SlideShare a Scribd company logo
1 of 14
Information Security Management
Course conducted by Department of Information
Management and Logistics &
Novi Research Center - TUT
Dr. Ilona Ilvonen (Course Teacher)
Karan Menon (Course Assistant)
What are the information and knowledge security
related issues in your firm and how can they be
mitigated?
• 2015-16 – 6 Kampusklubi Companies Case
interviews conducted by student groups
• KSRM Model
• Target for 2016-17 approximately 15 companies
with a focus on Digitalization and/or IoT related
activities
• Interviews will be conducted in December or
January by groups of 3-4 students and the
course assistant
4.10.2016 2
Summary of 15 Groups
4.10.2016 3
Risk areas
Table shows amount of risks in a certain risk area.
Risk area Total
3.1 Unintentional harm 18 9 21 36 12 2 98
3.2 Intentional harm 7 7 12 46 9 2 83
3.3 Employee turnover 9 7 7 12 1 4 40
3.4 Other threats 0 0 1 3 1 0 5
Total 34 23 41 97 23 8 226
Scale shows the sum of the risk values in a certain risk area.
Risk areas
Table shows amount of risks in a certain risk area.
Risk area Total
3.1 Unintentional harm 18 9 21 36 12 2 98
3.2 Intentional harm 7 7 12 46 9 2 83
3.3 Employee turnover 9 7 7 12 1 4 40
3.4 Other threats 0 0 1 3 1 0 5
Total 34 23 41 97 23 8 226
Scale shows the sum of the risk values in a certain risk area.
Contact Us to register as a Case Company
Write an email for queries and registration to the following persons.
Dr. Ilona Ilvonen – ilona.ilvonen@tut.fi
Karan Menon – karan.menon@tut.fi 0401 305 046
Jaana Hanninen – jaana.hanninen@sykoy.fi 0400 414 117
4.10.2016 4
What is the course about?
• The course aims for understanding of issues
related to information security management:
recognizing risks that information and
knowledge face in companies, how to
address those risks, and how to develop the
information security status
• Both Finnish and international students
4.10.2016 5
KSRM model, focus on steps 1-5 in
this assignment
4.10.2016 6
1. BUSINESS NEED OR PROBLEM,
EXPECTED BENEFITS SOUGHT FROM
CHANGE
- costs of implementation
- expected monetary business benefits
2. KNOWLEDGE IDENTIFICATION
- identify communication genres
and containers
3. THREAT IDENTIFICATION
- identify vulnerabilities and motives
to exploit them
- identify threat agents
4. RISK ANALYSIS
- identify risks connected to the most
important communication genres
- analyse the size of risk and costs of
risk realization
- identify mitigation means
5. COST/BENEFIT ASSESSMENT
- business benefits vs. implementation
costs
- mitigation costs vs. mitigation benefits
6. MITIGATION
- implementation of mitigation
means that are deemed
reasonable
7. MONITORING
- set triggers for action
- any change should trigger re-
evaluation of business need
and threats
Examples of results: Group 1
4.10.2016 7
Risk areas
Table shows amount of risks in a certain risk area.
Risk area Total
3.1 Unintentional harm 1 0 0 1 0 0 2
3.2 Intentional harm 0 0 0 1 0 0 1
3.3 Employee turnover 0 0 0 1 0 0 1
3.4 Other threats 0 0 1 1 0 0 2
Total 1 0 1 4 0 0 6
Scale shows the sum of the risk values in a certain risk area.
Risk areas
Table shows amount of risks in a certain risk area.
Risk area Total
3.1 Unintentional harm 1 0 0 1 0 0 2
3.2 Intentional harm 0 0 0 1 0 0 1
3.3 Employee turnover 0 0 0 1 0 0 1
3.4 Other threats 0 0 1 1 0 0 2
Total 1 0 1 4 0 0 6
Scale shows the sum of the risk values in a certain risk area.
Examples of results: Group 1
4.10.2016 8
Examples of results: Group 2
4.10.2016 9
Risk areas
Table shows amount of risks in a certain risk area.
Risk area Total
3.1 Unintentional harm 1 3 3 1 0 0 8
3.2 Intentional harm 2 1 1 7 0 0 11
3.3 Employee turnover 3 1 2 2 0 0 8
3.4 Other threats 0 0 0 0 0 0 0
Total 6 5 6 10 0 0 27
Scale shows the sum of the risk values in a certain risk area.
Risk areas
Table shows amount of risks in a certain risk area.
Risk area Total
3.1 Unintentional harm 1 3 3 1 0 0 8
3.2 Intentional harm 2 1 1 7 0 0 11
3.3 Employee turnover 3 1 2 2 0 0 8
3.4 Other threats 0 0 0 0 0 0 0
Total 6 5 6 10 0 0 27
Scale shows the sum of the risk values in a certain risk area.
Examples of
results: Group 2
4.10.2016 10
Examples of results: Group 3
4.10.2016 11
Risk areas
Table shows amount of risks in a certain risk area.
Risk area Total
3.1 Unintentional harm 0 1 2 0 0 0 3
3.2 Intentional harm 0 0 0 0 2 0 2
3.3 Employee turnover 0 0 1 0 1 1 3
3.4 Other threats 0 0 0 1 0 0 1
Total 0 1 3 1 3 1 9
Scale shows the sum of the risk values in a certain risk area.
Risk areas
Table shows amount of risks in a certain risk area.
Risk area Total
3.1 Unintentional harm 0 1 2 0 0 0 3
3.2 Intentional harm 0 0 0 0 2 0 2
3.3 Employee turnover 0 0 1 0 1 1 3
3.4 Other threats 0 0 0 1 0 0 1
Total 0 1 3 1 3 1 9
Scale shows the sum of the risk values in a certain risk area.
Examples of results: Group 3
4.10.2016 12
Examples of the most severe risks
• Employee leaves and takes customer contacts with them
• Losing company reputation due to mistakes, technical
problems or intentional actions by employees
• New employee gives information to their previous
employer
• Leaving employee tells information to their new employer
4.10.2016 13
Contact Us to register as a Case Company
Write an email for queries and registration to the following persons.
Dr. Ilona Ilvonen – ilona.ilvonen@tut.fi
Karan Menon – karan.menon@tut.fi 0401 305 046
Jaana Hanninen – jaana.hanninen@sykoy.fi 0400 414 117
4.10.2016 14

