SlideShare a Scribd company logo
1 of 30
Risk Management
By Shyam
DISCLAIMER(S)
• The opinion here represented are my personal ones
and do not necessary reflect my employers views.
• Registered brands belong to their legitimate owners.
• The information contained in this
presentation does not break any
intellectual property, nor does it
provide detailed information that may
be in conflict with any laws
(hopefully...) :)
2
3
Personal Risk Management

4
Ideal Risk Management
A Prioritization process is followed whereby
the risks with the greatest (impact) and the
greatest probability (likelihood) of occurring
are handled first, and risks with lower
probability of occurrence and lower loss are
handled in descending order.
5
Impact vs Likelihood

6
Risk management methodologies
• NIST SP 800-30 framework
• ISO 27005 framework
• ISO 31000 Risk Management principles and guidelines
• PRISM framework

•OWASP Risk rating methodology
•COSO Enterprise risk management- Integrated framework
•OCTAVE
•ISF Information risk assessment methodologies (IRAM)
•ISACA risk IT
7
Problem
• These are somebody else’s vision of what risk management should
be.
• At best they are a guideline to give you examples of what others are
doing.

•At worst they make risk management look overly complicated and
make it difficult to get started.

8
Defining Risk
• Risk is the potential that a chosen action or activity (including the
choice of inaction) will lead to a loss (an undesirable outcome).

9
Risk can apply to
• Economic risk
•Health, Safety, and Environment
•IT and InfoSec
•Insurance
•Business and management
•Finance
•Security

10
Risk formula
•Likelihood: The probability of something occurring.
•Impact: The expected loss if that event occurs.
•Classic formula
•Risk= Likelihood*Impact

11
Make your risk formula fit you
• Weighting Impact
RISK= LIKELIHOODxIMPACT+IMPACT

12
•Weighting Impact
RISK= LIKELIHOODxIMPACT+ILIKELIHOOD

13
Be Flexible!!
•Risk management needs to be a custom fit for your organization and
your formula needs to reflect that.
•Your formula can (and likely will) change.
•Wherever you are tracking risks should be able to dynamically
update risk based on the updated formula.
•No word documents
•No excel documents
•No static formats

14
Determining risks
Convince your peers that documenting risks is CYOA and you’ll have
more risks than you know what to do with.
• Network vulnerability scanners
•Application vulnerability scanners
•Security mailing lists
• Security blogs
•Code Reviews

15
Evaluating a risk
Is the risk acceptable?
Is the likelihood or impact low enough that I’m willing to simply
accept the consequences if it happens.
Is the risk transferrable?

•Could I purchase insurance or some other measure to transfer
the impact of the risk to another party.
Is the risk reducable?
•

Is there some sort of mitigation that could be put in place to
reduce the impact or likelihood of the risk.
16
Determining a response

17
Risk management is cyclical

18
Risk review process
• May depend on how lean your organization is on management
structure.
• Raise the visibility of high level risks.
• High Risk =VP
•Medium Risk =Director
• Low Risk = Area Manager
•Risk should be re-reviewed regularly.
• High Risk = Monthly
•Medium Risk = Semi-Monthly
• Low Risk = Annually
19
Risk management is not
• It is not a process for avoiding risk.
•The aim of risk management is not to eliminate risk, rather to manage
the risks involved in business activities to maximize opportunities and
minimize adverse effects.
•Note: Risk management is not the management of insurable risks.
Insurance is an important way of transferring risk but most risks will be
managed by other means.

20
Deriving Value
• Order by risk level.
•Group if the mitigations are the same.
•Pass back to various teams stating that project X was approved for
consideration in next budget cycle.

21
Tools for enterprise risk management
•Most enterprise tools fall into a category called “GRC” (Governance,
Risk & Compliance). These tools are easily $100+.
•Bwise GRC Platform
•RSA Archer eGRC
•SAP GRC
•Oracle GRC
•Spreadsheets 
•Any good tools out there?

