SlideShare a Scribd company logo
1 of 42
Download to read offline
Fundamentals Matter – A Brief
Introduction to Risk Analysis for
Information Security
Southern Methodist University, March 26, 2014
Heather Goodnight, President
Patrick Florer, CTO
Risk Centric Security, Inc.
www.riskcentricsecurity.com
Authorized reseller of ModelRisk from Vose Software
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Risk Analysis for the 21st Century®
• Introductions
• What we are going to talk about
o Why Fundamentals Matter / Current State
o Definitions
• Risk and the Risk Landscape
• Possibility and Probability
• Measurement
• Variability and Uncertainty
• Precision vs. Accuracy
• Scales of Measurement: Qualitative vs. Quantitative
• Not Enough Data
• Monte Carlo Simulation
• Modeling Expert Opinion and PERT distributions
Agenda
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Heather Goodnight is an accomplished Global Sales and Business Development
Consultant. Over the years, her unique, practical insight into problems of risk and
opportunity have provided important guidance for organizations both large and
small. She is a cofounder of Risk Centric Security and currently serves as President
of the Corporation. In 2010, she was appointed to the RIM Council (Responsible
Information Council) of the Ponemon Institute. In addition to her role at Risk
Centric Security, she serves as Business Development Manager at Triumfant, Inc.,
a vendor of advanced anti-malware products.
Patrick Florer has worked in information technology for almost 35 years. For 17
years, he worked a parallel track in medical outcomes research, analysis, and the
creation of evidence-based guidelines for medical treatment. His roles have
included IT operations, programming, and systems analysis. From 1986 until now,
he has worked as an independent consultant, helping customers with strategic
development, analytics, risk analysis, and decision analysis. He is a cofounder of
Risk Centric Security and currently serves as Chief Technology Officer. He is a
member of the Ponemon Institute RIM council. In 2012, he was appointed
Distinguished Fellow of the Ponemon Institute.
Introductions
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The Current State of Confusion …
.
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
ROI IRR
EPS
EMV
EBITDA
≠
Often leads to this …
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
What is Risk?
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
What Risk Isn’t!
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Vulnerability Threat
Risk = Frequency x Impact
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Frequency
Impact
Risk
Risk and Opportunity
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Possibility and Probability: Possibility
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Possibility and Probability: Probability
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
What is a Measurement?
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Properties of Measurement
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Validity
Reproducibility
Detail
Sources of Error in Measurement?
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Random Error
Errors from Bias
Variability and Uncertainty
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Variability
Uncertainty
Precision and Accuracy
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Scales of Measurement
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Qualitative Quantitative
Qualitative Scales
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Nominal/Categorical
IntervalOrdinal
HIGH - Red
MEDIUM - Orange
LOW - Green
First, Second, Third … On a scale of …
Quantitative/Ratio Scales
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
1, 2, 3, 4, 5, 6, … n
Problems with Qualitative Scales
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
My Scale
High
Medium
Low
Red
Orange
Green
Your Scale
High
Medium
Low
Red
Orange
Yellow
Green
(RED – GREEN + MEDIUM) / Somewhat Likely
= ???
Mismatched Scales
Meaningless Calculations
Assessor Disagreements
Problems with Qualitative Scales
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Boundary Problems
$2.5M Loss Exposure = Moderate = Yellow
$2.5M Loss Exposure = Moderate = Yellow
$2.5M Loss Exposure = Moderate = Yellow
$7.5M Aggregate Loss Exposure = not so Moderate !
Issues with Loss of Information
Quantitative Scales
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
2 + 2 - 1 = 3
360 * 10 = 3,600
Sqrt(25) = 5
f(x) = y
etc.
Qualitative Methods - Problems
Difficulty with arithmetic and statistical operations
From ISO 17999
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Qualitative Methods - Problems
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Qualitative Methods - Problems
On a scale of 1 to 5,
where 1 = least and 5 = most,
please rate …
Likert scale (From Wikipedia, the free encyclopedia)
When responding to a Likert questionnaire item, respondents
specify their level of agreement or disagreement …
In so doing, Likert scaling assumes that distances
on each item are equal …
