SlideShare a Scribd company logo
1 of 54
Download to read offline
Risk Management
Time to blow it up and start over?

@alexhutton
Met E.T. Jaynes
probability theory, the logic of
science
Kuhn’s Protoscience
 A stage in the development of a science
that is described by:

• somewhat random fact gathering
  (mainly of readily accessible data)
• a “morass” of interesting, trivial,

  irrelevant observations
• A variety of theories (that are spawned

  from what he calls philosophical
  speculation) that provide little guidance
  to data gathering
only the wisest and stupidest of
men never change
Confucius
Destroy GRC
Musings of a Risk Management
Deconstructivist
A feeling of diss-connect
between GRC and Security
let’s talk governance
governance, without metrics &
models, is superstition
governance, with metrics &
models, describes capability to
manage risk
Why does what you
execute on and how
you execute matter?
governance, without metrics & models,
is superstition
governance, with metrics & models,
describes capability to manage risk

measurably good governance
practices (can/will) reduce risk
measurably good governance is
simply a description of capability to
manage risk
not sucking eggs at security is a
good idea
compliance*, without metrics, is
superstition
compliance*, with metrics, is risk
management


                          *(regulatory)
But “GRC” Risk
Management

Find issue, call
issue bad, fix issue,
hope you don’t find
it again...
What is risk?
a. Risk is notional
b. Risk is tangible
Problems with “tangible”

- complex systems, complexity
science

- usefulness outside of the very
specific

- measurements

- lots of belief statements
How Complex Systems Fail
(Being a Short Treatise on the Nature of Failure; How Failure
is Evaluated; How Failure is Attributed to Proximate Cause;
and the Resulting New Understanding of Patient Safety)

Richard I. Cook, MD
Cognitive technologies Laboratory
University of Chicago

http://www.ctlab.org/documents/How
%20Complex%20Systems
%20Fail.pdf
Catastrophe requires multiple failures
single point failures are not enough..

The array of defenses works. System operations are generally successful. Overt
catastrophic failure occurs when small, apparently innocuous failures join to create
opportunity for a systemic accident. Each of these small failures is necessary to cause
catastrophe but only the combination is sufficient to permit failure. Put another way, there are
many more failure opportunities than overt system accidents. Most initial failure trajectories
are blocked by designed system safety components. Trajectories that reach the operational
level are mostly blocked, usually by practitioners.


Complex systems contain changing mixtures of failures latent within them.

The complexity of these systems makes it impossible for them to run without multiple
flaws being present. Because these are individually insufficient to cause failure they are
regarded as minor factors during operations. Eradication of all latent failures is limited
primarily by economic cost but also because it is difficult before the fact to see how
such failures might contribute to an accident. The failures change constantly
because of changing technology, work organization, and efforts to eradicate failures.
Complex systems run in degraded mode.

Post-accident attribution accident to a ‘root
cause’ is fundamentally wrong.

All practitioner actions are gambles.

Human expertise in complex systems is
constantly changing

Change introduces new forms of failure.

Views of ‘cause’ limit the effectiveness of
defenses against future events.
Problems with “notional”

- becomes difficult to extract wisdom - we
want a “Gross Domestic Product”

- unable to be defended

- pseudo-scientific

- lots of belief statements
from Mark Curphey’s SecurityBullshit
What is risk?
uses of “risk”

- engineering
         - complex systems says “no”
- financial
          - no 110% return on your firewall
- medical
          - requires data
our standards say:

Find issue, call
issue bad, fix issue,
hope you don’t find
it again...
Managing risk means aligning the
capabilities of the organization, and
the exposure of the organization
with the tolerance of the data
owners
                              - Jack Jones
evidence based medicine, meet information security



     What is evidence-based risk
           management?

        a deconstructed, notional view of risk
Loss Landscape




                                              Threat Landscape



                            risk

Asset Landscape



                                   Controls Landscape
Loss Landscape

                                                                  a balanced
                                                                  scorecard?




