SlideShare a Scribd company logo
1 of 21
Risk Evaluation and Mitigation Strategies
This is a presentation on Risk Evaluation and
Mitigation Strategies.
Chapter 8
Presented by EO DETTBARN
Risk Evaluation and Mitigation Strategies
After this learning unit you should be able to:
• Discuss the different options for risk evaluation.
• Explain and apply different risk mitigation approaches.
• Explain policy exceptions and risk acceptance.
Risk Evaluation and Mitigation Strategies
Options for risk evaluation.
The 4 main once are,
● Avoid
● Accept
● Mitigate
● Transfer
Risk Evaluation and Mitigation Strategies
Avoid : The least frequently used however,it is
important to keep it in mind as an option.
Eliminate, withdraw from or not become involved
Accept : Many risks may be unavoidable or just
not worth mitigating for the organization, so in this
case, management needs to make a formal
decision to accept the risk. Many organizations
choose to ignore certain risks, which is really just
an implicit form of acceptance.
Risk Evaluation and Mitigation Strategies
Mitigate : To mitigate a risk really means to limit
the exposure in some way. This could include
reducing the likelihood of occurrence, decreasing
the severity of the impact, or even reducing the
sensitivity of the resource. Mitigation does not
imply a complete elimination of risk, just a
reduction to an acceptable level.
Risk Evaluation and Mitigation Strategies
Transfer : This option is gaining in popularity.
Example : Insurance to cover the expected
consequences of a risk exposure.
Data breach insurance is just starting to emerge
as an option for organizations, the idea being that
you transfer the risk to the insurance company.
Risk can also be transferred through contracts
with partners and clients or by pushing functions
out to the customer.
Risk Evaluation and Mitigation Strategies
Risk mitigation approaches.
There are many options for mitigating a risk.
Focus is not always on trying to eliminate the risk,
but rather to reduce the risk exposure to an
acceptable level. To mitigate a risk, you either
have to reduce the likelihood of occurrence, limit
the severity, or decrease the impact
Risk Evaluation and Mitigation Strategies
Risk Alleviation – implementscontrolsto prevent the
threat/vulnerability (such aspatching asoftware
weakness).
Risk Limitation –limitslikelihood or effectswith
controls(such astheexamplesgiven above).
Risk Planning – developsaformal plan to
prioritize,implement,and maintain controls(thisdoesn’t
directly changetherisk exposurelevel,but it assumes
someplan to addresstherisk in thenear
future,therefore,limiting thetimeframefor possible
exposure).
Risk Evaluation and Mitigation Strategies
The fourth mitigation option: Re-mediation
This ,isn’t applicable for all risks because not all
risks have a vulnerability that can be removed.
Risk Evaluation and Mitigation Strategies
Controls
If we think about the effects that controls can have
on risks, we can agree that they can potentially
lower any one or all of the variables used to
calculate the risk exposure.
Risk Evaluation and Mitigation Strategies
A preventative control may change the likelihood
of a vulnerability being exploited, but do nothing to
change the severity of a successful exploit. In
contrast, a reactive control may not lessen the
likelihood at all, but it could limit the severity by
con-straining the scope of the exploit once it is
detected.
Risk Evaluation and Mitigation Strategies
Policy exceptions and risk acceptance.
Risk exceptions serve many purposes, including
documenting when
• arisk exposurecan’t bere-mediated or mitigated
• thebusinesschoosesto accept arisk asis
• thecost of mitigation outweighstheimpact of the
exposure
• compensating controlsalready exist
• arisk exposureneedsto beaccepted temporarily
whileit isbeing addressed
Risk Evaluation and Mitigation Strategies
Whenever any of these situations occur, an
exception request will need to be filed and
approved. Keep in mind that an exception is not a
permanent approval
Risk Evaluation and Mitigation Strategies
Risk Evaluation and Mitigation Strategies
Exception work-flow
The level of approval needed for an exception
depends on the level of risk being introduced by
the deviation from policy and can be directly
mapped to the qualitative risk exposure mapping
table that we have been using.
See page 157 for an example
Risk Evaluation and Mitigation Strategies
Risk Evaluation and Mitigation Strategies
Theexception request form should capturethe
following information at aminimum:
• Target
Resource(application,system,environment,business
unit,or vendor)
• Submitter
• Functional Unit
• Work flow Status
• Expiration Date
• Risk ActiveStatus
Risk Evaluation and Mitigation Strategies
Continue
• Description of Exception
• Scopeof Risk
• Risk Description
• Compensating and/or Mitigating Controls
• Severity
• Likelihood
• Risk ExposureRanking
• Mitigation Plan
• Approval Tracking
• Individual Finding(s)
• Standard(s)Impacted
• Sourceof Findings
Risk Evaluation and Mitigation Strategies
Signature Requirements
There is no “rule”
For risks that does have a low impact and the
likelihood is small a project manager might be
signature might be sufficient. But the higher the
risks impact and likelihood it might require top
management to sign off on such changes.
Risk Evaluation and Mitigation Strategies
Expiration and Renewal
A good rule of thumb is for all exceptions to be
valid for a year from the approval date by default;
alternatively, the information security team can
select an expiration date based on the specific
mitigation plan for that exception.
Risk Evaluation and Mitigation Strategies
Depending on the level of risk approval can be
done by any of following individuals:
• Either a Senior Manager from the information
security team or the Chief Information Security
Officer.
• Senior management for the functional area or
business unit if the mitigation plan has changed.
Risk Evaluation and Mitigation Strategies
END

