SlideShare a Scribd company logo
1 of 50
Download to read offline
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
IT Risk Management
IT Solutions Specialist
CEH, Hyper-V MVP
tudy.tel
Tudor Damian
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Many thanks to our sponsors & partners!
GOLD
SILVER
PARTNERS
PLATINUM
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• IT risk overview
• COBIT & Risk IT framework
–Risk Governance
• Risk Appetite and Risk Tolerance
–Risk Evaluation
–Risk Response
• IT risk management as a continuous process
• Sources:
Agenda
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
IT RISK OVERVIEW
Business risk related to the use of IT
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• We create information
• We use and store information
• We destroy information
• Technology creates opportunities
–Business, education, government, sales of real and
electronic goods, e-health, etc.
• IT plays an essential role in these activities
–Part of its duty is to protect these information assets
Information as a key resource
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Email passwords may be disclosed
• Facebook accounts may be used by someone else
• Credit card information may be disclosed
• Customer information may be stolen
• IT service delivery to customers may be poor
• IT systems may be obsolete
• IT projects may be late or fail
• IT systems do not provide any business benefit
• Risk of non-compliance with the regulator
• Own people may harm the systems
IT risk is business risk
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Opportunity and Risk - two sides of the same coin
–Those who manage risk, succeed
–Those who do not, fail
• Risk is inherent to every enterprise
• You don’t really have a choice: every decision taken,
every strategy chosen, carries a certain risk
Opportunity vs. Risk
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• No organization is unaffected
• Businesses are disrupted
• Privacy is violated
• Organizations suffer direct financial loss
• Reputation is damaged
The impact of IT risk
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
High Risk
Low Cost
Low Risk
High Cost
Risk vs. Investment – an easy decision (?)
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• 87% of small business and 93% of larger organizations
experienced a security breach in the last year alone
• 85% of breaches took weeks to discover
• 96% of breaches were not highly difficult
• 97% of breaches were avoidable through simple or
intermediate controls
• 57% of EU incidents were caused by administrative error,
missing hardware, exposed online, or stolen by insiders
Some statistics
Sources: Center for Media, Data and Society (CMDS) / Verizon / UK Government, Department for Business, Innovation and Skills (BIS)
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Timeline of discovery for cyber attacks (2013)
Hours, 9%
Days, 8%
Weeks, 16%
Months, 62%
Years, 5%
Hours Days Weeks Months Years
Source: Verizon
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Cyber crime attacks experienced by US companies (June 2014)
VIRUSES, WORMS, TROJANS
MALWARE
BOTNETS
WEB-BASED ATTACKS
MALICIOUS CODE
PHISHING AND SOCIAL ENGINEERING
MALICIOUS INSIDERS
STOLEN SERVICES
DENIAL OF SERVICE
100%
97%
76%
61%
46%
44%
41%
37%
34%
Sources: Ponemon Institute; Hewlett-Packard (HP Enterprise Security)
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Some more statistics
Ponemon Institute 2011 Cost of Data Breach Study: United States
Verizon 2012 Data Breach Investigations Report
Reuters, http://reut.rs/zzrcec
Symantec Internal Threat Report 17
WIRED, http://www.wired.com/threatlevel/2012/05/flame/all/1
European Commission-Justice, Data Protection
Ponemon Institute Second Annual Benchmark Study on Patient
Privacy and Data Security
ISACA 2011 Top Business/Technology Issues Survey
Symantec 2012 SMB Disaster Preparedness Survey
Ponemon Institute True Cost of Compliance Report
Thomson Reuters State of Regulatory Reform 2012
eWeek, http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-
Downtime-
Can-Cost-5K-Per-Minute-Report-549007/
Sources:
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Even more statistics
Ponemon Institute 2011 Cost of Data Breach Study: United States
Verizon 2012 Data Breach Investigations Report
Reuters, http://reut.rs/zzrcec
Symantec Internal Threat Report 17
WIRED, http://www.wired.com/threatlevel/2012/05/flame/all/1
European Commission-Justice, Data Protection
Ponemon Institute Second Annual Benchmark Study on Patient
Privacy and Data Security
ISACA 2011 Top Business/Technology Issues Survey
Symantec 2012 SMB Disaster Preparedness Survey
Ponemon Institute True Cost of Compliance Report
Thomson Reuters State of Regulatory Reform 2012
eWeek, http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-
Downtime-
