Risk Management Practices: Involve systematic processes of identifying, assessing, mitigating, and monitoring organizational risks.
Audits: Provide independent and objective evaluations of processes and controls, ensuring adherence to standards and identifying risks.
Assessments: Evaluate the effectiveness of risk management strategies and identify vulnerabilities.
Importance: Combining audits and assessments is essential for understanding risks and implementing controls to protect against potential threats.
Explain various risk management processes and concepts.
Risk management: Process of identifying, assessing, and mitigating vulnerabilities.
Likelihood: Chance of a risk event happens (subjective)
Probability: Chance of a risk event happens (determined by statistics)
Impact: How severe the risk will be as an incident.
Risk register: Document displaying the results of risk assessments in a comprehensible format.
Risk threshold: Limits/levels of risk an organization is willing to tolerate.
Risk management process:
Identify critical systems/functions (risk identification)
Identify highly probable vulnerabilities in critical systems (risk analysis)
Identify threat sources/actors that may trigger vulnerabilities in critical systems (risk analysis)
Analyze the business impact of activated vulnerabilities (business impact analysis, risk posture)
Identify and assess the possible countermeasures (risk response)
Risk identification: Listing sources of cybersecurity risks, such as malware attacks, phishing, insider threats, or equipment failures.
Risk assessment: Determining the impact/significance of identified risks on the organization.
Risk analysis: Identifying and evaluating potential risks, and their defining characteristics.
Quantitative risk analysis: Method that aims to assign concrete numbers to risk factors. Include:
Single Loss Expectancy (SLE) - loss if a single occurrence occurred. Determined by multiplying the asset value (e.g., a $200,000 office building) by an exposure factor (how much would be lost, like 40%/0.4 for a tornado that damages the building).
Annualized Loss Expectancy (ALE) - a loss that would occur over a year. Determined by multiplying SLE by the annualized rate of occurrence (ARO, number of times a year an incident occurs).
Qualitative risk analysis - risk assessment dependent on subjective and qualitative factors.
Inherent risk: Level of risk before any type of mitigation has been attempted.
Risk posture: Level/type of risk an organization is willing to tolerate and identifies risk responses to prioritize.
Risk mitigation: Reducing exposure/effects of identified risks.
Avoidance: Stopping the risky activity.
Transference: Shifting the risk to a third party, often through insurance or outsourcing, to manage potential impacts.
Acceptance: Recognizing the risk and making a conscious decision to accept it, often because the costs of mitigation outweigh the potential impact.
Risk assessment types:
Ad hoc: Conducted as needed, normally in response to specific incidents (e.g., zero-day malware)
Recurring: Regularly scheduled risk assessments (quarterly, annually)
One-time: Comprehensive evaluations at a particular time point (e.g., when implementing new software).
Continuous: Constantly evaluated risk assessments - typically done by vulnerability scanners/IDS systems
Understand business impact analysis concepts.
Starts with identifying critical business assets. Includes:
People: Employees, vendors, suppliers
Tangible assets: Buildings, computer equipment, machinery, digital data
Intangible assets: Ideas, brand, commercial reputation
Procedures: Supply chains, SOPs
For critical business functions - reduce dependencies by identifying:
Inputs - sources of information for performing the business function
Hardware - server or datacenter that does processing
Staff that support function
Outputs - data/resources produced by the function
Process flow - step-by-step description of how the function is performed
Mission essential function (MEF): A business function that cannot be deferred and must be performed as continually as possible.
Maximum tolerable downtime (MTD): The longest time period a business can experience an outage without causing irrecoverable failure (for example, a medical equipment manufacturer may be able to exist without incoming supplies for 3 months, and after this time, the organization won’t have sufficient supplies).
Recovery Time Objective (RTO): The target time set for the recovery of IT and business activities after a disruption.
Work Recovery Time (WRT): Time in addition to the RTO to perform reintegration of impacted business functions.
Recovery Point Objective (RPO): Quantity of data loss that a system can sustain, measured in time.
Mean time between failures (MTBF): Expected lifetime of a product; calculated from total operation time / # of failures.