More Related Content

What's hot

What's hot (19)

Risk managment
Risk managmentRisk managment
Risk managment
 
Professional Networking: 3 key roles of accountant
Professional Networking: 3 key roles of accountantProfessional Networking: 3 key roles of accountant
Professional Networking: 3 key roles of accountant
 
Risk management
Risk managementRisk management
Risk management
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
Risk Mitigation
Risk MitigationRisk Mitigation
Risk Mitigation
 
Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelines
 
Organizational Risk Management
Organizational Risk Management Organizational Risk Management
Organizational Risk Management
 
Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
Risk avoidance
Risk avoidanceRisk avoidance
Risk avoidance
 
Risk Management in Pilotage - By Mr. Marantis Stylianos
Risk Management in Pilotage - By Mr. Marantis StylianosRisk Management in Pilotage - By Mr. Marantis Stylianos
Risk Management in Pilotage - By Mr. Marantis Stylianos
 
Risk management process
Risk management processRisk management process
Risk management process
 
Risk management process
Risk management  processRisk management  process
Risk management process
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 

Viewers also liked

Recommendations on Potential Market Acceptance v. 4
Recommendations on Potential Market Acceptance v. 4Recommendations on Potential Market Acceptance v. 4
Recommendations on Potential Market Acceptance v. 4
Jessica Waetjen
 
Gestione dei rischi: analisi di un modello semplificato per le PMI
Gestione dei rischi: analisi di un modello semplificato per le PMIGestione dei rischi: analisi di un modello semplificato per le PMI
Gestione dei rischi: analisi di un modello semplificato per le PMI
Stefano Bendandi
 
MEASUREMENT & EVALUATION OF RISK
MEASUREMENT & EVALUATION OF RISKMEASUREMENT & EVALUATION OF RISK
MEASUREMENT & EVALUATION OF RISK
Raj Anwar
 
Risk identification
Risk identificationRisk identification
Risk identification
murukkada
 
ppt on micro small and medium enterprises
ppt on micro small and medium enterprisesppt on micro small and medium enterprises
ppt on micro small and medium enterprises
Shreya Sharma
 
Micro, small and medium enterprises in india
Micro, small and medium enterprises in indiaMicro, small and medium enterprises in india
Micro, small and medium enterprises in india
Raveena Kaushal
 

Viewers also liked (16)

Recommendations on Potential Market Acceptance v. 4
Recommendations on Potential Market Acceptance v. 4Recommendations on Potential Market Acceptance v. 4
Recommendations on Potential Market Acceptance v. 4
 
PACE-IT, Security+ 2.3: Risk Mitigation Strategies
PACE-IT, Security+ 2.3: Risk Mitigation StrategiesPACE-IT, Security+ 2.3: Risk Mitigation Strategies
PACE-IT, Security+ 2.3: Risk Mitigation Strategies
 
TSCA - Risk Evaluation Rule
TSCA - Risk Evaluation RuleTSCA - Risk Evaluation Rule
TSCA - Risk Evaluation Rule
 
Gestione dei rischi: analisi di un modello semplificato per le PMI
Gestione dei rischi: analisi di un modello semplificato per le PMIGestione dei rischi: analisi di un modello semplificato per le PMI
Gestione dei rischi: analisi di un modello semplificato per le PMI
 