More Related Content

Similar to Information Security Risk Management Course

Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk managementconsult4solutions
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk managementconsult4solutions
 
Pm0016 –project risk management
Pm0016 –project risk managementPm0016 –project risk management
Pm0016 –project risk managementsmumbahelp
 
Pm0016 summer-2016
Pm0016 summer-2016Pm0016 summer-2016
Pm0016 summer-2016smumbahelp
 
Pm 0016 –project risk management
Pm 0016 –project risk managementPm 0016 –project risk management
Pm 0016 –project risk managementsmumbahelp
 
Presentation on Risk management & controlling (Corporate Finance & Internatio...
Presentation on Risk management & controlling (Corporate Finance & Internatio...Presentation on Risk management & controlling (Corporate Finance & Internatio...
Presentation on Risk management & controlling (Corporate Finance & Internatio...Suyash Rewale
 
Pm 0016 project risk management
Pm 0016  project risk managementPm 0016  project risk management
Pm 0016 project risk managementsmumbahelp
 
Home Risk Assessment Essay
Home Risk Assessment EssayHome Risk Assessment Essay
Home Risk Assessment EssayAngela Hays
 
Strengths And Methods Of Risk Analysis And Risk Management
Strengths And Methods Of Risk Analysis And Risk ManagementStrengths And Methods Of Risk Analysis And Risk Management
Strengths And Methods Of Risk Analysis And Risk ManagementNina Vazquez
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!SQALab
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk managementconsult4solutions
 
Pm 0016 project risk management
Pm 0016  project risk managementPm 0016  project risk management
Pm 0016 project risk managementsmumbahelp
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Muizz Anibire
 
By LK_Manager_operational_risk_270715.pptx
By LK_Manager_operational_risk_270715.pptxBy LK_Manager_operational_risk_270715.pptx
By LK_Manager_operational_risk_270715.pptxLALU LK
 
Risk-based Testing: Not for the Fainthearted
Risk-based Testing: Not for the FaintheartedRisk-based Testing: Not for the Fainthearted
Risk-based Testing: Not for the FaintheartedTechWell
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000PECB
 

Similar to Information Security Risk Management Course (20)

Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk management
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk management
 
Pm0016 –project risk management
Pm0016 –project risk managementPm0016 –project risk management
Pm0016 –project risk management
 
Pm0016 summer-2016
Pm0016 summer-2016Pm0016 summer-2016
Pm0016 summer-2016
 
Pm 0016 –project risk management
Pm 0016 –project risk managementPm 0016 –project risk management
Pm 0016 –project risk management
 
Presentation on Risk management & controlling (Corporate Finance & Internatio...
Presentation on Risk management & controlling (Corporate Finance & Internatio...Presentation on Risk management & controlling (Corporate Finance & Internatio...
Presentation on Risk management & controlling (Corporate Finance & Internatio...
 
