SlideShare a Scribd company logo
1 of 26
Download to read offline
Threat Based Risk
Assessments
© Michael Lines
cyberadvisor@protonmail.com
© Michael Lines
cyberadvisor@protonmail.com
Introduction
My Objectives
• Provide you food for thought regarding how to structure a
risk assessment for your organization
• Familiarize you with risk assessment terms and present a
risk assessment process to consider in case you have not
performed a risk assessment before
• Help you understand the drivers for risk assessments, in
particular how to meet the needs of both the business
(including the board) and your information security program
2
© Michael Lines
cyberadvisor@protonmail.com
Introduction
My Credentials
• Past 17 years focused in Information Security
• Developed and lead the managed security services
organization for Exodus Communications
• First Global CISO at Fair Isaac Corp
• First Global CISO at TransUnion
• Global CISO for PriceWaterhouseCoopers LLP
• Global CISO for D+H Ltd
• Now an independent advisor to boards and management
on cyber security
3
© Michael Lines
cyberadvisor@protonmail.com
Introduction
Disclaimer
• The information presented here is a compilation of my
observations and experience as to what works (and what
doesn’t) in information security risk assessment over my
career
• The methodology presented is my own and is not intended
to represent the practice of any particular organization
• The examples used are for demonstration purposes only
and do not represent the security state of any particular
organization
• Finally, the approach and discussion today is focused on
macro or enterprise level risk
4
© Michael Lines
cyberadvisor@protonmail.com
Agenda
• Why assess risk?
• Risk assessment challenges
• Risk terms and calculations
• Threat based risk analysis
• In conclusion
• For further information
5
© Michael Lines
cyberadvisor@protonmail.com
Why assess risk?
"We were not able to prevent the accident from happening
because we stopped thinking," said Yuichi Okamura, a
Tepco company spokesman. 
"We were not able to think beyond a certain point, such as
that a tsunami might be higher and what would happen to
the plant if that scenario did occur. We didn't think what
would happen if the safety equipment did not function as it
was meant to.”
The Telegraph article on the Fukushima disaster, March
2016
6
© Michael Lines
cyberadvisor@protonmail.com
Why assess risk?
The drivers
• Regulators (and regulations) demand it
• Boards and management need it
• Your Information Security program requires it
7
© Michael Lines
cyberadvisor@protonmail.com
Why assess risk?
Regulators (and regulations) demand it
8
Industry Risk Requirements
Retailers PCI DSS v3.1 12.2
Healthcare
45 CFR 164.308(a)(1)(ii)(A) (part of HIPAA Security
Rule)
Financial Services
GLBA Section 501(b)

