SlideShare a Scribd company logo
1 of 21
Risk Explained
 ... in 5 Minutes or Less
About
     @pjbeyer        Austin ISSA
allthingsphil.com     President

    Texas Education Agency
  Information Security Officer

       Factor Analysis of
       Information Risk
photo credit: Dennis Yang (flickr.com)
photo credit: Kate Mereand-Sinha (flickr.com)
photo credit: Tom Bech (flickr.com)
photo credit: dfinnecy (flickr.com)
The Bald Tire
           Scenario Analysis
      Identify the components in this
      scenario:

            THREATS

            VULNERABILITIES

            RISKS

@pjbeyer                          allthingsphil.com
Asset


      Risk depends on the ASSET

      How many ASSETS did you consider?

      The ASSET is the bald tire



@pjbeyer                           allthingsphil.com
Threat

      Risk depends on the THREAT

      How many THREATS did you
      consider?

      The THREAT is the earth and the
      force of gravity that it applies


@pjbeyer                           allthingsphil.com
Vulnerability

      Risk depends on VULNERABILITY

      How did you consider
      VULNERABILITY?

      Vulnerability depends on the THREAT

      The potential VULNERABILITY is the
      frayed rope

@pjbeyer                         allthingsphil.com
Risk


      the probable frequency and
        probable magnitude of
              future loss



@pjbeyer                   allthingsphil.com
Risk Analysis

      Risk is a derived value

      Risk is a probability issue

      Risk has both a frequency and a
      magnitude component

      The fundamental nature of Risk is
      universal, regardless of context

@pjbeyer                            allthingsphil.com
Probability

      Possible




      Probable




      Predictable

                       photo credit: Wally Gobetz (flickr.com)
@pjbeyer
Shaman or Scientist
      You might be a Security Shaman if you...

           Assign risk based solely on
           "industry best practices"

           Don't use a framework which yields
           repeatable risk analysis results

           Can't rationally explain your risk
           analysis

@pjbeyer                                 allthingsphil.com
Taxonomy
                          Risk
    Loss Event                                    Loss
    Frequency                                   Magnitude



Threat Event                                        Secondary
                Vulnerability       Primary LM
 Frequency                                             Risk




      Threat Capability   Resistance Strength
Vulnerability



            Threat        Resistance
           Capability      Strength




@pjbeyer                        allthingsphil.com
Loss Event Frequency



           Threat Event
                          Vulnerability
            Frequency




@pjbeyer                         allthingsphil.com
Loss Magnitude



           Primary Loss   Secondary
            Magnitude        Risk




@pjbeyer                       allthingsphil.com
Risk



           Loss Event            Loss
           Frequency           Magnitude




@pjbeyer                            allthingsphil.com
FAIR


      Don't be a Security Shaman!

      Factor Analysis of Information Risk

     fairwiki.riskmanagementinsight.com



@pjbeyer                            allthingsphil.com
This work is licensed under a Creative
Commons Attribution-NonCommercial-
   ShareAlike 3.0 Unported License

More Related Content

More from Philip Beyer

Security Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouSecurity Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught You
Philip Beyer
 

More from Philip Beyer (8)

Security Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouSecurity Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught You
 
It Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityIt Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in Security
 
You Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityYou Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in Security
 
Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!
 
The Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifeThe Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal Life
 
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
 
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
 
Lean and (Prepared for) Mean: Application Security Program Essentials
Lean and (Prepared for) Mean: Application Security Program EssentialsLean and (Prepared for) Mean: Application Security Program Essentials
Lean and (Prepared for) Mean: Application Security Program Essentials
 

Recently uploaded

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Risk Explained... in 5 Minutes or Less

  • 1. Risk Explained ... in 5 Minutes or Less
  • 2. About @pjbeyer Austin ISSA allthingsphil.com President Texas Education Agency Information Security Officer Factor Analysis of Information Risk
  • 3. photo credit: Dennis Yang (flickr.com)
  • 4. photo credit: Kate Mereand-Sinha (flickr.com)
  • 5. photo credit: Tom Bech (flickr.com)
  • 6. photo credit: dfinnecy (flickr.com)
  • 7. The Bald Tire Scenario Analysis Identify the components in this scenario: THREATS VULNERABILITIES RISKS @pjbeyer allthingsphil.com
  • 8. Asset Risk depends on the ASSET How many ASSETS did you consider? The ASSET is the bald tire @pjbeyer allthingsphil.com
  • 9. Threat Risk depends on the THREAT How many THREATS did you consider? The THREAT is the earth and the force of gravity that it applies @pjbeyer allthingsphil.com
  • 10. Vulnerability Risk depends on VULNERABILITY How did you consider VULNERABILITY? Vulnerability depends on the THREAT The potential VULNERABILITY is the frayed rope @pjbeyer allthingsphil.com
  • 11. Risk the probable frequency and probable magnitude of future loss @pjbeyer allthingsphil.com
  • 12. Risk Analysis Risk is a derived value Risk is a probability issue Risk has both a frequency and a magnitude component The fundamental nature of Risk is universal, regardless of context @pjbeyer allthingsphil.com
  • 13. Probability Possible Probable Predictable photo credit: Wally Gobetz (flickr.com) @pjbeyer
  • 14. Shaman or Scientist You might be a Security Shaman if you... Assign risk based solely on "industry best practices" Don't use a framework which yields repeatable risk analysis results Can't rationally explain your risk analysis @pjbeyer allthingsphil.com
  • 15. Taxonomy Risk Loss Event Loss Frequency Magnitude Threat Event Secondary Vulnerability Primary LM Frequency Risk Threat Capability Resistance Strength
  • 16. Vulnerability Threat Resistance Capability Strength @pjbeyer allthingsphil.com
  • 17. Loss Event Frequency Threat Event Vulnerability Frequency @pjbeyer allthingsphil.com
  • 18. Loss Magnitude Primary Loss Secondary Magnitude Risk @pjbeyer allthingsphil.com
  • 19. Risk Loss Event Loss Frequency Magnitude @pjbeyer allthingsphil.com
  • 20. FAIR Don't be a Security Shaman! Factor Analysis of Information Risk fairwiki.riskmanagementinsight.com @pjbeyer allthingsphil.com
  • 21. This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported License