Essay On Risk Management
Essay On Risk ManagementEssay On Risk Management
Essay On Risk Management
 
Pm 0016 project risk management
Pm 0016  project risk managementPm 0016  project risk management
Pm 0016 project risk management
 
Home Risk Assessment Essay
Home Risk Assessment EssayHome Risk Assessment Essay
Home Risk Assessment Essay
 
Strengths And Methods Of Risk Analysis And Risk Management
Strengths And Methods Of Risk Analysis And Risk ManagementStrengths And Methods Of Risk Analysis And Risk Management
Strengths And Methods Of Risk Analysis And Risk Management
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk management
 
Pm 0016 project risk management
Pm 0016  project risk managementPm 0016  project risk management
Pm 0016 project risk management
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
 
By LK_Manager_operational_risk_270715.pptx
By LK_Manager_operational_risk_270715.pptxBy LK_Manager_operational_risk_270715.pptx
By LK_Manager_operational_risk_270715.pptx
 
VaR DAX
VaR DAXVaR DAX
VaR DAX
 
Risk-based Testing: Not for the Fainthearted
Risk-based Testing: Not for the FaintheartedRisk-based Testing: Not for the Fainthearted
Risk-based Testing: Not for the Fainthearted
 
Gol
GolGol
Gol
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000
 
Preventing Accidents
Preventing AccidentsPreventing Accidents
Preventing Accidents
 

More from Novi Research Center

Tietojohtaminen: Tiedosta arvoa - Ilona Ilvonen, NOVI
Tietojohtaminen: Tiedosta arvoa - Ilona Ilvonen, NOVITietojohtaminen: Tiedosta arvoa - Ilona Ilvonen, NOVI
Tietojohtaminen: Tiedosta arvoa - Ilona Ilvonen, NOVINovi Research Center
 
Mitattavaa arvonluontia liiketoiminnassa
Mitattavaa arvonluontia liiketoiminnassaMitattavaa arvonluontia liiketoiminnassa
Mitattavaa arvonluontia liiketoiminnassaNovi Research Center
 
Tietojohtamisen perusteet: Strategiat ja prosessimallit
Tietojohtamisen perusteet: Strategiat ja prosessimallitTietojohtamisen perusteet: Strategiat ja prosessimallit
Tietojohtamisen perusteet: Strategiat ja prosessimallitNovi Research Center
 
Knowledge Management Practices in Large Companies
Knowledge Management Practices in Large CompaniesKnowledge Management Practices in Large Companies
Knowledge Management Practices in Large CompaniesNovi Research Center
 
Tietojohtamisen perusteet: tiedon tasot ja lajit
Tietojohtamisen perusteet: tiedon tasot ja lajitTietojohtamisen perusteet: tiedon tasot ja lajit
Tietojohtamisen perusteet: tiedon tasot ja lajitNovi Research Center
 
Tietämyksenhallinta osana organisaation toimintaa - hallintaa vai hämmennystä
Tietämyksenhallinta osana organisaation toimintaa - hallintaa vai hämmennystäTietämyksenhallinta osana organisaation toimintaa - hallintaa vai hämmennystä
Tietämyksenhallinta osana organisaation toimintaa - hallintaa vai hämmennystäNovi Research Center
 
Tietojohtamisen perusteet: Tietojohtamisen konteksti ja tietoperustainen arvo...
Tietojohtamisen perusteet: Tietojohtamisen konteksti ja tietoperustainen arvo...Tietojohtamisen perusteet: Tietojohtamisen konteksti ja tietoperustainen arvo...
Tietojohtamisen perusteet: Tietojohtamisen konteksti ja tietoperustainen arvo...Novi Research Center
 