16 CFR 314.4(b) (part of Safeguards Rule)
Federal Agencies FISMA 44 USC 3544(b)(1)
© Michael Lines
cyberadvisor@protonmail.com
Why assess risk?
Boards and management need it
• From the NACD Cyber Risk Oversight - Director’s Handbook
1. Directors need to understand and approach cybersecurity as an
enterprise-wide risk management issue, not just an IT issue.
2. Directors should understand the legal implications of cyber risks
as they relate to their company’s specific circumstances.
3. Boards should have adequate access to cybersecurity expertise,
and discussions about cyber-risk management should be given
regular and adequate time on the board meeting agenda.
4. Directors should set the expectation that management will
establish an enterprise-wide cyber-risk management framework.
5. Board-management discussion of cyber risks should include
identification of which risks to avoid, which to accept, and which
to mitigate or transfer through insurance, as well as specific
plans associated with each approach
9
© Michael Lines
cyberadvisor@protonmail.com
Why assess risk?
Your Information Security program requires it
• From ISO 27001:2013
• Information security management systems (ISMS)
• 6.1.2 Information Security Risk Assessment
• 6.1.3 Information Security Risk Treatment > SOA
• From NIST
• 800-30 Guide for Conducting Risk Assessments
• 800-37 Guide for Applying the Risk Mgmt Framework
• 800-39 Managing Information Security Risk
• 800-53r4 Security and Privacy Controls
• From ISF Standard of Good Practice
• SR1 Information Risk Assessment
• IRAM Information Risk Assessment Methodology
10
© Michael Lines
cyberadvisor@protonmail.com
Risk assessment challenges
• General agreement on the overall approach, no consensus on
the details
• Can be challenging in terms of where to start
• Easy to over analyze risk
• “Forrest for the trees” syndrome
• Analysis paralysis
• “Angels on the head of a pin” arguments
• Can easily become very costly to perform and maintain
• Easy to confuse management and frustrate the business
11
© Michael Lines
cyberadvisor@protonmail.com
Risk terms and calculations
Risk terms
• Threat Actors
• Threats
• Prevalence
• Vulnerabilities
• Impact
• Inherent Risk
• Residual Risk
• Risk Appetite (Tolerance)
12
© Michael Lines
cyberadvisor@protonmail.com
Risk terms and calculations
Risk treatments
• Acceptance
• Transfer
• Avoidance
• Mitigation
13
© Michael Lines
cyberadvisor@protonmail.com
Risk terms and calculations
• L = (P x V)/5
• P = Prevalence
• V = Vulnerability to Threat
• R = L x I
• R = Inherent Risk
• L = Inherent Likelihood of Threat
• I = Impact should Threat be successful or occur
• RR = cL x cI
• RR = Residual Risk
• cL = Compensated Likelihood of Threat
• cI = Compensated Impact should Threat be successful or
occur
14
© Michael Lines
cyberadvisor@protonmail.com
Risk terms and calculations
15
Prevalence
1 Rare, Unlikely, Not in Wild
2
3 Possible
4
5 Widespread, Certain
Vulnerability
1 Completely invulnerable
2
3 Partial protected
4
5 Complete vulnerable
Impact
1 Minor impact
2
3 Moderate impact
4
5 Major impact (share, legal)
Likelihood
1 2 3 4 5
5 Low Medium High High Critical
4 Low Medium Medium High High
3 Low Low Medium Medium High
2 Low Low Low Medium Medium
1 Low Low Low Low Low
Impact
Risk
© Michael Lines
cyberadvisor@protonmail.com
Risk terms and calculations
A medical example - Influenza
• Inherent risk
• Prevalence - Flu Season - (5)
• Vulnerability - Elderly, non vaccinated - (5)
• Impact - Hospitalization - (4)
• Risk - High (20)
• Compensating Control - Flu Vaccine
• Residual risk
• Prevalence - Flu Season - (5)
• Vulnerability - Elderly, vaccinated - (3)
• Impact - Moderate Illness - (3)
• Risk - Medium (9)
16
© Michael Lines
cyberadvisor@protonmail.com
Threat based risk analysis
What is an effective risk assessment program?
• One which:
• Gathers data regarding the information and technology
assets of the organization, threats to those assets,
vulnerabilities, existing security controls and processes,
and the current security standards and requirements;
• Analyzes the probability and impact associated with the
known threats and vulnerabilities to their assets; and
• Prioritizes the risks present due to threats and
vulnerabilities to determine the appropriate level of training,
controls, and assurance necessary for effective mitigation.