Asset Landscape                                                Threat Landscape




                                   risk




                                          Controls Landscape
Loss Landscape                                              a balanced
                                                                              scorecard?

                                                                              capability
                                                                              (destroys “g”
                                                                              introducing quality
                                                                              management & mgmt.
Asset Landscape                                            Threat Landscape   science elements into
                                                                              infosec)


                               risk                                           exposure

                                                                              change

                                                                              “compliance”
                                                                              simply becomes a
                                                                              factor of loss
                                                                              landscape and/or
                                                                              operating as a
                                      Controls Landscape
                                                                              control group for
                                                                              comparative data
The Achilles heel again, lack of
             data
Models and data
sharing
Good Lord Of The Dance, something a
vendor might actually help you with
Verizon Incident Sharing Framework
             it’s open*!



                            * kinda
Verizon has shared data
-   2009 –
    over 600
    cases


-   2010 –
    between
    1000 &
    1400
Verizon is sharing our
framework
What is the Verizon Incident Sharing (VerIS)
Framework?

 - A means   to create metrics
   from the incident narrative
    -   how Verizon creates measurements for the DBIR

    -   how *anyone* can create measurements from an incident

    -   http://securityblog.verizonbusiness.com/wp-content/uploads/
        2010/03/VerIS_Framework_Beta_1.pdf
What makes up the VerIS framework?


 -   Demographics
 -   Incident Classification
     -   Event Modeling (a4)

 -   Discovery & Mitigation
 -   Impact Classification
     -   Impact Modeling
Cybertrust Security




                      demographics   -   company industry

                                     -   company size

                                     -   geographic location
                                         -   of business unit in incident


                                     -   size of security
                                         department
Cybertrust Security




                       incident classification                                                   -   agent
                                                         error
                                                     misuse
                                                                                                     -   what acts against us
                                        malware
                                  hacking               environmental

                      external                                                                   -   asset
                                                              social
                                            action              physical                             -   what the agent acts
                                                                                                         against
internal                        agent

                                            asset
                                                                  confidentiality
                                                                           possession            -   action
                      partner
                                                                                  availability       -   what the agent does to the
                                    type             attribute                   utility                 asset
                                       function

                                                                           authenticity
                                                                    integrity                    -   attribute
                                                                                                     -   the result of the agent’s
                                                                                                         action against the asset
Cybertrust Security




                      incident classification
                      a4 event model


             the series of events (a4) creates an “attack model”




                          1     >             2        >           3   >   4   >
                                                                                   5
Cybertrust Security




                      discovery & mitigation   -   incident timeline
                                               -   discovery method
                                                   evidence sources


                                  +
                                               -

                                               -   control capability
                                               -   corrective action
                                                   -   most straightforward manner
                                                       in which the incident could be
                                                       prevented

                                                   -   the cost of preventative
                                                       controls
Cybertrust Security




                      Impact classification   -   impact
                                                  categorization
                                                  -   sources of Impact




                                $
                                                      (direct, indirect)
                                                  -   similar to iso 27005/FAIR


                                              -   impact estimation
                                                  -   distribution for
                                                      amount of impact

                                              -   impact
                                                  qualification
                                                  -   relative impact
                                                      rating
Cybertrust Security




                      incident narrative                     incident metrics

                                                                 discovery
demographics                  incident classification (a4)                      impact classification



                                                                          +
                                                                 & mitigation

                                 1> 2> 3> 4 > 5                                 $$$
Cybertrust Security
                           case studies                         data set

                                                              discovery
demographics                   incident classification (a4)                  impact classification



                                                                       +
                                                              & mitigation

 a                               1> 2> 3> 4 > 5                              $$$
 b                                1> 2> 3> 4 > 5
                                                                       +     $$$
 c                                1> 2> 3> 4 > 5
                                                                       +     $$$
 d                                1> 2> 3> 4 > 5
                                                                       +     $$$
 e                                1> 2> 3> 4 > 5
                                                                       +     $$$
 f                                1> 2> 3> 4 > 5
                                                                       +     $$$
Cybertrust Security
                           data set                       knowledge & wisdom