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Data
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Good Data Bad Data
Big Data
Little Data
How much data is enough data?
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
How do I get to the mall?
How do we build this?
vs.
Data from Calibrated Estimates
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
More often than you might think, the data we have to work with
comes from Subject Matter Experts (SME’s).
How can we improve the accuracy of these SME’s – to a 90%
confidence level?
With calibration.
Example: How much does an iPhone 5s weigh?
Monte Carlo Simulation
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The average = $12,500
$2,500 $12,500 $32,000
The range is:
The distributions are:
Monte Carlo Simulation
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The Beta Pert Calculator
Minimum:
What is the least or lowest (best or worst) numerical
estimate that you believe to be reasonable? This will be the
smallest number you come up with.
Most Likely:
What is the most likely or most probable numerical estimate
in your opinion? This number must fall between the
minimum and maximum. It may equal either the minimum
or the maximum, but should not equal both
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The Beta Pert Calculator
Maximum:
What is the greatest or highest (best or worst)
numerical estimate that you believe to be
reasonable?
Note that “best” or “worst” case estimates could be
either minimum or maximum values, depending upon
the scenario.
In a risk / loss exposure scenario, lower is better, so the
minimum represents the lowest loss, or best outcome.
The maximum represents the highest loss, or worst
outcome.
In a sales or opportunity scenario, it’s the reverse:
lower is not better, so the minimum represents the
worst case. Higher is better, so the maximum
represents the best case.
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The Beta Pert Calculator
Confidence:
On a scale that includes “Very Low”, “Low”, “Average”,
“High”, and “Very High”, how confident are you in the
accuracy of your estimates?
This parameter controls the sampling around the most likely
value, and thereby also controls the height of the histogram
or slope of the cumulative plot.
For most analyses, using “Average” for the confidence
parameter works well. In this instance, “Average” really
means having no strong feeling about the matter – being
evenly divided between under-confidence and over-
confidence.
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The Beta Pert Calculator
Percentile Tables
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The Beta Pert Calculator
Percentile Tables
1% of values are <= 10,044 and 99% are > 10,044
10% of values are <= 11,120 and 90% are > 11,120
20% of values are <= 11,658 and 80% are > 11,658
50% of values are <= 13,025 and 50% are > 13,025
The 50th percentile has another name - it’s
called the Median.
The Median is the mid-point in a list of values -
half of the values in the list are less and half
are greater than the Median.
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The Beta Pert Calculator
Histogram
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
The Beta Pert Calculator
Cumulative Plot
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Thank you !
Heather Goodnight
President and Cofounder
Patrick Florer
CTO and Co-founder
Risk Centric Security, Inc
patrick@riskcentricsecurity.com
214.828.1172
Authorized reseller of ModelRisk from Vose Software
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
Risk Analysis for the 21st Century ®
”We don’t have enough data!” - Sources
Open Security Foundation: datalossdb and osvdb
http://www.opensecurityfoundation.org/
Office of Inadequate Security:
http://www.databreaches.net/
Identity Theft Resource Center:
http://www.idtheftcenter.org/
ISACA: www.isaca.org
ISSA: www.issa.org
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
”We don’t have enough data!” - Sources
Mitre Corporation: www.mitre.org
OWASP: http://owasp.com/index.php/Main_Page
Privacy Rights Clearing House:
http://www.privacyrights.org/
SANS: www.sans.org
The Ponemon Institute: www.ponemon.org
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
”We don’t have enough data!” - Sources
Conference procedings: Black Hat, RSA, Source
Conferences, BSides
Internet tools:
Search engines: Google, Bing, Yahoo, Ask.com
Trend Analyzers:
Google trends:
http://www.google.com/trends
Twitter Trends: www.trendistic.com
Amazon:
http://www.metricjunkie.com/
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
”We don’t have enough data!” - Sources
Securitymetrics.org – mailing list
Society of Information Risk Analysts (SIRA)
Books:
How to Measure Anything – Hubbard
The Failure of Risk Management – Hubbard
Risk Analysis: A Quantitative Guide – Vose
Clinical Epidemiology and Biostatistics – Kramer
Data-Driven Security: Analysis, Visualization and Dashboards – Jacobs and
Rudis
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright © 2014 Risk Centric Security, Inc . All rights reserved.