* From FFIEC Information Technology Examination Handbook
17
© Michael Lines
cyberadvisor@protonmail.com
Threat based risk analysis
What are the major sources of threats to
information security?
• Nation States
• Organized Crime
• Hacktivists
• Malicious Insiders
• Company Employees
18
© Michael Lines
cyberadvisor@protonmail.com
Threat based risk analysis
What are the threats that come from these actors?
19
Malicious Data Loss NS OC H MI CE
Web/Application Compromise X X X X
Malicious Emails X X X X X
Malicious Websites X X X X X
3rd Party Compromise X X X X
© Michael Lines
cyberadvisor@protonmail.com
Threat based risk analysis
What are the threats that come from these actors?
20
Accidental Data Loss NS OC H MI CE
Phishing X X X X
Loss X
Theft X X X X X
Accident X X X X X
© Michael Lines
cyberadvisor@protonmail.com
Threat based risk analysis
What are the threats that come from these actors?
21
Business Disruption NS OC H MI CE
Denial of Service X X X X
Business Process Disruption X X X X X
Facilities Attack X X X X
Ransomware X X X X
© Michael Lines
cyberadvisor@protonmail.com
Threat based risk analysis
What are the threats that come from these actors?
22
Compliance Findings NS OC H MI CE
Regulatory X X
Industry (PCI) X X
Client X X
Internal X X
© Michael Lines
cyberadvisor@protonmail.com
Threat based risk analysis
An example threat analysis
• Compensating controls are added to reduce risk
• Answers the questions – what’s the threat, is it meaningful to
us (inherent risk score), what are we doing about it (or need to
do about it – drives action), do we think it is enough (vs risk
tolerance), how much does or will this cost us.
23
Inherent Risk Rating
Inherent
Risk
Residual
Risk
Deployment
StatusThreat # Threat Prevalence Vulnerability Impact Capex $ Opex $
1
Emails are received containing
malicious links or attachments 4 5 5 20 10 In Progress $ 450,000 $ 105,000
Residual Risk Rating
Residual
Risk
Deployment
StatusCC # Compensating Control Prevalence Vulnerability Impact Capex $ Opex $
1
APT solution to detect
malicious attachments 4 2 5 8 Proposed $ 250,000 $ 60,000
2
Web proxy to stop access to
malicious websites 4 3 5 12 In Progress $ 100,000 $ 25,000
2
Antivirus on endpoints to stop
malicious attachments 4 3 5 12 Complete $ 100,000 $ 20,000
© Michael Lines
cyberadvisor@protonmail.com
Threat based risk analysis
An example threat assessment summary
• Management sets the level of acceptable risk (risk tolerance)
• Not all threats have to be mitigated, management can accept the
risk
• Regular risk assessment meetings should focus on incident
reviews, deployment status updates and changes to threats or
risk ratings that drive the need for reassessment of controls
• All risks should be reviewed annually in light of actual incidents,
company changes and changes in the threat environment
24
Inherent Risk Rating
Inherent
Risk
Residual
Risk
Deployment
StatusThreat # Threat Likelihood Vulnerability Impact Capex $ Opex $
1
Emails are received containing
malicious links or attachments 4 5 5 20 10 In Progress $ 450,000 $ 105,000
2
Emails are received that trick
users to divulge information 4 5 4 16 8 Complete $ 75,000 $ 10,000
3
Order website is disabled by
DOS attack 3 4 4 10 10
Risk
accepted $ 0 $ 0
© Michael Lines
cyberadvisor@protonmail.com
In conclusion
Proposed approach
• Focus on threats to the entire enterprise
• Consider asset classes instead of individual systems
• Start at the top with fundamental controls
• And finally… (JFDI)
25
“A good plan violently
executed now is
better than a perfect
plan executed next
week.” 

General George S. Patton
© Michael Lines
cyberadvisor@protonmail.com
For further information
Michael Lines
—————————————
Advisor to Boards and Management on Security Governance,
Assessment, Operations and Remediation
email: cyberadvisor@protonmail.com
Articles and further information available at
https://www.linkedin.com/in/michaellines
26

More Related Content

What's hot

National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Dr David Probert
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationPriyanka Aash
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 

What's hot (20)

National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Incident response
Incident responseIncident response
Incident response
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Incident response process
Incident response processIncident response process
Incident response process
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 

Viewers also liked

Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modelingsedukull
 
NYC Workshop: Improving the Business Value of your Service Management Program
NYC Workshop: Improving the Business Value of your Service Management ProgramNYC Workshop: Improving the Business Value of your Service Management Program
NYC Workshop: Improving the Business Value of your Service Management ProgramNavvia
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
NIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross ReferenceNIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross ReferenceJim Meyer
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & ForensicsPriyanka Aash
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerManageEngine, Zoho Corporation
 
