Harrisburg University ISEM 580 Summer 2017

IT Security Risk Management Overview

Objectives

What is Security Risk Management

The goals, value, and benefits of Security Risk Analysis

Security Program (Principles & Elements)

IT Security Risk Analysis Approaches (Quantitative & Qualitative)

IT Security Risk Analysis Report

Definitions & References

2

What is Security Risk Management?

Security Risk Management relies on properly identifying and valuing the company’s assets and implementing security policies, procedures, standards, and guidelines to protect and ensure the integrity, confidentiality, and availability of these assets.

3

IT Security Risk Analysis- Goals

Goals of Security Risk Analysis

Identify assets and their criticality and value to the organization

Identify vulnerabilities and threats

Quantify the probability and business impact of these potential threats

Provide an economic balance between the impact of the threat and the cost of the countermeasure

Determine the effectiveness of security program

4

IT Security Program- Principles

Security Program Main Principles:

Availability

Integrity

Confidentiality

5

IT Security Management Program

Security Program Elements

Security Governance & Management

Information Security Policies

Business Continuity & Disaster Recovery

Identity Access Management

Administrative, Technical, and Physical Controls

Software Development Lifecycle

Physical & Environmental Security

Security Architecture Model & Profile

Incident Response

Risk and Vulnerability Management

Asset Identification and Management

Logging and Monitoring

Compliance

Security Awareness and Training

6

IT Security Risk Analysis- Questions

Questions regarding IT Security Risk Analysis

Why should a risk analysis be conducted?

When should a risk analysis be conducted?

What can a risk analysis analyze?

What can the results of risk analysis tell an organization?

Who should review the results of a risk analysis?

How is the success of risk analysis measured?

7

IT Security Risk Analysis- Benefits

Customer, investor, stockbroker, investor, taxpayer confidence in the organization

Protect confidentiality of sensitive information

Protect sensitive operational data from inappropriate disclosure

Avoid third-party liability for legal or malicious acts committed with the organization systems

Ensure that the organization’s computer, network, and data are not misused or wasted

Avoid fraud

Avoid expense and disruptive incidents

Complied with pertinent laws and regulations

Avoid a unruly behaviors and incidents in the workplace

8

IT Security Risk Analysis

Components, Approaches, & Best Practices

9

IT Security Risk Analysis- Methodology

10

Security risk analysis, otherwise known as risk assessment, is fundamental to the security of any organization. It is essential in ensuring that controls and expenditure are fully commensurate with the risks to which the organization is exposed.

IT Security Risk Analysis- Asset Identification

11

Asset: Anything that has value to an organization

Most enterprises divide assets into two major categories: Physical (or Fixed) Assets and Logical Assets

Asset identification is the use of attributes and methods to uniquely identify an asset

IT Security Risk Analysis- Methodology

12

Vulnerability: is a software, hardware, procedural , or human weakness that may provide an attacker the open door they are looking for to enter a computer network an obtain unauthorized access to resources within the environment.

Threat: is any potential danger to information systems. Hence, the threat is when someone or something can identify and take advantage of/exploit a vulnerability.

Risk: is a likelihood of a threat agent taking advantage of a vulnerability and corresponding business impact.

IT Security Risk Analysis- Threat Identification

13

Threats are normally classified into three main categories:

Natural Threats

Accidental Threats

Intentional Threats

IT Security Risk Analysis- Threat Identification

Some common natural threats are:

Flood

Ice storm

Severe thunderstorms

Blizzard

Earthquake

Flash flood

Tornado

14

IT Security Risk Analysis- Threat Identification

Some common accidental threats are:

Disclosure

Electrical disturbance

Environmental failure

Software error

Hardware failure

Operator/User error

Fire

Software error

15

IT Security Risk Analysis- Threat Identification

Some common intentional threats are:

Alteration of data

Alteration of software

Disclosure

Fraud

Theft

Employee sabotage

Strike

Unauthorized Use

16

IT Security Risk Analysis

Quantitative IT Security Risk Analysis Approach

17

Quantitative IT Security Risk Analysis

18

Quantitative IT Security Risk Analysis- ALE, SLE, ARO

19

Risk Analysis Calculations (Potential Loss per Threat)

Single Loss Expectancy (SLE)

SLE = (Asset Value) x (Exposure Factor) ; where Exposure factor (EF) represents the percentage loss a realized threat could have on a certain asset.

Annualized Loss Expectancy (ALE)

ALE = SLE x ARO ; where ARO is annualized rate of occurrence; frequency a specific threat takes place within one year timeframe.

