SlideShare a Scribd company logo
© 2017 HealthGuard
All rights reserved
Introduction to
Scenario Based Risk Analysis
Part 1: Foundational Concepts
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Housekeeping
● Using Zoom / Meeting Interaction
● Webinar Recording
© 2017 HealthGuard
All rights reserved
Housekeeping – Zoom Meeting viewer interaction
© 2017 HealthGuard
All rights reserved
Housekeeping – Zoom Meeting viewer interaction
© 2017 HealthGuard
All rights reserved
Housekeeping – Zoom Meeting viewer interaction
© 2017 HealthGuard
All rights reserved
Our Speakers
John Zuziak, Director of Information
Security, Catholic Health Initiatives
Apolonio “Apps” Garcia,
Founder/President, HealthGuard
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
What is scenario based risk analysis?
Basic scenario elements
Benefits of scenario based analysis
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Audience Poll
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
What is scenario
based risk analysis?
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Risk scenario analysis is a technique to make IT risk
more concrete and tangible and to allow for proper risk
analysis and assessment. It is a core approach to bring
realism, insight, organisational engagement, improved
analysis and structure to the complex matter of IT risk.” -
ISACA
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Scenario analysis is a process of analyzing possible
future events by considering alternative possible
outcomes (sometimes called "alternative worlds"). Thus,
scenario analysis, which is one of the main forms of
projection, does not try to show one exact picture of the
future. Instead, it presents several alternative future
developments. - Wikipedia
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Basic Elements of a
Risk Scenario
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Threat
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Threats
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Threat Asset
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Assets
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Threat Asset Loss Event /
Effect
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Loss Event / Effect
Confidentiality
Integrity Availability
Financial Loss (Open FAIR)
● Productivity
● Response
● Replacement
● Fines & Judgement
● Competitive Advantage
● Reputation
Patient Safety (AHRQ Harm Scale)
● No Harm
● Mild Harm
● Moderate Harm
● Severe Harm
● Death
Privacy
● Information Exposure
● Data Theft
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Threat Asset
Acts On
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
ControlsThreat Asset
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Loss Event
ControlsThreat Asset
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Threat Controls Primary
Loss Event
Threat Event
Frequency
Primary Loss
Event
Frequency &
Magnitude
Vulnerability
Secondary
Loss Event
Frequency &
Magnitude
Secondary
Loss Event
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Benefits of Scenario
Based Risk Analysis
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Why do Scenario Based Risk Analysis?
“Scenarios are a powerful tool in a risk manager’s
armory—they help professionals ask the right questions
and prepare for the unexpected. Scenario analysis has
become a ‘new’ and best practice in enterprise risk
management (ERM). - ISACA
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Why do Scenario Based Risk Analysis?
“Risk scenario analysis is a structured process that leads to better understanding
of the ways multiple factors may combine to create both vulnerabilities and
opportunities. It is often applied to expand perceptions prior to formulating specific
business plans by focusing on factors that often get dismissed or shortchanged.”
“Risk scenario analysis helps overcome organizational resistance in discussions of
low-probability events or events that have not occurred in the recent past. Such
risks often receive low rankings in standard risk assessments, but they can be
revealed to be very challenging when introduced within risk scenarios.” - PwC
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Scenario based risk analysis is an analysis
methodology to prioritize and quantify risk and to
take action.
Scenario Risk Analysis summary in 3 words
1. Context
2. Context
3. Context
© 2017 HealthGuard
All rights reserved
© 2017 HealthGuard
All rights reserved
Introduction to Scenario Based
Risk Analysis -
Part 2: How to Build a Scenario
Wednesday, May 24th @ 1pm
Register on Eventbrite

More Related Content

What's hot

Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
Sameer Paradia
 
BUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNINGBUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNING
Health Informatics New Zealand
 
Enterprise Risk Management in Healthcare Organisations “Going Beyond Patient ...
Enterprise Risk Management in Healthcare Organisations “Going Beyond Patient ...Enterprise Risk Management in Healthcare Organisations “Going Beyond Patient ...
Enterprise Risk Management in Healthcare Organisations “Going Beyond Patient ...
Hossam Elamir
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
Risk assessment-training
Risk assessment-trainingRisk assessment-training
Risk assessment-training
Nguyên Hà Văn
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)
Diane Christina
 