More Related Content

What's hot

Riskpro SCRAY whitepaper
Riskpro SCRAY whitepaperRiskpro SCRAY whitepaper
Riskpro SCRAY whitepaperEdgevalue
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactionsbrucelb
 
Taking the Attacker Eviction Red Pill [updated]
Taking the Attacker Eviction Red Pill [updated]Taking the Attacker Eviction Red Pill [updated]
Taking the Attacker Eviction Red Pill [updated]Frode Hommedal
 
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer
 
The Critical Incident Response Maturity Journey
The Critical Incident Response Maturity JourneyThe Critical Incident Response Maturity Journey
The Critical Incident Response Maturity JourneyEMC
 
HP Software Performance Tour 2014 - Guarding against the Data Breach
HP Software Performance Tour 2014 - Guarding against the Data BreachHP Software Performance Tour 2014 - Guarding against the Data Breach
HP Software Performance Tour 2014 - Guarding against the Data BreachHP Enterprise Italia
 

What's hot (8)

Riskpro SCRAY whitepaper
Riskpro SCRAY whitepaperRiskpro SCRAY whitepaper
Riskpro SCRAY whitepaper
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactions
 
Taking the Attacker Eviction Red Pill [updated]
Taking the Attacker Eviction Red Pill [updated]Taking the Attacker Eviction Red Pill [updated]
Taking the Attacker Eviction Red Pill [updated]
 
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
 
The Critical Incident Response Maturity Journey
The Critical Incident Response Maturity JourneyThe Critical Incident Response Maturity Journey
The Critical Incident Response Maturity Journey
 
HP Software Performance Tour 2014 - Guarding against the Data Breach
HP Software Performance Tour 2014 - Guarding against the Data BreachHP Software Performance Tour 2014 - Guarding against the Data Breach
HP Software Performance Tour 2014 - Guarding against the Data Breach
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 

Viewers also liked

Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breachPatrick Florer
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsResilient Systems
 
2009 Cost Of Data Breach
2009 Cost Of  Data Breach2009 Cost Of  Data Breach
2009 Cost Of Data BreachPGP Corporation
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalPatrick Florer
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authenticationPaulo Martins
 
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)Jordi Cabot
 
Herd Immunity – Does this concept from Immunology have relevance for Informat...
Herd Immunity – Does this concept from Immunology have relevance for Informat...Herd Immunity – Does this concept from Immunology have relevance for Informat...
Herd Immunity – Does this concept from Immunology have relevance for Informat...Patrick Florer
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slidesSteve Arnold
 
Understanding Herd immunity
Understanding Herd immunityUnderstanding Herd immunity
Understanding Herd immunitydipesh125
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Approaches to risk management banking example slides
Approaches to risk management   banking example slidesApproaches to risk management   banking example slides
Approaches to risk management banking example slidesJohn MX Jkalyn
 
Measuring operational risk
Measuring operational riskMeasuring operational risk
Measuring operational riskUjjwal 'Shanu'
 
Operational risk management
Operational risk managementOperational risk management
Operational risk managementUjjwal 'Shanu'
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Managementarsqureshi
 
Kyriba currency risk management webinar slides 3.17.16 ss
Kyriba currency risk management webinar slides 3.17.16 ssKyriba currency risk management webinar slides 3.17.16 ss
Kyriba currency risk management webinar slides 3.17.16 sseardelean
 
Disaster Risk Reduction and Management
Disaster Risk Reduction and ManagementDisaster Risk Reduction and Management
Disaster Risk Reduction and ManagementRyann Castro
 

Viewers also liked (19)

Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breach
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
 
2009 Cost Of Data Breach
2009 Cost Of  Data Breach2009 Cost Of  Data Breach
2009 Cost Of Data Breach
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
 
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)
 
Herd Immunity – Does this concept from Immunology have relevance for Informat...
Herd Immunity – Does this concept from Immunology have relevance for Informat...Herd Immunity – Does this concept from Immunology have relevance for Informat...
Herd Immunity – Does this concept from Immunology have relevance for Informat...
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Understanding Herd immunity
Understanding Herd immunityUnderstanding Herd immunity
Understanding Herd immunity
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Approaches to risk management banking example slides
Approaches to risk management   banking example slidesApproaches to risk management   banking example slides
Approaches to risk management banking example slides
 
Measuring operational risk
Measuring operational riskMeasuring operational risk
Measuring operational risk
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Management
 