Tiedon ja osaamisen johtaminen suomen 50 suurimmassa yrityksessä
Tiedon ja osaamisen johtaminen suomen 50 suurimmassa yrityksessäTiedon ja osaamisen johtaminen suomen 50 suurimmassa yrityksessä
Tiedon ja osaamisen johtaminen suomen 50 suurimmassa yrityksessäNovi Research Center
 
Today's social media and cloud computing in business environment
Today's social media and cloud computing in business environmentToday's social media and cloud computing in business environment
Today's social media and cloud computing in business environmentNovi Research Center
 
Tietojohtamisen perusteet: Mitä on tietojohtaminen?
Tietojohtamisen perusteet: Mitä on tietojohtaminen?Tietojohtamisen perusteet: Mitä on tietojohtaminen?
Tietojohtamisen perusteet: Mitä on tietojohtaminen?Novi Research Center
 
Näin suomalaiset yritykset johtavat tiedolla, Jussi Myllärniemi, Novi tutkimu...
Näin suomalaiset yritykset johtavat tiedolla, Jussi Myllärniemi, Novi tutkimu...Näin suomalaiset yritykset johtavat tiedolla, Jussi Myllärniemi, Novi tutkimu...
Näin suomalaiset yritykset johtavat tiedolla, Jussi Myllärniemi, Novi tutkimu...Novi Research Center
 
Value creation and evolution of a value network a longitudinal case study on ...
Value creation and evolution of a value network a longitudinal case study on ...Value creation and evolution of a value network a longitudinal case study on ...
Value creation and evolution of a value network a longitudinal case study on ...Novi Research Center
 
Arvoa palvelutuotannon mittareista seminaari
Arvoa palvelutuotannon mittareista seminaariArvoa palvelutuotannon mittareista seminaari
Arvoa palvelutuotannon mittareista seminaariNovi Research Center
 
SmartWoW-työkalu tietotyön suorituskyvyn analysoimiseen
SmartWoW-työkalu tietotyön suorituskyvyn analysoimiseenSmartWoW-työkalu tietotyön suorituskyvyn analysoimiseen
SmartWoW-työkalu tietotyön suorituskyvyn analysoimiseenNovi Research Center
 
Pirkanmaan fiksuin työympäristö?
Pirkanmaan fiksuin työympäristö?Pirkanmaan fiksuin työympäristö?
Pirkanmaan fiksuin työympäristö?Novi Research Center
 

More from Novi Research Center (15)

Tietojohtaminen: Tiedosta arvoa - Ilona Ilvonen, NOVI
Tietojohtaminen: Tiedosta arvoa - Ilona Ilvonen, NOVITietojohtaminen: Tiedosta arvoa - Ilona Ilvonen, NOVI
Tietojohtaminen: Tiedosta arvoa - Ilona Ilvonen, NOVI
 
Mitattavaa arvonluontia liiketoiminnassa
Mitattavaa arvonluontia liiketoiminnassaMitattavaa arvonluontia liiketoiminnassa
Mitattavaa arvonluontia liiketoiminnassa
 
Tietojohtamisen perusteet: Strategiat ja prosessimallit
Tietojohtamisen perusteet: Strategiat ja prosessimallitTietojohtamisen perusteet: Strategiat ja prosessimallit
Tietojohtamisen perusteet: Strategiat ja prosessimallit
 
Knowledge Management Practices in Large Companies
Knowledge Management Practices in Large CompaniesKnowledge Management Practices in Large Companies
Knowledge Management Practices in Large Companies
 
Tietojohtamisen perusteet: tiedon tasot ja lajit
Tietojohtamisen perusteet: tiedon tasot ja lajitTietojohtamisen perusteet: tiedon tasot ja lajit
Tietojohtamisen perusteet: tiedon tasot ja lajit
 
Tietämyksenhallinta osana organisaation toimintaa - hallintaa vai hämmennystä
Tietämyksenhallinta osana organisaation toimintaa - hallintaa vai hämmennystäTietämyksenhallinta osana organisaation toimintaa - hallintaa vai hämmennystä
Tietämyksenhallinta osana organisaation toimintaa - hallintaa vai hämmennystä
 
Tietojohtamisen perusteet: Tietojohtamisen konteksti ja tietoperustainen arvo...
Tietojohtamisen perusteet: Tietojohtamisen konteksti ja tietoperustainen arvo...Tietojohtamisen perusteet: Tietojohtamisen konteksti ja tietoperustainen arvo...
Tietojohtamisen perusteet: Tietojohtamisen konteksti ja tietoperustainen arvo...
 
