SlideShare a Scribd company logo
Measuring Risk
What Doesn’t Work and What
Does
aliadocorp.com







2

Aliado – Name’s Root is ―Ally;‖ How We Value Our
Relationships with our Customers

Leading the Way Since 2008
Professional Service Company /Management
Consultancy

Core Aliado Leaders have over 20 Years Professional
Service Experience from Big 5


Consultants servicing our technical expertise:
 Security
 Infrastructure
 Risk Management



Our most important Assets - People
 Integrity, Principles, Values
 Reputation, Reputation, Reputation
 Brand



Trusted Advisor



Professional Services – Not Products






If your risk analysis and risk management don’t work, then that is
your biggest risk.

Risk management (or, for that matter, any management
methodology) itself rarely has performance metrics applied to it.
The most popular methods have no published controlled
experiments where the improvement on forecasts and decisions
was actually measured (although anecdotal case studies are
common).
Mis - Communication – IT Security and Business Managers have
no common language to discuss risk. IT Security talks in terms of
high, medium, low or ordinal scales and Business Managers talks
in terms of quantitative numbers.


Likelihood









Does your ―Risk Map‖ look more like the top
or bottom chart? If more like the top, how do
the errors mentioned earlier compare to the
variance among the clustered responses?
Clustering means that all the previous errors
mentioned before make up a large part of the
difference between scores of individual risks.
How does this address correlations, common
mode failures, and cascade failures? These
factors can make a few ―low risk‖ items add
up to one very big risk.
The ―math‖ in these methods don’t even
remotely approximate the relationships one
might build in a quantitative model.
Risk maps like this may be ok for initial
brainstorming, but don’t make critical
decisions based on it.

Impact
5


Extreme
◦ Extreme likelihood of security controls being compromised with the possibility of catastrophic financial losses occurring as a
result. An asset with a vulnerability that was demonstrated to be exploitable and subsequently led to the compromise of
sensitive information would be designated with this rating.



High
◦ High likelihood of security controls being compromised with the potential for significant financial losses occurring as a result. This
rating would be given if a vulnerability was found to be exploitable and potentially affect the confidentiality, availability, and/or
integrity of a given asset.



Elevated
◦ Elevated likelihood of security controls being compromised with the potential for material financial losses occurring as a result.
Assets with a finding that led to information disclosure, for example, but not necessarily a full compromise, would be assigned
this rating.



Moderate
◦ Moderate likelihood of security controls being compromised with the possibility of limited financial losses occurring as a result. A
system with a vulnerability whose impact was reduced by factors such as configuration settings or difficulty of exploitation would
be assigned this rating.



Low
◦ Low likelihood of security controls being compromised with negligible impact as a result. This rating signifies either the nonexistence of vulnerabilities or those that have minimal impact.
▶

•
•

•

•

7

Human expertise is an important input in and it is
hard to completely automate. But there are certain
types of errors in human judgment we know how to
measure and control for:
Overconfidence – Their chance of being right is much less than they believe
Influence by irrelevant factors – Factors like the order in which you consider
projects, whether it is a 5-point scale or a 10-point scale, or how much other
people in the room smile all affect your judgments
Inconsistency – When given the same sets of problems to evaluate, experts have a
hard time giving the same answers; also, their memory is reconstructed so that
they believe they always had one preference when in fact they didn’t
Misinterpretation – We tend to interpret cues about risks, measurements and
decision problems in a way that is logically and mathematically irrational
Studies have shown that it is very easy for a decision-making process to
increase confidence in forecasts and decisions even if measured outcomes
(return on decisions, forecasts, etc.) are not improved – or even made worse










Gathering more information makes you feel better but, at some point, begins to reduce
decision quality while confidence continues to increase. (Tsai C. 2008)
Interaction with others also increases decision confidence but, again, at some point
decisions are not improved while confidence continues to increase (Heath C., Gonzalez
R. 1995)
Formal training in detecting lies makes individuals slightly worse at detecting lies in
controlled experiments – but there confidence in their judgments increases dramatically.
(Kassin, S.M., Fong, C.T. 1999)
An experiment with AHP shows confidence increased whether decisions are improved or
degraded. (Williams M. et. al. 2007)
Almost all popular business methodologies show no correlation to financial performance
of the firm (N. Nohria et. al. 2003)
Scales are simple. But our response behaviors when we use them are not.
Typical scales combine several complex, subtle errors








The use of scales simply obscures (doesn’t alleviate) the lack of information and
potential disagreements - he calls this an ―illusion of communication‖ (Budescu)
Popular weighted scores add error to unaided human judgment. Scale error is added
even if scales are ―well defined‖ by introducing an extreme rounding error. It is possible
to have one risk 10 or 50 times greater than another risk end up in the same final
group. (Cox)
―Partition dependence‖ creates an unanticipated relationship among choices on a scale.
Two scales that each define a ―1‖ in the same way (e.g. 1=―impact less than $1M), will
elicit different responses for a 1 depending on how many other choices there are.
Treating ordinal scales like linear scales that can be added and multiplied introduces an
error of ―assumed ratios‖. They assume relative values of the scales roughly
approximates real world relationships when an analysis of historical data shows they do
not.