Enterprise Risk Management Erm
Enterprise Risk Management ErmEnterprise Risk Management Erm
Enterprise Risk Management Erm
Nexus Aid
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
Sarah Moore
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Governance Risk and Compliance - in Higher Education - Australia
Governance Risk and Compliance - in Higher Education - AustraliaGovernance Risk and Compliance - in Higher Education - Australia
Governance Risk and Compliance - in Higher Education - Australia
Marissa McCauley
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
Prof. Akram Hassan PhD,MBA,PMP,OPM3
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
3Sixty Insights
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
FAA Safety Team Central Florida
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
Schneider Electric
 
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxBUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
JayLloyd8
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
primeteacher32
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentationmmagario
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Magdalena Anna Fas
 

What's hot (20)

Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
BUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNINGBUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNING
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Enterprise Risk Management in Healthcare Organisations “Going Beyond Patient ...
Enterprise Risk Management in Healthcare Organisations “Going Beyond Patient ...Enterprise Risk Management in Healthcare Organisations “Going Beyond Patient ...
Enterprise Risk Management in Healthcare Organisations “Going Beyond Patient ...
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Risk assessment-training
Risk assessment-trainingRisk assessment-training
Risk assessment-training
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)
 
Enterprise Risk Management Erm
Enterprise Risk Management ErmEnterprise Risk Management Erm
Enterprise Risk Management Erm
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Governance Risk and Compliance - in Higher Education - Australia
Governance Risk and Compliance - in Higher Education - AustraliaGovernance Risk and Compliance - in Higher Education - Australia
Governance Risk and Compliance - in Higher Education - Australia
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxBUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205
 

Similar to Introduction to Scenario Based Risk Analysis

Introduction to scenario based risk analysis part 3
Introduction to scenario based risk analysis  part 3Introduction to scenario based risk analysis  part 3
Introduction to scenario based risk analysis part 3
"Apolonio \"Apps\"" Garcia
 
Introduction to scenario based risk analysis part 2
Introduction to scenario based risk analysis  part 2Introduction to scenario based risk analysis  part 2
Introduction to scenario based risk analysis part 2
"Apolonio \"Apps\"" Garcia
 
Risks of being an enterprenuer
Risks of being an enterprenuerRisks of being an enterprenuer
Risks of being an enterprenuer
SPIIPE
 
Beyond the Equity Risk Premia
Beyond the Equity Risk PremiaBeyond the Equity Risk Premia
Beyond the Equity Risk Premia
Windham Labs
 
How to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellenceHow to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety Excellence
PECB
 
Risk descriptions from 'Coconut island' risk workshop
Risk descriptions from 'Coconut island' risk workshopRisk descriptions from 'Coconut island' risk workshop
Risk descriptions from 'Coconut island' risk workshop
Association for Project Management
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
Doug Copley
 
High Performance Security Report - High Technology
High Performance Security Report - High TechnologyHigh Performance Security Report - High Technology
High Performance Security Report - High Technology
Accenture Security
 
Smu seminar 2014_03_26 v3
Smu seminar 2014_03_26 v3Smu seminar 2014_03_26 v3
Smu seminar 2014_03_26 v3
Patrick Florer
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Puneet Kukreja
 
PMexpo17 - How to manage risks you didnt know you were taking - David Hillson
PMexpo17 - How to manage risks you didnt know you were taking - David HillsonPMexpo17 - How to manage risks you didnt know you were taking - David Hillson
PMexpo17 - How to manage risks you didnt know you were taking - David Hillson
PMexpo
 
Economic Value Chains - costing the impact of risk by "Colin Sandall - Senior...
Economic Value Chains - costing the impact of risk by "Colin Sandall - Senior...Economic Value Chains - costing the impact of risk by "Colin Sandall - Senior...
Economic Value Chains - costing the impact of risk by "Colin Sandall - Senior...
Project Controls Expo
 
Big Data Analytics for Insurance Business
Big Data Analytics for Insurance BusinessBig Data Analytics for Insurance Business
Big Data Analytics for Insurance Business
PanBI
 
Formula For Case Intake Success
Formula For Case Intake SuccessFormula For Case Intake Success
Formula For Case Intake Success
MyMeds&Me
 
