SlideShare a Scribd company logo
1 of 25
CrisisManagementFoundation
Crisis Management
Foundation
ds.co.za
dealing with incidents that have a severe negative
business consequence
14. it risk landscape
CrisisManagementFoundation
Objectives
• The meerkats and risk
• The Toyota logo
• DA matrix
CrisisManagementFoundation
Risk
Meerkats have a sentinel or lookout role performed by
non-breeding members of the community. They watch
for possible predators and other potential threats to
the community. This behaviour is also called the raised
guarding position. This position rotates amongst
different members of the group in no particular order
or structure. Sentinels are usually around when the
group is foraging away from the burrow. The meerkat
on the lookout will sound an alarm by producing a
distinct bark. This allows the offspring to escape inside
the burrows and under protection of adults.Meerkats
are aware that life is full of risks, like cobra's and eagles
and thus plan to mitigate those risks. In the workplace
a person cannot be ignorant about the risks associated
with problems occurring. Evaluate what you have done
to mitigate those risks!
Addressing the IT risk management landscape
www.deesmith.co.za
CrisisManagementFoundation
Risk
• It is crucial to be able mitigate the risk associated with problems
and thus an established risk analysis methodology needs to be
adopted and utilized. How will we know if the problem is required
to be solved or not?
• How will we know which problems need to be worked on and
prioritized over others?
• The risk assessment methodology needs to cover the landscape –
refer the TOYOTA logo
CrisisManagementFoundation
The three ellipses
There are three ellipses visible in the company’s logo. Each ellipse
represents the heart of the customer, the heart of the product and
the heart of technological progress.
CrisisManagementFoundation
The IT landscape / DA matrix
A matrix of overlapping areas with the
areas being people, process and
technology.
Many practitioners concentrate on a
single block but then that only addresses
a small area of risk that will be mitigated.
Each block has a present and future:
• Threat
• Opportunity
These are underpinned by perceived:
• Strengths
• Weaknesses
These blocks can be viewed as there
own SWOT (see example SWOT
template)
Areas
Disciplines
CrisisManagementFoundation
Disciples of risk in the IT landscape
To be able to highlight threats in each area of the IT landscape
there are three attributes that can be used on focus on:
• Confidentiality. Information and services is accessible only to
those authorized (unauthorized disclosure)(loss)
• Integrity. Safeguarding the accuracy and completeness of
information and services (unauthorized modification or
misuse)(error)
• Availability. Authorized customers have access to the information
and services when require (destruction)(failure)
derived from CRAMM
CrisisManagementFoundation
CIA
CrisisManagementFoundation
An example SWOT template
S W
O T
CrisisManagementFoundation
Rapid risk assessment
• Rapid framework
• Provide a mechanism process threats using lights, camera and action
methodology
derived from CRAMM and ITIL
Landscape
/ metric Description Type Assessment* Value Vulnerablity Assessment* Value Threat Risk level Control Countermeasures Decision Mitigation Responsibility Relevant policy
PC
Describe the risk (will maintain
intellectual property) Confidentiality Confidential 3 Loss Moderate 2 6 Medium
Not
applicable Provide countermeasures
Control &
countermeasure Insufficent Not applicable
PI
Describe the risk (sufficiently
trained) Integrity Moderate 2 Errors Significant 3 6 Medium
Not
applicable Provide countermeasures On hold Partial Not applicable
PA
Describe the risk (right seats on
the bus) Availablity Negligible 0 Failures High 4 0 Low
Not
applicable Provide countermeasures
Control &
countermeasure Majority Not applicable
OC
Describe the risk (engineered not
to leak) Confidentiality Secure 4 Loss Moderate 2 8 Medium
Not
applicable Provide countermeasures
Control &
countermeasure Insufficent Not applicable
OI
Describe the risk (without
ambiquity) Integrity Catastrophic 4 Errors Significant 3 12 High
Not
applicable Provide countermeasures
Control &
countermeasure Partial Not applicable
OA Describe the risk (repeatable) Availablity Mandatory 4 Failures High 4 16 High
Not
applicable Provide countermeasures
Control &
countermeasure Majority Not applicable
TC
Describe the risk (system
information protection
requirements) Confidentiality Secure 4 Loss Moderate 2 8 Medium Substitute Provide countermeasures
Control &
countermeasure Insufficent Not applicable