Measuring method complexity of the case management modeling and notation (CMMN)
Measuring method complexity of the case management modeling and notation (CMMN)Measuring method complexity of the case management modeling and notation (CMMN)
Measuring method complexity of the case management modeling and notation (CMMN)Mike Marin
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Skybox Security
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 

Viewers also liked (13)

Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 
NYC Workshop: Improving the Business Value of your Service Management Program
NYC Workshop: Improving the Business Value of your Service Management ProgramNYC Workshop: Improving the Business Value of your Service Management Program
NYC Workshop: Improving the Business Value of your Service Management Program
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
NIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross ReferenceNIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross Reference
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
 
Measuring method complexity of the case management modeling and notation (CMMN)
Measuring method complexity of the case management modeling and notation (CMMN)Measuring method complexity of the case management modeling and notation (CMMN)
Measuring method complexity of the case management modeling and notation (CMMN)
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 

Similar to Threat Based Risk Assessments Explained

Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack SurvivalSkoda Minotti
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018Open Security Summit
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileVijayananda Mohire
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...Cam Fulton
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...SurfWatch Labs
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 

Similar to Threat Based Risk Assessments Explained (20)

Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Threat Based Risk Assessments Explained

  • 1. Threat Based Risk Assessments © Michael Lines cyberadvisor@protonmail.com
  • 2. © Michael Lines cyberadvisor@protonmail.com Introduction My Objectives • Provide you food for thought regarding how to structure a risk assessment for your organization • Familiarize you with risk assessment terms and present a risk assessment process to consider in case you have not performed a risk assessment before • Help you understand the drivers for risk assessments, in particular how to meet the needs of both the business (including the board) and your information security program 2
  • 3. © Michael Lines cyberadvisor@protonmail.com Introduction My Credentials • Past 17 years focused in Information Security • Developed and lead the managed security services organization for Exodus Communications • First Global CISO at Fair Isaac Corp • First Global CISO at TransUnion • Global CISO for PriceWaterhouseCoopers LLP • Global CISO for D+H Ltd • Now an independent advisor to boards and management on cyber security 3
  • 4. © Michael Lines cyberadvisor@protonmail.com Introduction Disclaimer • The information presented here is a compilation of my observations and experience as to what works (and what doesn’t) in information security risk assessment over my career • The methodology presented is my own and is not intended to represent the practice of any particular organization • The examples used are for demonstration purposes only and do not represent the security state of any particular organization • Finally, the approach and discussion today is focused on macro or enterprise level risk 4
  • 5. © Michael Lines cyberadvisor@protonmail.com Agenda • Why assess risk? • Risk assessment challenges • Risk terms and calculations • Threat based risk analysis • In conclusion • For further information 5
  • 6. © Michael Lines cyberadvisor@protonmail.com Why assess risk? "We were not able to prevent the accident from happening because we stopped thinking," said Yuichi Okamura, a Tepco company spokesman.  "We were not able to think beyond a certain point, such as that a tsunami might be higher and what would happen to the plant if that scenario did occur. We didn't think what would happen if the safety equipment did not function as it was meant to.” The Telegraph article on the Fukushima disaster, March 2016 6
