SlideShare a Scribd company logo
1 of 20
Samuel Mazoya
Managing Partner at BIWDANT CONSULT
LIMITED
Samuel MAZOYA: (ITIL EXPERT, CRM, ABCP-BCMS, ISO 28000,
22301). A graduate of Industrial Design/Technology with over 15
years in the world of IT. He is an erudite instructor with very good
and unmatched delivery testimonials. His areas of expertise are
ITIL® (IT Infrastructure Library-Foundation, Intermediate, and
Expert Levels), ISO 28000 (Supply Chain), ISO 22301 (BCMS) and
CRM (Customer Relationship Management).
Contact Information
Add your number please
samuel@biwdant.com
www.biwdant.com
https://ng.linkedin.com/in/samuel-mazoya
Overview
Risk management methodology in the past allows you to
identify risks using any methodology you like; however,
today’s Risk management requires identification of
assets, threats and vulnerabilities.
This presentation is tailored to enhance practitioners
insights on how to combine assets, threats and
vulnerability in order to identify risks to which supply
chain services, processes and activities are exposed to.
Assets
 An asset is anything that has value to the
organization which needs to be protected.
 For Supply Chain operations, we can
categorize assets as follows:
 1. Primary Assets which consists of business
processes and information assets. During our
risk assessment activities, these primary
assets should take upmost importance in
safeguarding.
Assets Cont.
 2. Supporting Assets: These includes the
hardware, software, computer networks, staff,
sites and organizational structures needed to
support the primary assets to deliver its
outputs to business opeartions.
Risk
 The chance of something happening,
measured in terms of probability and
consequences. The consequence may be
either positive or negative. Risk in a general
sense can be defined as the threat of an
action or inaction that will prevent an
organisation’s ability to achieve its business
objectives. The results of a risk occurring are
defined by the impact.
Vulnerability
 A weakness that could be exploited by a
threat-For example, an open firewall port, a
password that is never changed.
 A missing or weak control measure can also
be considered to be a vulnerability
Start-off Approach
* Gain agreement on Risk Assessment Tolerance with all
stakeholders
* Risk identification is the first step of the Risk Assessment
process and care + quality time should be invested in
carrying out this activity.
* After identifying the Risk Supply Chain processes,
services and activities plus systems are vulnerable to,
the Risk Evaluation process (Assessing the impact and
likelihood) follows.
Start-Off Approach cont.
 Evaluate and classify risk impacts and
vulnerabilities related to supply chain
processes, activities and operations as well as
their dependencies
 Conduct an analysis of the controls in place to
identify business resiliency strategy for
mitigating identified risks
 Document and present the risk assessment
for management approval
Start-off Approach cont.
 To make your risk assessment easier, you can use a
sheet with assets, threats and vulnerabilities in columns;
you should also include some other information like risk
ID, risk owners, impact and likelihood, etc
S/N Risk ID Risk Owner Impact Likelihood
Developing Threats, Assets &
Vulnerability Matrix
It is usually easiest to start listing items column by column,
not row by row – this means you should list all of your
assets first, and only then start finding a couple of
threats for each asset, and finally find a couple of
vulnerabilities for each threat.
We have identified risks faced , lets look at what the
matching of these three, Assets, Threats and
Vulnerability looks like for a Supply Chain operation.