TI
Describe the risk (system
validation requiremenst) Integrity Catastrophic 4 Errors Significant 3 12 High
Not
applicable Provide countermeasures
Control &
countermeasure Partial Not applicable
TA
Describe the risk (system uptime
requirements) Availablity Negligible 0 Failures High 4 0 Low
Not
applicable Provide countermeasures
Control &
countermeasure Majority Not applicable
Evaluation
People
Process
Technology
Mitigation
ActionLights Camera
Impact (consequence
of event)
Vulnerablity
(liklihood of
occurrence) Analysis
CrisisManagementFoundation
Process (lights, camera, action)
CrisisManagementFoundation
Process (lights, camera, action)
• Lights. List all of the dangers or possible situations associated
with the event activity that may expose services or information to
threats. List these in the template. Use experts or experienced
people to advise you on your risk assessment.
• Camera. Rate or assess what the vulnerability (likelihood) is of
services and information being exposed to threats and what the
impact (consequences) could be as a result of the threat
occurring.
• Action. Identify what practical measures could be put in place to
eliminate or reduce the likelihood of the threat occurring. This is
where changes are made to the event to reduce the risks. Use the
hierarchy of control system to minimise or eliminate threats by
putting in place potential to manage the threats once you have
assessed their risk level.
CrisisManagementFoundation
Risk – Lights
CrisisManagementFoundation
Risk – Camera
CrisisManagementFoundation
Risk – Camera
CrisisManagementFoundation
Risk – Camera
CrisisManagementFoundation
Impact (consequence of event)
• Catastrophic
• Multiple deaths, escalated and debilitating costs, adverse media coverage
• Major
• Serious health impacts for people or permanent disability, severe costs
incurred, widespread media coverage
• Moderate
• Rehabilitation required for injured persons, costs incurred, media and
community concerned
• Low
• Injuries resulting in lost time and claims, some costs incurred, minor isolated
concerns raised by stakeholders, customers
• Negligible
• Persons requiring first aid, insignificant costs incurred, minimum impact to
reputation
CrisisManagementFoundation
Vulnerability (likelihood of occurrence)
• High
• It is expected to occur in most circumstances, availability required (excluding
scheduled maintenance), there is a strong likelihood or danger of reoccurrence
• Significant
• Similar dangers have been recorded on a regular basis, availability recovered in
minutes, considered that it is likely that the event could occur
• Moderate
• Availability recovered in hours, incidents or dangers have occurred infrequently
in the past
• Low
• Very few known incidents of occurrence, availability recovered in days, has not
occurred yet, but it could occur sometime
• Negligible
• No known or recorded incidents of occurrence, remote chance, may only
occur in exceptional circumstance
CrisisManagementFoundation
Risk – Action
CrisisManagementFoundation
Controls
• Eliminate (the threat)
• Remove or stop the threat if possible, remove the cause or source of the threat, by
eliminating the machine, task or work process. If this is not practical, then substitute.
• Substitute (the process)
• Use a less problematic process. If this is not practical, then engineer.
• Engineer (change the technology)
• Introduce different technology. Improve maintenance procedures. If this is not
practical, then:
• Isolate
• Separate or isolate the threat from people by relocation or by changing the operation.
If this is not practical, then administer
• Administer
• Design and communicate written or verbal procedures that prevent the threat from
occurring. If this is not practical, then protect
• Protect
• Provide protect measures appropriate to the risk. Provide training information and
supervision to ensure that the measures will be effective and efficient.
CrisisManagementFoundation
Decision
• Control & countermeasures
• Determine what controls are currently in place and which are appropriate to use in
relation to mitigation of issues which are likely to occur.
• Risk transference
• Transferring the cost of the risk occurring to another party such as an
insurer
• Risk acceptance
• Accepting a risk without implementing any mitigating measures
• Risk avoidance
• Disabling or stopping the activity which contributes most to the risk
potentially occurring.
CrisisManagementFoundation
Risk (special case) – Information
Security
CrisisManagementFoundation
Review
• IT Risk involves all aspects of human behaviour as well as
systematic structures and technology.

