Cybersecurity Risk Analysis and Management
THE PURPOSE OF RISK MANAGEMENT
2
STEPS OF A RISK MANAGEMENT PLAN
3
RISK IDENTIFICATION
To the right is a simplified example of how a company may identify risks
4
Asset | Asset Type and Subcategory | Asset Function | Priority Level (Low, Medium, High, Critical) |
Bob Worker | Personnel: InfoSec |
| Low |
Cisco UCS B460 M4 Blade Server | Hardware: Networking |
| High |
Customer Personally Identifiable Information (PII) | Data: Confidential Information |
| Critical |
Windows 7 | Software: Operating System |
| Medium |
RISK ASSESSMENT
R = P * V – M + U
R = Risk
P = Probability of threat attack
V = Value of Information Asset
M = Mitigation by current controls
U = Uncertainty of vulnerability
The table to the right combines elements of all of these in a highly simplified format
5
Threat Agent and Threat | Targeted Asset | Threat Level | Possible Exploits | Risk (Scale of 1-5) |
Disgruntled Insider: Steal company information to sell | Company data (i.e. Customer PII) | High | Access control credentials, knowledge of InfoSec policies, etc. | 4.16 |
Fire: Burn the facility down or cause major damage | Company Facility, Personnel, Equipment | Critical | Mishandled equipment | 2.78 |
Hacktivists: Quality of service deviation | Company Hardware/Software | Low | Lack of effective filtering | 1.39 |
RISK CONTROL
6
VULNERABILITY ASSESSMENT (CONT’D.)
7
VULNERABILITY ASSESSMENT (CONT’D.)
8
9
10
COST-BENEFIT ANALYSIS
11
FEASIBILITY ANALYSIS
12
RISK CONTROL STRATEGIES
13
RISK CONTROL STRATEGY: DEFENSE
14
RISK CONTROL STRATEGY: TRANSFERAL
15
RISK CONTROL STRATEGY: MITIGATION
Preparation should include a:
16
RISK CONTROL STRATEGY: ACCEPTANCE
Appropriate when:
17
RISK CONTROL STRATEGY: TERMINATION
18
PROS AND CONS OF EACH STRATEGY
Pros
Cons
19
STANDARD APPROACHES TO RISK MANAGEMENT
20
21