Tiedon ja osaamisen johtaminen suomen 50 suurimmassa yrityksessä
Tiedon ja osaamisen johtaminen suomen 50 suurimmassa yrityksessäTiedon ja osaamisen johtaminen suomen 50 suurimmassa yrityksessä
Tiedon ja osaamisen johtaminen suomen 50 suurimmassa yrityksessä
 
Today's social media and cloud computing in business environment
Today's social media and cloud computing in business environmentToday's social media and cloud computing in business environment
Today's social media and cloud computing in business environment
 
Tietojohtamisen perusteet: Mitä on tietojohtaminen?
Tietojohtamisen perusteet: Mitä on tietojohtaminen?Tietojohtamisen perusteet: Mitä on tietojohtaminen?
Tietojohtamisen perusteet: Mitä on tietojohtaminen?
 
Näin suomalaiset yritykset johtavat tiedolla, Jussi Myllärniemi, Novi tutkimu...
Näin suomalaiset yritykset johtavat tiedolla, Jussi Myllärniemi, Novi tutkimu...Näin suomalaiset yritykset johtavat tiedolla, Jussi Myllärniemi, Novi tutkimu...
Näin suomalaiset yritykset johtavat tiedolla, Jussi Myllärniemi, Novi tutkimu...
 
Value creation and evolution of a value network a longitudinal case study on ...
Value creation and evolution of a value network a longitudinal case study on ...Value creation and evolution of a value network a longitudinal case study on ...
Value creation and evolution of a value network a longitudinal case study on ...
 
Arvoa palvelutuotannon mittareista seminaari
Arvoa palvelutuotannon mittareista seminaariArvoa palvelutuotannon mittareista seminaari
Arvoa palvelutuotannon mittareista seminaari
 
SmartWoW-työkalu tietotyön suorituskyvyn analysoimiseen
SmartWoW-työkalu tietotyön suorituskyvyn analysoimiseenSmartWoW-työkalu tietotyön suorituskyvyn analysoimiseen
SmartWoW-työkalu tietotyön suorituskyvyn analysoimiseen
 
Pirkanmaan fiksuin työympäristö?
Pirkanmaan fiksuin työympäristö?Pirkanmaan fiksuin työympäristö?
Pirkanmaan fiksuin työympäristö?
 

Recently uploaded

Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 

Recently uploaded (20)

Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 

Information Security Risk Management Course

  • 1. Information Security Management Course conducted by Department of Information Management and Logistics & Novi Research Center - TUT Dr. Ilona Ilvonen (Course Teacher) Karan Menon (Course Assistant)
  • 2. What are the information and knowledge security related issues in your firm and how can they be mitigated? • 2015-16 – 6 Kampusklubi Companies Case interviews conducted by student groups • KSRM Model • Target for 2016-17 approximately 15 companies with a focus on Digitalization and/or IoT related activities • Interviews will be conducted in December or January by groups of 3-4 students and the course assistant 4.10.2016 2
  • 3. Summary of 15 Groups 4.10.2016 3 Risk areas Table shows amount of risks in a certain risk area. Risk area Total 3.1 Unintentional harm 18 9 21 36 12 2 98 3.2 Intentional harm 7 7 12 46 9 2 83 3.3 Employee turnover 9 7 7 12 1 4 40 3.4 Other threats 0 0 1 3 1 0 5 Total 34 23 41 97 23 8 226 Scale shows the sum of the risk values in a certain risk area. Risk areas Table shows amount of risks in a certain risk area. Risk area Total 3.1 Unintentional harm 18 9 21 36 12 2 98 3.2 Intentional harm 7 7 12 46 9 2 83 3.3 Employee turnover 9 7 7 12 1 4 40 3.4 Other threats 0 0 1 3 1 0 5 Total 34 23 41 97 23 8 226 Scale shows the sum of the risk values in a certain risk area.
  • 4. Contact Us to register as a Case Company Write an email for queries and registration to the following persons. Dr. Ilona Ilvonen – ilona.ilvonen@tut.fi Karan Menon – karan.menon@tut.fi 0401 305 046 Jaana Hanninen – jaana.hanninen@sykoy.fi 0400 414 117 4.10.2016 4
  • 5. What is the course about? • The course aims for understanding of issues related to information security management: recognizing risks that information and knowledge face in companies, how to address those risks, and how to develop the information security status • Both Finnish and international students 4.10.2016 5
  • 6. KSRM model, focus on steps 1-5 in this assignment 4.10.2016 6 1. BUSINESS NEED OR PROBLEM, EXPECTED BENEFITS SOUGHT FROM CHANGE - costs of implementation - expected monetary business benefits 2. KNOWLEDGE IDENTIFICATION - identify communication genres and containers 3. THREAT IDENTIFICATION - identify vulnerabilities and motives to exploit them - identify threat agents 4. RISK ANALYSIS - identify risks connected to the most important communication genres - analyse the size of risk and costs of risk realization - identify mitigation means 5. COST/BENEFIT ASSESSMENT - business benefits vs. implementation costs - mitigation costs vs. mitigation benefits 6. MITIGATION - implementation of mitigation means that are deemed reasonable 7. MONITORING - set triggers for action - any change should trigger re- evaluation of business need and threats
  • 7. Examples of results: Group 1 4.10.2016 7 Risk areas Table shows amount of risks in a certain risk area. Risk area Total 3.1 Unintentional harm 1 0 0 1 0 0 2 3.2 Intentional harm 0 0 0 1 0 0 1 3.3 Employee turnover 0 0 0 1 0 0 1 3.4 Other threats 0 0 1 1 0 0 2 Total 1 0 1 4 0 0 6 Scale shows the sum of the risk values in a certain risk area. Risk areas Table shows amount of risks in a certain risk area. Risk area Total 3.1 Unintentional harm 1 0 0 1 0 0 2 3.2 Intentional harm 0 0 0 1 0 0 1 3.3 Employee turnover 0 0 0 1 0 0 1 3.4 Other threats 0 0 1 1 0 0 2 Total 1 0 1 4 0 0 6 Scale shows the sum of the risk values in a certain risk area.
  • 8. Examples of results: Group 1 4.10.2016 8
  • 9. Examples of results: Group 2 4.10.2016 9 Risk areas Table shows amount of risks in a certain risk area. Risk area Total 3.1 Unintentional harm 1 3 3 1 0 0 8 3.2 Intentional harm 2 1 1 7 0 0 11 3.3 Employee turnover 3 1 2 2 0 0 8 3.4 Other threats 0 0 0 0 0 0 0 Total 6 5 6 10 0 0 27 Scale shows the sum of the risk values in a certain risk area. Risk areas Table shows amount of risks in a certain risk area. Risk area Total 3.1 Unintentional harm 1 3 3 1 0 0 8 3.2 Intentional harm 2 1 1 7 0 0 11 3.3 Employee turnover 3 1 2 2 0 0 8 3.4 Other threats 0 0 0 0 0 0 0 Total 6 5 6 10 0 0 27 Scale shows the sum of the risk values in a certain risk area.
  • 10. Examples of results: Group 2 4.10.2016 10
  • 11. Examples of results: Group 3 4.10.2016 11 Risk areas Table shows amount of risks in a certain risk area. Risk area Total 3.1 Unintentional harm 0 1 2 0 0 0 3 3.2 Intentional harm 0 0 0 0 2 0 2 3.3 Employee turnover 0 0 1 0 1 1 3 3.4 Other threats 0 0 0 1 0 0 1 Total 0 1 3 1 3 1 9 Scale shows the sum of the risk values in a certain risk area. Risk areas Table shows amount of risks in a certain risk area. Risk area Total 3.1 Unintentional harm 0 1 2 0 0 0 3 3.2 Intentional harm 0 0 0 0 2 0 2 3.3 Employee turnover 0 0 1 0 1 1 3 3.4 Other threats 0 0 0 1 0 0 1 Total 0 1 3 1 3 1 9 Scale shows the sum of the risk values in a certain risk area.
  • 12. Examples of results: Group 3 4.10.2016 12
  • 13. Examples of the most severe risks • Employee leaves and takes customer contacts with them • Losing company reputation due to mistakes, technical problems or intentional actions by employees • New employee gives information to their previous employer • Leaving employee tells information to their new employer 4.10.2016 13
  • 14. Contact Us to register as a Case Company Write an email for queries and registration to the following persons. Dr. Ilona Ilvonen – ilona.ilvonen@tut.fi Karan Menon – karan.menon@tut.fi 0401 305 046 Jaana Hanninen – jaana.hanninen@sykoy.fi 0400 414 117 4.10.2016 14