IT Security Risk Analysis

Qualitative IT Security Risk Analysis Approach & Best Practices

20

Qualitative IT Security Risk Analysis

The steps involved in conducting a qualitative security risk analysis are as follows:

Define Scope (define what is to be examined and accomplished)

Assemble a competent team

Identify Threats (determine which threads can cause harm to the asset under review)

Determine threat probability and prioritization (determine how often each of the identified threats is likely to occur)

Determine Impact (determine the impact to the asset under review)

Calculate total threat impact (calculation of probability and impact rankings resulting in the overall Risk Factor)

Identify safeguards and cost to implement (controls and countermeasures, usually ranked in order)

Risk Analysis Report (the results of the risk analysis process must be presented to management in a formal report)

21

Qualitative IT Security Risk Analysis - Threat Probability and Prioritization

22

Once the threats have been identified, the risk analysis team will need to determine how often each of the identified threats is likely to occur. In a qualitative analysis the frequencies are expressed as low medium and high or some variation of and can be given a numeric value by applying an assigned number as outlined in the threat priority table illustrated above.

Qualitative IT Security Risk Analysis Threat Impact Level Values

23

The security risk analysis team defines threat levels and their associated values. They then determine the impact to the asset under review if the specific threat were to occur. In a qualitative analysis the threat levels are defined and apply an assigned number value, as illustrated in the table above

Qualitative IT Security Risk Analysis – Total Threat Impact

24

The security analysis team adds the threat priority figure to the impact value to achieve the overall risk factor for each verified threat.

After all the risk factors have been calculated, the team must sort the entire table by the values of the risk factor column in order of priority from the highest value to the lowest value. Those with a risk factor of 8 or greater are then moved to the safe guard identification worksheet.

Is important to note, no enterprise has sufficient resources to examine all the risk and pay to implement all of the safeguards, regardless of their impact and probability

Qualitative IT Security Risk Analysis – Risk Controls & Safegaurds

25

Risk Control Categories:

Avoidance Controls: our proactive safeguards that attempt to minimize the risk of accidental or intentional intrusions

Assurance Controls: our controls and strategies employed to ensure the ongoing effectiveness of the existing controls and safeguards

Detection Controls: our techniques and programs use to ensure early detection, interception, in response of security breaches

Recovery Controls: our planning and response services to rapidly restore and secure environments as well as investigating the source of the breaches

Qualitative IT Security Risk Analysis – Identify Safeguards

26

It is important to estimate the cost to implement each of the controls to be incorporated into the risk assessment report for senior management considered in the final determinations.

The cost analysis should ensure that the safeguard recommended meet the business objectives and provide adequate level of asset protection for the investment.

Qualitative IT Security Risk Analysis – Risk Analysis Report

27

The results of the risk analysis process must be presented to management in a form of formal report.

Report serves two purposes:

To report findings

To serve as a historical document

Qualitative IT Security Risk Analysis – Risk Analysis Report

28

Risk Analysis Report Outline

Executive Summary

Introduction

Threat Identification

Risk Factor Determination

Safeguard Determination

Cost Benefit Analysis

Recommendations

Appendix

IT Security Risk Management

Definitions & References

29

Security Management - Definitions

Vulnerability: is a software, hardware, procedural , or human weakness that may provide an attacker the open door they are looking for to enter a computer network an obtain unauthorized access to resources within the environment.

Threat: is any potential danger to information systems. Hence, the threat is when someone or something can identify and take advantage of/exploit a vulnerability.

Threat Agent: an entity that takes advantage of a vulnerability.

Risk: is a likelihood of a threat agent taking advantage of a vulnerability and corresponding business impact.

Exposure: is an instance of being exposed to losses from a threat agent.

Countermeasure: is a safeguard put in place to mitigate the potential risk (e.g., hardware device, software, procedure, controls, training, etc.)

Due Care: steps taken to show that the company has taken responsibility for the activities that occur within the organization and taken the necessary steps to protect the company, recourses, and employees

30

Security Management - Definitions

Privacy : a security principle that protects an individual’s information and employs controls to ensure that this information is not disseminated or accessed in an unauthorized manor.

Authentication: to verify the identity of a person requesting the use of a system and/or access to network resources.

Authorization (Access control): determine what access rights that person has and granting access after the person has been properly identified and authenticated.

Accountability (Auditing):

Assure that you can tell who did what when and convince yourself that the system keeps its security promises.

Includes non-repudiation (NR) -- the ability to provide proof of the origin or delivery of data.

NR protects the sender against a false denial by the recipient that the data has been received. Also protects the recipient against false denial by the sender that the data has been sent..

a receiver cannot say that he/she never received the data or the sender cannot say that he/she never sent any data

Permissions: the type of authorized interactions that a person can have with an object (e.g., read, write, execute, add, modify, delete).

Encryption: The transformation of plaintext into unreadable cipher text.

Due Diligence: The process of systematically evaluating information to identify vulnerabilities, threats, and issues relating to an organization’s overall risk.