  • 7. © Michael Lines cyberadvisor@protonmail.com Why assess risk? The drivers • Regulators (and regulations) demand it • Boards and management need it • Your Information Security program requires it 7
  • 8. © Michael Lines cyberadvisor@protonmail.com Why assess risk? Regulators (and regulations) demand it 8 Industry Risk Requirements Retailers PCI DSS v3.1 12.2 Healthcare 45 CFR 164.308(a)(1)(ii)(A) (part of HIPAA Security Rule) Financial Services GLBA Section 501(b)
 16 CFR 314.4(b) (part of Safeguards Rule) Federal Agencies FISMA 44 USC 3544(b)(1)
  • 9. © Michael Lines cyberadvisor@protonmail.com Why assess risk? Boards and management need it • From the NACD Cyber Risk Oversight - Director’s Handbook 1. Directors need to understand and approach cybersecurity as an enterprise-wide risk management issue, not just an IT issue. 2. Directors should understand the legal implications of cyber risks as they relate to their company’s specific circumstances. 3. Boards should have adequate access to cybersecurity expertise, and discussions about cyber-risk management should be given regular and adequate time on the board meeting agenda. 4. Directors should set the expectation that management will establish an enterprise-wide cyber-risk management framework. 5. Board-management discussion of cyber risks should include identification of which risks to avoid, which to accept, and which to mitigate or transfer through insurance, as well as specific plans associated with each approach 9
  • 10. © Michael Lines cyberadvisor@protonmail.com Why assess risk? Your Information Security program requires it • From ISO 27001:2013 • Information security management systems (ISMS) • 6.1.2 Information Security Risk Assessment • 6.1.3 Information Security Risk Treatment > SOA • From NIST • 800-30 Guide for Conducting Risk Assessments • 800-37 Guide for Applying the Risk Mgmt Framework • 800-39 Managing Information Security Risk • 800-53r4 Security and Privacy Controls • From ISF Standard of Good Practice • SR1 Information Risk Assessment • IRAM Information Risk Assessment Methodology 10
  • 11. © Michael Lines cyberadvisor@protonmail.com Risk assessment challenges • General agreement on the overall approach, no consensus on the details • Can be challenging in terms of where to start • Easy to over analyze risk • “Forrest for the trees” syndrome • Analysis paralysis • “Angels on the head of a pin” arguments • Can easily become very costly to perform and maintain • Easy to confuse management and frustrate the business 11
  • 12. © Michael Lines cyberadvisor@protonmail.com Risk terms and calculations Risk terms • Threat Actors • Threats • Prevalence • Vulnerabilities • Impact • Inherent Risk • Residual Risk • Risk Appetite (Tolerance) 12
  • 13. © Michael Lines cyberadvisor@protonmail.com Risk terms and calculations Risk treatments • Acceptance • Transfer • Avoidance • Mitigation 13
  • 14. © Michael Lines cyberadvisor@protonmail.com Risk terms and calculations • L = (P x V)/5 • P = Prevalence • V = Vulnerability to Threat • R = L x I • R = Inherent Risk • L = Inherent Likelihood of Threat • I = Impact should Threat be successful or occur • RR = cL x cI • RR = Residual Risk • cL = Compensated Likelihood of Threat • cI = Compensated Impact should Threat be successful or occur 14
  • 15. © Michael Lines cyberadvisor@protonmail.com Risk terms and calculations 15 Prevalence 1 Rare, Unlikely, Not in Wild 2 3 Possible 4 5 Widespread, Certain Vulnerability 1 Completely invulnerable 2 3 Partial protected 4 5 Complete vulnerable Impact 1 Minor impact 2 3 Moderate impact 4 5 Major impact (share, legal) Likelihood 1 2 3 4 5 5 Low Medium High High Critical 4 Low Medium Medium High High 3 Low Low Medium Medium High 2 Low Low Low Medium Medium 1 Low Low Low Low Low Impact Risk
  • 16. © Michael Lines cyberadvisor@protonmail.com Risk terms and calculations A medical example - Influenza • Inherent risk • Prevalence - Flu Season - (5) • Vulnerability - Elderly, non vaccinated - (5) • Impact - Hospitalization - (4) • Risk - High (20) • Compensating Control - Flu Vaccine • Residual risk • Prevalence - Flu Season - (5) • Vulnerability - Elderly, vaccinated - (3) • Impact - Moderate Illness - (3) • Risk - Medium (9) 16