Kyriba currency risk management webinar slides 3.17.16 ss
Kyriba currency risk management webinar slides 3.17.16 ssKyriba currency risk management webinar slides 3.17.16 ss
Kyriba currency risk management webinar slides 3.17.16 ss
 
Disaster Risk Reduction and Management
Disaster Risk Reduction and ManagementDisaster Risk Reduction and Management
Disaster Risk Reduction and Management
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Similar to Smu seminar 2014_03_26 v3

Base Rate Fallacy Sira Con 2012 05
Base Rate Fallacy Sira Con 2012 05Base Rate Fallacy Sira Con 2012 05
Base Rate Fallacy Sira Con 2012 05hgoodnight
 
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool StuffMeasurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool StuffPatrick Florer
 
Agile IS Risk Management - Agile 2014 - Antifragile
Agile IS Risk Management - Agile 2014 - AntifragileAgile IS Risk Management - Agile 2014 - Antifragile
Agile IS Risk Management - Agile 2014 - AntifragileKen Rubin
 
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool StuffMeasurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool StuffJody Keyser
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Alex Yates
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security InvestmentJojo Colina
 
Agile IS Risk Management -- Dump the Heavyweight Process and Embrace the Prin...
Agile IS Risk Management -- Dump the Heavyweight Process and Embrace the Prin...Agile IS Risk Management -- Dump the Heavyweight Process and Embrace the Prin...
Agile IS Risk Management -- Dump the Heavyweight Process and Embrace the Prin...Ken Rubin
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Risk Assessment About Building And Risk
Risk Assessment About Building And RiskRisk Assessment About Building And Risk
Risk Assessment About Building And RiskFaheem Ul Hasan
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceEvan Francen
 
Keynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasKeynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasEvan Francen
 
Risk Analysis Webinar
Risk Analysis WebinarRisk Analysis Webinar
Risk Analysis WebinarJody Keyser
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Patrick Florer
 
Understanding Risk Management Basics for Business Owners (Series: Business Pr...
Understanding Risk Management Basics for Business Owners (Series: Business Pr...Understanding Risk Management Basics for Business Owners (Series: Business Pr...
Understanding Risk Management Basics for Business Owners (Series: Business Pr...Financial Poise
 

Similar to Smu seminar 2014_03_26 v3 (20)

Base Rate Fallacy Sira Con 2012 05
Base Rate Fallacy Sira Con 2012 05Base Rate Fallacy Sira Con 2012 05
Base Rate Fallacy Sira Con 2012 05
 
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool StuffMeasurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Agile IS Risk Management - Agile 2014 - Antifragile
Agile IS Risk Management - Agile 2014 - AntifragileAgile IS Risk Management - Agile 2014 - Antifragile
Agile IS Risk Management - Agile 2014 - Antifragile
 
How MSPs and MDRs Can Work Together.pdf
How MSPs and MDRs Can Work Together.pdfHow MSPs and MDRs Can Work Together.pdf
How MSPs and MDRs Can Work Together.pdf
 
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool StuffMeasurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
 
Agile IS Risk Management -- Dump the Heavyweight Process and Embrace the Prin...
Agile IS Risk Management -- Dump the Heavyweight Process and Embrace the Prin...Agile IS Risk Management -- Dump the Heavyweight Process and Embrace the Prin...
Agile IS Risk Management -- Dump the Heavyweight Process and Embrace the Prin...
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Risk Assessment About Building And Risk
Risk Assessment About Building And RiskRisk Assessment About Building And Risk
Risk Assessment About Building And Risk
 
Netrika Brochure
Netrika BrochureNetrika Brochure
Netrika Brochure
 
Netrika Brochure
Netrika BrochureNetrika Brochure
Netrika Brochure
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
Keynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasKeynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware Dallas
 
Risk Analysis Webinar
Risk Analysis WebinarRisk Analysis Webinar
Risk Analysis Webinar
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
 
Understanding Risk Management Basics for Business Owners (Series: Business Pr...
Understanding Risk Management Basics for Business Owners (Series: Business Pr...Understanding Risk Management Basics for Business Owners (Series: Business Pr...
Understanding Risk Management Basics for Business Owners (Series: Business Pr...
 