Developing Threats, Assets &
Vulnerability Matrix
 This matrix gives a broader picture of which
risk have the highest probability of having the
most impact. The last column should indicate
what recommended mitigation should be put
in place to reduce the effect of the risk in the
even of occurrence.
 The next slide gives an example of
Threat/Risk Matrix
Threat/Risk Matrix sample
Risk Power
Failure
Buildin
g
Access
Facility/
Equipmen
t Damage
Fire Commu
nication
Access
Comput
er
Shutdo
wn
Data
Loss
Threats
Tornado * * * * * * *
Lightning * * * * * * *
Plane
Crash
* * * * * * *
Water/Pi
e leak
* * *
Fire * * * * * * *
Cable
Cut
* * * * *
Location/Threat Matrix
Location Threat/Probability Recommended
Control
H/Q Office Hurricane/Low Business Continuity
Plan
Boston Office Power Outage/High Backup Generator UPS
on critical systems
San Francisco Office Tornado/Medium Tornado shelter on site,
Tornado drills, Property
insurance, Weather
radios
Miami Office Earthquake/High Anchor equipment to
walls/desktops, Secure
hazardous items
UK Office Hurricane/High Backup generator,
Business Continuity
Plan
Matching of Assets, Threats &
Vulnerability
 Supply Chain Assets: Paper Document.
 threat: fire; vulnerability: document is not stored in a
fire-proof cabinet (risk related to the loss of availability
of the information)
 threat: fire; vulnerability: there is no backup of the
document (potential loss of availability)
 threat: unauthorized access; vulnerability: document is
not locked in a cabinet (potential loss of
confidentiality)
Matching of Assets, Threats &
Vulnerability Cont.
 Supply Chain Asset: digital document:
 threat: disk failure; vulnerability: there is no backup of
the document (potential loss of availability)
 threat: virus; vulnerability: anti-virus program is not
properly updated (potential loss of confidentiality,
integrity and availability)
 threat: unauthorized access; vulnerability: access
control scheme is not properly defined (potential loss
of confidentiality, integrity and availability)
 threat: unauthorized access; vulnerability: the access
was given to too many people (potential loss of
confidentiality, integrity and availability)
Matching of Assets, Threats &
Vulnerability Cont.
 Asset: system administrator:
 threat: unavailability of this person; vulnerability: there
is no replacement for this position (potential loss of
availability)
 threat: frequent errors; vulnerability: lack of training
(potential loss of integrity and availability)
 etc.
How much is enough?
 Very often you hear people ask how many risks
should they identify? If they start being really
thorough, for each asset they could find 10 threats,
and for each threat at least 5 vulnerabilities – this is
quite realistic, isn’t it?
 Now if you are a small company with 50 assets, this
would mean you would end up with 2,500 risks, which
would probably be overkill for this size of a company.
This is why you should focus only on the most
important threats and vulnerabilities, while including
all the assets; that would mean that per each asset
you should identify on average 5 threats, and for each
threat on average 2 vulnerabilities. This way you
would end up with 500 risks for a smaller company
with 50 assets, which is quite manageable..
ISO 28000 Training Courses
 ISO 28000 Introduction
1 Day Course
 ISO 28000 Foundation
2 Days Course
 ISO 28000 LEAD IMPLEMENTER
5 Days Course
 ISO 28000 Lead Auditor
5 Days Course
Exam and certification fees are included in the training price.
https://pecb.com/iso-28000-training-courses| www.pecb.com/events
THANK YOU
?
Add your number please
samuel@biwdant.com
www.biwdant.com
https://ng.linkedin.com/in/samuel-mazoya-b