31

Security Management - Definitions

Administrative Controls: Policies, standards, procedures, guidelines, screening, security awareness training

Technical Controls: Logical access controls, encryption, security devices, identification, and authentication

Physical Controls: Facilities protection, security guards, locks, monitoring, environmental controls, and intrusion detection

Identifying Information: The set of an asset’s attributes that may be useful for identifying that asset, including discoverable information about the asset and identifiers assigned to the asset

32

Security Management - Definitions

Disclosure: the unauthorized or premature exit door release of proprietary, classified, company confidential, personal, or otherwise sensitive information

Electrical disturbance: a momentary fluctuation in political power source

Environmental failure: an interruption in the supply of controlled environment support such as air quality, air conditioning, humidity, heating, and water

Hardware failure: a unit or component failure of sufficient magnitude to cause delays in processing or monetary loss to the enterprise

Operator/User error: an accidental, improper, or otherwise ill-chosen act by an employee that results in processing delays, equipment damage, data loss, or modify data

Fire: an instance of combustion that produces damage through heat, smoke, or suppression agent

Software error: an extraneous or erroneous data in an operating system or application program that results in processing errors, data output errors, or processing delays

33

Security Management - Definitions

Alteration of data: an unintentional modification, insertion, or deletion of data, rather by an authorized user or not

Alteration of software: an unintentional modification, insertion, or deletion of an operating system or application system program, whether by an authorized user or not

Disclosure: the unauthorized or premature intentional release a proprietary, classified, company confidential, personal, or otherwise sensitive information

Fraud: a deliberate unauthorized manipulation of hardware, software, or information

Theft: the unauthorized appropriation of hardware, software, you, computer supplies, or data of the classified nature

Employee sabotage: a deliberate action taken by an employee, group of employees, or not employees working together to disrupt enterprise operations

Strike: an organized employee action designed to halt or disrupt normal business operations

Unauthorized use: an unauthorized use of the computer equipment or programs

34

Security Management - Standards

ISO/IEC 27001 & 27002: guidelines for establishment, implementation, control, and improvement of information security management systems

ISO/IEC 27004: standard for information security management

ISO/IEC 27005: guideline for establishing a risk management approach to information security

ISO/IEC 27006: guideline for certification/registration Process

ISO/IEC 27799: guide for protecting personal health information

NIST Special Publication (SP) 800-53: outlines security requirements and security controls federal information systems and pass IT security audits performed under the Federal Information Security Management Act

NIST Cybersecurity Framework Version 1.0: risk-based Cybersecurity Framework—a set of existing standards, guidelines and practices to help organizations manage cyber risks.

NIST Special Publication 800-39: guidance for an integrated, organization-wide program for managing information security risk to organizational operations, assets, individuals, and other organizations

35

Assignments

Chapter 8 (IT Managers Handbook)

Homework 5: Risk Management

Project 2

Part A: Create an IT Governance Matrix

Part B: Create a Governance Charter for Enterprise Security Committee

Part C: Write a Information Security Policy for Data Classifications

36

Elevator Pitch This assignment will be graded separately.

Elevator Pitch Your boss needs you to summarize the key elements of your marketing plan before she attends the next corporate board meeting. You are required to present this to her in the form of an elevator pitch. The elevator pitch was originally devised to make a quick sales pitch to venture capitalists. Your objective is to convince your boss that your marketing plan is well-thought-out and credible. You must decide what key points you need to include from your written plan that will convince her that the new concept will be successful.

Harrisburg University ISEM 580 Summer 2017

IT Project Risk Management Overview

Objectives

What is Project Risk & Project Risk Management

The goal and value of risk management

Key stages of risk management

Project Risk Management approaches and best practices

2

What is Project Risk ?

Project risk is defined by PMI as 'an uncertain event or condition that, if it occurs, has a positive or negative effect on a project’s objectives'.

3

What is Project Risk Management?

Project risk management is a method of finding risks, classifying risks and mitigating risks.

4

The Goal of Project Risk Management

The goal of project risk management is identifying potential risk, analyzing risk to determine those that have the greatest probability of occurring, identifying the risks that have the greatest impact on the project if they should occur, and defining plans that help mitigate or lessen the risks impact or avoid the risks while making the most of opportunity.

5

Value of Project Risk Management

Project risk management delivers a number of values to the project, including:

Recognizes uncertainty and provides forecasts of possible outcomes.

Produces better business outcomes through more informed decision making

Has a positive influence on creative thinking and innovation

Creates better project control—reduces overhead and time, and enhances benefits.

Contributes to project success

6

Importance of Project Risk Management

Project risk management is an important aspect of project management.

According to the Project Management Institute's PMBOK, Risk management is one of the ten knowledge areas in which a project manager must be competent.

Understanding project risks enables project teams to more effectively fulfill business goals and objectives as well as meet service expectations.