22
FixNix Risk management

23
FixNix Document a risk

24
FixNix risk mitigation

25
FixNix risk review

26
27
GOOD Risk management

A good risk management is that where the risks
are easily managed , mitigated and continuously
reviewed.
28
QUESTIONS??
Sheyamselvaraj
Shyamdicaprio

or
gRc_sham
or
29
Risk management automation

More Related Content

What's hot

Impact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing RiskImpact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing Risk
PECB
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk Management
JamesMooreCo
 

What's hot (20)

Introductory Considerations for Enterprise Security Risk Management Programs
Introductory Considerations for Enterprise Security Risk Management ProgramsIntroductory Considerations for Enterprise Security Risk Management Programs
Introductory Considerations for Enterprise Security Risk Management Programs
 
Alex Sidorenko at the 6th G31000 Risk management conference in Dubai
Alex Sidorenko at the 6th G31000 Risk management conference in DubaiAlex Sidorenko at the 6th G31000 Risk management conference in Dubai
Alex Sidorenko at the 6th G31000 Risk management conference in Dubai
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Impact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing RiskImpact of Changing World Politics in Managing Risk
Impact of Changing World Politics in Managing Risk
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Employee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management StrategyEmployee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management Strategy
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk Management
 
#Corpriskforum2016 - Andy Cox
#Corpriskforum2016 - Andy Cox#Corpriskforum2016 - Andy Cox
#Corpriskforum2016 - Andy Cox
 
#corpriskforum2016 - Julia Graham
#corpriskforum2016 - Julia Graham#corpriskforum2016 - Julia Graham
#corpriskforum2016 - Julia Graham
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Globals - Too Big to Govern?
Globals - Too Big to Govern?Globals - Too Big to Govern?
Globals - Too Big to Govern?
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Why risk management is needed
Why risk management is neededWhy risk management is needed
Why risk management is needed
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 
Emerging Risks
Emerging RisksEmerging Risks
Emerging Risks
 
Risk Management Case Study - Applied Concepts
Risk Management Case Study - Applied ConceptsRisk Management Case Study - Applied Concepts
Risk Management Case Study - Applied Concepts
 
#corpriskforum2016 - Erike Young
#corpriskforum2016 - Erike Young#corpriskforum2016 - Erike Young
#corpriskforum2016 - Erike Young
 

Similar to Risk management automation

Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017
Alexei Sidorenko, CRMP
 
ppt erm.pdf
ppt erm.pdfppt erm.pdf
ppt erm.pdf
RJ231
 

Similar to Risk management automation (20)

C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Trustee Conference AM4: Effectively managing risk
Trustee Conference AM4: Effectively managing riskTrustee Conference AM4: Effectively managing risk
Trustee Conference AM4: Effectively managing risk
 
Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence Program
 
Risk assessment facilitation guide
Risk assessment facilitation guideRisk assessment facilitation guide
Risk assessment facilitation guide
 
Risk assessment facilitation guide
Risk assessment facilitation guideRisk assessment facilitation guide
Risk assessment facilitation guide
 
ppt erm.pdf
ppt erm.pdfppt erm.pdf
ppt erm.pdf
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
Taking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to PracticalTaking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to Practical
 
Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 
Risk assessment and compliance 151119
Risk assessment and compliance 151119Risk assessment and compliance 151119
Risk assessment and compliance 151119
 
Getting the risk basics right, 30th November 2016
Getting the risk basics right, 30th November 2016Getting the risk basics right, 30th November 2016
Getting the risk basics right, 30th November 2016
 
DRIDeckFinalMar3
DRIDeckFinalMar3DRIDeckFinalMar3
DRIDeckFinalMar3
 
Role of Enterprise Risk Management in Risk Based Capital
Role of Enterprise Risk Management in Risk Based CapitalRole of Enterprise Risk Management in Risk Based Capital
Role of Enterprise Risk Management in Risk Based Capital
 
