SlideShare a Scribd company logo
1 of 21
A new paradigm
for
risk calculation
and
visualization
FrAppSec
Framework for Application Security
https://frappsec.org
risk as a bubble
= risk appetite
Risk
=
Impact x Likelihood
Risk
=
Impact x Likelihood
x Business Factor
Risk 1 = Impact x Likelihood x Business Factor
Risk 2 = Impact x Likelihood x Business Factor
.
.
Risk n = Impact x Likelihood x Business Factor
Risk 1 = Impact x Likelihood x Business Factor
Risk 2 = Impact x Likelihood x Business Factor
.
.
Risk n = Impact x Likelihood x Business Factor
Total Risk = Σ Risk i
Risk 1 = Impact x Likelihood x Business Factor
Risk 2 = Impact x Likelihood x Business Factor
.
.
Risk n = Impact x Likelihood x Business Factor
Total Risk = Σ Risk i
Risk 1 = Impact x Likelihood x Business Factor
Risk 2 = Impact x Likelihood x Business Factor
.
.
Risk n = Impact x Likelihood x Business Factor
Total Risk = Σ Risk i
= risk appetite
Risk appetite = 30 risk points, no high risks
Risk appetite = 30 risk points, no high risks
Case 1
25
Risk appetite = 30 risk points, no high risks
Case 2
20
Risk appetite = 30 risk points, no high risks
Case 3
35
A meaningful risk visualization
A meaningful risk visualization
Sirius
Polaris
Vega
Aldebaran
Rigel
Deneb
Betelgeuse
Arcturus Canopus
Altair
Fomalhaut
Pollux
A meaningful risk visualization
Sirius
Polaris
Vega
Aldebaran
Rigel
Deneb
Betelgeuse
Arcturus Canopus
Altair
Fomalhaut
Pollux
A meaningful risk visualization
Sirius
Polaris
Vega
Aldebaran
Rigel
Deneb
Betelgeuse
Arcturus Canopus
Altair
Fomalhaut
Pollux
20182017
1. Combat risk illiteracy
2. View risk as a bubble
3. Use meaningful visualization
FrAppSec.org
@DanCVasile

More Related Content

Similar to Dan Vasile - Risk Calculation and Visualization

Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis IMuizz Anibire
 
PMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_RiskPMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_RiskMuzette Charles, PMP
 
Risk management intruduction part 2
Risk management intruduction part 2Risk management intruduction part 2
Risk management intruduction part 2MEEQAT HOSPITAL
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementTorsten Koerting
 
Managing Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptxManaging Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptxTope Osanyintuyi
 
Risk Assessment.pptx
Risk Assessment.pptxRisk Assessment.pptx
Risk Assessment.pptxDivyesh Jha
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaPankaj K Sinha
 
Risk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersRisk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersVictoria Finch
 
Risk Analysis in Occupational Health Setting
Risk Analysis in Occupational Health SettingRisk Analysis in Occupational Health Setting
Risk Analysis in Occupational Health SettingAhmed-Refat Refat
 
Sameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk managementSameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk managementSameer Mitter
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfmohamed Ismail
 
Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023The IRM India
 
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 BBA 4226, Risk Management 1 Course Learning Outcomes .docx BBA 4226, Risk Management 1 Course Learning Outcomes .docx
BBA 4226, Risk Management 1 Course Learning Outcomes .docxaryan532920
 

Similar to Dan Vasile - Risk Calculation and Visualization (18)

Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis I
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
PMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_RiskPMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
 
Risk management intruduction part 2
Risk management intruduction part 2Risk management intruduction part 2
Risk management intruduction part 2
 
Deploying Risk Management in SMEs
Deploying Risk Management in SMEsDeploying Risk Management in SMEs
Deploying Risk Management in SMEs
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
 
Managing Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptxManaging Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptx
 
Risk Assessment.pptx
Risk Assessment.pptxRisk Assessment.pptx
Risk Assessment.pptx
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
Risk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersRisk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for Managers
 
Risk Analysis in Occupational Health Setting
Risk Analysis in Occupational Health SettingRisk Analysis in Occupational Health Setting
Risk Analysis in Occupational Health Setting
 
Rsc 05
Rsc 05Rsc 05
Rsc 05
 
COSO VS ERM -
COSO VS ERM - COSO VS ERM -
COSO VS ERM -
 
Sameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk managementSameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk management
 
Risk analysis and risk mgt.
Risk analysis and risk mgt.Risk analysis and risk mgt.
Risk analysis and risk mgt.
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdf
 
Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023
 
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 BBA 4226, Risk Management 1 Course Learning Outcomes .docx BBA 4226, Risk Management 1 Course Learning Outcomes .docx
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 

More from Dan Vasile

SC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT SecuritySC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT SecurityDan Vasile
 
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...Dan Vasile
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Vasile
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Vasile
 
Bug bounty programs
Bug bounty programsBug bounty programs
Bug bounty programsDan Vasile
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeamDan Vasile
 

More from Dan Vasile (6)

SC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT SecuritySC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT Security
 
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
 
Bug bounty programs
Bug bounty programsBug bounty programs
Bug bounty programs
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeam
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Dan Vasile - Risk Calculation and Visualization

Editor's Notes

  1. It all started when developing the Framework for Application Security.
  2. Present risk as a bubble. Good analogy: if it’s too big, it’s going to pop.
  3. Size is always a constraint for the risk bubble.
  4. Traditional risk calculation formula.
  5. Challenged and appended formula to allow quantification for executives. The business factor is the importance of the system from a business perspective and can be expressed as percentage. A mission critical system will thus have a business factor equal to one.
  6. Each system has multiple vulnerabilities, each of them carrying an associated risk.
  7. The total risk of the system is the sum of individual risks.
  8. Individual risks have different severities. In this slide, risk 1 is high (red label), risk two is medium (orange label) and risk n is low (yellow label)
  9. The total risk inherits the highest severity of individual risks.
  10. We can now define the risk appetite based on the formula previously presented.
  11. This is the acceptable bubble. It has a size of 30 risk points and the maximum accepted severity is medium.
  12. Scenario 1: compliant. The risk value is within acceptable limits (25<30) and the maximum severity among individual risks is low.
  13. Scenario 2: non-compliant. Even though the numeric value of the total risk is within the risk appetite statement(20<30), the severity of the total risk is high which is unacceptable.
  14. Scenario 3: non-compliant. The numeric value of the total risk is greater than the risk appetite statement (35>30)
  15. Building a meaningful risk visualization. Each bubble represents a system.
  16. Improvement 1: add system names to quickly identify them
  17. Improvement 2: add a visual indicator of non-compliancy
  18. Improvement 3: add a timeline indicator to show the last assessment performed to measure risk.
  19. Take away: Educate people on information security risks and mitigations. Use the risk as a bubble analogy for a more clear message Build a meaningful visualization to provide an overview of the total risk.