7

Effective Project Risk Management – Behaviors to Avoid

WSDOT Project Risk Management Guide-November 2014

8

Effective Project Risk Management avoids the following behaviors:

Paying too little attention to risk management

Not allocating sufficient resources for risk management

Unable to identify risks before they become issues

Poorly defined or not following project management process and procedures

Missing Opportunities

Project Risk Management – Balanced Approach

9

IT Managers Role in IT Project Risk Management

WSDOT Project Risk Management Guide-November 2014

10

As an IT manager you should coordinate with the PM and project team to:

Ensure proper due diligence in IT project planning and estimations

Coordinate with key stakeholders and subject matter experts to identify, assess/analyze, and respond to major risks

Continually monitor IT project triple constraints, progress, risks, response actions, and results

Maintain a good understanding of the overall health and evolving risk profile of the IT projects in your portfolio

Facilitate compliance with IT governance and polices associated with project management

Manage stakeholders expectations; ensuring timely accurate communications

Listen to stakeholders and project team members; investigate and verify concerns and use appropriate channels to raise awareness or take necessary actions to resolve

Risk Management Stages

Components, Approaches, & Best Practices

11

Project Risk Management - Stages

Risk Management Involves the following stages:

Risk Management Planning

Risk Identification

Risk Analysis & Quantification (Qualitative & Quantitative)

Risk Response

Risk Monitoring & Control

12

Project Risk Management - Planning Stage

WSDOT Project Risk Management Guide-November 2014

13

Project Risk Management - Planning Stage

WSDOT Project Risk Management Guide-November 2014

14

Risk management must commence early in project development and proceed as the project evolves and project information increases in quantity and quality.

Consider the resources needed for project risk management and build them into the project development budget and schedule.

When preparing the Project Management Plan and work activities for IT Projects, we must include both pillars of risk management.

Project Risk Management - Planning Stage

WSDOT Project Risk Management Guide-November 2014

15

How to Plan for Project Risk Management

Determine the level of risk assessment for your project

Incorporate risk management activities into the project schedule

Make risk management an agenda item for regularly scheduled project meetings

Communicate the importance of risk management to the entire project team

Establish the expectation that risk will be managed, documented, and reported

Project Risk Management - Planning Stage

WSDOT Project Risk Management Guide-November 2014

16

Tips for managing Project Risk Management Plan

Allow time in the schedule for prep activities; this includes review and QA/QC of project schedules and cost estimates at appropriate times

Allow a budget for risk assessment, risk management, and risk response activities

Report on the status of project risk in regularly scheduled project meetings

Know the organization’s tolerance for risk

Contact the Enterprise Project Management Office (EPMO) and EA to discuss the possibility of integrating the risk assessments with a business solution architecture (BSA) processes (conduct workshops).

Project Risk Management- Risk Identification Stage

WSDOT Project Risk Management Guide-November 2014

17

Risk identification involves determining which risks might affect the project and documenting their characteristics.

Project Risk Management – Risk Identification

WSDOT Project Risk Management Guide-November 2014

18

Project Lifecycle Systems Development Lifecycle
Initiation (Scoping) Feasibility
Planning & Estimating Requirements
Scheduling Design
Execution Build
Control & Monitoring Test & Validate
  Implementation

 

 

Risk identification occurs throughout most phases of the IT project life cycle and SDLC. The probability of risk is greatest earlier than later in the project lifecycle.

Project Risk Management – Risk Identification

19

Techniques for Risk Identification

Document Reviews

Brainstorming

Lessons Learned

Other Methods

Tips for Risk Identification

Determine, for your project, what constitutes “significant” risk

Thoroughly describe the risk

Include specialty groups and/or other persons who may have meaningful input regarding the challenges the project may face

Determine who “owns” the risk and who will develop a response

Risk Should Be:

Specific

Measurable

Relevant

Time-Bound

Response

Project Risk Management- Risk Profile Sheet

20

Project Risk Management- Risk Analysis & Quantification Stage

21

Qualitative Risk Analysis: is concerned with the discovering the probability of a risk of an occurring and impact the risk will have if it does occur. You should perform qualitative risk analysis throughout the work of the project. This is the most common and probably the easiest method for analyzing risk for projects.

Risk Analysis & Quantification Stage – Qualitative Analysis

22

Risk Analysis & Quantification Stage – Qualitative Analysis

23

Qualitative Analysis - Risk Profile Sheet

WSDOT Project Risk Management Guide-November 2014

24

Project Risk Management- Risk Analysis & Quantification Stage

25

Quantitative Risk Analysis: numerically estimates the probability that a project will meet its cost and time objectives.

Determine Cardinal Scale Values (numbers expressed between zero and 1.0 probability) to both probability and impact so that you can calculate the overall risk score

Risk Analysis & Quantification Stage – Quantitative Analysis

26

Risk Analysis & Quantification Stage – Quantitative Analysis

27

Risk Analysis & Quantification Stage – Quantitative Analysis

28

Several other quantitative techniques exist, including sensitivity analysis, decision tree analysis and simulation techniques.