Risk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public SectorRisk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public Sector
 
Introduction To Risk Management Process
Introduction To Risk Management ProcessIntroduction To Risk Management Process
Introduction To Risk Management Process
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk management
 

Risk management automation

  • 2. DISCLAIMER(S) • The opinion here represented are my personal ones and do not necessary reflect my employers views. • Registered brands belong to their legitimate owners. • The information contained in this presentation does not break any intellectual property, nor does it provide detailed information that may be in conflict with any laws (hopefully...) :) 2
  • 3. 3
  • 5. Ideal Risk Management A Prioritization process is followed whereby the risks with the greatest (impact) and the greatest probability (likelihood) of occurring are handled first, and risks with lower probability of occurrence and lower loss are handled in descending order. 5
  • 7. Risk management methodologies • NIST SP 800-30 framework • ISO 27005 framework • ISO 31000 Risk Management principles and guidelines • PRISM framework •OWASP Risk rating methodology •COSO Enterprise risk management- Integrated framework •OCTAVE •ISF Information risk assessment methodologies (IRAM) •ISACA risk IT 7
  • 8. Problem • These are somebody else’s vision of what risk management should be. • At best they are a guideline to give you examples of what others are doing. •At worst they make risk management look overly complicated and make it difficult to get started. 8
  • 9. Defining Risk • Risk is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). 9
  • 10. Risk can apply to • Economic risk •Health, Safety, and Environment •IT and InfoSec •Insurance •Business and management •Finance •Security 10
  • 11. Risk formula •Likelihood: The probability of something occurring. •Impact: The expected loss if that event occurs. •Classic formula •Risk= Likelihood*Impact 11
  • 12. Make your risk formula fit you • Weighting Impact RISK= LIKELIHOODxIMPACT+IMPACT 12
  • 14. Be Flexible!! •Risk management needs to be a custom fit for your organization and your formula needs to reflect that. •Your formula can (and likely will) change. •Wherever you are tracking risks should be able to dynamically update risk based on the updated formula. •No word documents •No excel documents •No static formats 14
  • 15. Determining risks Convince your peers that documenting risks is CYOA and you’ll have more risks than you know what to do with. • Network vulnerability scanners •Application vulnerability scanners •Security mailing lists • Security blogs •Code Reviews 15
  • 16. Evaluating a risk Is the risk acceptable? Is the likelihood or impact low enough that I’m willing to simply accept the consequences if it happens. Is the risk transferrable? •Could I purchase insurance or some other measure to transfer the impact of the risk to another party. Is the risk reducable? • Is there some sort of mitigation that could be put in place to reduce the impact or likelihood of the risk. 16
  • 18. Risk management is cyclical 18
  • 19. Risk review process • May depend on how lean your organization is on management structure. • Raise the visibility of high level risks. • High Risk =VP •Medium Risk =Director • Low Risk = Area Manager •Risk should be re-reviewed regularly. • High Risk = Monthly •Medium Risk = Semi-Monthly • Low Risk = Annually 19
  • 20. Risk management is not • It is not a process for avoiding risk. •The aim of risk management is not to eliminate risk, rather to manage the risks involved in business activities to maximize opportunities and minimize adverse effects. •Note: Risk management is not the management of insurable risks. Insurance is an important way of transferring risk but most risks will be managed by other means. 20
  • 21. Deriving Value • Order by risk level. •Group if the mitigations are the same. •Pass back to various teams stating that project X was approved for consideration in next budget cycle. 21
  • 22. Tools for enterprise risk management •Most enterprise tools fall into a category called “GRC” (Governance, Risk & Compliance). These tools are easily $100+. •Bwise GRC Platform •RSA Archer eGRC •SAP GRC •Oracle GRC •Spreadsheets  •Any good tools out there? 22
  • 24. FixNix Document a risk 24
  • 27. 27
  • 28. GOOD Risk management A good risk management is that where the risks are easily managed , mitigated and continuously reviewed. 28