―Gut Feel‖ is the baseline. Anything that ―works‖ has to show an improvement on this.
Measured sources of error : inconsistency, overconfidence, various biases, inaccurate
estimates
The worst case is not ―gut feel‖ – some methods add more error
The best case isn’t perfection – just measurably reduced error compared to gut feel

Method

Gut
Feel

Weighted Score

Preference
Theory Models

Quant.
Models

Measured
Improvement to
Judgment?

Baseline

No: Remove no errors
and add new errors

No: AHP has known
math problems; might
improve consistency

Yes: Proven
w/controlled tests

Does it quantify
risk?

Only
intuitively

No, it attempts to
describe risk;

No, but it can quantify
risk aversion

Yes

Determines HighPayoff Measures?

No

No: Turns some good
measures into scores

No

Yes (w/AIE)

Net Reduction in
Error?

Baseline

No: Probably Worse

Maybe Slightly Better
– Maybe not

Best


Aliado provides a Methodology--Applied
Information Economics—that IT Security and
IT Business Leaders can understand
◦ A statistical and probability application that allows
an organization to measure their risk accurately on
an ongoing basis that provides tangible results in
quantifying the risk on any risk landscape
component.



―Calibrate‖ experts to realistically assess probabilities.
―Do the math‖– don’t rely intuition entirely.
◦ Use the ―calibrated‖ judgments of experts in Monte Carlo simulations.
◦ Simple historical models usually outperform human judges.
◦ Compute the ―Expected Value of Information‖ to identify important
measures.






Improve unaided human judgment with statistical
―smoothing‖.
Try rational incentives to encourage better expert judgment.
Document basic decision criteria - especially risk vs. return.
Model The Current State of Uncertainty
– Initially use calibrated estimates and
then actual measurements

Calibration
Training

Define the Decision and Identify
Relevant Variables. Set up the
―Business Case‖ for the decision, using
these variables –

Compute the value of additional Information
– Determine what to measure and how much
effort to spend on measuring it.
No

Is there significant
value to more
information?

Yes
Measure where the information value is
high – Reduce uncertainty using any of
the methods

Optimize Decision – Use the quantified
Risk/Return boundary of the Decision makers to
determine which decision is preferred.
Event A

Event B

OR

%Orders
Lost

Demand

Lost
Revenue

•

Performance metrics for decision analysis tools is very sparse, but favors Monte Carlos.

•

One researcher in the oil industry found a correlation between the use of quantitative risk
analysis methods and financial performance – and the improvement in performance started
when they started using the quantitative methods. (F. Macmillan, 2000)
Data at NASA from over 100 space missions showed that Monte Carlo simulations beat
other methods for estimating cost, schedule and risks (Published this in The Failure of Risk
Management and OR/MS Today)

•
k

EVI

z

p(ri ) max
i 1

z

V1, j p(
j 1

j

| ri ),

z

V2, j p(
j 1

j

| ri ),... Vl , j p(

j

| ri ),

EV *

j 1

The formula for the value of information has been around for almost 60
years. It is widely used in many parts of industry and government as part of
the “decision analysis” methods – but still mostly unheard of in the parts of
business where it might do the most good.
What it means:
1.Information reduces uncertainty
2.Reduced uncertainty improves decisions
3.Improved decisions have observable consequences with measurable value


Value of Information



The Priority of Measurements is Reversed: This
calculation reveals that most organizations will
consistently focus on low-value measurements
and ignore high-value measurements - this is
the ―measurement inversion‖
Only a Few Measurements Are Really Needed:
We also found that, if anything, fewer
measurements were required after the
information values were known.
Some Additional Empirical Measurements are
almost always needed: I found that 97% of the
models I built justified further measurement
according to the information values.

Traditional Measurement Priorities


•

•

•

Our risk tolerance changes much more frequently than we are aware and for arbitrary
reasons. One study showed that being around people who smile make us more likely to take
risky bets. Others show that simply remembering past events that made us angry make us
more risk tolerant while recalling events where we were afraid made us more risk averse.
The simplest element of Harry Markowitz’s method “Modern Portfolio Theory” is documenting
how much risk an investor accepts for a given return. Documenting our appetite for risk
makes it less vulnerable to capricious change.
The “Investment Boundary” states how much risk an investor is willing to accept for a given
return. For our purposes, we modified Markowitz’s approach a bit.

Acceptable Risk/Return
Boundary
Investment Region

Investment
•
•
–
–
–
–
–
–
•

Some managers have told me they wish they could quantify the risks of
their decisions more rigorously
But they cite various reasons why they believe they can’t:
Concepts like “risk” (as well as “quality”, “flexibility”, etc.) are
fundamentally immeasurable
They can better evaluate an investment “by experience” i.e. in relation
to other investments they’ve seen
Some are skeptical about statistics (“you can prove anything with
statistics”)
Any approach that involves statistics will seem too “theoretical” to top
management
“We don’t have enough data”
“We can’t compute a precise probability”
Each of these are refuted by the evidence
Copyright HDR 2008
dwhubbard@hubbardresearch.com




Business Case:
◦ Retail Firm fined 2.1Billion by FTC for failing Audit
◦ FTC required Retail Firm to have a independent Consulting Firm to provide Risk
Assessment
◦ CSO had a Big 4 Firm as their Auditor and was not confident with them from the fine
from the FTC
◦ CSO heard of our Quantitative Risk Assessments and understood the value of a
tangible assessment that would provide him a real value of the risks they had and
could be accepted by the FTC.
Scope:
◦ Provide Risk Assessment across 4 Major lines of Business
◦ The elements in scope across all their lines of business were:

Customer Applications 
Prescription Applications 
Data Warehouses 
Mobile Data

Mainframe 
Windows Servers 
Financial Applications 
iSeries Systems
Network
Devices 
Internet Applications 
UNIX 
Backup Tapes 
Proprietary Data Applications

Stratus 
Databases 
Personal Systems Applications 
HR
Wireless 
Remote Access

Back Office Applications 
Test Systems
Print Operations 
LDAP Systems

Credential
◦ Threat communities – Cyber Criminals, Privileged Insiders, Non – Privileged Insiders,
Malware
◦ Provide the Information risk for each line of business and the overall aggregate risk
for the Retail Firm.