Recently uploaded

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 

Recently uploaded (20)

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 

Smu seminar 2014_03_26 v3

  • 1. Fundamentals Matter – A Brief Introduction to Risk Analysis for Information Security Southern Methodist University, March 26, 2014 Heather Goodnight, President Patrick Florer, CTO Risk Centric Security, Inc. www.riskcentricsecurity.com Authorized reseller of ModelRisk from Vose Software Risk Centric Security, Inc. Confidential and Proprietary . Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Risk Analysis for the 21st Century®
  • 2. • Introductions • What we are going to talk about o Why Fundamentals Matter / Current State o Definitions • Risk and the Risk Landscape • Possibility and Probability • Measurement • Variability and Uncertainty • Precision vs. Accuracy • Scales of Measurement: Qualitative vs. Quantitative • Not Enough Data • Monte Carlo Simulation • Modeling Expert Opinion and PERT distributions Agenda Risk Centric Security, Inc. Confidential and Proprietary . Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 3. Heather Goodnight is an accomplished Global Sales and Business Development Consultant. Over the years, her unique, practical insight into problems of risk and opportunity have provided important guidance for organizations both large and small. She is a cofounder of Risk Centric Security and currently serves as President of the Corporation. In 2010, she was appointed to the RIM Council (Responsible Information Council) of the Ponemon Institute. In addition to her role at Risk Centric Security, she serves as Business Development Manager at Triumfant, Inc., a vendor of advanced anti-malware products. Patrick Florer has worked in information technology for almost 35 years. For 17 years, he worked a parallel track in medical outcomes research, analysis, and the creation of evidence-based guidelines for medical treatment. His roles have included IT operations, programming, and systems analysis. From 1986 until now, he has worked as an independent consultant, helping customers with strategic development, analytics, risk analysis, and decision analysis. He is a cofounder of Risk Centric Security and currently serves as Chief Technology Officer. He is a member of the Ponemon Institute RIM council. In 2012, he was appointed Distinguished Fellow of the Ponemon Institute. Introductions Risk Centric Security, Inc. Confidential and Proprietary . Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 4. The Current State of Confusion … . Risk Centric Security, Inc. Confidential and Proprietary . Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 5. ROI IRR EPS EMV EBITDA ≠ Often leads to this … Risk Centric Security, Inc. Confidential and Proprietary . Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 6. What is Risk? Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 7. What Risk Isn’t! Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Vulnerability Threat
  • 8. Risk = Frequency x Impact Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Frequency Impact Risk
  • 9. Risk and Opportunity Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 10. Possibility and Probability: Possibility Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 11. Possibility and Probability: Probability Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 12. What is a Measurement? Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 13. Properties of Measurement Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Validity Reproducibility Detail
  • 14. Sources of Error in Measurement? Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Random Error Errors from Bias
  • 15. Variability and Uncertainty Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Variability Uncertainty
  • 16. Precision and Accuracy Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 17. Scales of Measurement Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Qualitative Quantitative
  • 18. Qualitative Scales Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Nominal/Categorical IntervalOrdinal HIGH - Red MEDIUM - Orange LOW - Green First, Second, Third … On a scale of …
  • 19. Quantitative/Ratio Scales Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. 1, 2, 3, 4, 5, 6, … n
  • 20. Problems with Qualitative Scales Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. My Scale High Medium Low Red Orange Green Your Scale High Medium Low Red Orange Yellow Green (RED – GREEN + MEDIUM) / Somewhat Likely = ??? Mismatched Scales Meaningless Calculations Assessor Disagreements
  • 21. Problems with Qualitative Scales Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Boundary Problems $2.5M Loss Exposure = Moderate = Yellow $2.5M Loss Exposure = Moderate = Yellow $2.5M Loss Exposure = Moderate = Yellow $7.5M Aggregate Loss Exposure = not so Moderate ! Issues with Loss of Information
  • 22. Quantitative Scales Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. 2 + 2 - 1 = 3 360 * 10 = 3,600 Sqrt(25) = 5 f(x) = y etc.
