SlideShare a Scribd company logo
Onur YÜKSEKTEPELİ
Bilgi Güvenliği Danışmanı
www.onuryuksektepeli.com
twitter.com/oyuksektepeli
facebook.com/onuryuksektepeli
Risk Analysis and Management
Risk Management – Principles and Guidelines
ISO 31000:2009
Unique Terms and Definitions
Annualized Loss Expectancy - The Cost of loss due to a Risk over a year
Threat – A Potentially negative occurence
Vulnerability – A Weakness in a System
Risk – A Matched Threat and Vulnerability
Safeguard – A Measure taken to Reduce Risk
Total Cost of Ownership – The Cost of a Safequard
Return of Investment – Money Saved by deploying a Safeguard
What is Risk?
Risk = Threat x Vulnerability
Example: Earthquake Disaster Risk Index
San Francisco – Near the Pasicific Ocean
Boston - Northeast
San Francisco Threat, 4
San Francisco vulnerability, 2
San Francisco risk = 4 x 2 = 8
Boston Threat, 2
Boston Vulnerability, 4
Boston Risk = 2 x 4= 8
Rachel Davidson Earthquake Disaster Risk Index
http://www.sciencedaily.com/releases/1997/08/970821233648.htm
IMPACT
 Severity of the Damage
Risk = Threat x Vulnerability x Impact
Empty Building Risk = 2 (threat) x 4 (vulnerability) x 2 (impact) = 16
Full Building Risk = 2 (threat) x 4 (vulnerability) x 5 = 40
Risk Analysis Matrix
Calculating Annualized Loss Expectancy
Calculating Annualized Loss Expectancy
ALE = Annual Cost of a loss due to risk
Asset Value= Value of the asset you are trying to protect
Stolen Computer Example:
Hardware Cost = 2500$
Data Cost = 22.500$
Asset Value = 25000$
Asset Value
 Market Approach
 Income Approach
 Cost Approach
Calculating Annualized Loss Expectancy
 Exposure Factor
The Percentage of value an asset lost due to an incident.
Exposure Factor of Stolen Computer = %100
Singel Loss Expectancy (SLE)
The Cost of a single loss.
SLE = Asset Value (25000$) x Exposure Factor(%100) = 25000$
 Annual Rate of Occurrence (ARO)
Number of losses you suffer per year.
ARO = 11
Annualized Loss Expectancy
ALE = SLE (25000) x ARO (11) = 275000$
Total Cost of Ownership
Total Cost of Ownership (TCO) is the total cost of a mitigating safequard.
Total Cost of Ownership must contain;
• One – Time capital expense
• Annual Cost
• Staff Hours
• Ventor Maintenance fees
• Software Subscriptions etc.
Total Cost of Ownership
1000 Laptops
Software = $100/laptop = 100000$
Annual Support Fee = %10 Annually 10000$
4000 Staff Hours
$50 / hour
$20 / hour
$70/ hour x 4000 = 280000$
3 Years Technology Refresh Cycle
Software Cost = $100000
3 Years of Vendor Support = $10000 x 3 = $30000
Hourly Staff Cost = $280000
TCO for 3 Years = $410000
TCO per Year = $410000 / 3 = 136,667/year
Return of Investment
The Amount of Money saved by implementing a safeguard.
TCO < ALE – Postive ROI, Good Choice
TCO > ALE – Negative ROI, Poor Choice
TCO = $136,667
ALE = $275,000
After Encryption Implement
Asset Value = $25000 - $22500 = 25000
Exposure Factor = %10
$275000 * %10 = $27,5000
By Making Investment
You Save;
Old ALE ($275,000) – New ALE ($27,500) = $247,500
Your ROI = $247,500 - $136,667 = $110,833
Risk Choice
Accept the Risk
Mitigate the Risk
Transfer the Risk
Risk Avoidance
Onur YÜKSEKTEPELİ
Bilgi Güvenliği Danışmanı
www.onuryuksektepeli.com
twitter.com/oyuksektepeli
facebook.com/onuryuksektepeli

More Related Content

What's hot

Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
Mart Rovers
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
healthpoint
 
Awareness ISMS ISO 27001:2013
Awareness ISMS ISO 27001:2013Awareness ISMS ISO 27001:2013
Awareness ISMS ISO 27001:2013
Ali Fuad R
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
Jonathan Sinclair
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
Donald E. Hester
 
Risk assement c tpat
Risk assement c tpatRisk assement c tpat
Risk assement c tpat
akira1230
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
TapOffice
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
Brian Matteson, CISSP CISA
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
Priyanka Aash
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
John Macasio
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
Dr David Probert
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 

What's hot (20)

Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
 
Awareness ISMS ISO 27001:2013
Awareness ISMS ISO 27001:2013Awareness ISMS ISO 27001:2013
Awareness ISMS ISO 27001:2013
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 
Risk assement c tpat
Risk assement c tpatRisk assement c tpat
Risk assement c tpat
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Isms
IsmsIsms
Isms
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 