Can-Cost-5K-Per-Minute-Report-549007/
Sources:
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Statistics overload
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
How is IT Risk ideally handled?
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
COBIT® AND RISK IT FRAMEWORKS
www.isaca.org/cobit
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Better accountability and responsibility (ownership)
– You get out of the blame game
• Better management
• Better benefits from IT investments
• Better compliance
• Better monitoring
• Easily compare yourself with others
• Everybody’s doing it anyway
– ITIL, ISO 27001/2, COSO ERM, PRINCE2, PMBOK, Six Sigma, TOGAF, etc.
Why use best practices / frameworks?
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
IT risk in the enterprise risk hierarchy
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Overview – COBIT®, Risk IT and Val IT
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• A comprehensive IT governance and management framework
• Addresses every aspect of IT
• Ensures clear ownership and responsibilities
• A common language for all
• Improves IT efficiency and effectiveness
• Better management of IT investments
• Ensures compliance
• A complementary copy is available:
– www.isaca.org/cobit
COBIT®
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
•Manage 3rd-party Services
•Ensure Continuous Service
•Ensure Systems Security
•Manage Incidents
•Manage Data & Operations
•Monitor and Evaluate IT
Performance
•Monitor and Evaluate
Internal Control
•Ensure Compliance
•Provide IT Governance
•Acquire & Maintain
Application Software
•Acquire and Maintain
Technology Infrastructure
•Manage Changes
• Strategic IT Plan
• Manage IT Investment
• Manage IT Human
Resources
• Manage IT Risks
• Manage Projects
PLAN &
ORGANIZE
ACQUIRE &
IMPLEMENT
DELIVERY &
SUPPORT
MONITOR&
EVALUATE
COBIT® coverage
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Framework for effective management of IT risk
• Complements COBIT®
– COBIT® provides a set of controls to mitigate IT risk
– Risk IT provides a framework for enterprises to identify, govern and manage IT risk
• Enterprises who have adopted COBIT® can use Risk IT to enhance risk
management
• Integrates the management of IT risk into the overall enterprise risk
management (ERM) of the organization
• Helps management make well-informed decisions about the extent of the
risk, the risk appetite and the risk tolerance of the enterprise
• Helps management understand how to respond to risk
• Available for ISACA members:
– http://isaca.org/RiskIT
Risk IT
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Always connects to business objectives
• Aligns the management of IT-related business risk with
overall enterprise risk management (ERM) - if applicable
• Balances the costs and benefits of managing IT risk
• Promotes fair and open communication of IT risk
• Establishes the right tone from the top while defining and
enforcing personal accountability for operating within
acceptable and well-defined tolerance levels
• Is a continuous process and part of daily activities
Risk IT principles
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• To prioritize and manage IT risk, management needs a
clear understanding of the IT function and IT risk
– Key stakeholders often do not have a full understanding
• IT risk is not just a technical issue
– IT experts help to understand and manage aspects of IT risk
– Business management is still the most important stakeholder
• Business managers determine what IT needs to do to
support their business
– They set the targets for IT
– They are accountable for managing the associated risks
Managing and understanding IT risk
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
1. Define a risk universe and scoping risk management
2. Risk appetite and risk tolerance
3. Risk awareness, communication and reporting: includes key risk
indicators, risk profiles, risk aggregation and risk culture
4. Express and describe risk: guidance on business context,
frequency, impact, COBIT business goals, risk maps, risk registers
5. Risk scenarios: includes capability risk factors and environmental
risk factors
6. Risk response and prioritization
7. A risk analysis workflow: “swim lane” flow chart, including role
context
8. IT risk mitigation using COBIT and Val IT
Risk IT process model
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Risk IT Framework
– A set of governance practices for risk management
– An end-to-end process framework for successful IT risk management
– A generic list of common, potentially adverse, IT-related risk scenarios
– Tools and techniques to understand concrete risks to business operations
• Risk IT Practitioner Guide
– Support document for the Risk IT framework
– Provides examples of possible techniques to address IT-related risk issues