  • 23. Qualitative Methods - Problems Difficulty with arithmetic and statistical operations From ISO 17999 Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 24. Qualitative Methods - Problems Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 25. Qualitative Methods - Problems On a scale of 1 to 5, where 1 = least and 5 = most, please rate … Likert scale (From Wikipedia, the free encyclopedia) When responding to a Likert questionnaire item, respondents specify their level of agreement or disagreement … In so doing, Likert scaling assumes that distances on each item are equal … Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 26. Data Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Good Data Bad Data Big Data Little Data
  • 27. How much data is enough data? Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. How do I get to the mall? How do we build this? vs.
  • 28. Data from Calibrated Estimates Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. More often than you might think, the data we have to work with comes from Subject Matter Experts (SME’s). How can we improve the accuracy of these SME’s – to a 90% confidence level? With calibration. Example: How much does an iPhone 5s weigh?
  • 29. Monte Carlo Simulation Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. The average = $12,500 $2,500 $12,500 $32,000 The range is: The distributions are:
  • 30. Monte Carlo Simulation Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 31. The Beta Pert Calculator Minimum: What is the least or lowest (best or worst) numerical estimate that you believe to be reasonable? This will be the smallest number you come up with. Most Likely: What is the most likely or most probable numerical estimate in your opinion? This number must fall between the minimum and maximum. It may equal either the minimum or the maximum, but should not equal both Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 32. The Beta Pert Calculator Maximum: What is the greatest or highest (best or worst) numerical estimate that you believe to be reasonable? Note that “best” or “worst” case estimates could be either minimum or maximum values, depending upon the scenario. In a risk / loss exposure scenario, lower is better, so the minimum represents the lowest loss, or best outcome. The maximum represents the highest loss, or worst outcome. In a sales or opportunity scenario, it’s the reverse: lower is not better, so the minimum represents the worst case. Higher is better, so the maximum represents the best case. Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 33. The Beta Pert Calculator Confidence: On a scale that includes “Very Low”, “Low”, “Average”, “High”, and “Very High”, how confident are you in the accuracy of your estimates? This parameter controls the sampling around the most likely value, and thereby also controls the height of the histogram or slope of the cumulative plot. For most analyses, using “Average” for the confidence parameter works well. In this instance, “Average” really means having no strong feeling about the matter – being evenly divided between under-confidence and over- confidence. Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 34. The Beta Pert Calculator Percentile Tables Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 35. The Beta Pert Calculator Percentile Tables 1% of values are <= 10,044 and 99% are > 10,044 10% of values are <= 11,120 and 90% are > 11,120 20% of values are <= 11,658 and 80% are > 11,658 50% of values are <= 13,025 and 50% are > 13,025 The 50th percentile has another name - it’s called the Median. The Median is the mid-point in a list of values - half of the values in the list are less and half are greater than the Median. Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 36. The Beta Pert Calculator Histogram Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 37. The Beta Pert Calculator Cumulative Plot Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 38. Thank you ! Heather Goodnight President and Cofounder Patrick Florer CTO and Co-founder Risk Centric Security, Inc patrick@riskcentricsecurity.com 214.828.1172 Authorized reseller of ModelRisk from Vose Software Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved. Risk Analysis for the 21st Century ®
  • 39. ”We don’t have enough data!” - Sources Open Security Foundation: datalossdb and osvdb http://www.opensecurityfoundation.org/ Office of Inadequate Security: http://www.databreaches.net/ Identity Theft Resource Center: http://www.idtheftcenter.org/ ISACA: www.isaca.org ISSA: www.issa.org Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 40. ”We don’t have enough data!” - Sources Mitre Corporation: www.mitre.org OWASP: http://owasp.com/index.php/Main_Page Privacy Rights Clearing House: http://www.privacyrights.org/ SANS: www.sans.org The Ponemon Institute: www.ponemon.org Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 41. ”We don’t have enough data!” - Sources Conference procedings: Black Hat, RSA, Source Conferences, BSides Internet tools: Search engines: Google, Bing, Yahoo, Ask.com Trend Analyzers: Google trends: http://www.google.com/trends Twitter Trends: www.trendistic.com Amazon: http://www.metricjunkie.com/ Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.
  • 42. ”We don’t have enough data!” - Sources Securitymetrics.org – mailing list Society of Information Risk Analysts (SIRA) Books: How to Measure Anything – Hubbard The Failure of Risk Management – Hubbard Risk Analysis: A Quantitative Guide – Vose Clinical Epidemiology and Biostatistics – Kramer Data-Driven Security: Analysis, Visualization and Dashboards – Jacobs and Rudis Risk Centric Security, Inc. Confidential and Proprietary. Copyright © 2014 Risk Centric Security, Inc . All rights reserved.