SlideShare a Scribd company logo
1 of 21
Download to read offline
| Charlotte Chapter
Cybersecurity Risk Management 101
Srinivasan (Mali) Vanamali, CISSP
Principal - Olympus Infotech
November 13, 2019
| Charlotte Chapter
➢ 20+ years practicing information system security
➢ CISSP (Since 2001)
➢ Technical and Management Roles - Developer, Systems Security Engineer,
Security Architect, Solution Manager
➢ SME - Identity and Access Management, RBAC
➢ SME - Cybersecurity Risk Assessment (NIST, HIPAA, PCI, ISO 27005)
➢ Trusted Adviser, Virtual CISO
➢ Published Author
✓ Identity Management Framework: Delivering Value for Business (ISACA Journal - 2004)
✓ Role Engineering: Cornerstone of RBAC (ISACA Journal - 2008)
Short Bio
| Charlotte Chapter
| Charlotte Chapter
What is Cybersecurity?
Cybersecurity
noun cy·ber·se·cu·ri·ty -si-ˌkyu̇ r-ə-tē
measures taken to protect a computer or computer system (as on the Internet)
against unauthorized access or attack
merriam-webster.com
| Charlotte Chapter
What is Cybersecurity Risk?
Cybersecurity risk is the likelihood of a cyber threat materializing by
compromising a vulnerability resulting in loss of confidentiality, integrity or
availability of a critical asset, system or an application.
Risk
Level
Likelihood
Model
Ease of
Exploitation
Valueof
Asset
| Charlotte Chapter
Key Definitions
➢ Asset is anything that has value and therefore requires protection
✧ Asset Classification - Public, Internal, Confidential, Restricted
✧ Asset Category - Software, Hardware, IP, Data, People, Process, Intangible
➢ Threat has the potential to harm an asset
✧ Natural (e.g., floods, earthquakes, storms, tornados);
✧ Human (e.g., intentional such as identity thieves, hackers, spyware authors; unintentional such
as user error, accidental deletions); or
✧ Environmental (e.g., power surges and spikes, hazmat contamination, environmental pollution)
➢ Vulnerabilities is a weakness that can be exploited by a threat to cause harm
to an asset
| Charlotte Chapter
Key Definitions Continued
➢ Impact is a negative quantitative and/or qualitative assessment of a
vulnerability compromising the confidentiality, integrity, and availability of an
asset
➢ Likelihood is the probability of occurrence in terms of frequency that a threat
exploiting a known or unknown vulnerability.
➢ Controls are existing process, policy, systems, applications, practice or other
action that mitigate risks or enhance security of an asset.
| Charlotte Chapter
Cybersecurity Risk Management Framework
ISO 27005: Information
Security Risk Management
| Charlotte Chapter
Risk Assessment
➢ Risk Identification
✧ Asset Register
✧ Identification of Threat
✧ Identification of Vulnerabilities
✧ Identification of Controls
Risk Assessment is a well defined process to determine value of critical assets, applicable
threats, vulnerabilities that exists or could exist, identifies controls and their effectiveness on
identified risks and help prioritize a risk treatment plan to mitigate residual risks.
| Charlotte Chapter
Risk Assessment ...Contd.
➢ Risk Calculation
✧ Quantitative vs Qualitative
✧ Risk = Likelihood x Consequence
➢ High Risk (>50 to 100) - There is a strong need for corrective measures. An existing system may
continue to operate, but a corrective action plan must be put in place as soon as possible.
➢ Medium Risk (>10 to 50) - Corrective actions are needed and a plan must be developed to
incorporate these actions within a reasonable period of time as agreed by the asset owner.
➢ Low Risk (>0 to 10) - Asset owner should determine if additional compensating controls are
needed or accept the risk.
| Charlotte Chapter
Sample Asset Register
Process Name Process / Asset
Owner
Description of Asset Asset Type Storage
Location
Patient Onboarding Customer Patient Data (EPHI)
Class: Restricted
Cat: Data
Primary AWS
User
Authentication
Customer User Credential (EPHI)
Class: Restricted
Cat: Data
Primary MongoDB
Data Management Customer Patient Data (EPHI)
Class: Restricted
Cat: Data
Primary MongoDB
| Charlotte Chapter
Threat Identification
Asset Owner Type Threat Description
Likelihood
Low
(0.1)
Medium
(0.5)
High
(1.0)
Patient Data
(EPHI)
Customer Primary
Breach of contractual requirements X
Cloud Bruteforce Attack X
Damage caused by a third party X
User Credential Customer Primary
Cloud Bruteforce Attack X
Disclosure of Passwords X
Leakage of data in the Cloud X
Malicious code X
| Charlotte Chapter
Vulnerability Identification
Asset Threat Description
Threat
Likelihood
Vulnerability Description
Consequence Risk
Calculation
L x C
Low
(10)
Med (50) High (100)
Patient Data
(EPHI)
Breach of contractual
requirements
Low (0.1)
Critical System Vulnerabilities in
Host Systems due to insufficient
patch management
X 10
Inadequate protection of
cryptographic keys
X 10
Lack of redundancy X 10
➢ Risk Register
✧ Asset Specific Threats and Related Vulnerabilities Exposure
✧ Each Combination of Threat and Vulnerability Constitutes a Risk
✧ Cumulative Qualitative Risk Score per Threat
| Charlotte Chapter
Control Identification
Asset
Risk
Score
Control Description
Control
Factor
Residual Risk
Patient Data
(EPHI)
30
Addressing security within supplier
agreements
27 3Identification of applicable legislation
and contractual requirements
Encryption Key management
| Charlotte Chapter
Risk Evaluation Criteria
➢ Strategic Importance to Business
➢ Criticality of the Asset
➢ Compliance, Legal, Contractual Obligation
➢ Impact on Confidentiality, Integrity and Availability
➢ Impact on Brand and Reputation
| Charlotte Chapter
Risk Treatment
➢ Risk Reduction
✧ Additional Controls to Further Mitigate Risks
✧ Cost Vs Benefits Analysis
➢ Risk Acceptance
✧ May be Conditional
✧ Management buy-in
✧ Decision Criteria
➢ Risk Avoidance
✧ Unable to Accept or Mitigate Risks
✧ *PANIC MODE*
➢ Risk Transfer
✧ Share Risks
✧ Transfer to Third-Party (Insurance)
| Charlotte Chapter
Why Risk Management?
➢ Resources are limited ($$)
➢ Challenges in Prioritizing Risks
➢ Control Driven Approach is Insufficient
➢ Compliance (SEC, NY DFS Cybersecurity Regulation)
| Charlotte Chapter
Risk Management Contexts
Business
Risk
Enterprise
Risk
Cyber Risk
Supply Chain Risk, Financial Risk,
Competition, Operational Risk etc.
Enterprise Risk Management driven by GRC,
Vendor Risk Management, Physical Security
etc.
Information Systems Security, Threat
Management. Vulnerability Management etc.
| Charlotte Chapter
ISMS Framework
| Charlotte Chapter
Questions?
| Charlotte Chapter
mali@olympus-infotech.com
www.olympus-infotech.com