More Related Content

Viewers also liked

DS Crisis Management Foundation Introduction
DS Crisis Management Foundation IntroductionDS Crisis Management Foundation Introduction
DS Crisis Management Foundation IntroductionDS
 
Circuito electrico
Circuito electricoCircuito electrico
Circuito electricoLaura Molina
 
La gestione dell'energia ed il controllo della qualita' energetica degli edif...
La gestione dell'energia ed il controllo della qualita' energetica degli edif...La gestione dell'energia ed il controllo della qualita' energetica degli edif...
La gestione dell'energia ed il controllo della qualita' energetica degli edif...Pasquale Capezzuto
 
Numero 23 raymer paulino 4to a
Numero 23 raymer paulino 4to aNumero 23 raymer paulino 4to a
Numero 23 raymer paulino 4to awilson almonte
 
2g -5000g Ozone generator catalog from Jiahuan ozone
2g -5000g Ozone generator  catalog from Jiahuan ozone 2g -5000g Ozone generator  catalog from Jiahuan ozone
2g -5000g Ozone generator catalog from Jiahuan ozone tracy woo
 
3Com HIPER DSP T1/EI
3Com HIPER DSP T1/EI3Com HIPER DSP T1/EI
3Com HIPER DSP T1/EIsavomir
 
Imagenes cardiologíaped1
Imagenes cardiologíaped1Imagenes cardiologíaped1
Imagenes cardiologíaped1Mony Fel
 
3Com ESPL-341
3Com ESPL-3413Com ESPL-341
3Com ESPL-341savomir
 

Viewers also liked (14)

DS Crisis Management Foundation Introduction
DS Crisis Management Foundation IntroductionDS Crisis Management Foundation Introduction
DS Crisis Management Foundation Introduction
 
Circuito electrico
Circuito electricoCircuito electrico
Circuito electrico
 
Decalogo innovacion06
 Decalogo innovacion06 Decalogo innovacion06
Decalogo innovacion06
 
La gestione dell'energia ed il controllo della qualita' energetica degli edif...
La gestione dell'energia ed il controllo della qualita' energetica degli edif...La gestione dell'energia ed il controllo della qualita' energetica degli edif...
La gestione dell'energia ed il controllo della qualita' energetica degli edif...
 
Solutionvalley
SolutionvalleySolutionvalley
Solutionvalley
 
Numero 23 raymer paulino 4to a
Numero 23 raymer paulino 4to aNumero 23 raymer paulino 4to a
Numero 23 raymer paulino 4to a
 
Presentacionde ingles
Presentacionde inglesPresentacionde ingles
Presentacionde ingles
 
Andrew Feller Photography
Andrew Feller PhotographyAndrew Feller Photography
Andrew Feller Photography
 
2g -5000g Ozone generator catalog from Jiahuan ozone
2g -5000g Ozone generator  catalog from Jiahuan ozone 2g -5000g Ozone generator  catalog from Jiahuan ozone
2g -5000g Ozone generator catalog from Jiahuan ozone
 
3Com HIPER DSP T1/EI
3Com HIPER DSP T1/EI3Com HIPER DSP T1/EI
3Com HIPER DSP T1/EI
 
How to be Awesome
How to be AwesomeHow to be Awesome
How to be Awesome
 
Imagenes cardiologíaped1
Imagenes cardiologíaped1Imagenes cardiologíaped1
Imagenes cardiologíaped1
 
3Com ESPL-341
3Com ESPL-3413Com ESPL-341
3Com ESPL-341
 
Drdevi
DrdeviDrdevi
Drdevi
 

Similar to DS Crisis Management Foundation Risk

Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides SlideTeam
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityAtlantic Training, LLC.
 