Our client was able to see that their overall aggregate risk was in line with their expectations
that they were willing to accept for their business.

◦ Identify Risk by Threat Community


Cyber Criminals by far was the biggest risk to our client.



Privileged Insider was second most significant with Non – Privileged Insider than Malware.

◦ Loss Event Type
 Confidentiality consisted most of loss at 290M due to sensitive customer info
 Availability was distant second at $530K
 Integrity was last at $2100
◦ Risk by Asset Group


Personal Systems had the biggest exposure accounting for 48% of risk exposure



Internet Applications at 16%



Windows Servers (Internet facing) at 11%

◦ Best opportunities for risk reduction


Access Privileges – 33M



Personal System Security – 34M



Mobile Media Restrictions – 20M




Business Case
◦ Federal Executive Agencies face significant management and technical
challenges when measuring the contribution of IT investments to mission
results as required by the Clinger-Cohen Act.
◦ VA Information Security Program had an approved new infrastructure
initiative that will mitigate IT Security – related risk across the department.
The risks include reducing the cost and frequency of virus, unauthorized
access, fraud and other type of losses.
◦ VA wanted to have a methodology that could meet the Clinger
Scope
◦ Provide the best rollout strategy for VA Public Key Infrastructure
investment that will optimize the value of PKI
◦ Combination of its optional investments will reduce the greatest losses at
a reasonable cost.
◦ Determine the Effectiveness of the Information Security Program over time







Rollout of VAPKI should occur in a particular order and should be
implemented when a certain criterion is met. That criterion is 1.1% is
the expected reduction in fraud cost per person where VAPKI is
implemented. In other words, if the annual fraud cost per person
were $500 then the VAPKI cost per person must be less than $5.50
per person to justify rolling it out to that facility.
VA accelerated the anti-virus roll out by six months
The Information Security Program should reduce by 75% to 95% the
expected losses for all security incidents through 2006 estimated
somewhere between $1.1 billion and $2.4 billion.
One major optional investment (certain parts of Intrusion Detection)
did not reduce losses and therefore should not be made. This is
about a $30 million cost avoidance.


AIE determined that VA would make the best investment decisions by taken
seven key measurements. Those measurements will allow VA to determine
the effectiveness of the Information Security Program over time.
◦
◦
◦
◦
◦
◦
◦

Annual Fraud losses due to internal unauthorized access - $80M to $180M
Number of Pandemic Virus attacks per year – 2 to 4
Average number of people affected by a virus – 25K to 60K
Percentage productivity loss due to virus outbreak – 15% to 60%
Percentage of veterans affected – 2% to 15%
VAPKI initial cost of VA wide roll out - $1.3M to $2M
VAPKI annual cost of VA wide roll out - $1.1M to $1.3M






Regardless of how quantitative your environment
might be, be a skeptic about how your organization
assesses decisions and risks – ask how they know
it works (and consider the consequences if it
doesn’t)
Your judgment also has a performance that can –
and must – be measured
Considered against the size and risk of
decisions, better risk analysis will be one of the
best investments in your portfolio
Contact:

Information Security Threat Rating Scale

Karen Aldridge
Regional Sales
kaldridge@aliadocorp.com
www.aliadocorp.com

More Related Content

What's hot

The Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John LiuThe Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
NashvilleTechCouncil
 
Tool Box Talk - Developing Equipment Criticality
Tool Box Talk - Developing Equipment CriticalityTool Box Talk - Developing Equipment Criticality
Tool Box Talk - Developing Equipment Criticality
Ricky Smith CMRP, CMRT
 
Risk analysis
Risk analysis Risk analysis
Risk analysis
Samuel Gher
 
Criticality Analysis WIRAM Webinar Nov 17
Criticality Analysis WIRAM Webinar Nov 17 Criticality Analysis WIRAM Webinar Nov 17
Criticality Analysis WIRAM Webinar Nov 17 Jennifer Zach
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
Roger Johnston
 
The Cio And Crisis Leadership, An Examination
The Cio And Crisis Leadership, An ExaminationThe Cio And Crisis Leadership, An Examination
The Cio And Crisis Leadership, An Examination
dbriner
 
Aon FI Risk Advisory - CCAR Variable Selection
Aon FI Risk Advisory - CCAR Variable SelectionAon FI Risk Advisory - CCAR Variable Selection
Aon FI Risk Advisory - CCAR Variable SelectionEvan Sekeris
 
Risk Adjusted Estimating Techniques
Risk Adjusted Estimating TechniquesRisk Adjusted Estimating Techniques
Risk Adjusted Estimating Techniques
Government Contract Pricing Summit
 
Variable Selection for CCAR
Variable Selection for CCARVariable Selection for CCAR
Variable Selection for CCAR
Evan Sekeris
 
Risk Management Case Study - Applied Concepts
Risk Management Case Study - Applied ConceptsRisk Management Case Study - Applied Concepts
Risk Management Case Study - Applied Concepts
Resolver Inc.
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security ManagementLuis Martins
 
Seven symptoms of forescasting illness
Seven symptoms of forescasting illnessSeven symptoms of forescasting illness
Seven symptoms of forescasting illness
Enrique de Nicolás Marín
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)
JOSEPH Maas
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Resolver Inc.
 
