page 147
NIST 800-171
NIST 800-171 aims to protect Controlled Unclassified Information (CUI) in non-federal systems, essential for
organizations working with the U.S. government. The standard emphasizes the confidentiality and security of sensitive
data when handled by contractors or subcontractors outside federal systems.
The purpose of the NIST SP 800-171 publication is to:
Provide a framework for ensuring the confidentiality, integrity, and availability of Controlled Unclassified
Information in non-federal systems and organizations, helping them meet security requirements and protect
sensitive data when doing business with the U.S. government or handling government-related information.
There are 17 Control Families, which further constitute a total of 97 controls.
NIST SP 800-171 controls address key aspects of information security, including access control,
Security Controls
incident response, and system protection, enabling organizations to safeguard CUI effectively.
NIST SP 800-171 emphasizes security controls, offering limited guidance on privacy, so organizations
Privacy Controls often need to integrate additional privacy measures to address specific data protection and compliance
requirements.
Page 148
NIST 800-171 Control Families
Page 149
NIST 800-171 Control Families
Page 150
NIST 800-171 Control Families
Page 151