  • 17. © Michael Lines cyberadvisor@protonmail.com Threat based risk analysis What is an effective risk assessment program? • One which: • Gathers data regarding the information and technology assets of the organization, threats to those assets, vulnerabilities, existing security controls and processes, and the current security standards and requirements; • Analyzes the probability and impact associated with the known threats and vulnerabilities to their assets; and • Prioritizes the risks present due to threats and vulnerabilities to determine the appropriate level of training, controls, and assurance necessary for effective mitigation.
 * From FFIEC Information Technology Examination Handbook 17
  • 18. © Michael Lines cyberadvisor@protonmail.com Threat based risk analysis What are the major sources of threats to information security? • Nation States • Organized Crime • Hacktivists • Malicious Insiders • Company Employees 18
  • 19. © Michael Lines cyberadvisor@protonmail.com Threat based risk analysis What are the threats that come from these actors? 19 Malicious Data Loss NS OC H MI CE Web/Application Compromise X X X X Malicious Emails X X X X X Malicious Websites X X X X X 3rd Party Compromise X X X X
  • 20. © Michael Lines cyberadvisor@protonmail.com Threat based risk analysis What are the threats that come from these actors? 20 Accidental Data Loss NS OC H MI CE Phishing X X X X Loss X Theft X X X X X Accident X X X X X
  • 21. © Michael Lines cyberadvisor@protonmail.com Threat based risk analysis What are the threats that come from these actors? 21 Business Disruption NS OC H MI CE Denial of Service X X X X Business Process Disruption X X X X X Facilities Attack X X X X Ransomware X X X X
  • 22. © Michael Lines cyberadvisor@protonmail.com Threat based risk analysis What are the threats that come from these actors? 22 Compliance Findings NS OC H MI CE Regulatory X X Industry (PCI) X X Client X X Internal X X
  • 23. © Michael Lines cyberadvisor@protonmail.com Threat based risk analysis An example threat analysis • Compensating controls are added to reduce risk • Answers the questions – what’s the threat, is it meaningful to us (inherent risk score), what are we doing about it (or need to do about it – drives action), do we think it is enough (vs risk tolerance), how much does or will this cost us. 23 Inherent Risk Rating Inherent Risk Residual Risk Deployment StatusThreat # Threat Prevalence Vulnerability Impact Capex $ Opex $ 1 Emails are received containing malicious links or attachments 4 5 5 20 10 In Progress $ 450,000 $ 105,000 Residual Risk Rating Residual Risk Deployment StatusCC # Compensating Control Prevalence Vulnerability Impact Capex $ Opex $ 1 APT solution to detect malicious attachments 4 2 5 8 Proposed $ 250,000 $ 60,000 2 Web proxy to stop access to malicious websites 4 3 5 12 In Progress $ 100,000 $ 25,000 2 Antivirus on endpoints to stop malicious attachments 4 3 5 12 Complete $ 100,000 $ 20,000
  • 24. © Michael Lines cyberadvisor@protonmail.com Threat based risk analysis An example threat assessment summary • Management sets the level of acceptable risk (risk tolerance) • Not all threats have to be mitigated, management can accept the risk • Regular risk assessment meetings should focus on incident reviews, deployment status updates and changes to threats or risk ratings that drive the need for reassessment of controls • All risks should be reviewed annually in light of actual incidents, company changes and changes in the threat environment 24 Inherent Risk Rating Inherent Risk Residual Risk Deployment StatusThreat # Threat Likelihood Vulnerability Impact Capex $ Opex $ 1 Emails are received containing malicious links or attachments 4 5 5 20 10 In Progress $ 450,000 $ 105,000 2 Emails are received that trick users to divulge information 4 5 4 16 8 Complete $ 75,000 $ 10,000 3 Order website is disabled by DOS attack 3 4 4 10 10 Risk accepted $ 0 $ 0
  • 25. © Michael Lines cyberadvisor@protonmail.com In conclusion Proposed approach • Focus on threats to the entire enterprise • Consider asset classes instead of individual systems • Start at the top with fundamental controls • And finally… (JFDI) 25 “A good plan violently executed now is better than a perfect plan executed next week.” 
 General George S. Patton
  • 26. © Michael Lines cyberadvisor@protonmail.com For further information Michael Lines ————————————— Advisor to Boards and Management on Security Governance, Assessment, Operations and Remediation email: cyberadvisor@protonmail.com Articles and further information available at https://www.linkedin.com/in/michaellines 26