Risk Anticipation with
Risk Management
Contents:
• Understand risk management concepts
• Learn to manage risk through a risk management program
• Learn different risk management frameworks (RMFs)
Understand risk management concepts
• “ Risk and vulnerability management is a pro-active approach to manage
network security ”
• Risk management is the process of reducing and maintaining risk at an
acceptable level by means of a well-defined and actively employed security
program
• It involves identifying, assessing, and responding to the risks by implementing
controls to the help the organization manage the potential effects
• Risk management has a prominent place throughout the system security life-
cycle
Risk Management
Risk Management Benefits:
• Focuses on potential risk impact areas
• Addresses risks according to the risk level
• Improves the risk handling process
• Allows the security officers to act effectively in adverse situations
• Enables effective use of risk handling resources
• Minimizes the effect of risk on the organization’s revenue
• Identifies suitable controls for security
Key Roles and Responsibilities in Risk Management
• Senior Management: The support and involvement of senior management is
required for effective risk management
• Chief Information Officer (CIO): Responsible for IT planning, budgeting, and
performance based on a risk management program
• System and Information Owners: Responsible for the appropriate security control
use to maintain confidentiality, integrity, and availability for an information system
• Business and Functional Managers: Responsible for making trade-off decisions in
the risk management process
• IT Security Program Managers and Computer Security Officers (ISSO): Responsible
for an organization’s information security programs
• IT Security Practitioners: Responsible for implementing security controls
• Security Awareness Trainers: Responsible for developing and providing appropriate
training in the risk management process
Key Risk Indicators (KRI)
• A key risk indicator (KRI) is an important component of an effective risk
management process that shows the riskiness of an activity
• Understanding the organizational goals is required to identify KRI
• A KRI is a metric showing the risk appetite probability for an organization
Manage risk through risk management program
Risk Management Phase: Risk Identification
• Identifying the sources, causes, and consequences of the internal and external
risks affecting the security of the organization
• The risk assessment phase assesses the organization’s risk and provides an
estimate on the likelihood and impact of the risk
• The risk assessment is an on-going iterative process assigning priorities to risk
mitigation and implementation plans It determines the quantitative and
qualitative value of risk
Risk Management Phase: Risk Assessment
Risk Analysis:
• Defines the nature of the risk
• Determines the level of risk exposure
• Provides an understanding of inherent and controlled risk
Risk Prioritization:
• Risks are prioritized and treated according to the severity
• While performing the risk response step, consider the risk prioritization
Risk Levels: The impact level of a risk depends on the value of assets and resources it affects,
and the severity of the damage.
Risk Management Phase: Risk Assessment
Risk Matrix: A risk matrix is used to scale risk by considering the probability, likelihood, and
consequence/impact of the risk
Risk Treatment:
• Risk treatment is a process of selecting and implementing appropriate controls on the
identified risks
• Risks are addressed and treated based on its severity level
• Decisions made in this phase are based on the results of a risk assessment
Risk Treatment Process
Learn different risk management frameworks
Enterprise Network Risk Management
Enterprise network risk management integrates mitigation techniques
in a systematic approach to obtain the goals and objectives for
satisfying business requirements.
Enterprise Risk Management Framework (ERM)
• Activities: The RMF defines the implementation activities specific to how
an organization handles risk
• Structured Process: The ERM provides a structured process integrating
information security and risk management activities
• Actions: ERM frameworks identify, analyze, and perform the following
actions:
• Risk avoidance by aborting the actions that lead to risk
• Risk reduction by minimizing the likelihood or impact of risk
• Provides risk management process standards
Goals of the ERM Framework
• Integrates the ERM with the organization’s performance management
• Communicates the benefits of risk management
• Defines the roles and responsibilities in the organization to manage the
risk
• Standardizes the risk reporting and escalating process
• Sets a standard approach to manage risks in the organization
• Assists the resources in managing the risks
• Sets the scope and application of risk management in the organization
• Mandates periodic review and verification for improvements of the
ERM
NIST Risk Management FrameworK
NIST RMF is a structured and continuous process that integrates information security
and risk management activities into the system development life cycle
• Prepare: Essential activities to prepare the organization to manage security and
privacy risks
• Categorize: Categorize the system and information processed, stored, and
transmitted based on an impact analysis
• Select: Select the set of NIST SP 800-53 controls to protect the system based on risk
assessment(s)
• Implement: Implement the controls and document how controls are deployed
• Assess: Assess to verify if the controls are in place, operating as planned, and
producing the anticipated results
• Assess
• Authorize: Senior official makes a risk-based decision to authorize the system (to
operate)
• Monitor:Continuously monitor control implementation and risks to the system
NIST Risk Management FrameworK
Thankyou