Similar to Information Security Risk Management

Risk Analysis.pptx
Risk Analysis.pptxRisk Analysis.pptx
Risk Analysis.pptx
Karthick Panneerselvam
 
Cissp combined notes
Cissp combined notesCissp combined notes
Cissp combined notes
Joshua Fonseca
 
New offer: Climate Risk
New offer: Climate RiskNew offer: Climate Risk
New offer: Climate Risk
EcoAct
 
Improving Risk Assessment Techniques by Richard Robinson
Improving Risk Assessment Techniques by Richard Robinson  Improving Risk Assessment Techniques by Richard Robinson
Improving Risk Assessment Techniques by Richard Robinson
ISPO | International Standard for Maritime Pilot Organizations
 
RISK MANAGEMENT
RISK MANAGEMENTRISK MANAGEMENT
RISK MANAGEMENT
iqbal524087
 
Session B3 - Introduction to Project Cost and Schedule Risk Analysis
Session B3 - Introduction to Project Cost and Schedule Risk AnalysisSession B3 - Introduction to Project Cost and Schedule Risk Analysis
Session B3 - Introduction to Project Cost and Schedule Risk Analysis
Project Controls Expo
 
CHAPTER 1 Scopes of Industrial Safety Part 1 12 Feb 2020 3.pptx
CHAPTER 1 Scopes of Industrial Safety Part 1 12 Feb 2020 3.pptxCHAPTER 1 Scopes of Industrial Safety Part 1 12 Feb 2020 3.pptx
CHAPTER 1 Scopes of Industrial Safety Part 1 12 Feb 2020 3.pptx
JALIMIEABDULJALIL
 
System shock analysis and complex network effects
System shock analysis and complex network effectsSystem shock analysis and complex network effects
System shock analysis and complex network effects
Kimmo Soramaki
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Muizz Anibire
 
Exploration & Production onshore and offshore: technical challenges and their...
Exploration & Production onshore and offshore: technical challenges and their...Exploration & Production onshore and offshore: technical challenges and their...
Exploration & Production onshore and offshore: technical challenges and their...
ITE Oil&Gas
 
Assessing & measuring operational risk
Assessing & measuring operational riskAssessing & measuring operational risk
Assessing & measuring operational riskUjjwal 'Shanu'
 
Assessing measuring oprisksama-khan011805
Assessing measuring oprisksama-khan011805Assessing measuring oprisksama-khan011805
Assessing measuring oprisksama-khan011805Ujjwal 'Shanu'
 
IHST Safety Resources for Helicopter Pilots and Operators
IHST Safety Resources for Helicopter Pilots and OperatorsIHST Safety Resources for Helicopter Pilots and Operators
IHST Safety Resources for Helicopter Pilots and OperatorsIHSTFAA
 
Risk Concept And Management 5
Risk Concept And Management 5Risk Concept And Management 5
Risk Concept And Management 5
rajeevgupta
 
COSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORECOSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORE
Naresh Parandhaman
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
APNIC
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software security
Marco Morana
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
FRSecure
 

Similar to Information Security Risk Management (20)

Risk Analysis.pptx
Risk Analysis.pptxRisk Analysis.pptx
Risk Analysis.pptx
 
Cissp combined notes
Cissp combined notesCissp combined notes
Cissp combined notes
 
New offer: Climate Risk
New offer: Climate RiskNew offer: Climate Risk
New offer: Climate Risk
 
Improving Risk Assessment Techniques by Richard Robinson
Improving Risk Assessment Techniques by Richard Robinson  Improving Risk Assessment Techniques by Richard Robinson
Improving Risk Assessment Techniques by Richard Robinson
 
RISK MANAGEMENT
RISK MANAGEMENTRISK MANAGEMENT
RISK MANAGEMENT
 
Session B3 - Introduction to Project Cost and Schedule Risk Analysis
Session B3 - Introduction to Project Cost and Schedule Risk AnalysisSession B3 - Introduction to Project Cost and Schedule Risk Analysis
Session B3 - Introduction to Project Cost and Schedule Risk Analysis
 
CHAPTER 1 Scopes of Industrial Safety Part 1 12 Feb 2020 3.pptx
CHAPTER 1 Scopes of Industrial Safety Part 1 12 Feb 2020 3.pptxCHAPTER 1 Scopes of Industrial Safety Part 1 12 Feb 2020 3.pptx
CHAPTER 1 Scopes of Industrial Safety Part 1 12 Feb 2020 3.pptx
 
System shock analysis and complex network effects
System shock analysis and complex network effectsSystem shock analysis and complex network effects
System shock analysis and complex network effects
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
 
Exploration & Production onshore and offshore: technical challenges and their...
Exploration & Production onshore and offshore: technical challenges and their...Exploration & Production onshore and offshore: technical challenges and their...
Exploration & Production onshore and offshore: technical challenges and their...
 