IS Failures - state of the art ?
IS Failures - state of the art ? IS Failures - state of the art ?
IS Failures - state of the art ?
Ghent University
 
Executive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees SafeExecutive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees Safe
Resolver Inc.
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
Resolver Inc.
 
Introduction to Root Cause Analysis
Introduction to Root Cause AnalysisIntroduction to Root Cause Analysis
Introduction to Root Cause Analysis
Carmel Khan
 

What's hot (20)

The Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John LiuThe Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
 
Tool Box Talk - Developing Equipment Criticality
Tool Box Talk - Developing Equipment CriticalityTool Box Talk - Developing Equipment Criticality
Tool Box Talk - Developing Equipment Criticality
 
Risk analysis
Risk analysis Risk analysis
Risk analysis
 
Criticality Analysis WIRAM Webinar Nov 17
Criticality Analysis WIRAM Webinar Nov 17 Criticality Analysis WIRAM Webinar Nov 17
Criticality Analysis WIRAM Webinar Nov 17
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
The Cio And Crisis Leadership, An Examination
The Cio And Crisis Leadership, An ExaminationThe Cio And Crisis Leadership, An Examination
The Cio And Crisis Leadership, An Examination
 
Aon FI Risk Advisory - CCAR Variable Selection
Aon FI Risk Advisory - CCAR Variable SelectionAon FI Risk Advisory - CCAR Variable Selection
Aon FI Risk Advisory - CCAR Variable Selection
 
Risk Adjusted Estimating Techniques
Risk Adjusted Estimating TechniquesRisk Adjusted Estimating Techniques
Risk Adjusted Estimating Techniques
 
Variable Selection for CCAR
Variable Selection for CCARVariable Selection for CCAR
Variable Selection for CCAR
 
Risk Management Case Study - Applied Concepts
Risk Management Case Study - Applied ConceptsRisk Management Case Study - Applied Concepts
Risk Management Case Study - Applied Concepts
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security Management
 
Root cause analysis
Root cause analysisRoot cause analysis
Root cause analysis
 
Seven symptoms of forescasting illness
Seven symptoms of forescasting illnessSeven symptoms of forescasting illness
Seven symptoms of forescasting illness
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
 
IS Failures - state of the art ?
IS Failures - state of the art ? IS Failures - state of the art ?
IS Failures - state of the art ?
 
Executive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees SafeExecutive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees Safe
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
Introduction to Root Cause Analysis
Introduction to Root Cause AnalysisIntroduction to Root Cause Analysis
Introduction to Root Cause Analysis
 

Viewers also liked

AIE- A New Method for Quantifying IT Value
AIE- A New Method for Quantifying IT ValueAIE- A New Method for Quantifying IT Value
AIE- A New Method for Quantifying IT Value
Jody Keyser
 
IT Performance Management - Doug Hubbard
IT Performance Management - Doug Hubbard IT Performance Management - Doug Hubbard
IT Performance Management - Doug Hubbard
Jody Keyser
 
It Debate Final
It Debate FinalIt Debate Final
It Debate FinalUNU.MERIT
 
Risk Return Analysis - IT infrastructure - Risk Management
Risk Return Analysis - IT infrastructure - Risk ManagementRisk Return Analysis - IT infrastructure - Risk Management
Risk Return Analysis - IT infrastructure - Risk Management
Jody Keyser
 
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Alan McSweeney
 
Information technology industry of india
Information technology industry of indiaInformation technology industry of india
Information technology industry of india
Ajay Kumar
 
IT ppt
IT pptIT ppt
IT ppt
Jamila Bano
 

Viewers also liked (7)

AIE- A New Method for Quantifying IT Value
AIE- A New Method for Quantifying IT ValueAIE- A New Method for Quantifying IT Value
AIE- A New Method for Quantifying IT Value
 
IT Performance Management - Doug Hubbard
IT Performance Management - Doug Hubbard IT Performance Management - Doug Hubbard
IT Performance Management - Doug Hubbard
 
It Debate Final
It Debate FinalIt Debate Final
It Debate Final
 
Risk Return Analysis - IT infrastructure - Risk Management
Risk Return Analysis - IT infrastructure - Risk ManagementRisk Return Analysis - IT infrastructure - Risk Management
Risk Return Analysis - IT infrastructure - Risk Management
 
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
 
Information technology industry of india
Information technology industry of indiaInformation technology industry of india
Information technology industry of india
 
IT ppt
IT pptIT ppt
IT ppt
 

Similar to Aliado risk management presentation v3a

5 steps for better risk assessment
5 steps for better risk assessment5 steps for better risk assessment
5 steps for better risk assessment
DrMohammedFarid
 
Measuring Risk - What Doesn’t Work and What Does
Measuring Risk - What Doesn’t Work and What DoesMeasuring Risk - What Doesn’t Work and What Does
Measuring Risk - What Doesn’t Work and What Does
Jody Keyser
 