More Related Content

What's hot

10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000Ramana K V
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability ManagementMarcelo Martins
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleEnterpriseGRC Solutions, Inc.
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30timmcguinness
 

What's hot (20)

10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 

Similar to Cybersecurity Risk Management 101

Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Security managment risks, controls and incidents
Security managment   risks, controls and incidentsSecurity managment   risks, controls and incidents
Security managment risks, controls and incidentsEdinburgh Napier University
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdfdotco
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™CPaschal
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for CyberinfrastructureLightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructurejbasney
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deckElaine Axum
 
Management of Risk and its integration within ITIL
Management of Risk and its integration within ITILManagement of Risk and its integration within ITIL
Management of Risk and its integration within ITILhdoornbos
 
Does IT Security Matter?
Does IT Security Matter?Does IT Security Matter?
Does IT Security Matter?Luke O'Connor
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 

Similar to Cybersecurity Risk Management 101 (20)

Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Security managment risks, controls and incidents
Security managment   risks, controls and incidentsSecurity managment   risks, controls and incidents
Security managment risks, controls and incidents
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for CyberinfrastructureLightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck2012 10 19 risk analysis training deck
2012 10 19 risk analysis training deck
 
Management of Risk and its integration within ITIL
Management of Risk and its integration within ITILManagement of Risk and its integration within ITIL
Management of Risk and its integration within ITIL
 
File000170
File000170File000170
File000170
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Does IT Security Matter?
Does IT Security Matter?Does IT Security Matter?
Does IT Security Matter?
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 