Since most of these require extensive analysis and significant investments in software and mathematical proficiencies (e.g., variance based methods, dimensional modeling, regression analysis), they aren’t ideally suited to small and medium-sized projects.

Risk Analysis & Quantification Stage – Quantitative Analysis

29

Decision Tree Analysis. This is a diagramming method that shows the sequence of interrelated decisions and expected results of choosing one alternative over another. It is usually used for risk events that impact time or cost.

Risk Analysis & Quantification Stage – Quantitative Analysis

WSDOT Project Risk Management Guide-November 2014

30

Monte Carlo methods (or Monte Carlo experiments) are a broad class of computational algorithms that rely on repeated random sampling to obtain numerical results. Monte Carlo simulation, or probability simulation, is a technique used to understand the impact of risk and uncertainty in financial, project management, cost, and other forecasting models.

Risk Analysis & Quantification Stage – Quantitative Analysis

WSDOT Project Risk Management Guide-November 2014

31

Basic forecasting model for estimating the total time it will take to complete a particular IT project. In this case, it's a EIS implementation project, with three parts (Job 1, Job 2, & Job 3). The parts have to be done one after the other, so the total time for the project will be the sum of the three parts; totaling 14-Months. This is an estimate but this model can't tell us anything about risk. How likely is it that the project will be completed on time?

Risk Analysis & Quantification Stage – Quantitative Analysis

WSDOT Project Risk Management Guide-November 2014

32

Create a model using a Monte Carlo simulation for estimating the total time it will take to complete the EIS project. Build the model by estimating the minimum, most likely, and maximum expected time (based on our experience, or expertise, or historical information). Now there is a range of possible outcomes.

Note: This Monte Carlo simulation will use the beta-PERT distribution to generate random values based on a minimum, most likely, and maximum value.

Risk Analysis & Quantification Stage – Quantitative Analysis

WSDOT Project Risk Management Guide-November 2014

33

The Monte Carlo simulation, randomly generates values for each of the tasks, then calculates the total time to completion. The simulation was run 500 times. Based on the results of the simulation, you will be able to describe some of the characteristics of the risk in the model.

To evaluate the likelihood of a particular result, count how many times the model returned that result in the simulation. In this case, we want to know how many times the result was less than or equal to a particular number of months.

Risk Analysis & Quantification Stage – Quantitative Analysis

WSDOT Project Risk Management Guide-November 2014

34

The Monte Carlo simulation results displayed in a graph. The simulation results reveals that there is only a 34% chance – about 1 out of 3 – that any individual trial will result in a total time of 14 months or less. On the other hand, there is a 79% chance that the project will be completed within 15 months.

Project Risk Management- Risk Analysis & Quantification Stage

35

Risk response is the process of developing options and determining actions to enhance opportunities and reduce threats to achieving the project’s objectives.

From a quantitative risk analysis perspective you should require a risk response plan for risk analysis resulting with an overall risk value equal to critical or significant. Similarly, from a qualitative risk analysis perspective you should require risk response plan for risks scores greater than or equal to a predefined threshold (Risk Score >= 8 in our qualitative model).

Project Risk Management- Risk Response Stage

36

Risk Outcomes
Known risks with predictable outcomes
Known risks with uncertain outcomes
Unknown risks with unpredictable outcomes

Project Risk Management- Risk Response Stage

37

Risk response plan should include at least the following elements:

Risk ID no

Risk name and description

Risk Owner

Analysis approach and results (risk score, risk value, expected value, probability, priority)

Risk triggers, effects, and impacts the project (e.g., scope, schedule, budget, performance)

Risk Response (e.g., strategy, timeframe, and responsible party)

Resources (e.g., people, things, costs)

Appendix (additional and supporting information)

Project Risk Management- Risk Monitoring & Control Stage

38

Risk monitoring and control tracks identified risks, monitors residual risks, and identifies new risks; ensuring the execution of risk plans and evaluating their effectiveness in reducing risk.

Risk monitoring and control is an ongoing process for the life of the project.

Involves a risk audit review process as a part of the project close-out phase to identify things that went well and opportunities for improvement and preventing future reoccurrences

Assignments

Chapters 4, 8 (IT Managers Handbook)

Homework 5: Risk Management

Project 2

Part A: Create an IT Governance Matrix

Part B: Create a Governance Charter for Enterprise Security Committee

Part C: Write a Information Security Policy for Data Classifications

39

Harrisburg University ISEM 580 Summer 2017

Business Risk Management Overview

Objectives

Key Terms

Risk Management Overview

Types of Risks

Risk Informed Decision Model

Risk Management Important to Project Success

Decision Tree Analysis

2

Risk Management – Key Terms

Risk: is the potential of gaining or losing something of value. Values (such as physical health, social status, emotional well-being, or financial wealth) can be gained or lost when taking risk resulting from a given action or inaction, foreseen or unforeseen.