TR crisis management
TR crisis managementTR crisis management
TR crisis managementTurab Rzayev
 
Risk Mitigation Strategies PowerPoint Presentation Slides
Risk Mitigation Strategies PowerPoint Presentation SlidesRisk Mitigation Strategies PowerPoint Presentation Slides
Risk Mitigation Strategies PowerPoint Presentation SlidesSlideTeam
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesSlideTeam
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesSlideTeam
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Risk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation SlidesRisk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation SlidesSlideTeam
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides SlideTeam
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Performing Risk Assessments1
Performing Risk Assessments1Performing Risk Assessments1
Performing Risk Assessments1Mary Harris
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management Seapine Software
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides SlideTeam
 
Risk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesRisk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesSlideTeam
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesSlideTeam
 
Risk Management Lifecycle Process Powerpoint Presentation Slides
Risk Management Lifecycle Process Powerpoint Presentation SlidesRisk Management Lifecycle Process Powerpoint Presentation Slides
Risk Management Lifecycle Process Powerpoint Presentation SlidesSlideTeam
 
Operational Risk Management Overview PowerPoint presentation Slides
Operational Risk Management Overview PowerPoint presentation SlidesOperational Risk Management Overview PowerPoint presentation Slides
Operational Risk Management Overview PowerPoint presentation SlidesSlideTeam
 

Similar to DS Crisis Management Foundation Risk (20)

Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
 
TR crisis management
TR crisis managementTR crisis management
TR crisis management
 
Risk Mitigation Strategies PowerPoint Presentation Slides
Risk Mitigation Strategies PowerPoint Presentation SlidesRisk Mitigation Strategies PowerPoint Presentation Slides
Risk Mitigation Strategies PowerPoint Presentation Slides
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation SlidesRisk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation Slides
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Performing Risk Assessments1
Performing Risk Assessments1Performing Risk Assessments1
Performing Risk Assessments1
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management
 
Topic 04 risk mangement
Topic 04 risk mangementTopic 04 risk mangement
Topic 04 risk mangement
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
Risk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation SlidesRisk Assessment Powerpoint Presentation Slides
Risk Assessment Powerpoint Presentation Slides
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation Slides
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Management
 
Risk Management Lifecycle Process Powerpoint Presentation Slides
Risk Management Lifecycle Process Powerpoint Presentation SlidesRisk Management Lifecycle Process Powerpoint Presentation Slides
Risk Management Lifecycle Process Powerpoint Presentation Slides
 
Operational Risk Management Overview PowerPoint presentation Slides
Operational Risk Management Overview PowerPoint presentation SlidesOperational Risk Management Overview PowerPoint presentation Slides
Operational Risk Management Overview PowerPoint presentation Slides
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