– Building scenarios, based on a set of generic IT risk scenarios
– Building risk maps, techniques to describe scenario impact and frequency
– Building impact criteria with business relevance
– Defining KRIs (Key Risk Indicators)
Risk IT publications
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Risk management frameworks and standards compared
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Key activities / Roles
Board
CEO
CRO
CIO
CFO
EnterpriseRisk
Committee
Business
Management
BusinessProcess
Owner
RiskControl
Functions
HR
Complianceand
Audit
Define IT risk analysis scope I R C I C A R C C
Estimate IT risk I R C C I A/R R R C
Identify risk response options C C C R A R R I
Perform a peer review of IT analysis A/R I I I
Perform enterprise IT risk assessment I A R R C I R C R C C
Propose IT risk tolerance thresholds I I C R C I A C C C
Approve IT risk tolerance A C C C C R C C C C C
Assign IT risk policy C A R R R C R R R R C
Promote IT risk-aware culture A R R R R R R R R R R
Encourage effective communication of IT risk R R R R R R A R R R R
RACI charts – IT risk example
A RACI chart identifies who is Responsible, Accountable, Consulted and/or Informed
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
RISK GOVERNANCE
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Risk Governance
– Establish and Maintain a Common Risk View
– Integrate with Enterprise Risk Management (ERM)
– Make Risk-aware Business Decisions
• Risk Evaluation
– Collect Data
– Analyze Risk
– Maintain Risk Profile
• Risk Response
– Articulate Risk
– Manage Risk
– React to Events
Risk governance, evaluation and response
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
IT Risk Management Responsibilities and Accountability
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
RISK APPETITE AND RISK TOLERANCE
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Risk Appetite: the amount of risk an entity is prepared to
accept when trying to achieve its objectives
– Defining factors:
• The enterprise’s objective capacity to absorb loss (e.g., financial loss,
reputation damage)
• The (management) culture or predisposition towards risk taking -
cautious or aggressive (i.e. what is the amount of loss the enterprise
wants to accept to pursue a return?)
• Risk Tolerance: the tolerable deviation from the level set by
the risk appetite and business objectives
– e.g., standards require projects to be completed within estimated
budgets and time, but overruns of 10 percent of budget or 20
percent of time are tolerated
Risk Appetite and Risk Tolerance
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Risk map
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Sample risk scenarios and risk appetite
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Elements of risk culture
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
RISK EVALUATION
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Expressing IT risk in business terms
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
IT scenario development
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
IT risk scenario components
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
RISK RESPONSE
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Identify Key Risk Indicators based on:
– Impact
– Effort to implement, measure and report
– Reliability
– Sensitivity
• Decide on best response to risk
– Avoidance
– Reduction/Mitigation
– Sharing/Transfer
– Acceptance
Risk response overview
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
IT RISK AS A CONTINUOUS PROCESS
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Risk IT maturity model
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Business
Goals
IT Goals
Process
Goals
Activity
Goal
Defining goals and metrics - example
Maintain
reputation
IT can resist to
an attack
Reduce
unauthorized
access
Understand
vulnerabilities
and threats
Number of incidents with
public embarrassment
Number of incidents with
business impact
Number of incidents caused
by unauthorized access
Frequency of review
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
SUMMARY
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
• Use best practices (such as COBIT®) to minimize IT Risks
• Start with basic processes
• Form a high level IT Strategy Committee
• Formulate and implement IT Strategic Plan and IT policies
• Allocate resources (budget, people, infrastructure)
• Assign roles and responsibilities, authority and
accountability (using RACI chart)
• Make IT a regular item on the board agenda
• Regularly assess, review and monitor IT Risks
Summary
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Q & A
Image source: coolrisk.com / Artist: Michael Mittag
@ITCAMPRO #ITCAMP15Community Conference for IT Professionals
Thank you!
IT Solutions Specialist
CEH, Hyper-V MVP
tudy.tel
Tudor Damian