Assessing & measuring operational risk
Assessing & measuring operational riskAssessing & measuring operational risk
Assessing & measuring operational risk
 
Assessing measuring oprisksama-khan011805
Assessing measuring oprisksama-khan011805Assessing measuring oprisksama-khan011805
Assessing measuring oprisksama-khan011805
 
IHST Safety Resources for Helicopter Pilots and Operators
IHST Safety Resources for Helicopter Pilots and OperatorsIHST Safety Resources for Helicopter Pilots and Operators
IHST Safety Resources for Helicopter Pilots and Operators
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Concept And Management 5
Risk Concept And Management 5Risk Concept And Management 5
Risk Concept And Management 5
 
COSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORECOSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORE
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software security
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 

Recently uploaded

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 

Recently uploaded (20)

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 

Information Security Risk Management

  • 1. Onur YÜKSEKTEPELİ Bilgi Güvenliği Danışmanı www.onuryuksektepeli.com twitter.com/oyuksektepeli facebook.com/onuryuksektepeli
  • 2. Risk Analysis and Management Risk Management – Principles and Guidelines ISO 31000:2009
  • 3. Unique Terms and Definitions Annualized Loss Expectancy - The Cost of loss due to a Risk over a year Threat – A Potentially negative occurence Vulnerability – A Weakness in a System Risk – A Matched Threat and Vulnerability Safeguard – A Measure taken to Reduce Risk Total Cost of Ownership – The Cost of a Safequard Return of Investment – Money Saved by deploying a Safeguard
  • 4. What is Risk? Risk = Threat x Vulnerability
  • 5. Example: Earthquake Disaster Risk Index San Francisco – Near the Pasicific Ocean Boston - Northeast San Francisco Threat, 4 San Francisco vulnerability, 2 San Francisco risk = 4 x 2 = 8 Boston Threat, 2 Boston Vulnerability, 4 Boston Risk = 2 x 4= 8 Rachel Davidson Earthquake Disaster Risk Index http://www.sciencedaily.com/releases/1997/08/970821233648.htm
  • 6. IMPACT  Severity of the Damage Risk = Threat x Vulnerability x Impact Empty Building Risk = 2 (threat) x 4 (vulnerability) x 2 (impact) = 16 Full Building Risk = 2 (threat) x 4 (vulnerability) x 5 = 40
  • 9. Calculating Annualized Loss Expectancy ALE = Annual Cost of a loss due to risk Asset Value= Value of the asset you are trying to protect Stolen Computer Example: Hardware Cost = 2500$ Data Cost = 22.500$ Asset Value = 25000$ Asset Value  Market Approach  Income Approach  Cost Approach
  • 10. Calculating Annualized Loss Expectancy  Exposure Factor The Percentage of value an asset lost due to an incident. Exposure Factor of Stolen Computer = %100 Singel Loss Expectancy (SLE) The Cost of a single loss. SLE = Asset Value (25000$) x Exposure Factor(%100) = 25000$  Annual Rate of Occurrence (ARO) Number of losses you suffer per year. ARO = 11 Annualized Loss Expectancy ALE = SLE (25000) x ARO (11) = 275000$
  • 11. Total Cost of Ownership Total Cost of Ownership (TCO) is the total cost of a mitigating safequard. Total Cost of Ownership must contain; • One – Time capital expense • Annual Cost • Staff Hours • Ventor Maintenance fees • Software Subscriptions etc.
  • 12. Total Cost of Ownership 1000 Laptops Software = $100/laptop = 100000$ Annual Support Fee = %10 Annually 10000$ 4000 Staff Hours $50 / hour $20 / hour $70/ hour x 4000 = 280000$ 3 Years Technology Refresh Cycle Software Cost = $100000 3 Years of Vendor Support = $10000 x 3 = $30000 Hourly Staff Cost = $280000 TCO for 3 Years = $410000 TCO per Year = $410000 / 3 = 136,667/year
  • 13. Return of Investment The Amount of Money saved by implementing a safeguard. TCO < ALE – Postive ROI, Good Choice TCO > ALE – Negative ROI, Poor Choice TCO = $136,667 ALE = $275,000 After Encryption Implement Asset Value = $25000 - $22500 = 25000 Exposure Factor = %10 $275000 * %10 = $27,5000 By Making Investment You Save; Old ALE ($275,000) – New ALE ($27,500) = $247,500 Your ROI = $247,500 - $136,667 = $110,833
  • 14. Risk Choice Accept the Risk Mitigate the Risk Transfer the Risk Risk Avoidance
  • 15. Onur YÜKSEKTEPELİ Bilgi Güvenliği Danışmanı www.onuryuksektepeli.com twitter.com/oyuksektepeli facebook.com/onuryuksektepeli