                                                            discovery
demographics               incident classification (a4)                    impact classification



                                                                     +
                                                            & mitigation

 a                           1> 2> 3> 4 > 5                                $$$
 b                            1> 2> 3> 4 > 5
                                                                     +     $$$
 c                            1> 2> 3> 4 > 5
                                                                     +     $$$
 d                            1> 2> 3> 4 > 5
                                                                     +     $$$
 e                            1> 2> 3> 4 > 5
                                                                     +     $$$
 f                            1> 2> 3> 4 > 5
                                                                     +     $$$
Cybertrust Security
                           threat modeling

                                                          discovery
demographics               incident classification (a4)                  impact classification



                                                                   +
                                                          & mitigation

 a                           1> 2> 3> 4 > 5                              $$$
 b                            1> 2> 3> 4 > 5
                                                                   +     $$$
 c                            1> 2> 3> 4 > 5
                                                                   +     $$$
 d                            1> 2> 3> 4 > 5
                                                                   +     $$$
 e                            1> 2> 3> 4 > 5
                                                                   +     $$$
 f                            1> 2> 3> 4 > 5
                                                                   +     $$$
Cybertrust Security
                           threat modeling

                                                          discovery
demographics               incident classification (a4)                  impact classification



                                                                   +
                                                          & mitigation

 a                           1> 2> 3> 4 > 5                              $$$
 b                            1> 2> 3> 4 > 5
                                                                   +     $$$
 c                            1> 2> 3> 4 > 5
                                                                   +     $$$
 d                            1> 2> 3> 4 > 5
                                                                   +     $$$
 e                            1> 2> 3> 4 > 5
                                                                   +     $$$
 f                            1> 2> 3> 4 > 5
                                                                   +     $$$
Cybertrust Security
                           impact modeling

                                                          discovery
demographics               incident classification (a4)                  impact classification



                                                                   +
                                                          & mitigation

 a                           1> 2> 3> 4 > 5                              $$$
 b                            1> 2> 3> 4 > 5
                                                                   +     $$$
 c                            1> 2> 3> 4 > 5
                                                                   +     $$$
 d                            1> 2> 3> 4 > 5
                                                                   +     $$$
 e                            1> 2> 3> 4 > 5
                                                                   +     $$$
 f                            1> 2> 3> 4 > 5
                                                                   +     $$$
Cybertrust Security
                           impact modeling

                                                          discovery
demographics               incident classification (a4)                  impact classification



                                                                   +
                                                          & mitigation

 a                           1> 2> 3> 4 > 5                              $$$
 b                            1> 2> 3> 4 > 5
                                                                   +     $$$
 c                            1> 2> 3> 4 > 5
                                                                   +     $$$
 d                            1> 2> 3> 4 > 5
                                                                   +     $$$
 e                            1> 2> 3> 4 > 5
                                                                   +     $$$
 f                            1> 2> 3> 4 > 5
                                                                   +     $$$
Problems:

Data sharing, incidents, privacy

Failures vs. Successes
(where management capability helps)




Talking to the business owner
(might still need a “tangible approach here, but pseudo-actuarial data can help - we
still want a GDP)
Successes:

Bridge the gap
(IRM becomes tactically actionable based on threat/attack modeling)

(Capability measurements bridged to notional increase/decrease in risk)

(complex system problems addressed by showing multiple sources of causes)




Accurate, notional likelihood

Accurate tangible impact
Requirements:
Data Sets

Models

Technology

Sciences - complexity, management/TQM/Probability/
Game Theory, biomimicry...