More Related Content

What's hot

Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1Richard Willis
 

What's hot (20)

Security risk management
Security risk managementSecurity risk management
Security risk management
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
 

Viewers also liked

Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentationesbosman
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 
ISACA Indonesia - 9 sept 2013 - Erik Guldentops - Reflections on Value & Risk...
ISACA Indonesia - 9 sept 2013 - Erik Guldentops - Reflections on Value & Risk...ISACA Indonesia - 9 sept 2013 - Erik Guldentops - Reflections on Value & Risk...
ISACA Indonesia - 9 sept 2013 - Erik Guldentops - Reflections on Value & Risk...rahmatmoelyana
 
Unlocking Patterns of EA Program Failure: Lessons learned about the barriers ...
Unlocking Patterns of EA Program Failure: Lessons learned about the barriers ...Unlocking Patterns of EA Program Failure: Lessons learned about the barriers ...
Unlocking Patterns of EA Program Failure: Lessons learned about the barriers ...Basuki Rahmad
 
Portfolio Management (Program & Project) by Rahmat Mulyana at OMM 43 PMI Indo...
Portfolio Management (Program & Project) by Rahmat Mulyana at OMM 43 PMI Indo...Portfolio Management (Program & Project) by Rahmat Mulyana at OMM 43 PMI Indo...
Portfolio Management (Program & Project) by Rahmat Mulyana at OMM 43 PMI Indo...rahmatmoelyana
 
ISACA Indonesia Special Technical Session feat Erik Guldentops - Indonesia Re...
ISACA Indonesia Special Technical Session feat Erik Guldentops - Indonesia Re...ISACA Indonesia Special Technical Session feat Erik Guldentops - Indonesia Re...
ISACA Indonesia Special Technical Session feat Erik Guldentops - Indonesia Re...rahmatmoelyana
 
About tipping edge consulting v1d
About tipping edge consulting v1dAbout tipping edge consulting v1d
About tipping edge consulting v1dMadhav Chablani
 
Rahmat mulyana isaca tech session - mapping cobit 5 & per-02-mbu-2013
Rahmat mulyana   isaca tech session - mapping cobit 5 & per-02-mbu-2013Rahmat mulyana   isaca tech session - mapping cobit 5 & per-02-mbu-2013
Rahmat mulyana isaca tech session - mapping cobit 5 & per-02-mbu-2013rahmatmoelyana
 
Modul 8 enterprise architecture-2012
Modul 8 enterprise architecture-2012Modul 8 enterprise architecture-2012
Modul 8 enterprise architecture-2012Ir. Zakaria, M.M
 
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...rahmatmoelyana
 
02. cobit5 introduction
02. cobit5 introduction02. cobit5 introduction
02. cobit5 introductionMulyadi Yusuf
 
The Foundations of Cloud Data Storage
The Foundations of Cloud Data StorageThe Foundations of Cloud Data Storage
The Foundations of Cloud Data StorageJan-Erik Finlander
 
Paper seminar akuntansi pemerintah kel 1--sap berbasis akrual
Paper seminar akuntansi pemerintah kel 1--sap berbasis akrualPaper seminar akuntansi pemerintah kel 1--sap berbasis akrual
Paper seminar akuntansi pemerintah kel 1--sap berbasis akrualMulyadi Yusuf
 
GCC Health: Tackling diabetes and obesity in the age of digital acceleration.pdf
GCC Health: Tackling diabetes and obesity in the age of digital acceleration.pdfGCC Health: Tackling diabetes and obesity in the age of digital acceleration.pdf
GCC Health: Tackling diabetes and obesity in the age of digital acceleration.pdfThe Economist Media Businesses
 

Viewers also liked (20)

Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Derechos del niño
Derechos del niñoDerechos del niño
Derechos del niño
 
COBIT5-IntroductionS
COBIT5-IntroductionSCOBIT5-IntroductionS
COBIT5-IntroductionS
 
ISACA Indonesia - 9 sept 2013 - Erik Guldentops - Reflections on Value & Risk...
ISACA Indonesia - 9 sept 2013 - Erik Guldentops - Reflections on Value & Risk...ISACA Indonesia - 9 sept 2013 - Erik Guldentops - Reflections on Value & Risk...
ISACA Indonesia - 9 sept 2013 - Erik Guldentops - Reflections on Value & Risk...
 
Unlocking Patterns of EA Program Failure: Lessons learned about the barriers ...
Unlocking Patterns of EA Program Failure: Lessons learned about the barriers ...Unlocking Patterns of EA Program Failure: Lessons learned about the barriers ...
Unlocking Patterns of EA Program Failure: Lessons learned about the barriers ...
 
Portfolio Management (Program & Project) by Rahmat Mulyana at OMM 43 PMI Indo...
Portfolio Management (Program & Project) by Rahmat Mulyana at OMM 43 PMI Indo...Portfolio Management (Program & Project) by Rahmat Mulyana at OMM 43 PMI Indo...
Portfolio Management (Program & Project) by Rahmat Mulyana at OMM 43 PMI Indo...
 
ISACA Indonesia Special Technical Session feat Erik Guldentops - Indonesia Re...
ISACA Indonesia Special Technical Session feat Erik Guldentops - Indonesia Re...ISACA Indonesia Special Technical Session feat Erik Guldentops - Indonesia Re...
ISACA Indonesia Special Technical Session feat Erik Guldentops - Indonesia Re...
 