Uncertainty: The lack of complete certainty, that is, the existence of more than one possibility whereby the "true" outcome/state/result/value is not known, unpredictable, or uncontrollable.

Risk Perception: is the subjective judgment people make about the severity and probability of a risk, and may vary person to person. Any human endeavor carries some risk, but some are much riskier than others.

Default: is failure to meet the legal obligations or terms and conditions of a contract (loan, bond, bank notes, line of credit, unpaid wages, tax liabilities, other debt obligations, etc.).

Threat: is the intent to inflict harm or loss on another person; Threats can be subtle or overt. From a IT perspective: a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause harm.

3

Risk Management – Key Terms

Vulnerability: Susceptible to physical harm or damage. A security vulnerability is a weakness in a product or systems that could allow an attacker to compromise the integrity, availability, or confidentiality of that product or system.

Risk Tolerance: is a more specific measure of the degree of uncertainty that an organization is willing to accept in respect to negative changes to its business, assets, or security.

Risk Appetite: the amount and type of risk that an organization is prepared to pursue, retain, or take (according to ISO 31000)

Residual Risk: is defined as the threat a risk poses after considering the current mitigation activities in place to address it.

4

Risk Management – Strategic Alignment

Align your risk tolerances with your strategic goals and business models When risk tolerances are aligned with both overall risk appetite and strategic goals, they will lower residual risk and contribute to achieving your strategic goals.

5

Risk Management Overview

6

What is Risk Management, Approach & Plan?

Risk management is the identification, assessment, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.

Risk management’s objective is to assure uncertainty does not deflect the endeavor from the business goals.

Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level

The risk management approach determines the processes, techniques, tools, and team roles and responsibilities for a specific project.

The risk management plan describes how risk management will be structured and performed on the project

7

Effective Risk Management Characteristics

Create value – resources expended to mitigate risk should be less than the consequence of inaction

Be an integral part of organizational processes (strategic, Tactical, operational)

Be part of decision making process

Explicitly address uncertainty and assumptions

Be a systematic and structured process

Be based on the best available information

Be tailorable

Take human factors into account

Be transparent and inclusive

Be dynamic, iterative and responsive to change

Capable of continual improvement and enhancement

Continually or periodically re-assessed

8

Business Owner’s Perspective on Risk

Business Owner’s Perspective on Risk:

Business Risk: refers to the chance a business's cash flows are not enough to cover its operating expenses like cost of goods sold, rent and wages.

Systematic risk refers to the chance an entire market or economy will experience a downturn or even fail.

Unsystematic risk describes the chance a specific company or line of business will experience a downturn or even fail.

Financial risk refers to the chance a business's cash flows are not enough to pay creditors and fulfill other financial responsibilities.

9

Business Financial Risk – Internal & External Factors

Interest Rate Risk: The interest rate is often the number-one component of financial risk. Banks and lenders offer business loans at a specific interest rate.

A credit risk is the risk of default on a debt that may arise from a borrower failing to make required payments.

Market risk is the risk of losses in positions arising from movements in market prices. Financial risks can also be linked to the overall market risk in the business environment.

10

Business Financial Risk – Internal & External Factors

Cash Flow plays an important role in financial risk. Business owners often use external financing to start their new business venture. External financing represents fixed cash outflows that must be paid regardless of the company profitability.

Volatility risk is the risk of a change of price of a portfolio as a result of changes in the volatility of a risk factor.

Legal risk is the risk of litigation resulting in financial or reputational loss due to the lack of awareness or misunderstanding of, ambiguity in, or reckless indifference to, the way law and regulation apply to your business, its relationships, processes, products and services.

11

Business Financial Risk – Internal & External Factors

Compliance Risk: Risks associated with compliance are those subject to legislative or bureaucratic rule and regulations, or those associated with best practices for investment purposes.

Reputation risk, is a risk of loss resulting from damages to a firm's reputation, in lost revenue; increased operating, capital or regulatory costs; or destruction of shareholder value, consequent to an adverse or potentially criminal event even if the company is not found guilty.

Liquidity risk is a financial risk that for a certain period of time a given assets, security, or commodity cannot be traded quickly enough in the market without impacting the market price.

12

Business Financial Risk – Internal & External Factors

Economic Risk: Companies are exposed to financial risk from various aspects of the overall economy.

Performance Risk: include the risks that the completed project, when complete, fails to perform as intended or fails to meet business requirements that justified it.