Editor's Notes

  1. Risk is commonly misunderstood in the security community.\nLet's explain Risk in terms of its components, look at a taxonomy, and introduce scientific risk analysis.\n
  2. \n\n
  3. The Bald Tire Scenario #1\nPicture in your mind a bald car tire. Imagine that it’s so bald you can hardly tell that it ever had tread. How much risk is there?\n
  4. The Bald Tire Scenario #2\nNext, imagine that the bald tire is tied to a rope hanging from a tree branch. How much risk is there?\n
  5. The Bald Tire Scenario #3\nNext, imagine that the rope is frayed about halfway through, just below where it’s tied to the tree branch. How much risk is there?\n
  6. The Bald Tire Scenario #4\nFinally, imagine that the tire swing is suspended over an 80-foot cliff with sharp rocks below. How much risk is there?\n
  7. Now, identify the following components within the scenario. What were the:\n- Threats\n- Vulnerabilities\n- Risks\n
  8. Risk can't be calculated without identifying the asset.\nThis scenario only includes a single asset.\nWhat asset assumptions did you make at each step of the scenario?\n\nIn the context of information risk, we can define Asset as any data, device, or other component of the environment that supports information-related activities, which can be illicitly accessed, used, disclosed, altered, destroyed, and/or stolen, resulting in loss.\n
  9. A threat acts against an asset in a manner that can result in harm.\nDifferent threats have different capabilities.\nConsider the same scenario with a squirrel intent on gnawing through the rope.\n\nA reasonable definition for Threat is anything (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset that can cause a loss event to occur.\n
  10. An asset is vulnerable to a threat.\nVulnerability is a derived value.\nCalculating vulnerability has everything to do with the threat.\nConsider the same scenario with a frayed steel cable.\n\nYou may have wondered why “potential” is emphasized when I identified the frayed rope as a potential vulnerability. The reason it’s only a potential vulnerability is that we first have to ask the question, “Vulnerable to what?” If our frayed rope still had a tensile strength of 2000 pounds per square inch, its vulnerability to the weight of a tire would, for all practical purposes, be virtually zero. If our scenario had included a squirrel gnawing on the frayed rope, then he also would be considered a threat, and the rope’s hardness would determine its vulnerability to that threat. A steel cable (even a frayed one) would not be particularly vulnerable to our furry friend. The point is that vulnerability is always dependent upon the type and level of force being applied.\n
  11. Risk depends on threat, vulnerability, and asset characteristics.\nRisk is a derived value.\nCalculating risk has everything to do with how you frame the scenario.\n\nThe following definition applies regardless of whether you’re talking about investment risk, market risk, credit risk, information risk, or any of the other commonly referenced risk domains:\n\nRisk: the probable frequency and probable magnitude of future loss\n\nIn other words “how frequently something bad is likely to happen, and how much loss is likely to result.” As stated above, these probabilities are derived from the combination of threat, vulnerability, and asset characteristics.\n
  12. Risk is a derived value... Let that sink in.\nProbability, frequency, and magnitude are all involved.\nInformation risk is no different from any other risk domain in business, government, or life.\n
  13. What is probability?\nIt is POSSIBLE that an Alaskan Brown Bear will come through that door and maul me right now. However, it is not PROBABLE.\nI'm very confident that the PROBABILITY of rolling snake eyes on a pair of 6-sided dice is 1 in 36. I'm not at all confident in the PREDICTABILITY of when that roll will occur.\n\nPossibility is a binary condition, either something is possible, or it's not.\nProbability reflects the continuum between absolute certainty and impossibility.\nPredictability is a level of confidence in a forecast about what will happen.\n
  14. A shaman prescribes a remedy based upon what his forefathers have passed down to him.\nSome shamans may be extremely intuitive and great at what they do, but they are artists, not scientists.\nA shaman can't credibly explain why the cure works.\n\nScientific analysis leads to deeper understanding.\nThe scientific method is: define the problem; substantiate a theory; propose and test a hypothesis; come to a conclusion; learn something.\n\nBest practices are often based on long-held shamanistic solutions, tend to be one-size-fits-all, may evolve more slowly than the conditions in which they're used, and can too often be used as a crutch (e.g. "I can't explain why, so I'll just point to the fact that everyone else is doing it this way.").\n
  15. Don't be a Security Shaman!\nDerive your Risk!\n
  16. Don't be a Security Shaman!\nDerive the Vulnerability of your Assets!\n
  17. Don't be a Security Shaman!\nDerive the frequency of your Loss Events!\n
  18. Don't be a Security Shaman!\nDerive the Magnitude of a probable Loss!\n
  19. Don't be a Security Shaman!\nDerive your Risk!\n
  20. \n\n
  21. \n\n