More Related Content

What's hot

Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
BC Components and CM Lifecycle
BC Components and  CM LifecycleBC Components and  CM Lifecycle
BC Components and CM LifecycleZaszou
 
Walter Ammann - Business Continuity Management within the Concept of Integrat...
Walter Ammann - Business Continuity Management within the Concept of Integrat...Walter Ammann - Business Continuity Management within the Concept of Integrat...
Walter Ammann - Business Continuity Management within the Concept of Integrat...Global Risk Forum GRFDavos
 
The Knowledge Management Role In Mitigating Operational Risk
The Knowledge Management Role In Mitigating Operational RiskThe Knowledge Management Role In Mitigating Operational Risk
The Knowledge Management Role In Mitigating Operational RiskEduardo Longo
 
ITFM Business Brief
ITFM Business BriefITFM Business Brief
ITFM Business Briefwdjohnson1
 
Safetydivnewslettersummer05
Safetydivnewslettersummer05Safetydivnewslettersummer05
Safetydivnewslettersummer05supperman2011
 
Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security InvestmentConferencias FIST
 

What's hot (13)

Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Stream 2 - Don't Risk IT
Stream 2 - Don't Risk ITStream 2 - Don't Risk IT
Stream 2 - Don't Risk IT
 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
 
Behavioural Safety Issues Forum
Behavioural Safety Issues ForumBehavioural Safety Issues Forum
Behavioural Safety Issues Forum
 
Fms India 2011 Bcm
Fms India 2011 BcmFms India 2011 Bcm
Fms India 2011 Bcm
 
BC Components and CM Lifecycle
BC Components and  CM LifecycleBC Components and  CM Lifecycle
BC Components and CM Lifecycle
 
Walter Ammann - Business Continuity Management within the Concept of Integrat...
Walter Ammann - Business Continuity Management within the Concept of Integrat...Walter Ammann - Business Continuity Management within the Concept of Integrat...
Walter Ammann - Business Continuity Management within the Concept of Integrat...
 
The Knowledge Management Role In Mitigating Operational Risk
The Knowledge Management Role In Mitigating Operational RiskThe Knowledge Management Role In Mitigating Operational Risk
The Knowledge Management Role In Mitigating Operational Risk
 
ITFM Business Brief
ITFM Business BriefITFM Business Brief
ITFM Business Brief
 
Safetydivnewslettersummer05
Safetydivnewslettersummer05Safetydivnewslettersummer05
Safetydivnewslettersummer05
 
Apdip disaster mgmt
Apdip disaster mgmtApdip disaster mgmt
Apdip disaster mgmt
 
Conceptual Risk Model
Conceptual Risk ModelConceptual Risk Model
Conceptual Risk Model
 
Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security Investment
 

Similar to Risk Management - Time to blow it up and start over? - Alex Hutton

Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Seema Sheth-Voss
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierRamsés Gallego
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRaffael Marty
 
Hutton/Miller SourceBarcelona
Hutton/Miller SourceBarcelonaHutton/Miller SourceBarcelona
Hutton/Miller SourceBarcelonaAlexander Hutton
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT SecuritySeccuris Inc.
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGArul Nambi
 
Dubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooDubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooGuan Khoo
 
Yves caseau@md day2011
Yves caseau@md day2011Yves caseau@md day2011
Yves caseau@md day2011MDDAY11
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringQ1 Labs
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Osprey Bank Risk
Osprey Bank RiskOsprey Bank Risk
Osprey Bank Riskpakelly
 
Mortman/Hutton Security B-Sides Presentation
Mortman/Hutton Security B-Sides PresentationMortman/Hutton Security B-Sides Presentation
Mortman/Hutton Security B-Sides PresentationAlexander Hutton
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programsSecurity BSides London
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0Fabrizio Cilli
 

Similar to Risk Management - Time to blow it up and start over? - Alex Hutton (20)

Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event Analysis
 
Hutton/Miller SourceBarcelona
Hutton/Miller SourceBarcelonaHutton/Miller SourceBarcelona
Hutton/Miller SourceBarcelona
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
Real Time Risk Management
Real Time Risk ManagementReal Time Risk Management
Real Time Risk Management
 
Dubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooDubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs Khoo
 