Operational risk is "the risk of a change in value caused by the fact that actual losses, incurred for inadequate or failed internal processes, people and systems, or from external events (including legal risk), differ from the expected losses

13

Business Operational Risk – Causes

Internal Fraud

External Fraud

Employment Practices and Workplace

Clients, Products, and Business Practice

Damage to Physical Assets

Business Disruption and Systems Failures

Execution, Delivery, and Process Management

Project and Portfolio Management

14

Risk Informed Decision Model

15

International Organization for Standardization (ISO)- (Defined the Principles of Risk Management)

How to reduce Business Risk

16

Reducing Business Risk – Recommendations

Review the existing system of internal controls, which provide checks and balances for every aspect of a company

Establish Business Risk Assessment & Measurement Methods

Develop Risk Management & Contingency Plans

Plan Evaluations

Employ the services of an internal control consultant

17

Risk Response Strategies

18

Risk – Response Strategies

Avoidance

Transference

Mitigation

Acceptance

Contingency Planning

19

Benefits of Risk Management Program

20

Risk – Response Strategies

Financial

Protecting Resources

Business Culture

21

Why Risk Management is Important to Project Success

22

Risk – Response Strategies

Plans

Preparation

Results

Evaluation

23

Conducting Quantitative Risk Analysis

Decision Tree

24

Creating Procedures – Starting Block

A decision tree is a graph that uses a branching method to illustrate every possible outcome of a decision. Decision trees can be drawn by hand or created with a graphics program or specialized software.

Informally, decision trees are useful for focusing discussion when a group must make a decision

25

Decision Tree – Decision Paths

26

Decision Tree – Evaluate Options & Outcomes

27

Decision Tree – Calculation of Uncertain Outcome Nodes

28

0.4 (probability good outcome) x $1,000,000 (value) = $400,000
0.4 (probability moderate outcome) x $50,000 (value) = $20,000
0.2 (probability poor outcome) x $2,000 (value) = $400
TOTAL $420,400

Decision Tree –Calculate Value of Decision Nodes

29

Decision Tree –Calculate Value of Decision Nodes

30

Assignments

Chapter 8 (IT Managers Handbook)

Homework 3: IT Policy Management

Project 1:

Part A: Create an IT Governance Matrix

Part B: Create a Governance Charter for Enterprise Security Committee

Part C: Write a Information Security Policy for Data Classifications

31

Homework # 5 Risk Determination & Decision Tree Analysis

1. Review Module-5 Lecture Notes and Chapter Readings

2. Use the Risk Determination Excel Workbook and complete the following worksheets:

a. Corporate Assets Risk Summary - Tab

i. Use the Reference Tab in the workbook to select the appropriate values from the respective tables and complete Columns B, C, D, & E

ii. Column F (Risk Score) is a calculated field already formatted

iii. Column H (Possible Safeguards) provide the safeguards you would put in place to mitigate the threat (e.g., controls, policies, etc.)

b. Occupation Analysis - Tab

i. Use the Risk Level Table and assign the appropriate value for each occupation and the corresponding threats outlined in Columns B, C, D, &E

ii. Column F (Total) is a calculated filed already formatted

iii. Complete the occupational analysis; answer the four questions after completing your occupational vulnerability assessment

c. Decision Tree Analysis - Tab

i. Examine the Decision Tree Analysis for enterprise CRM solution approach

ii. Complete the corresponding tables for both paths and individual branches referencing the values in the decision tree diagram.

iii. Some of the data is already populated

iv. Total fields, Branch Total fields, and Value Fields are calculated fields and are already formatted

v. Answer the question regarding which options provides the best overall value

vi. Explain your reasoning for the choice you made, response should be based on your analysis of the decision tree results.

vii. Hint : Only one of the value fields should have a negative value when finished

3. Complete the Risk Determination Worksheets (M.S. Excel Document not PDF) and upload the file using the designated link on Moodle on or before the assignment due date.

Corpoarate Assets Risk Summary

Asset Under Review: Customer Realtionship Management System Financial Loss Legal Impacts Embarrassment Probability - Impact Risk Score Possible Safeguards Safeguard Cost
Unauthorized Disclosure 0 0 0 0 0
Unauthorized Modification 0 0 0 0 0
Unavailability 0 0 0 0 0
Unauthorized Destruction 0 0 0 0 0
Unauthorized Access 0 0 0 0 0
Asset Under Review: Supply Chain Management System Financial Loss Legal Impacts Embarrassment Probability - Impact Risk Score Possible Safeguards Safeguard Cost
Unauthorized Disclosure 0 0 0 0 0
Unauthorized Modification 0 0 0 0 0
Unavailability 0 0 0 0 0
Unauthorized Destruction 0 0 0 0 0
Unauthorized Access 0 0 0 0 0
Asset Under Review: Employee Training System Financial Loss Legal Impacts Embarrassment Probability - Impact Risk Score Possible Safeguards Safeguard Cost
Unauthorized Disclosure 0 0 0 0 0
Unauthorized Modification 0 0 0 0 0
Unavailability 0 0 0 0 0
Unauthorized Destruction 0 0 0 0 0
Unauthorized Access 0 0 0 0 0
Asset Under Review: Enterprise Data Center Financial Loss Legal Impacts Embarrassment Probability - Impact Risk Score Possible Safeguards Safeguard Cost
Fire 0 0 0 0 0
Water Damage 0 0 0 0 0
Production Environment Unavailability 0 0 0 0 0
Development Environment Unavailability 0 0 0 0 0
Loss of Facilities Power 0 0 0 0 0
Primary Network Area Storage Device Unavailabity 0 0 0 0 0
Theft of Computing Equipement 0 0 0 0 0
Unauthorized Access into EDC 0 0 0 0 0
Complete a qualitiative risk assessment for the each of the corpoarate assets using the predefined risk tables above and cooresponding refernce table on the reference tab in the workbook.