Relationship Forecasting
Relationship ForecastingRelationship Forecasting
Business model innovation by experimentation
Business model innovation by experimentationBusiness model innovation by experimentation
Business model innovation by experimentation
Energized Work
 
Managing Decision Under Uncertainties
Managing Decision Under UncertaintiesManaging Decision Under Uncertainties
Managing Decision Under Uncertainties
Elijah Ezendu
 
Denise Rousseau's Generic EBMgt Class 4
Denise Rousseau's Generic EBMgt Class 4Denise Rousseau's Generic EBMgt Class 4
Denise Rousseau's Generic EBMgt Class 4
Center for Evidence-Based Management
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
SlideTeam
 
Lecture3 Modelling Decision Processes
Lecture3 Modelling Decision ProcessesLecture3 Modelling Decision Processes
Lecture3 Modelling Decision ProcessesKodok Ngorex
 
Week 9
Week 9Week 9
Week 9
Arthur Shum
 
Statistics For Bi
Statistics For BiStatistics For Bi
Statistics For Bi
Angela Hays
 
httphome.ubalt.eduntsbarshbusiness-statoprepartIX.htmTool.docx
httphome.ubalt.eduntsbarshbusiness-statoprepartIX.htmTool.docxhttphome.ubalt.eduntsbarshbusiness-statoprepartIX.htmTool.docx
httphome.ubalt.eduntsbarshbusiness-statoprepartIX.htmTool.docx
adampcarr67227
 
اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222
nashaat algrara
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinsteinAahil Malik
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinsteinRamaica Ona
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinstein
Sukumar Reddy
 
Risk Analysis & Risk Management
Risk Analysis & Risk ManagementRisk Analysis & Risk Management
Risk Analysis & Risk Management
Grafic.guru
 
The Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdfThe Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdf
arwholesalelors
 
ethical hacking (with respect to to new ).pptx
ethical hacking (with respect to to new ).pptxethical hacking (with respect to to new ).pptx
ethical hacking (with respect to to new ).pptx
shashikumard29
 
Risk Assessment(50 points)Directions Use the case study t.docx
Risk Assessment(50 points)Directions Use the case study t.docxRisk Assessment(50 points)Directions Use the case study t.docx
Risk Assessment(50 points)Directions Use the case study t.docx
malbert5
 
Risk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesRisk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation Slides
SlideTeam
 

Similar to Aliado risk management presentation v3a (20)

5 steps for better risk assessment
5 steps for better risk assessment5 steps for better risk assessment
5 steps for better risk assessment
 
Measuring Risk - What Doesn’t Work and What Does
Measuring Risk - What Doesn’t Work and What DoesMeasuring Risk - What Doesn’t Work and What Does
Measuring Risk - What Doesn’t Work and What Does
 
Relationship Forecasting
Relationship ForecastingRelationship Forecasting
Relationship Forecasting
 
Business model innovation by experimentation
Business model innovation by experimentationBusiness model innovation by experimentation
Business model innovation by experimentation
 
Managing Decision Under Uncertainties
Managing Decision Under UncertaintiesManaging Decision Under Uncertainties
Managing Decision Under Uncertainties
 
Denise Rousseau's Generic EBMgt Class 4
Denise Rousseau's Generic EBMgt Class 4Denise Rousseau's Generic EBMgt Class 4
Denise Rousseau's Generic EBMgt Class 4
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
 
Lecture3 Modelling Decision Processes
Lecture3 Modelling Decision ProcessesLecture3 Modelling Decision Processes
Lecture3 Modelling Decision Processes
 
Week 9
Week 9Week 9
Week 9
 
Statistics For Bi
Statistics For BiStatistics For Bi
Statistics For Bi
 
httphome.ubalt.eduntsbarshbusiness-statoprepartIX.htmTool.docx
httphome.ubalt.eduntsbarshbusiness-statoprepartIX.htmTool.docxhttphome.ubalt.eduntsbarshbusiness-statoprepartIX.htmTool.docx
httphome.ubalt.eduntsbarshbusiness-statoprepartIX.htmTool.docx
 
اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinstein
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinstein
 
1 -corinne_berinstein
1  -corinne_berinstein1  -corinne_berinstein
1 -corinne_berinstein
 
Risk Analysis & Risk Management
Risk Analysis & Risk ManagementRisk Analysis & Risk Management
Risk Analysis & Risk Management
 
The Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdfThe Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdf
 
ethical hacking (with respect to to new ).pptx
ethical hacking (with respect to to new ).pptxethical hacking (with respect to to new ).pptx
ethical hacking (with respect to to new ).pptx
 
Risk Assessment(50 points)Directions Use the case study t.docx
Risk Assessment(50 points)Directions Use the case study t.docxRisk Assessment(50 points)Directions Use the case study t.docx
Risk Assessment(50 points)Directions Use the case study t.docx
 
Risk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesRisk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation Slides
 

Recently uploaded

USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 
NO1 Uk Divorce problem uk all amil baba in karachi,lahore,pakistan talaq ka m...
NO1 Uk Divorce problem uk all amil baba in karachi,lahore,pakistan talaq ka m...NO1 Uk Divorce problem uk all amil baba in karachi,lahore,pakistan talaq ka m...
NO1 Uk Divorce problem uk all amil baba in karachi,lahore,pakistan talaq ka m...
Amil Baba Dawood bangali
 