Mean time to repair (MTTR): Measure of time taken to correct a fault after a failure occurs; less time = less harm to business operations
Learn about risk responses, vendor assessments, and management practices.
Vendor assessment: evaluation of third-party vendor capabilities & security before engaging in business partnerships.
Conflict of interest: A situation where an individual has competing interests that could compromise their ability to act objectively.
Vendor assessment methods:
Penetration testing: Attempting to break into a system (legally) to report on exploitable vulnerabilities.
Right-to-audit-clause: Contract that grants an organization authority to conduct audits on vendor operations.
Evidence/documentation of external audits
Independent assessment of vendor capabilities
Supply chain analysis
Explore internal and external assessment concepts.
Understand different penetration testing methods.
Risk Management Components: Includes identifying potential issues, assessing impact, and implementing controls to mitigate risks.
Key Concepts: Risk identification, assessment, mitigation, and monitoring.
Risk Appetite and Tolerance: Defines the levels of risk an organization is willing to accept.
Risk Identification: Crucial for managing cybersecurity risks, includes recognizing risks like malware attacks and insider threats.
Methods: Vulnerability assessments, penetration testing, security audits, and threat intelligence.
Risk Assessment: Evaluates previously identified risks to determine their impact on the organization.
Methodologies: Can be ad hoc, one-time, recurring, or continuous assessments.
Ad Hoc Assessments: Conducted as needed, often in response to specific incidents.
Recurring Assessments: Scheduled at regular intervals to identify and assess risks.
Continuous Assessments: Provide real-time data about risks using specialized tools.
Risk Analysis: Identifies and evaluates potential risks, examining causes, consequences, and concerns.
Risk Assessment: A systematic approach estimating risk levels based on collected data, addressing likelihood and severity.
Objective: Assign concrete values to risks.
Single Loss Expectancy (SLE): Expected loss in a single occurrence, calculated by asset value and exposure factor.
Annualized Loss Expectancy (ALE): The yearly loss estimated by multiplying SLE by the annualized rate of occurrence (ARO).
Objective: Assess risks based on subjective judgment and qualitative factors.
Strengths and Limitations: Simple and easy to use, but subjective and relies heavily on expert judgment.
Definition: Level of risk before any mitigation efforts.
Regulatory Requirements: Compliance with laws mandating security controls, such as SOX, HIPAA, and PCI DSS.
Definition: Overall status of risk management within an organization, prioritizing risk response options appropriately.
Risk Mitigation: Reduces exposure and impacts via controls.
Avoidance: Stops the activity causing risk.
Transference: Transfers risk to third-party (e.g., insurance).
Acceptance: No countermeasures are put in place if risk is deemed acceptable.
Effectiveness: Communicates risk profiles and effectiveness of risk management.
Audience-Specific Content: Tailors reports based on the audience (board members vs operational managers).
Purpose: Understand potential effects of disruptions (e.g., accidents, disasters).
Process: Involves identifying critical systems, assessing impacts, and creating recovery strategies.
Maximum Tolerable Downtime (MTD): Longest period a business function can be downtime without irrecoverable failure.
Recovery Time Objective (RTO): Time taken to restore individual IT systems post-disaster.
Recovery Point Objective (RPO): Maximum permissible data loss in a disaster.
Elements: Vendor due diligence, risk identification, ongoing monitoring, and incident response planning.
Vendor Selection: Evaluate security practices, financial stability, and compliance.
Definition: When competing interests compromise the ability to act objectively.
Importance: Addressing conflicts ensures unbiased vendor assessments.
Audits: Systematic evaluation of processes and compliance with standards.
Assessments: Evaluate effectiveness of operations, cybersecurity, and controls.
Internal: Conducted by organization's employees; enhances internal controls and monitoring.
External: Conducted by independent parties; validates compliance and provides unbiased evaluations.
Core Concepts: Risk management, business impact analysis, vendor management, and audits.
Takeaways:
Continuous risk assessment and updating risk registers are vital.
Understanding and managing third-party risks are crucial components of an organization's risk strategy.
Penetration testing is a critical method for assessing security resilience.