About tipping edge consulting v1d
About tipping edge consulting v1dAbout tipping edge consulting v1d
About tipping edge consulting v1d
 
Rahmat mulyana isaca tech session - mapping cobit 5 & per-02-mbu-2013
Rahmat mulyana   isaca tech session - mapping cobit 5 & per-02-mbu-2013Rahmat mulyana   isaca tech session - mapping cobit 5 & per-02-mbu-2013
Rahmat mulyana isaca tech session - mapping cobit 5 & per-02-mbu-2013
 
Modul 8 enterprise architecture-2012
Modul 8 enterprise architecture-2012Modul 8 enterprise architecture-2012
Modul 8 enterprise architecture-2012
 
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
 
02. cobit5 introduction
02. cobit5 introduction02. cobit5 introduction
02. cobit5 introduction
 
The Foundations of Cloud Data Storage
The Foundations of Cloud Data StorageThe Foundations of Cloud Data Storage
The Foundations of Cloud Data Storage
 
Paper seminar akuntansi pemerintah kel 1--sap berbasis akrual
Paper seminar akuntansi pemerintah kel 1--sap berbasis akrualPaper seminar akuntansi pemerintah kel 1--sap berbasis akrual
Paper seminar akuntansi pemerintah kel 1--sap berbasis akrual
 
GCC Health: Tackling diabetes and obesity in the age of digital acceleration.pdf
GCC Health: Tackling diabetes and obesity in the age of digital acceleration.pdfGCC Health: Tackling diabetes and obesity in the age of digital acceleration.pdf
GCC Health: Tackling diabetes and obesity in the age of digital acceleration.pdf
 
Food Loss and Waste
Food Loss and WasteFood Loss and Waste
Food Loss and Waste
 
Vmware infographic pdf
Vmware infographic pdfVmware infographic pdf
Vmware infographic pdf
 
Terms of trade
Terms of tradeTerms of trade
Terms of trade
 
Strategic workforce planning white paper
Strategic workforce planning white paperStrategic workforce planning white paper
Strategic workforce planning white paper
 

Similar to IT Risk Management

How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsEnterprise Management Associates
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Enterprise Management Associates
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 

Similar to IT Risk Management (20)

How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 

More from Tudor Damian

Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Tudor Damian
 
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themModern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themTudor Damian
 
Microsoft Azure Stack
Microsoft Azure StackMicrosoft Azure Stack
Microsoft Azure StackTudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
IDS Evasion Techniques
IDS Evasion TechniquesIDS Evasion Techniques
IDS Evasion TechniquesTudor Damian
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking peopleTudor Damian
 
Azure Site Recovery and System Center
Azure Site Recovery and System Center Azure Site Recovery and System Center
Azure Site Recovery and System Center Tudor Damian
 
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2Tudor Damian
 
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2Tudor Damian
 
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware CloudComparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware CloudTudor Damian
 
What's new in Windows 8
What's new in Windows 8What's new in Windows 8
What's new in Windows 8Tudor Damian
 
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyPrivate cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyTudor Damian
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 OverviewTudor Damian
 
BOI 2011 - Be what's next
BOI 2011 - Be what's nextBOI 2011 - Be what's next
BOI 2011 - Be what's nextTudor Damian
 
Hosting your virtual private cloud
Hosting your virtual private cloudHosting your virtual private cloud
Hosting your virtual private cloudTudor Damian
 
Linux sub Hyper-V R2
Linux sub Hyper-V R2Linux sub Hyper-V R2
Linux sub Hyper-V R2Tudor Damian
 
White Hat Hacking #3
White Hat Hacking #3White Hat Hacking #3
White Hat Hacking #3Tudor Damian
 
White Hat Hacking #1
White Hat Hacking #1White Hat Hacking #1
White Hat Hacking #1Tudor Damian
 

More from Tudor Damian (20)

Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themModern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
 
Microsoft Azure Stack
Microsoft Azure StackMicrosoft Azure Stack
Microsoft Azure Stack
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
IDS Evasion Techniques
IDS Evasion TechniquesIDS Evasion Techniques
IDS Evasion Techniques
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
Azure Site Recovery and System Center
Azure Site Recovery and System Center Azure Site Recovery and System Center
Azure Site Recovery and System Center
 
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
 
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
 
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware CloudComparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
 
What's new in Windows 8
What's new in Windows 8What's new in Windows 8
What's new in Windows 8
 
Linux on Hyper-V
Linux on Hyper-VLinux on Hyper-V
Linux on Hyper-V
 
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the UglyPrivate cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 Overview
 