Greek trade a pillar of dynamic economic growth - European Business Review
Greek trade a pillar of dynamic economic growth - European Business ReviewGreek trade a pillar of dynamic economic growth - European Business Review
Greek trade a pillar of dynamic economic growth - European Business Review
Antonis Zairis
 
how can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securelyhow can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securely
DOT TECH
 
Latino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino CaucusLatino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino Caucus
Danay Escanaverino
 
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
betoozp
 
Scope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theoriesScope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theories
nomankalyar153
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
DOT TECH
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
Commercial Bank of Ceylon PLC
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
DOT TECH
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
Amil baba
 
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Vighnesh Shashtri
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
Proposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in EthereumProposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in Ethereum
RasoulRamezanian1
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
Avanish Goel
 
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal RiskFalcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 

Recently uploaded (20)

USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
NO1 Uk Divorce problem uk all amil baba in karachi,lahore,pakistan talaq ka m...
NO1 Uk Divorce problem uk all amil baba in karachi,lahore,pakistan talaq ka m...NO1 Uk Divorce problem uk all amil baba in karachi,lahore,pakistan talaq ka m...
NO1 Uk Divorce problem uk all amil baba in karachi,lahore,pakistan talaq ka m...
 
Greek trade a pillar of dynamic economic growth - European Business Review
Greek trade a pillar of dynamic economic growth - European Business ReviewGreek trade a pillar of dynamic economic growth - European Business Review
Greek trade a pillar of dynamic economic growth - European Business Review
 
how can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securelyhow can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securely
 
Latino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino CaucusLatino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino Caucus
 
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
 
Scope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theoriesScope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theories
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
NO1 Uk Rohani Baba In Karachi Bangali Baba Karachi Online Amil Baba WorldWide...
 
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
Proposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in EthereumProposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in Ethereum
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
 
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal RiskFalcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 