DS Crisis Management Foundation Risk

  • 1. CrisisManagementFoundation Crisis Management Foundation ds.co.za dealing with incidents that have a severe negative business consequence
  • 2. 14. it risk landscape
  • 3. CrisisManagementFoundation Objectives • The meerkats and risk • The Toyota logo • DA matrix
  • 4. CrisisManagementFoundation Risk Meerkats have a sentinel or lookout role performed by non-breeding members of the community. They watch for possible predators and other potential threats to the community. This behaviour is also called the raised guarding position. This position rotates amongst different members of the group in no particular order or structure. Sentinels are usually around when the group is foraging away from the burrow. The meerkat on the lookout will sound an alarm by producing a distinct bark. This allows the offspring to escape inside the burrows and under protection of adults.Meerkats are aware that life is full of risks, like cobra's and eagles and thus plan to mitigate those risks. In the workplace a person cannot be ignorant about the risks associated with problems occurring. Evaluate what you have done to mitigate those risks!
  • 5. Addressing the IT risk management landscape www.deesmith.co.za
  • 6. CrisisManagementFoundation Risk • It is crucial to be able mitigate the risk associated with problems and thus an established risk analysis methodology needs to be adopted and utilized. How will we know if the problem is required to be solved or not? • How will we know which problems need to be worked on and prioritized over others? • The risk assessment methodology needs to cover the landscape – refer the TOYOTA logo
  • 7. CrisisManagementFoundation The three ellipses There are three ellipses visible in the company’s logo. Each ellipse represents the heart of the customer, the heart of the product and the heart of technological progress.
  • 8. CrisisManagementFoundation The IT landscape / DA matrix A matrix of overlapping areas with the areas being people, process and technology. Many practitioners concentrate on a single block but then that only addresses a small area of risk that will be mitigated. Each block has a present and future: • Threat • Opportunity These are underpinned by perceived: • Strengths • Weaknesses These blocks can be viewed as there own SWOT (see example SWOT template) Areas Disciplines
  • 9. CrisisManagementFoundation Disciples of risk in the IT landscape To be able to highlight threats in each area of the IT landscape there are three attributes that can be used on focus on: • Confidentiality. Information and services is accessible only to those authorized (unauthorized disclosure)(loss) • Integrity. Safeguarding the accuracy and completeness of information and services (unauthorized modification or misuse)(error) • Availability. Authorized customers have access to the information and services when require (destruction)(failure) derived from CRAMM
  • 12. CrisisManagementFoundation Rapid risk assessment • Rapid framework • Provide a mechanism process threats using lights, camera and action methodology derived from CRAMM and ITIL Landscape / metric Description Type Assessment* Value Vulnerablity Assessment* Value Threat Risk level Control Countermeasures Decision Mitigation Responsibility Relevant policy PC Describe the risk (will maintain intellectual property) Confidentiality Confidential 3 Loss Moderate 2 6 Medium Not applicable Provide countermeasures Control & countermeasure Insufficent Not applicable PI Describe the risk (sufficiently trained) Integrity Moderate 2 Errors Significant 3 6 Medium Not applicable Provide countermeasures On hold Partial Not applicable PA Describe the risk (right seats on the bus) Availablity Negligible 0 Failures High 4 0 Low Not applicable Provide countermeasures Control & countermeasure Majority Not applicable OC Describe the risk (engineered not to leak) Confidentiality Secure 4 Loss Moderate 2 8 Medium Not applicable Provide countermeasures Control & countermeasure Insufficent Not applicable OI Describe the risk (without ambiquity) Integrity Catastrophic 4 Errors Significant 3 12 High Not applicable Provide countermeasures Control & countermeasure Partial Not applicable OA Describe the risk (repeatable) Availablity Mandatory 4 Failures High 4 16 High Not applicable Provide countermeasures Control & countermeasure Majority Not applicable TC Describe the risk (system information protection requirements) Confidentiality Secure 4 Loss Moderate 2 8 Medium Substitute Provide countermeasures Control & countermeasure Insufficent Not applicable TI Describe the risk (system validation requiremenst) Integrity Catastrophic 4 Errors Significant 3 12 High Not applicable Provide countermeasures Control & countermeasure Partial Not applicable TA Describe the risk (system uptime requirements) Availablity Negligible 0 Failures High 4 0 Low Not applicable Provide countermeasures Control & countermeasure Majority Not applicable Evaluation People Process Technology Mitigation ActionLights Camera Impact (consequence of event) Vulnerablity (liklihood of occurrence) Analysis