Cybersecurity Risk Management 101

  • 1. | Charlotte Chapter Cybersecurity Risk Management 101 Srinivasan (Mali) Vanamali, CISSP Principal - Olympus Infotech November 13, 2019
  • 2. | Charlotte Chapter ➢ 20+ years practicing information system security ➢ CISSP (Since 2001) ➢ Technical and Management Roles - Developer, Systems Security Engineer, Security Architect, Solution Manager ➢ SME - Identity and Access Management, RBAC ➢ SME - Cybersecurity Risk Assessment (NIST, HIPAA, PCI, ISO 27005) ➢ Trusted Adviser, Virtual CISO ➢ Published Author ✓ Identity Management Framework: Delivering Value for Business (ISACA Journal - 2004) ✓ Role Engineering: Cornerstone of RBAC (ISACA Journal - 2008) Short Bio
  • 4. | Charlotte Chapter What is Cybersecurity? Cybersecurity noun cy·ber·se·cu·ri·ty -si-ˌkyu̇ r-ə-tē measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack merriam-webster.com
  • 5. | Charlotte Chapter What is Cybersecurity Risk? Cybersecurity risk is the likelihood of a cyber threat materializing by compromising a vulnerability resulting in loss of confidentiality, integrity or availability of a critical asset, system or an application. Risk Level Likelihood Model Ease of Exploitation Valueof Asset
  • 6. | Charlotte Chapter Key Definitions ➢ Asset is anything that has value and therefore requires protection ✧ Asset Classification - Public, Internal, Confidential, Restricted ✧ Asset Category - Software, Hardware, IP, Data, People, Process, Intangible ➢ Threat has the potential to harm an asset ✧ Natural (e.g., floods, earthquakes, storms, tornados); ✧ Human (e.g., intentional such as identity thieves, hackers, spyware authors; unintentional such as user error, accidental deletions); or ✧ Environmental (e.g., power surges and spikes, hazmat contamination, environmental pollution) ➢ Vulnerabilities is a weakness that can be exploited by a threat to cause harm to an asset
  • 7. | Charlotte Chapter Key Definitions Continued ➢ Impact is a negative quantitative and/or qualitative assessment of a vulnerability compromising the confidentiality, integrity, and availability of an asset ➢ Likelihood is the probability of occurrence in terms of frequency that a threat exploiting a known or unknown vulnerability. ➢ Controls are existing process, policy, systems, applications, practice or other action that mitigate risks or enhance security of an asset.
  • 8. | Charlotte Chapter Cybersecurity Risk Management Framework ISO 27005: Information Security Risk Management
  • 9. | Charlotte Chapter Risk Assessment ➢ Risk Identification ✧ Asset Register ✧ Identification of Threat ✧ Identification of Vulnerabilities ✧ Identification of Controls Risk Assessment is a well defined process to determine value of critical assets, applicable threats, vulnerabilities that exists or could exist, identifies controls and their effectiveness on identified risks and help prioritize a risk treatment plan to mitigate residual risks.
  • 10. | Charlotte Chapter Risk Assessment ...Contd. ➢ Risk Calculation ✧ Quantitative vs Qualitative ✧ Risk = Likelihood x Consequence ➢ High Risk (>50 to 100) - There is a strong need for corrective measures. An existing system may continue to operate, but a corrective action plan must be put in place as soon as possible. ➢ Medium Risk (>10 to 50) - Corrective actions are needed and a plan must be developed to incorporate these actions within a reasonable period of time as agreed by the asset owner. ➢ Low Risk (>0 to 10) - Asset owner should determine if additional compensating controls are needed or accept the risk.
  • 11. | Charlotte Chapter Sample Asset Register Process Name Process / Asset Owner Description of Asset Asset Type Storage Location Patient Onboarding Customer Patient Data (EPHI) Class: Restricted Cat: Data Primary AWS User Authentication Customer User Credential (EPHI) Class: Restricted Cat: Data Primary MongoDB Data Management Customer Patient Data (EPHI) Class: Restricted Cat: Data Primary MongoDB
  • 12. | Charlotte Chapter Threat Identification Asset Owner Type Threat Description Likelihood Low (0.1) Medium (0.5) High (1.0) Patient Data (EPHI) Customer Primary Breach of contractual requirements X Cloud Bruteforce Attack X Damage caused by a third party X User Credential Customer Primary Cloud Bruteforce Attack X Disclosure of Passwords X Leakage of data in the Cloud X Malicious code X
  • 13. | Charlotte Chapter Vulnerability Identification Asset Threat Description Threat Likelihood Vulnerability Description Consequence Risk Calculation L x C Low (10) Med (50) High (100) Patient Data (EPHI) Breach of contractual requirements Low (0.1) Critical System Vulnerabilities in Host Systems due to insufficient patch management X 10 Inadequate protection of cryptographic keys X 10 Lack of redundancy X 10 ➢ Risk Register ✧ Asset Specific Threats and Related Vulnerabilities Exposure ✧ Each Combination of Threat and Vulnerability Constitutes a Risk ✧ Cumulative Qualitative Risk Score per Threat
  • 14. | Charlotte Chapter Control Identification Asset Risk Score Control Description Control Factor Residual Risk Patient Data (EPHI) 30 Addressing security within supplier agreements 27 3Identification of applicable legislation and contractual requirements Encryption Key management
  • 15. | Charlotte Chapter Risk Evaluation Criteria ➢ Strategic Importance to Business ➢ Criticality of the Asset ➢ Compliance, Legal, Contractual Obligation ➢ Impact on Confidentiality, Integrity and Availability ➢ Impact on Brand and Reputation
  • 16. | Charlotte Chapter Risk Treatment ➢ Risk Reduction ✧ Additional Controls to Further Mitigate Risks ✧ Cost Vs Benefits Analysis ➢ Risk Acceptance ✧ May be Conditional ✧ Management buy-in ✧ Decision Criteria ➢ Risk Avoidance ✧ Unable to Accept or Mitigate Risks ✧ *PANIC MODE* ➢ Risk Transfer ✧ Share Risks ✧ Transfer to Third-Party (Insurance)
  • 17. | Charlotte Chapter Why Risk Management? ➢ Resources are limited ($$) ➢ Challenges in Prioritizing Risks ➢ Control Driven Approach is Insufficient ➢ Compliance (SEC, NY DFS Cybersecurity Regulation)
  • 18. | Charlotte Chapter Risk Management Contexts Business Risk Enterprise Risk Cyber Risk Supply Chain Risk, Financial Risk, Competition, Operational Risk etc. Enterprise Risk Management driven by GRC, Vendor Risk Management, Physical Security etc. Information Systems Security, Threat Management. Vulnerability Management etc.