Yves caseau@md day2011
Yves caseau@md day2011Yves caseau@md day2011
Yves caseau@md day2011
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk Scoring
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Osprey Bank Risk
Osprey Bank RiskOsprey Bank Risk
Osprey Bank Risk
 
Mortman/Hutton Security B-Sides Presentation
Mortman/Hutton Security B-Sides PresentationMortman/Hutton Security B-Sides Presentation
Mortman/Hutton Security B-Sides Presentation
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programs
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
 
eccenca Basic
eccenca Basiceccenca Basic
eccenca Basic
 
Rm
RmRm
Rm
 

More from Security B-Sides

Lord of the bing b-sides atl
Lord of the bing   b-sides atlLord of the bing   b-sides atl
Lord of the bing b-sides atlSecurity B-Sides
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c Security B-Sides
 
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Security B-Sides
 
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySocial Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySecurity B-Sides
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
Security? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity B-Sides
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...Security B-Sides
 
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineThe Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineSecurity B-Sides
 
Dominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsDominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsSecurity B-Sides
 
Enterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldEnterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldSecurity B-Sides
 
From fishing to phishing to ?
From fishing to phishing to ?From fishing to phishing to ?
From fishing to phishing to ?Security B-Sides
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the faceSecurity B-Sides
 
Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Security B-Sides
 

More from Security B-Sides (20)

Lord of the bing b-sides atl
Lord of the bing   b-sides atlLord of the bing   b-sides atl
Lord of the bing b-sides atl
 
The road to hell v0.6
The road to hell v0.6The road to hell v0.6
The road to hell v0.6
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
 
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySocial Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Security? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity? Who cares! - Brett Hardin
Security? Who cares! - Brett Hardin
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
 
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineThe Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
 
Dominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsDominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource tools
 
2009 Zacon Haroon Meer
2009 Zacon  Haroon  Meer2009 Zacon  Haroon  Meer
2009 Zacon Haroon Meer
 
Enterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldEnterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the Gold
 
From fishing to phishing to ?
From fishing to phishing to ?From fishing to phishing to ?
From fishing to phishing to ?
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
 
Make Tea Not War
Make Tea Not WarMake Tea Not War
Make Tea Not War
 
OWASP Proxy
OWASP ProxyOWASP Proxy
OWASP Proxy
 
Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)
 
Exploitation
ExploitationExploitation
Exploitation
 
Layer 2 Hackery
Layer 2 HackeryLayer 2 Hackery
Layer 2 Hackery
 

Recently uploaded

Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 

Recently uploaded (20)

Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 

Risk Management - Time to blow it up and start over? - Alex Hutton

  • 1. Risk Management Time to blow it up and start over? @alexhutton
  • 2. Met E.T. Jaynes probability theory, the logic of science
  • 3. Kuhn’s Protoscience A stage in the development of a science that is described by: • somewhat random fact gathering (mainly of readily accessible data) • a “morass” of interesting, trivial, irrelevant observations • A variety of theories (that are spawned from what he calls philosophical speculation) that provide little guidance to data gathering
  • 4. only the wisest and stupidest of men never change Confucius
  • 5. Destroy GRC Musings of a Risk Management Deconstructivist
  • 6. A feeling of diss-connect between GRC and Security
  • 8. governance, without metrics & models, is superstition governance, with metrics & models, describes capability to manage risk
  • 9. Why does what you execute on and how you execute matter?
  • 10.
  • 11.
  • 12. governance, without metrics & models, is superstition governance, with metrics & models, describes capability to manage risk measurably good governance practices (can/will) reduce risk measurably good governance is simply a description of capability to manage risk
  • 13. not sucking eggs at security is a good idea
  • 14. compliance*, without metrics, is superstition compliance*, with metrics, is risk management *(regulatory)
  • 15. But “GRC” Risk Management Find issue, call issue bad, fix issue, hope you don’t find it again...
  • 17. a. Risk is notional b. Risk is tangible
  • 18. Problems with “tangible” - complex systems, complexity science - usefulness outside of the very specific - measurements - lots of belief statements
  • 19. How Complex Systems Fail (Being a Short Treatise on the Nature of Failure; How Failure is Evaluated; How Failure is Attributed to Proximate Cause; and the Resulting New Understanding of Patient Safety) Richard I. Cook, MD Cognitive technologies Laboratory University of Chicago http://www.ctlab.org/documents/How %20Complex%20Systems %20Fail.pdf
  • 20. Catastrophe requires multiple failures single point failures are not enough.. The array of defenses works. System operations are generally successful. Overt catastrophic failure occurs when small, apparently innocuous failures join to create opportunity for a systemic accident. Each of these small failures is necessary to cause catastrophe but only the combination is sufficient to permit failure. Put another way, there are many more failure opportunities than overt system accidents. Most initial failure trajectories are blocked by designed system safety components. Trajectories that reach the operational level are mostly blocked, usually by practitioners. Complex systems contain changing mixtures of failures latent within them. The complexity of these systems makes it impossible for them to run without multiple flaws being present. Because these are individually insufficient to cause failure they are regarded as minor factors during operations. Eradication of all latent failures is limited primarily by economic cost but also because it is difficult before the fact to see how such failures might contribute to an accident. The failures change constantly because of changing technology, work organization, and efforts to eradicate failures.
  • 21. Complex systems run in degraded mode. Post-accident attribution accident to a ‘root cause’ is fundamentally wrong. All practitioner actions are gambles. Human expertise in complex systems is constantly changing Change introduces new forms of failure. Views of ‘cause’ limit the effectiveness of defenses against future events.
  • 22. Problems with “notional” - becomes difficult to extract wisdom - we want a “Gross Domestic Product” - unable to be defended - pseudo-scientific - lots of belief statements
  • 23. from Mark Curphey’s SecurityBullshit
  • 25. uses of “risk” - engineering - complex systems says “no” - financial - no 110% return on your firewall - medical - requires data
  • 26. our standards say: Find issue, call issue bad, fix issue, hope you don’t find it again...
  • 27. Managing risk means aligning the capabilities of the organization, and the exposure of the organization with the tolerance of the data owners - Jack Jones
  • 28. evidence based medicine, meet information security What is evidence-based risk management? a deconstructed, notional view of risk
  • 29. Loss Landscape Threat Landscape risk Asset Landscape Controls Landscape
  • 30. Loss Landscape a balanced scorecard? Asset Landscape Threat Landscape risk Controls Landscape