  • 14. CrisisManagementFoundation Process (lights, camera, action) • Lights. List all of the dangers or possible situations associated with the event activity that may expose services or information to threats. List these in the template. Use experts or experienced people to advise you on your risk assessment. • Camera. Rate or assess what the vulnerability (likelihood) is of services and information being exposed to threats and what the impact (consequences) could be as a result of the threat occurring. • Action. Identify what practical measures could be put in place to eliminate or reduce the likelihood of the threat occurring. This is where changes are made to the event to reduce the risks. Use the hierarchy of control system to minimise or eliminate threats by putting in place potential to manage the threats once you have assessed their risk level.
  • 19. CrisisManagementFoundation Impact (consequence of event) • Catastrophic • Multiple deaths, escalated and debilitating costs, adverse media coverage • Major • Serious health impacts for people or permanent disability, severe costs incurred, widespread media coverage • Moderate • Rehabilitation required for injured persons, costs incurred, media and community concerned • Low • Injuries resulting in lost time and claims, some costs incurred, minor isolated concerns raised by stakeholders, customers • Negligible • Persons requiring first aid, insignificant costs incurred, minimum impact to reputation
  • 20. CrisisManagementFoundation Vulnerability (likelihood of occurrence) • High • It is expected to occur in most circumstances, availability required (excluding scheduled maintenance), there is a strong likelihood or danger of reoccurrence • Significant • Similar dangers have been recorded on a regular basis, availability recovered in minutes, considered that it is likely that the event could occur • Moderate • Availability recovered in hours, incidents or dangers have occurred infrequently in the past • Low • Very few known incidents of occurrence, availability recovered in days, has not occurred yet, but it could occur sometime • Negligible • No known or recorded incidents of occurrence, remote chance, may only occur in exceptional circumstance
  • 22. CrisisManagementFoundation Controls • Eliminate (the threat) • Remove or stop the threat if possible, remove the cause or source of the threat, by eliminating the machine, task or work process. If this is not practical, then substitute. • Substitute (the process) • Use a less problematic process. If this is not practical, then engineer. • Engineer (change the technology) • Introduce different technology. Improve maintenance procedures. If this is not practical, then: • Isolate • Separate or isolate the threat from people by relocation or by changing the operation. If this is not practical, then administer • Administer • Design and communicate written or verbal procedures that prevent the threat from occurring. If this is not practical, then protect • Protect • Provide protect measures appropriate to the risk. Provide training information and supervision to ensure that the measures will be effective and efficient.
  • 23. CrisisManagementFoundation Decision • Control & countermeasures • Determine what controls are currently in place and which are appropriate to use in relation to mitigation of issues which are likely to occur. • Risk transference • Transferring the cost of the risk occurring to another party such as an insurer • Risk acceptance • Accepting a risk without implementing any mitigating measures • Risk avoidance • Disabling or stopping the activity which contributes most to the risk potentially occurring.
  • 25. CrisisManagementFoundation Review • IT Risk involves all aspects of human behaviour as well as systematic structures and technology.