More Related Content

Viewers also liked

How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?PECB
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security TestingPECB
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 
How Climate Change is shaping the Future of Business?
How Climate Change is shaping the Future of Business?How Climate Change is shaping the Future of Business?
How Climate Change is shaping the Future of Business?PECB
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301PECB
 
The role of the new ISO 9001:2015 leadership requirements in companies
The role of the new ISO 9001:2015 leadership requirements in companiesThe role of the new ISO 9001:2015 leadership requirements in companies
The role of the new ISO 9001:2015 leadership requirements in companiesPECB
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
Asignando roles, responsabilidad y autoridad en la seguridad de la información
Asignando roles, responsabilidad y autoridad en la seguridad de la informaciónAsignando roles, responsabilidad y autoridad en la seguridad de la información
Asignando roles, responsabilidad y autoridad en la seguridad de la informaciónPECB
 
5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
5 Top Tips for Implementing a Successful Safety Culture in Global Organizations5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
5 Top Tips for Implementing a Successful Safety Culture in Global OrganizationsPECB
 

Viewers also liked (10)

How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
How Climate Change is shaping the Future of Business?
How Climate Change is shaping the Future of Business?How Climate Change is shaping the Future of Business?
How Climate Change is shaping the Future of Business?
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301
 
The role of the new ISO 9001:2015 leadership requirements in companies
The role of the new ISO 9001:2015 leadership requirements in companiesThe role of the new ISO 9001:2015 leadership requirements in companies
The role of the new ISO 9001:2015 leadership requirements in companies
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Asignando roles, responsabilidad y autoridad en la seguridad de la información
Asignando roles, responsabilidad y autoridad en la seguridad de la informaciónAsignando roles, responsabilidad y autoridad en la seguridad de la información
Asignando roles, responsabilidad y autoridad en la seguridad de la información
 
5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
5 Top Tips for Implementing a Successful Safety Culture in Global Organizations5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
5 Top Tips for Implementing a Successful Safety Culture in Global Organizations
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Insights about an effective risk assessment within the supply chain