  • 31. Loss Landscape a balanced scorecard? capability (destroys “g” introducing quality management & mgmt. Asset Landscape Threat Landscape science elements into infosec) risk exposure change “compliance” simply becomes a factor of loss landscape and/or operating as a Controls Landscape control group for comparative data
  • 32. The Achilles heel again, lack of data
  • 33. Models and data sharing Good Lord Of The Dance, something a vendor might actually help you with
  • 34. Verizon Incident Sharing Framework it’s open*! * kinda
  • 36. - 2009 – over 600 cases - 2010 – between 1000 & 1400
  • 37. Verizon is sharing our framework
  • 38. What is the Verizon Incident Sharing (VerIS) Framework? - A means to create metrics from the incident narrative - how Verizon creates measurements for the DBIR - how *anyone* can create measurements from an incident - http://securityblog.verizonbusiness.com/wp-content/uploads/ 2010/03/VerIS_Framework_Beta_1.pdf
  • 39. What makes up the VerIS framework? - Demographics - Incident Classification - Event Modeling (a4) - Discovery & Mitigation - Impact Classification - Impact Modeling
  • 40. Cybertrust Security demographics - company industry - company size - geographic location - of business unit in incident - size of security department
  • 41. Cybertrust Security incident classification - agent error misuse - what acts against us malware hacking environmental external - asset social action physical - what the agent acts against internal agent asset confidentiality possession - action partner availability - what the agent does to the type attribute utility asset function authenticity integrity - attribute - the result of the agent’s action against the asset
  • 42. Cybertrust Security incident classification a4 event model the series of events (a4) creates an “attack model” 1 > 2 > 3 > 4 > 5
  • 43. Cybertrust Security discovery & mitigation - incident timeline - discovery method evidence sources + - - control capability - corrective action - most straightforward manner in which the incident could be prevented - the cost of preventative controls
  • 44. Cybertrust Security Impact classification - impact categorization - sources of Impact $ (direct, indirect) - similar to iso 27005/FAIR - impact estimation - distribution for amount of impact - impact qualification - relative impact rating
  • 45. Cybertrust Security incident narrative incident metrics discovery demographics incident classification (a4) impact classification + & mitigation 1> 2> 3> 4 > 5 $$$
  • 46. Cybertrust Security case studies data set discovery demographics incident classification (a4) impact classification + & mitigation a 1> 2> 3> 4 > 5 $$$ b 1> 2> 3> 4 > 5 + $$$ c 1> 2> 3> 4 > 5 + $$$ d 1> 2> 3> 4 > 5 + $$$ e 1> 2> 3> 4 > 5 + $$$ f 1> 2> 3> 4 > 5 + $$$
  • 47. Cybertrust Security data set knowledge & wisdom discovery demographics incident classification (a4) impact classification + & mitigation a 1> 2> 3> 4 > 5 $$$ b 1> 2> 3> 4 > 5 + $$$ c 1> 2> 3> 4 > 5 + $$$ d 1> 2> 3> 4 > 5 + $$$ e 1> 2> 3> 4 > 5 + $$$ f 1> 2> 3> 4 > 5 + $$$
  • 48. Cybertrust Security threat modeling discovery demographics incident classification (a4) impact classification + & mitigation a 1> 2> 3> 4 > 5 $$$ b 1> 2> 3> 4 > 5 + $$$ c 1> 2> 3> 4 > 5 + $$$ d 1> 2> 3> 4 > 5 + $$$ e 1> 2> 3> 4 > 5 + $$$ f 1> 2> 3> 4 > 5 + $$$
  • 49. Cybertrust Security threat modeling discovery demographics incident classification (a4) impact classification + & mitigation a 1> 2> 3> 4 > 5 $$$ b 1> 2> 3> 4 > 5 + $$$ c 1> 2> 3> 4 > 5 + $$$ d 1> 2> 3> 4 > 5 + $$$ e 1> 2> 3> 4 > 5 + $$$ f 1> 2> 3> 4 > 5 + $$$
  • 50. Cybertrust Security impact modeling discovery demographics incident classification (a4) impact classification + & mitigation a 1> 2> 3> 4 > 5 $$$ b 1> 2> 3> 4 > 5 + $$$ c 1> 2> 3> 4 > 5 + $$$ d 1> 2> 3> 4 > 5 + $$$ e 1> 2> 3> 4 > 5 + $$$ f 1> 2> 3> 4 > 5 + $$$
  • 51. Cybertrust Security impact modeling discovery demographics incident classification (a4) impact classification + & mitigation a 1> 2> 3> 4 > 5 $$$ b 1> 2> 3> 4 > 5 + $$$ c 1> 2> 3> 4 > 5 + $$$ d 1> 2> 3> 4 > 5 + $$$ e 1> 2> 3> 4 > 5 + $$$ f 1> 2> 3> 4 > 5 + $$$
  • 52. Problems: Data sharing, incidents, privacy Failures vs. Successes (where management capability helps) Talking to the business owner (might still need a “tangible approach here, but pseudo-actuarial data can help - we still want a GDP)
  • 53. Successes: Bridge the gap (IRM becomes tactically actionable based on threat/attack modeling) (Capability measurements bridged to notional increase/decrease in risk) (complex system problems addressed by showing multiple sources of causes) Accurate, notional likelihood Accurate tangible impact
  • 54. Requirements: Data Sets Models Technology Sciences - complexity, management/TQM/Probability/ Game Theory, biomimicry...