Editor's Notes

  1. CM101 – Crisis Management Foundations Refer ITWeb article: https://lnkd.in/ehckK3T
  2. Meerkats have a sentinel or lookout role performed by non-breeding members of the community. They watch for possible predators and other potential threats to the community. This behaviour is also called the raised guarding position. This position rotates amongst different members of the group in no particular order or structure. Sentinels are usually around when the group is foraging away from the burrow. The meerkat on the lookout will sound an alarm by producing a distinct bark. This allows the offspring to escape inside the burrows and under protection of adults.Meerkats are aware that life is full of risks, like cobra's and eagles and thus plan to mitigate those risks. In the workplace a person cannot be ignorant about the risks associated with problems occurring. Evaluate what you have done to mitigate those risks!
  3. Addressing the IT risk management landscape
  4. It is crucial to be able mitigate the risk associated with problems and thus an established risk analysis methodology needs to be adopted and utilized. How will we know if the problem is required to be solved or not? How will we know which problems need to be worked on and prioritized over others? The risk assessment methodology needs to cover the landscape – refer the TOYOTA logo
  5. There are three ellipses visible in the company’s logo. Each ellipse represents the heart of the customer, the heart of the product and the heart of technological progress.
  6. A matrix of overlapping areas with the areas being people, process and technology. Many practitioners concentrate on a single block but then that only addresses a small area of risk that will be mitigated. Each block has a present and future: Threat Opportunity These are underpinned by perceived: Strengths Weaknesses These blocks can be viewed as there own SWOT (see example SWOT template)
  7. To be able to highlight threats in each area of the IT landscape there are three attributes that can be used on focus on: Confidentiality. Information and services is accessible only to those authorized (unauthorized disclosure)(loss) Integrity. Safeguarding the accuracy and completeness of information and services (unauthorized modification or misuse)(error) Availability. Authorized customers have access to the information and services when require (destruction)(failure) derived from CRAMM
  8. Reference: https://lnkd.in/e3Wu8hc
  9. SWOT
  10. Download from www.deesmith.co.za Under Resources Tools, Rapid Risk Assessment Tool
  11. Lights, camera, action
  12. Lights. List all of the dangers or possible situations associated with the event activity that may expose services or information to threats. List these in the template. Use experts or experienced people to advise you on your risk assessment. Camera. Rate or assess what the vulnerability (likelihood) is of services and information being exposed to threats and what the impact (consequences) could be as a result of the threat occurring. Action. Identify what practical measures could be put in place to eliminate or reduce the likelihood of the threat occurring. This is where changes are made to the event to reduce the risks. Use the hierarchy of control system to minimise or eliminate threats by putting in place potential to manage the threats once you have assessed their risk level.
  13. Lights
  14. Camera
  15. Camera
  16. Camera
  17. Catastrophic Multiple deaths, escalated and debilitating costs, adverse media coverage Major Serious health impacts for people or permanent disability, severe costs incurred, widespread media coverage Moderate Rehabilitation required for injured persons, costs incurred, media and community concerned Low Injuries resulting in lost time and claims, some costs incurred, minor isolated concerns raised by stakeholders, customers Negligible Persons requiring first aid, insignificant costs incurred, minimum impact to reputation
  18. High It is expected to occur in most circumstances, availability required (excluding scheduled maintenance), there is a strong likelihood or danger of reoccurrence Significant Similar dangers have been recorded on a regular basis, availability recovered in minutes, considered that it is likely that the event could occur Moderate Availability recovered in hours, incidents or dangers have occurred infrequently in the past Low Very few known incidents of occurrence, availability recovered in days, has not occurred yet, but it could occur sometime Negligible No known or recorded incidents of occurrence, remote chance, may only occur in exceptional circumstance
  19. Action
  20. Eliminate (the threat) Remove or stop the threat if possible, remove the cause or source of the threat, by eliminating the machine, task or work process. If this is not practical, then substitute. Substitute (the process) Use a less problematic process. If this is not practical, then engineer. Engineer (change the technology) Introduce different technology. Improve maintenance procedures. If this is not practical, then: Isolate Separate or isolate the threat from people by relocation or by changing the operation. If this is not practical, then administer Administer Design and communicate written or verbal procedures that prevent the threat from occurring. If this is not practical, then protect Protect Provide protect measures appropriate to the risk. Provide training information and supervision to ensure that the measures will be effective and efficient.
  21. Control & countermeasures Determine what controls are currently in place and which are appropriate to use in relation to mitigation of issues which are likely to occur. Risk transference Transferring the cost of the risk occurring to another party such as an insurer Risk acceptance Accepting a risk without implementing any mitigating measures Risk avoidance Disabling or stopping the activity which contributes most to the risk potentially occurring.
  22. Information Security
  23. Review