Chapter 3: Risk Management: Assessing Risk

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

Stakeholders

People or organizations that have a vested interest in some aspect of an organization’s planning, operation, or outcomes.

2
New cards

Strategic Planning

The process of defining the organization’s long-term direction and determining the resources needed to achieve it.

3
New cards

Champion

A high-level executive who provides influence, funding, and support for a cybersecurity initiative.

4
New cards

Methodology

A formal, structured sequence of procedures for solving a problem and ensuring a consistent, rigorous process.

5
New cards

Systems Development Life Cycle (SDLC)

A methodology for designing and implementing systems through investigation, analysis, design, implementation, and maintenance phases.

6
New cards

Controls and Safeguards

Security mechanisms, policies, or procedures that counter attacks, reduce risk, and improve protection.

7
New cards

Corporate Governance

The framework of rules, practices, and processes by which an organization is directed and controlled.

8
New cards

Cybersecurity Governance

The integration of cybersecurity strategy with overall corporate governance to ensure accountability, risk management, and alignment with business goals.

9
New cards

Corporate Governance Task Force (CGTF) Framework

A 2004 initiative that established core activities for cybersecurity governance—annual evaluations, risk assessments, policies, awareness, testing, and continuous improvement.

10
New cards

IDEAL Model

A five-phase process (Initiating, Diagnosing, Establishing, Acting, Learning) used for continuous improvement in governance and security programs.

11
New cards

ISO/IEC 27014 (2020) Governance of Information Security

An ISO standard that defines governance objectives—integrated information security, risk-based decisions, conformance, culture, and performance monitoring.

12
New cards

ISO 27014 Governance Processes

Four core processes—Evaluate, Direct, Monitor, and Communicate—that guide executive oversight of cybersecurity.

13
New cards

Governance, Risk Management, and Compliance (GRC)

The integrated approach to aligning organizational strategy, managing risks, and ensuring regulatory compliance.

14
New cards

GRC² (GRC Squared) Model

A Verizon model coupling “Goals, Requirements, and Constraints” with “Governance, Risk, and Compliance” to enhance decision-making and performance.

15
New cards

Governance in GRC²

Defines how leadership sets direction, monitors performance, and ensures transparency for better control and accountability.

16
New cards

Risk Management in GRC²

Focuses on identifying, analyzing, and mitigating risks that threaten strategic objectives.

17
New cards

Compliance in GRC²

Ensures the organization meets internal policies and external regulations through consistent measurement and documentation.

18
New cards

Security Convergence

The integration or coordination of physical security and cybersecurity functions to reduce costs and align risk management with business goals.

19
New cards

Enterprise Risk Management (ERM)

A framework that aligns security activities with business objectives and supports collaboration across departments.

20
New cards

Risk Council Approach

A cross-functional method for policy and decision-making on organizational risk management and convergence.

21
New cards

Unified Risk Oversight

A model that brings together operations, HR, legal, IT, finance, and security leaders to coordinate risk mitigation enterprise-wide.

22
New cards

Organizational Culture

The largest factor in determining whether security convergence or integration is successful.

23
New cards

Chief Information Officer (CIO)

The executive who aligns IT strategy with organizational goals and ensures broad support for security initiatives.

24
New cards

Chief Security Officer (CSO)

The executive responsible for developing, implementing, and maintaining the organization’s cybersecurity plan and risk management efforts.

25
New cards

Corporate Security Program

A department that protects employees, assets, and information from risks such as theft, violence, regulatory non-compliance, and data breaches.

26
New cards

Security Executive Council (SEC)

An advisory organization providing research-based guidance for corporate security risk mitigation and program evaluation.

27
New cards

Elements of Corporate Security Program

Key components include risk assessment, strategic planning, training, communication, ethics, resiliency, supply-chain security, and continuous learning.

28
New cards

Critical Success Factors for Security Implementation

Readiness, leadership capability, department maturity, corporate culture, and regulatory requirements.

29
New cards

Top-Down Approach

Cybersecurity implementation driven by executive leadership with clear goals, funding, policies, and organization-wide participation.

30
New cards

Bottom-Up Approach

Cybersecurity efforts originating from administrators or technicians that often lack coordination and executive support.

31
New cards

Project Champion

A senior executive who advocates for a security initiative and secures resources and organizational buy-in.

32
New cards

Critical Success Factors for Cybersecurity Workshops

Use skilled facilitators, secure executive sponsorship, involve key stakeholders, set clear goals, define deliverables, and avoid technical jargon.

33
New cards

Continuous Improvement Program (CIP)

A process of periodic review and refinement of the cybersecurity program to maintain effectiveness against emerging threats.

34
New cards

Waterfall Model

A linear SDLC method where each phase flows into the next with periodic reviews and limited rework.

35
New cards

Investigation Phase

Initiated by management to set objectives, scope, budget, and team; includes policy development and feasibility analysis.

36
New cards

Analysis Phase

Examines existing policies, controls, and threats; includes risk identification and assessment to prioritize information assets.

37
New cards

Design Phase

Divided into logical and physical design stages to create the cybersecurity blueprint, policies, controls, and contingency plans.

38
New cards

Managerial Controls

Strategic and administrative controls designed to define scope, risk management, and policy direction.

39
New cards

Operational Controls

Processes that govern daily security functions such as incident response, training, physical security, and system maintenance.

40
New cards

Technical Controls

Technology-based mechanisms such as access controls, authentication, authorization, and accountability.

41
New cards

Contingency Planning (CP)

Comprehensive planning for incident response, disaster recovery, and business continuity to maintain operations during disruption.

42
New cards

Incident Response (IR)

The process for identifying, classifying, responding to, and recovering from a security incident.

43
New cards

Disaster Recovery (DR)

Procedures for restoring IT systems and services after a catastrophic event.

44
New cards

Business Continuity (BC)

Processes to ensure critical business functions continue during and after a disaster.

45
New cards

Physical Security

Protective measures for people, hardware, facilities, and media to prevent unauthorized physical access to systems.

46
New cards

Implementation Phase

The deployment and testing of cybersecurity solutions, training programs, and project plans under executive approval.

47
New cards

Project Management

The process of planning, supervising, and closing projects to ensure cybersecurity initiatives meet objectives on time and budget.

48
New cards

Maintenance and Change Phase

Ongoing monitoring, testing, updating, and refinement of the security program to adapt to new threats and technologies.

49
New cards

Data Trustee

A senior executive responsible for data governance within a business unit.

50
New cards

Data Owner

An individual accountable for a specific set of information and its protection and use.

51
New cards

Data Custodian

Personnel who store, maintain, and protect information on behalf of the data owner.

52
New cards

Data User

Any internal or external individual who interacts with organizational information to perform work tasks.

53
New cards

Chief Security Officer (CSO) Responsibilities

Develops policies, conducts risk assessments, creates plans and budgets, and promotes security culture organization-wide.

54
New cards

Chief Information Officer (CIO) Responsibilities

Integrates IT and cybersecurity strategies, allocates resources, and ensures departmental alignment with organizational goals.

55
New cards

Organizational Readiness

Understanding how security supports business goals and what level of protection the organization needs.

56
New cards

Security Leadership Capability

The extent to which security leaders can inspire vision, strategize effectively, and guide program maturity.

57
New cards

Corporate Culture

The shared values and attitudes that determine how security initiatives are accepted and sustained.

58
New cards

Regulatory Requirements

Industry-specific laws and standards that govern data protection and security compliance.

59
New cards

Continuous Learning

The practice of evaluating incidents and adapting the security program through after-action reviews and feedback.

60
New cards