  • 1.
  • 2. Samuel Mazoya Managing Partner at BIWDANT CONSULT LIMITED Samuel MAZOYA: (ITIL EXPERT, CRM, ABCP-BCMS, ISO 28000, 22301). A graduate of Industrial Design/Technology with over 15 years in the world of IT. He is an erudite instructor with very good and unmatched delivery testimonials. His areas of expertise are ITIL® (IT Infrastructure Library-Foundation, Intermediate, and Expert Levels), ISO 28000 (Supply Chain), ISO 22301 (BCMS) and CRM (Customer Relationship Management). Contact Information Add your number please samuel@biwdant.com www.biwdant.com https://ng.linkedin.com/in/samuel-mazoya
  • 3. Overview Risk management methodology in the past allows you to identify risks using any methodology you like; however, today’s Risk management requires identification of assets, threats and vulnerabilities. This presentation is tailored to enhance practitioners insights on how to combine assets, threats and vulnerability in order to identify risks to which supply chain services, processes and activities are exposed to.
  • 4. Assets  An asset is anything that has value to the organization which needs to be protected.  For Supply Chain operations, we can categorize assets as follows:  1. Primary Assets which consists of business processes and information assets. During our risk assessment activities, these primary assets should take upmost importance in safeguarding.
  • 5. Assets Cont.  2. Supporting Assets: These includes the hardware, software, computer networks, staff, sites and organizational structures needed to support the primary assets to deliver its outputs to business opeartions.
  • 6. Risk  The chance of something happening, measured in terms of probability and consequences. The consequence may be either positive or negative. Risk in a general sense can be defined as the threat of an action or inaction that will prevent an organisation’s ability to achieve its business objectives. The results of a risk occurring are defined by the impact.
  • 7. Vulnerability  A weakness that could be exploited by a threat-For example, an open firewall port, a password that is never changed.  A missing or weak control measure can also be considered to be a vulnerability
  • 8. Start-off Approach * Gain agreement on Risk Assessment Tolerance with all stakeholders * Risk identification is the first step of the Risk Assessment process and care + quality time should be invested in carrying out this activity. * After identifying the Risk Supply Chain processes, services and activities plus systems are vulnerable to, the Risk Evaluation process (Assessing the impact and likelihood) follows.
  • 9. Start-Off Approach cont.  Evaluate and classify risk impacts and vulnerabilities related to supply chain processes, activities and operations as well as their dependencies  Conduct an analysis of the controls in place to identify business resiliency strategy for mitigating identified risks  Document and present the risk assessment for management approval
  • 10. Start-off Approach cont.  To make your risk assessment easier, you can use a sheet with assets, threats and vulnerabilities in columns; you should also include some other information like risk ID, risk owners, impact and likelihood, etc S/N Risk ID Risk Owner Impact Likelihood
  • 11. Developing Threats, Assets & Vulnerability Matrix It is usually easiest to start listing items column by column, not row by row – this means you should list all of your assets first, and only then start finding a couple of threats for each asset, and finally find a couple of vulnerabilities for each threat. We have identified risks faced , lets look at what the matching of these three, Assets, Threats and Vulnerability looks like for a Supply Chain operation.
  • 12. Developing Threats, Assets & Vulnerability Matrix  This matrix gives a broader picture of which risk have the highest probability of having the most impact. The last column should indicate what recommended mitigation should be put in place to reduce the effect of the risk in the even of occurrence.  The next slide gives an example of Threat/Risk Matrix
  • 13. Threat/Risk Matrix sample Risk Power Failure Buildin g Access Facility/ Equipmen t Damage Fire Commu nication Access Comput er Shutdo wn Data Loss Threats Tornado * * * * * * * Lightning * * * * * * * Plane Crash * * * * * * * Water/Pi e leak * * * Fire * * * * * * * Cable Cut * * * * *
  • 14. Location/Threat Matrix Location Threat/Probability Recommended Control H/Q Office Hurricane/Low Business Continuity Plan Boston Office Power Outage/High Backup Generator UPS on critical systems San Francisco Office Tornado/Medium Tornado shelter on site, Tornado drills, Property insurance, Weather radios Miami Office Earthquake/High Anchor equipment to walls/desktops, Secure hazardous items UK Office Hurricane/High Backup generator, Business Continuity Plan
  • 15. Matching of Assets, Threats & Vulnerability  Supply Chain Assets: Paper Document.  threat: fire; vulnerability: document is not stored in a fire-proof cabinet (risk related to the loss of availability of the information)  threat: fire; vulnerability: there is no backup of the document (potential loss of availability)  threat: unauthorized access; vulnerability: document is not locked in a cabinet (potential loss of confidentiality)
  • 16. Matching of Assets, Threats & Vulnerability Cont.  Supply Chain Asset: digital document:  threat: disk failure; vulnerability: there is no backup of the document (potential loss of availability)  threat: virus; vulnerability: anti-virus program is not properly updated (potential loss of confidentiality, integrity and availability)  threat: unauthorized access; vulnerability: access control scheme is not properly defined (potential loss of confidentiality, integrity and availability)  threat: unauthorized access; vulnerability: the access was given to too many people (potential loss of confidentiality, integrity and availability)
  • 17. Matching of Assets, Threats & Vulnerability Cont.  Asset: system administrator:  threat: unavailability of this person; vulnerability: there is no replacement for this position (potential loss of availability)  threat: frequent errors; vulnerability: lack of training (potential loss of integrity and availability)  etc.
  • 18. How much is enough?  Very often you hear people ask how many risks should they identify? If they start being really thorough, for each asset they could find 10 threats, and for each threat at least 5 vulnerabilities – this is quite realistic, isn’t it?  Now if you are a small company with 50 assets, this would mean you would end up with 2,500 risks, which would probably be overkill for this size of a company. This is why you should focus only on the most important threats and vulnerabilities, while including all the assets; that would mean that per each asset you should identify on average 5 threats, and for each threat on average 2 vulnerabilities. This way you would end up with 500 risks for a smaller company with 50 assets, which is quite manageable..
  • 19. ISO 28000 Training Courses  ISO 28000 Introduction 1 Day Course  ISO 28000 Foundation 2 Days Course  ISO 28000 LEAD IMPLEMENTER 5 Days Course  ISO 28000 Lead Auditor 5 Days Course Exam and certification fees are included in the training price. https://pecb.com/iso-28000-training-courses| www.pecb.com/events
  • 20. THANK YOU ? Add your number please samuel@biwdant.com www.biwdant.com https://ng.linkedin.com/in/samuel-mazoya-b