BOI 2011 - Be what's next
BOI 2011 - Be what's nextBOI 2011 - Be what's next
BOI 2011 - Be what's next
 
Hosting your virtual private cloud
Hosting your virtual private cloudHosting your virtual private cloud
Hosting your virtual private cloud
 
Linux sub Hyper-V R2
Linux sub Hyper-V R2Linux sub Hyper-V R2
Linux sub Hyper-V R2
 
White Hat Hacking #3
White Hat Hacking #3White Hat Hacking #3
White Hat Hacking #3
 
White Hat Hacking #1
White Hat Hacking #1White Hat Hacking #1
White Hat Hacking #1
 

Recently uploaded

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

IT Risk Management

  • 1. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals IT Risk Management IT Solutions Specialist CEH, Hyper-V MVP tudy.tel Tudor Damian
  • 2. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Many thanks to our sponsors & partners! GOLD SILVER PARTNERS PLATINUM
  • 3. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • IT risk overview • COBIT & Risk IT framework –Risk Governance • Risk Appetite and Risk Tolerance –Risk Evaluation –Risk Response • IT risk management as a continuous process • Sources: Agenda
  • 4. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals IT RISK OVERVIEW Business risk related to the use of IT Image source: coolrisk.com / Artist: Michael Mittag
  • 5. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • We create information • We use and store information • We destroy information • Technology creates opportunities –Business, education, government, sales of real and electronic goods, e-health, etc. • IT plays an essential role in these activities –Part of its duty is to protect these information assets Information as a key resource
  • 6. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Email passwords may be disclosed • Facebook accounts may be used by someone else • Credit card information may be disclosed • Customer information may be stolen • IT service delivery to customers may be poor • IT systems may be obsolete • IT projects may be late or fail • IT systems do not provide any business benefit • Risk of non-compliance with the regulator • Own people may harm the systems IT risk is business risk
  • 7. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Opportunity and Risk - two sides of the same coin –Those who manage risk, succeed –Those who do not, fail • Risk is inherent to every enterprise • You don’t really have a choice: every decision taken, every strategy chosen, carries a certain risk Opportunity vs. Risk
  • 8. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • No organization is unaffected • Businesses are disrupted • Privacy is violated • Organizations suffer direct financial loss • Reputation is damaged The impact of IT risk
  • 9. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals High Risk Low Cost Low Risk High Cost Risk vs. Investment – an easy decision (?)
  • 10. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • 87% of small business and 93% of larger organizations experienced a security breach in the last year alone • 85% of breaches took weeks to discover • 96% of breaches were not highly difficult • 97% of breaches were avoidable through simple or intermediate controls • 57% of EU incidents were caused by administrative error, missing hardware, exposed online, or stolen by insiders Some statistics Sources: Center for Media, Data and Society (CMDS) / Verizon / UK Government, Department for Business, Innovation and Skills (BIS)
  • 11. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Timeline of discovery for cyber attacks (2013) Hours, 9% Days, 8% Weeks, 16% Months, 62% Years, 5% Hours Days Weeks Months Years Source: Verizon
  • 12. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Cyber crime attacks experienced by US companies (June 2014) VIRUSES, WORMS, TROJANS MALWARE BOTNETS WEB-BASED ATTACKS MALICIOUS CODE PHISHING AND SOCIAL ENGINEERING MALICIOUS INSIDERS STOLEN SERVICES DENIAL OF SERVICE 100% 97% 76% 61% 46% 44% 41% 37% 34% Sources: Ponemon Institute; Hewlett-Packard (HP Enterprise Security)
  • 13. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Some more statistics Ponemon Institute 2011 Cost of Data Breach Study: United States Verizon 2012 Data Breach Investigations Report Reuters, http://reut.rs/zzrcec Symantec Internal Threat Report 17 WIRED, http://www.wired.com/threatlevel/2012/05/flame/all/1 European Commission-Justice, Data Protection Ponemon Institute Second Annual Benchmark Study on Patient Privacy and Data Security ISACA 2011 Top Business/Technology Issues Survey Symantec 2012 SMB Disaster Preparedness Survey Ponemon Institute True Cost of Compliance Report Thomson Reuters State of Regulatory Reform 2012 eWeek, http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT- Downtime- Can-Cost-5K-Per-Minute-Report-549007/ Sources:
  • 14. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Even more statistics Ponemon Institute 2011 Cost of Data Breach Study: United States Verizon 2012 Data Breach Investigations Report Reuters, http://reut.rs/zzrcec Symantec Internal Threat Report 17 WIRED, http://www.wired.com/threatlevel/2012/05/flame/all/1 European Commission-Justice, Data Protection Ponemon Institute Second Annual Benchmark Study on Patient Privacy and Data Security ISACA 2011 Top Business/Technology Issues Survey Symantec 2012 SMB Disaster Preparedness Survey Ponemon Institute True Cost of Compliance Report Thomson Reuters State of Regulatory Reform 2012 eWeek, http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT- Downtime- Can-Cost-5K-Per-Minute-Report-549007/ Sources:
  • 15. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Statistics overload
  • 16. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals How is IT Risk ideally handled?
  • 17. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals COBIT® AND RISK IT FRAMEWORKS www.isaca.org/cobit Image source: coolrisk.com / Artist: Michael Mittag
  • 18. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Better accountability and responsibility (ownership) – You get out of the blame game • Better management • Better benefits from IT investments • Better compliance • Better monitoring • Easily compare yourself with others • Everybody’s doing it anyway – ITIL, ISO 27001/2, COSO ERM, PRINCE2, PMBOK, Six Sigma, TOGAF, etc. Why use best practices / frameworks?
  • 19. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals IT risk in the enterprise risk hierarchy
  • 20. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Overview – COBIT®, Risk IT and Val IT
  • 21. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • A comprehensive IT governance and management framework • Addresses every aspect of IT • Ensures clear ownership and responsibilities • A common language for all • Improves IT efficiency and effectiveness • Better management of IT investments • Ensures compliance • A complementary copy is available: – www.isaca.org/cobit COBIT®
  • 22. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals •Manage 3rd-party Services •Ensure Continuous Service •Ensure Systems Security •Manage Incidents •Manage Data & Operations •Monitor and Evaluate IT Performance •Monitor and Evaluate Internal Control •Ensure Compliance •Provide IT Governance •Acquire & Maintain Application Software •Acquire and Maintain Technology Infrastructure •Manage Changes • Strategic IT Plan • Manage IT Investment • Manage IT Human Resources • Manage IT Risks • Manage Projects PLAN & ORGANIZE ACQUIRE & IMPLEMENT DELIVERY & SUPPORT MONITOR& EVALUATE COBIT® coverage
  • 23. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Framework for effective management of IT risk • Complements COBIT® – COBIT® provides a set of controls to mitigate IT risk – Risk IT provides a framework for enterprises to identify, govern and manage IT risk • Enterprises who have adopted COBIT® can use Risk IT to enhance risk management • Integrates the management of IT risk into the overall enterprise risk management (ERM) of the organization • Helps management make well-informed decisions about the extent of the risk, the risk appetite and the risk tolerance of the enterprise • Helps management understand how to respond to risk • Available for ISACA members: – http://isaca.org/RiskIT Risk IT
  • 24. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Always connects to business objectives • Aligns the management of IT-related business risk with overall enterprise risk management (ERM) - if applicable • Balances the costs and benefits of managing IT risk • Promotes fair and open communication of IT risk • Establishes the right tone from the top while defining and enforcing personal accountability for operating within acceptable and well-defined tolerance levels • Is a continuous process and part of daily activities Risk IT principles
  • 25. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • To prioritize and manage IT risk, management needs a clear understanding of the IT function and IT risk – Key stakeholders often do not have a full understanding • IT risk is not just a technical issue – IT experts help to understand and manage aspects of IT risk – Business management is still the most important stakeholder • Business managers determine what IT needs to do to support their business – They set the targets for IT – They are accountable for managing the associated risks Managing and understanding IT risk
  • 26. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals 1. Define a risk universe and scoping risk management 2. Risk appetite and risk tolerance 3. Risk awareness, communication and reporting: includes key risk indicators, risk profiles, risk aggregation and risk culture 4. Express and describe risk: guidance on business context, frequency, impact, COBIT business goals, risk maps, risk registers 5. Risk scenarios: includes capability risk factors and environmental risk factors 6. Risk response and prioritization 7. A risk analysis workflow: “swim lane” flow chart, including role context 8. IT risk mitigation using COBIT and Val IT Risk IT process model
  • 27. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Risk IT Framework – A set of governance practices for risk management – An end-to-end process framework for successful IT risk management – A generic list of common, potentially adverse, IT-related risk scenarios – Tools and techniques to understand concrete risks to business operations • Risk IT Practitioner Guide – Support document for the Risk IT framework – Provides examples of possible techniques to address IT-related risk issues – Building scenarios, based on a set of generic IT risk scenarios – Building risk maps, techniques to describe scenario impact and frequency – Building impact criteria with business relevance – Defining KRIs (Key Risk Indicators) Risk IT publications