8 risk management
8 risk management8 risk management
8 risk management
 
MEASUREMENT & EVALUATION OF RISK
MEASUREMENT & EVALUATION OF RISKMEASUREMENT & EVALUATION OF RISK
MEASUREMENT & EVALUATION OF RISK
 
A Business Idea upto the Feasibility Analysis: Entrepreneurship
A Business Idea upto the Feasibility Analysis: EntrepreneurshipA Business Idea upto the Feasibility Analysis: Entrepreneurship
A Business Idea upto the Feasibility Analysis: Entrepreneurship
 
Risk assesment
Risk assesment Risk assesment
Risk assesment
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment template
 
MSME of all over india
MSME of all over indiaMSME of all over india
MSME of all over india
 
Risk identification
Risk identificationRisk identification
Risk identification
 
Role of msme in indian economic development
Role of msme in indian economic developmentRole of msme in indian economic development
Role of msme in indian economic development
 
Msme
MsmeMsme
Msme
 
ppt on micro small and medium enterprises
ppt on micro small and medium enterprisesppt on micro small and medium enterprises
ppt on micro small and medium enterprises
 
Micro, small and medium enterprises in india
Micro, small and medium enterprises in indiaMicro, small and medium enterprises in india
Micro, small and medium enterprises in india
 
Risk Management
Risk ManagementRisk Management
Risk Management
 

Similar to Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies

RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdfRISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
olabisiali
 
46753267 20075325-principles-of-risk-management-and-insurance-f
46753267 20075325-principles-of-risk-management-and-insurance-f46753267 20075325-principles-of-risk-management-and-insurance-f
46753267 20075325-principles-of-risk-management-and-insurance-f
Gaba Florian
 
Qrm presentation
Qrm presentationQrm presentation
Qrm presentation
Geetha Svcp
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
Paul Hunt
 

Similar to Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies (20)

12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
 
سيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxسيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptx
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix Presentation
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Risk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptxRisk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptx
 
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdfRISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
session 12.pptx
session 12.pptxsession 12.pptx
session 12.pptx
 
Risk Assessment.pptx
Risk Assessment.pptxRisk Assessment.pptx
Risk Assessment.pptx
 
Software Engineering Topic: Risk Management
Software Engineering Topic: Risk ManagementSoftware Engineering Topic: Risk Management
Software Engineering Topic: Risk Management
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Risk Management Toolkit
Risk Management ToolkitRisk Management Toolkit
Risk Management Toolkit
 
Risk-Management-ppt.pptx
Risk-Management-ppt.pptxRisk-Management-ppt.pptx
Risk-Management-ppt.pptx
 
46753267 20075325-principles-of-risk-management-and-insurance-f
46753267 20075325-principles-of-risk-management-and-insurance-f46753267 20075325-principles-of-risk-management-and-insurance-f
46753267 20075325-principles-of-risk-management-and-insurance-f
 
Qrm presentation
Qrm presentationQrm presentation
Qrm presentation
 
Risk management
Risk managementRisk management
Risk management
 
Week 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdfWeek 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdf
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to finance
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
anilsa9823
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
 