Aliado risk management presentation v3a

  • 1. Measuring Risk What Doesn’t Work and What Does aliadocorp.com
  • 2.     2 Aliado – Name’s Root is ―Ally;‖ How We Value Our Relationships with our Customers Leading the Way Since 2008 Professional Service Company /Management Consultancy Core Aliado Leaders have over 20 Years Professional Service Experience from Big 5
  • 3.  Consultants servicing our technical expertise:  Security  Infrastructure  Risk Management  Our most important Assets - People  Integrity, Principles, Values  Reputation, Reputation, Reputation  Brand  Trusted Advisor  Professional Services – Not Products
  • 4.    If your risk analysis and risk management don’t work, then that is your biggest risk. Risk management (or, for that matter, any management methodology) itself rarely has performance metrics applied to it. The most popular methods have no published controlled experiments where the improvement on forecasts and decisions was actually measured (although anecdotal case studies are common). Mis - Communication – IT Security and Business Managers have no common language to discuss risk. IT Security talks in terms of high, medium, low or ordinal scales and Business Managers talks in terms of quantitative numbers.
  • 5.  Likelihood     Does your ―Risk Map‖ look more like the top or bottom chart? If more like the top, how do the errors mentioned earlier compare to the variance among the clustered responses? Clustering means that all the previous errors mentioned before make up a large part of the difference between scores of individual risks. How does this address correlations, common mode failures, and cascade failures? These factors can make a few ―low risk‖ items add up to one very big risk. The ―math‖ in these methods don’t even remotely approximate the relationships one might build in a quantitative model. Risk maps like this may be ok for initial brainstorming, but don’t make critical decisions based on it. Impact 5
  • 6.  Extreme ◦ Extreme likelihood of security controls being compromised with the possibility of catastrophic financial losses occurring as a result. An asset with a vulnerability that was demonstrated to be exploitable and subsequently led to the compromise of sensitive information would be designated with this rating.  High ◦ High likelihood of security controls being compromised with the potential for significant financial losses occurring as a result. This rating would be given if a vulnerability was found to be exploitable and potentially affect the confidentiality, availability, and/or integrity of a given asset.  Elevated ◦ Elevated likelihood of security controls being compromised with the potential for material financial losses occurring as a result. Assets with a finding that led to information disclosure, for example, but not necessarily a full compromise, would be assigned this rating.  Moderate ◦ Moderate likelihood of security controls being compromised with the possibility of limited financial losses occurring as a result. A system with a vulnerability whose impact was reduced by factors such as configuration settings or difficulty of exploitation would be assigned this rating.  Low ◦ Low likelihood of security controls being compromised with negligible impact as a result. This rating signifies either the nonexistence of vulnerabilities or those that have minimal impact.
  • 7. ▶ • • • • 7 Human expertise is an important input in and it is hard to completely automate. But there are certain types of errors in human judgment we know how to measure and control for: Overconfidence – Their chance of being right is much less than they believe Influence by irrelevant factors – Factors like the order in which you consider projects, whether it is a 5-point scale or a 10-point scale, or how much other people in the room smile all affect your judgments Inconsistency – When given the same sets of problems to evaluate, experts have a hard time giving the same answers; also, their memory is reconstructed so that they believe they always had one preference when in fact they didn’t Misinterpretation – We tend to interpret cues about risks, measurements and decision problems in a way that is logically and mathematically irrational
  • 8. Studies have shown that it is very easy for a decision-making process to increase confidence in forecasts and decisions even if measured outcomes (return on decisions, forecasts, etc.) are not improved – or even made worse      Gathering more information makes you feel better but, at some point, begins to reduce decision quality while confidence continues to increase. (Tsai C. 2008) Interaction with others also increases decision confidence but, again, at some point decisions are not improved while confidence continues to increase (Heath C., Gonzalez R. 1995) Formal training in detecting lies makes individuals slightly worse at detecting lies in controlled experiments – but there confidence in their judgments increases dramatically. (Kassin, S.M., Fong, C.T. 1999) An experiment with AHP shows confidence increased whether decisions are improved or degraded. (Williams M. et. al. 2007) Almost all popular business methodologies show no correlation to financial performance of the firm (N. Nohria et. al. 2003)
  • 9. Scales are simple. But our response behaviors when we use them are not. Typical scales combine several complex, subtle errors     The use of scales simply obscures (doesn’t alleviate) the lack of information and potential disagreements - he calls this an ―illusion of communication‖ (Budescu) Popular weighted scores add error to unaided human judgment. Scale error is added even if scales are ―well defined‖ by introducing an extreme rounding error. It is possible to have one risk 10 or 50 times greater than another risk end up in the same final group. (Cox) ―Partition dependence‖ creates an unanticipated relationship among choices on a scale. Two scales that each define a ―1‖ in the same way (e.g. 1=―impact less than $1M), will elicit different responses for a 1 depending on how many other choices there are. Treating ordinal scales like linear scales that can be added and multiplied introduces an error of ―assumed ratios‖. They assume relative values of the scales roughly approximates real world relationships when an analysis of historical data shows they do not.
  • 10.    ―Gut Feel‖ is the baseline. Anything that ―works‖ has to show an improvement on this. Measured sources of error : inconsistency, overconfidence, various biases, inaccurate estimates The worst case is not ―gut feel‖ – some methods add more error The best case isn’t perfection – just measurably reduced error compared to gut feel Method Gut Feel Weighted Score Preference Theory Models Quant. Models Measured Improvement to Judgment? Baseline No: Remove no errors and add new errors No: AHP has known math problems; might improve consistency Yes: Proven w/controlled tests Does it quantify risk? Only intuitively No, it attempts to describe risk; No, but it can quantify risk aversion Yes Determines HighPayoff Measures? No No: Turns some good measures into scores No Yes (w/AIE) Net Reduction in Error? Baseline No: Probably Worse Maybe Slightly Better – Maybe not Best
  • 11.  Aliado provides a Methodology--Applied Information Economics—that IT Security and IT Business Leaders can understand ◦ A statistical and probability application that allows an organization to measure their risk accurately on an ongoing basis that provides tangible results in quantifying the risk on any risk landscape component.
  • 12.   ―Calibrate‖ experts to realistically assess probabilities. ―Do the math‖– don’t rely intuition entirely. ◦ Use the ―calibrated‖ judgments of experts in Monte Carlo simulations. ◦ Simple historical models usually outperform human judges. ◦ Compute the ―Expected Value of Information‖ to identify important measures.    Improve unaided human judgment with statistical ―smoothing‖. Try rational incentives to encourage better expert judgment. Document basic decision criteria - especially risk vs. return.
  • 13. Model The Current State of Uncertainty – Initially use calibrated estimates and then actual measurements Calibration Training Define the Decision and Identify Relevant Variables. Set up the ―Business Case‖ for the decision, using these variables – Compute the value of additional Information – Determine what to measure and how much effort to spend on measuring it. No Is there significant value to more information? Yes Measure where the information value is high – Reduce uncertainty using any of the methods Optimize Decision – Use the quantified Risk/Return boundary of the Decision makers to determine which decision is preferred.