Occupation Analysis

Asset Under Review: Corporate Financial Data Vulnerability Total
Occupation Unauthorized Access Unauthorized Modification Unauthorized Disclousure Distruction
Chief Executive Officer 0
Chief Financial Officer 0
Chief Information Systems Officer 0
Chief Technology Officer 0
Executive Secretary 0
Director of Engineering 0
VP Finance & Accounting 0
VP Human Resources 0
Senior Accountatnts -CPA 0
Junior Accountants 0
Director of Telecommunications 0
Director of Enterprise Applications 0
Senior Application Developer 0
Junior Application Devloper 0
Database Administrator 0
Network Administrator 0
Production Supervisor 0
Manager of Facilities Maintenance 0
Helpdesk Technician 0
Shipping Clerk 0
Risk Level Value
Greatest Risk 6
Great Risk 5
Moderate Risk 4
Limited Risk 3
Low Risk 2
No Risk 1
Completet the occupation analysis Table above and then evaluate the results and answer the quetsions below
How is this analysis Useful?
Which occupations pose the highest risks to unauthorized modification to corpoarte financial data?
Which occupations pose the least risks to unauthorized modification to corpoarte financial data?
What safegauards would you implement to help prevent the unauthorized authorization of corporate finainical data?

Decision Tree

CRM Decision Tree Diagarm
Examine the decisoon treet diagarem above; next complete each of the decision trree branch analysis using the tables below; evaluate the final results and answer the question as to your recommnedation for the best option
Custom Development
Branch 1 Cost High Moderate Low Branch Total Value
In-House Development Probability Value Total Probability Value Total Probability Value Total
$10,000,000 0.10 $12,000,000 $1,200,000 $10,000,000 $0 0.70 $0 $1,200,000 -$8,800,000
Branch 2 Cost High Moderate Low
Outsource Development Probability Value Total Probability Value Total Probability Value Total
$9,700,000 $0 0.60 $0 $6,000,000 $0 $0 -$9,700,000
COTS
Branch 1 Cost High Moderate Low Branch Total Value
On-Premise COTS Probability Value Total Probability Value Total Probability Value Total
$7,500,000 $15,000,000 $0 $0 0.20 $0 $0 -$7,500,000
Branch 2 Cost High Moderate Low
Hosted COTS Probability Value Total Probability Value Total Probability Value Total
$6,500,000 0.80 $0 $0 0.10 $0 $0 -$6,500,000
Which option would provide the best overall value and why?
* Note: one of the branch values should resullt in a negative number.

References

Financial Loss Valuation Score Threat Vulnerability Work Table
Less than $2,000 1 Impact
Between $2K and $20K 2 Low Medium High
Between $20K and $50K 3 Probability High 3 6 9
Between $50K and $100K 4 Medium 2 5 8
Between $100K and $300K 5 Low 1 4 7
Between $300K and $500K 6
Between $500K and $1M 7
Between $1M and $5M 8
Between $5M and $10M 9
Between $10M and $30M 10
Between $30M and $100M 11
Greater Than $100M 12
Legal Implication Valuation Score
Under $5K 1
Between $5K and $10K 4
Between $10K and $50K 5
Between $50K an $1M and/or CIO liable for prosecution 8
Over $1M and/or Officers and/or Directors Liable 10
Enterprise Embarrassment Valuation Score
Embarrasment restricted to within the project of work site 1
Embarrassment spread to other work areas of operating group or division 2
Embarrassment spread throughout the enterprise 3
Public made aware thorugh local press 5
Adverse national press 7
Stcok proce impacted 10
Priority Score
Low 1
Low to Medium 2
Medium 3
Medium to High 4
High 5
Annual Loss Multiplier Table
Occurrence Frequency Multplier
Never 0.000
Once in 300 Years 0.003
Once in 200 Years 0.005
Once in 100 Years 0.010
Once in 50 Years 0.020
Once in 25Years 0.040
Once in 10 Years 0.100
Once in 5 Years 0.200
Once in 2 Years 0.500
Yearly 1.000
Twice a Year 2.000
Once a Month 12.000
Once a Week 52.000
Once a Day 365.000

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com