  • 28. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Risk management frameworks and standards compared
  • 29. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Key activities / Roles Board CEO CRO CIO CFO EnterpriseRisk Committee Business Management BusinessProcess Owner RiskControl Functions HR Complianceand Audit Define IT risk analysis scope I R C I C A R C C Estimate IT risk I R C C I A/R R R C Identify risk response options C C C R A R R I Perform a peer review of IT analysis A/R I I I Perform enterprise IT risk assessment I A R R C I R C R C C Propose IT risk tolerance thresholds I I C R C I A C C C Approve IT risk tolerance A C C C C R C C C C C Assign IT risk policy C A R R R C R R R R C Promote IT risk-aware culture A R R R R R R R R R R Encourage effective communication of IT risk R R R R R R A R R R R RACI charts – IT risk example A RACI chart identifies who is Responsible, Accountable, Consulted and/or Informed
  • 30. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals RISK GOVERNANCE Image source: coolrisk.com / Artist: Michael Mittag
  • 31. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Risk Governance – Establish and Maintain a Common Risk View – Integrate with Enterprise Risk Management (ERM) – Make Risk-aware Business Decisions • Risk Evaluation – Collect Data – Analyze Risk – Maintain Risk Profile • Risk Response – Articulate Risk – Manage Risk – React to Events Risk governance, evaluation and response
  • 32. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals IT Risk Management Responsibilities and Accountability
  • 33. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals RISK APPETITE AND RISK TOLERANCE Image source: coolrisk.com / Artist: Michael Mittag
  • 34. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Risk Appetite: the amount of risk an entity is prepared to accept when trying to achieve its objectives – Defining factors: • The enterprise’s objective capacity to absorb loss (e.g., financial loss, reputation damage) • The (management) culture or predisposition towards risk taking - cautious or aggressive (i.e. what is the amount of loss the enterprise wants to accept to pursue a return?) • Risk Tolerance: the tolerable deviation from the level set by the risk appetite and business objectives – e.g., standards require projects to be completed within estimated budgets and time, but overruns of 10 percent of budget or 20 percent of time are tolerated Risk Appetite and Risk Tolerance
  • 35. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Risk map
  • 36. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Sample risk scenarios and risk appetite
  • 37. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Elements of risk culture
  • 38. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals RISK EVALUATION Image source: coolrisk.com / Artist: Michael Mittag
  • 39. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Expressing IT risk in business terms
  • 40. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals IT scenario development
  • 41. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals IT risk scenario components
  • 42. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals RISK RESPONSE Image source: coolrisk.com / Artist: Michael Mittag
  • 43. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Identify Key Risk Indicators based on: – Impact – Effort to implement, measure and report – Reliability – Sensitivity • Decide on best response to risk – Avoidance – Reduction/Mitigation – Sharing/Transfer – Acceptance Risk response overview
  • 44. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals IT RISK AS A CONTINUOUS PROCESS Image source: coolrisk.com / Artist: Michael Mittag
  • 45. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Risk IT maturity model
  • 46. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Business Goals IT Goals Process Goals Activity Goal Defining goals and metrics - example Maintain reputation IT can resist to an attack Reduce unauthorized access Understand vulnerabilities and threats Number of incidents with public embarrassment Number of incidents with business impact Number of incidents caused by unauthorized access Frequency of review
  • 47. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals SUMMARY Image source: coolrisk.com / Artist: Michael Mittag
  • 48. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals • Use best practices (such as COBIT®) to minimize IT Risks • Start with basic processes • Form a high level IT Strategy Committee • Formulate and implement IT Strategic Plan and IT policies • Allocate resources (budget, people, infrastructure) • Assign roles and responsibilities, authority and accountability (using RACI chart) • Make IT a regular item on the board agenda • Regularly assess, review and monitor IT Risks Summary
  • 49. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Q & A Image source: coolrisk.com / Artist: Michael Mittag
  • 50. @ITCAMPRO #ITCAMP15Community Conference for IT Professionals Thank you! IT Solutions Specialist CEH, Hyper-V MVP tudy.tel Tudor Damian