  • 14. Event A Event B OR %Orders Lost Demand Lost Revenue • Performance metrics for decision analysis tools is very sparse, but favors Monte Carlos. • One researcher in the oil industry found a correlation between the use of quantitative risk analysis methods and financial performance – and the improvement in performance started when they started using the quantitative methods. (F. Macmillan, 2000) Data at NASA from over 100 space missions showed that Monte Carlo simulations beat other methods for estimating cost, schedule and risks (Published this in The Failure of Risk Management and OR/MS Today) •
  • 15. k EVI z p(ri ) max i 1 z V1, j p( j 1 j | ri ), z V2, j p( j 1 j | ri ),... Vl , j p( j | ri ), EV * j 1 The formula for the value of information has been around for almost 60 years. It is widely used in many parts of industry and government as part of the “decision analysis” methods – but still mostly unheard of in the parts of business where it might do the most good. What it means: 1.Information reduces uncertainty 2.Reduced uncertainty improves decisions 3.Improved decisions have observable consequences with measurable value
  • 16.  Value of Information  The Priority of Measurements is Reversed: This calculation reveals that most organizations will consistently focus on low-value measurements and ignore high-value measurements - this is the ―measurement inversion‖ Only a Few Measurements Are Really Needed: We also found that, if anything, fewer measurements were required after the information values were known. Some Additional Empirical Measurements are almost always needed: I found that 97% of the models I built justified further measurement according to the information values. Traditional Measurement Priorities 
  • 17. • • • Our risk tolerance changes much more frequently than we are aware and for arbitrary reasons. One study showed that being around people who smile make us more likely to take risky bets. Others show that simply remembering past events that made us angry make us more risk tolerant while recalling events where we were afraid made us more risk averse. The simplest element of Harry Markowitz’s method “Modern Portfolio Theory” is documenting how much risk an investor accepts for a given return. Documenting our appetite for risk makes it less vulnerable to capricious change. The “Investment Boundary” states how much risk an investor is willing to accept for a given return. For our purposes, we modified Markowitz’s approach a bit. Acceptable Risk/Return Boundary Investment Region Investment
  • 18. • • – – – – – – • Some managers have told me they wish they could quantify the risks of their decisions more rigorously But they cite various reasons why they believe they can’t: Concepts like “risk” (as well as “quality”, “flexibility”, etc.) are fundamentally immeasurable They can better evaluate an investment “by experience” i.e. in relation to other investments they’ve seen Some are skeptical about statistics (“you can prove anything with statistics”) Any approach that involves statistics will seem too “theoretical” to top management “We don’t have enough data” “We can’t compute a precise probability” Each of these are refuted by the evidence Copyright HDR 2008 dwhubbard@hubbardresearch.com
  • 19.   Business Case: ◦ Retail Firm fined 2.1Billion by FTC for failing Audit ◦ FTC required Retail Firm to have a independent Consulting Firm to provide Risk Assessment ◦ CSO had a Big 4 Firm as their Auditor and was not confident with them from the fine from the FTC ◦ CSO heard of our Quantitative Risk Assessments and understood the value of a tangible assessment that would provide him a real value of the risks they had and could be accepted by the FTC. Scope: ◦ Provide Risk Assessment across 4 Major lines of Business ◦ The elements in scope across all their lines of business were:  Customer Applications  Prescription Applications  Data Warehouses  Mobile Data  Mainframe  Windows Servers  Financial Applications  iSeries Systems Network Devices  Internet Applications  UNIX  Backup Tapes  Proprietary Data Applications  Stratus  Databases  Personal Systems Applications  HR Wireless  Remote Access  Back Office Applications  Test Systems Print Operations  LDAP Systems  Credential ◦ Threat communities – Cyber Criminals, Privileged Insiders, Non – Privileged Insiders, Malware
  • 20. ◦ Provide the Information risk for each line of business and the overall aggregate risk for the Retail Firm.  Our client was able to see that their overall aggregate risk was in line with their expectations that they were willing to accept for their business. ◦ Identify Risk by Threat Community  Cyber Criminals by far was the biggest risk to our client.  Privileged Insider was second most significant with Non – Privileged Insider than Malware. ◦ Loss Event Type  Confidentiality consisted most of loss at 290M due to sensitive customer info  Availability was distant second at $530K  Integrity was last at $2100 ◦ Risk by Asset Group  Personal Systems had the biggest exposure accounting for 48% of risk exposure  Internet Applications at 16%  Windows Servers (Internet facing) at 11% ◦ Best opportunities for risk reduction  Access Privileges – 33M  Personal System Security – 34M  Mobile Media Restrictions – 20M
  • 21.   Business Case ◦ Federal Executive Agencies face significant management and technical challenges when measuring the contribution of IT investments to mission results as required by the Clinger-Cohen Act. ◦ VA Information Security Program had an approved new infrastructure initiative that will mitigate IT Security – related risk across the department. The risks include reducing the cost and frequency of virus, unauthorized access, fraud and other type of losses. ◦ VA wanted to have a methodology that could meet the Clinger Scope ◦ Provide the best rollout strategy for VA Public Key Infrastructure investment that will optimize the value of PKI ◦ Combination of its optional investments will reduce the greatest losses at a reasonable cost. ◦ Determine the Effectiveness of the Information Security Program over time
  • 22.     Rollout of VAPKI should occur in a particular order and should be implemented when a certain criterion is met. That criterion is 1.1% is the expected reduction in fraud cost per person where VAPKI is implemented. In other words, if the annual fraud cost per person were $500 then the VAPKI cost per person must be less than $5.50 per person to justify rolling it out to that facility. VA accelerated the anti-virus roll out by six months The Information Security Program should reduce by 75% to 95% the expected losses for all security incidents through 2006 estimated somewhere between $1.1 billion and $2.4 billion. One major optional investment (certain parts of Intrusion Detection) did not reduce losses and therefore should not be made. This is about a $30 million cost avoidance.
  • 23.  AIE determined that VA would make the best investment decisions by taken seven key measurements. Those measurements will allow VA to determine the effectiveness of the Information Security Program over time. ◦ ◦ ◦ ◦ ◦ ◦ ◦ Annual Fraud losses due to internal unauthorized access - $80M to $180M Number of Pandemic Virus attacks per year – 2 to 4 Average number of people affected by a virus – 25K to 60K Percentage productivity loss due to virus outbreak – 15% to 60% Percentage of veterans affected – 2% to 15% VAPKI initial cost of VA wide roll out - $1.3M to $2M VAPKI annual cost of VA wide roll out - $1.1M to $1.3M
  • 24.    Regardless of how quantitative your environment might be, be a skeptic about how your organization assesses decisions and risks – ask how they know it works (and consider the consequences if it doesn’t) Your judgment also has a performance that can – and must – be measured Considered against the size and risk of decisions, better risk analysis will be one of the best investments in your portfolio
  • 25. Contact: Information Security Threat Rating Scale Karen Aldridge Regional Sales kaldridge@aliadocorp.com www.aliadocorp.com