Recently uploaded (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 

Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies

  • 1. Risk Evaluation and Mitigation Strategies This is a presentation on Risk Evaluation and Mitigation Strategies. Chapter 8 Presented by EO DETTBARN
  • 2. Risk Evaluation and Mitigation Strategies After this learning unit you should be able to: • Discuss the different options for risk evaluation. • Explain and apply different risk mitigation approaches. • Explain policy exceptions and risk acceptance.
  • 3. Risk Evaluation and Mitigation Strategies Options for risk evaluation. The 4 main once are, ● Avoid ● Accept ● Mitigate ● Transfer
  • 4. Risk Evaluation and Mitigation Strategies Avoid : The least frequently used however,it is important to keep it in mind as an option. Eliminate, withdraw from or not become involved Accept : Many risks may be unavoidable or just not worth mitigating for the organization, so in this case, management needs to make a formal decision to accept the risk. Many organizations choose to ignore certain risks, which is really just an implicit form of acceptance.
  • 5. Risk Evaluation and Mitigation Strategies Mitigate : To mitigate a risk really means to limit the exposure in some way. This could include reducing the likelihood of occurrence, decreasing the severity of the impact, or even reducing the sensitivity of the resource. Mitigation does not imply a complete elimination of risk, just a reduction to an acceptable level.
  • 6. Risk Evaluation and Mitigation Strategies Transfer : This option is gaining in popularity. Example : Insurance to cover the expected consequences of a risk exposure. Data breach insurance is just starting to emerge as an option for organizations, the idea being that you transfer the risk to the insurance company. Risk can also be transferred through contracts with partners and clients or by pushing functions out to the customer.
  • 7. Risk Evaluation and Mitigation Strategies Risk mitigation approaches. There are many options for mitigating a risk. Focus is not always on trying to eliminate the risk, but rather to reduce the risk exposure to an acceptable level. To mitigate a risk, you either have to reduce the likelihood of occurrence, limit the severity, or decrease the impact
  • 8. Risk Evaluation and Mitigation Strategies Risk Alleviation – implementscontrolsto prevent the threat/vulnerability (such aspatching asoftware weakness). Risk Limitation –limitslikelihood or effectswith controls(such astheexamplesgiven above). Risk Planning – developsaformal plan to prioritize,implement,and maintain controls(thisdoesn’t directly changetherisk exposurelevel,but it assumes someplan to addresstherisk in thenear future,therefore,limiting thetimeframefor possible exposure).
  • 9. Risk Evaluation and Mitigation Strategies The fourth mitigation option: Re-mediation This ,isn’t applicable for all risks because not all risks have a vulnerability that can be removed.
  • 10. Risk Evaluation and Mitigation Strategies Controls If we think about the effects that controls can have on risks, we can agree that they can potentially lower any one or all of the variables used to calculate the risk exposure.
  • 11. Risk Evaluation and Mitigation Strategies A preventative control may change the likelihood of a vulnerability being exploited, but do nothing to change the severity of a successful exploit. In contrast, a reactive control may not lessen the likelihood at all, but it could limit the severity by con-straining the scope of the exploit once it is detected.
  • 12. Risk Evaluation and Mitigation Strategies Policy exceptions and risk acceptance. Risk exceptions serve many purposes, including documenting when • arisk exposurecan’t bere-mediated or mitigated • thebusinesschoosesto accept arisk asis • thecost of mitigation outweighstheimpact of the exposure • compensating controlsalready exist • arisk exposureneedsto beaccepted temporarily whileit isbeing addressed
  • 13. Risk Evaluation and Mitigation Strategies Whenever any of these situations occur, an exception request will need to be filed and approved. Keep in mind that an exception is not a permanent approval Risk Evaluation and Mitigation Strategies
  • 14. Risk Evaluation and Mitigation Strategies Exception work-flow The level of approval needed for an exception depends on the level of risk being introduced by the deviation from policy and can be directly mapped to the qualitative risk exposure mapping table that we have been using. See page 157 for an example
  • 15. Risk Evaluation and Mitigation Strategies
  • 16. Risk Evaluation and Mitigation Strategies Theexception request form should capturethe following information at aminimum: • Target Resource(application,system,environment,business unit,or vendor) • Submitter • Functional Unit • Work flow Status • Expiration Date • Risk ActiveStatus
  • 17. Risk Evaluation and Mitigation Strategies Continue • Description of Exception • Scopeof Risk • Risk Description • Compensating and/or Mitigating Controls • Severity • Likelihood • Risk ExposureRanking • Mitigation Plan • Approval Tracking • Individual Finding(s) • Standard(s)Impacted • Sourceof Findings
  • 18. Risk Evaluation and Mitigation Strategies Signature Requirements There is no “rule” For risks that does have a low impact and the likelihood is small a project manager might be signature might be sufficient. But the higher the risks impact and likelihood it might require top management to sign off on such changes.
  • 19. Risk Evaluation and Mitigation Strategies Expiration and Renewal A good rule of thumb is for all exceptions to be valid for a year from the approval date by default; alternatively, the information security team can select an expiration date based on the specific mitigation plan for that exception.
  • 20. Risk Evaluation and Mitigation Strategies Depending on the level of risk approval can be done by any of following individuals: • Either a Senior Manager from the information security team or the Chief Information Security Officer. • Senior management for the functional area or business unit if the mitigation plan has changed.
  • 21. Risk Evaluation and Mitigation Strategies END