Europe Insurance Innovation Award 2017 - Healix
Europe Insurance Innovation Award 2017 - HealixEurope Insurance Innovation Award 2017 - Healix
Europe Insurance Innovation Award 2017 - Healix
The Digital Insurer
 
5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too
SHAZEBALIKHAN1
 
Dec2016 - Calculating and Managing Environmental Counterparty Risk
Dec2016 - Calculating and Managing Environmental Counterparty RiskDec2016 - Calculating and Managing Environmental Counterparty Risk
Dec2016 - Calculating and Managing Environmental Counterparty RiskJohn Rosengard
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
NowSecure
 
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
riscoss-eu
 
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsLearn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
Splunk
 

Similar to Introduction to Scenario Based Risk Analysis (20)

Introduction to scenario based risk analysis part 3
Introduction to scenario based risk analysis  part 3Introduction to scenario based risk analysis  part 3
Introduction to scenario based risk analysis part 3
 
Introduction to scenario based risk analysis part 2
Introduction to scenario based risk analysis  part 2Introduction to scenario based risk analysis  part 2
Introduction to scenario based risk analysis part 2
 
Risks of being an enterprenuer
Risks of being an enterprenuerRisks of being an enterprenuer
Risks of being an enterprenuer
 
Beyond the Equity Risk Premia
Beyond the Equity Risk PremiaBeyond the Equity Risk Premia
Beyond the Equity Risk Premia
 
How to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellenceHow to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety Excellence
 
Risk descriptions from 'Coconut island' risk workshop
Risk descriptions from 'Coconut island' risk workshopRisk descriptions from 'Coconut island' risk workshop
Risk descriptions from 'Coconut island' risk workshop
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
High Performance Security Report - High Technology
High Performance Security Report - High TechnologyHigh Performance Security Report - High Technology
High Performance Security Report - High Technology
 
Smu seminar 2014_03_26 v3
Smu seminar 2014_03_26 v3Smu seminar 2014_03_26 v3
Smu seminar 2014_03_26 v3
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
PMexpo17 - How to manage risks you didnt know you were taking - David Hillson
PMexpo17 - How to manage risks you didnt know you were taking - David HillsonPMexpo17 - How to manage risks you didnt know you were taking - David Hillson
PMexpo17 - How to manage risks you didnt know you were taking - David Hillson
 
Economic Value Chains - costing the impact of risk by "Colin Sandall - Senior...
Economic Value Chains - costing the impact of risk by "Colin Sandall - Senior...Economic Value Chains - costing the impact of risk by "Colin Sandall - Senior...
Economic Value Chains - costing the impact of risk by "Colin Sandall - Senior...
 
Big Data Analytics for Insurance Business
Big Data Analytics for Insurance BusinessBig Data Analytics for Insurance Business
Big Data Analytics for Insurance Business
 
Formula For Case Intake Success
Formula For Case Intake SuccessFormula For Case Intake Success
Formula For Case Intake Success
 
Europe Insurance Innovation Award 2017 - Healix
Europe Insurance Innovation Award 2017 - HealixEurope Insurance Innovation Award 2017 - Healix
Europe Insurance Innovation Award 2017 - Healix
 
5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too
 
Dec2016 - Calculating and Managing Environmental Counterparty Risk
Dec2016 - Calculating and Managing Environmental Counterparty RiskDec2016 - Calculating and Managing Environmental Counterparty Risk
Dec2016 - Calculating and Managing Environmental Counterparty Risk
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
 
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
Managing Risks in Open Source Software adoption: the RISCOSS Approach, OW2con...
 
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsLearn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Introduction to Scenario Based Risk Analysis

  • 1. © 2017 HealthGuard All rights reserved Introduction to Scenario Based Risk Analysis Part 1: Foundational Concepts
  • 2. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Housekeeping ● Using Zoom / Meeting Interaction ● Webinar Recording
  • 3. © 2017 HealthGuard All rights reserved Housekeeping – Zoom Meeting viewer interaction
  • 4. © 2017 HealthGuard All rights reserved Housekeeping – Zoom Meeting viewer interaction
  • 5. © 2017 HealthGuard All rights reserved Housekeeping – Zoom Meeting viewer interaction
  • 6. © 2017 HealthGuard All rights reserved Our Speakers John Zuziak, Director of Information Security, Catholic Health Initiatives Apolonio “Apps” Garcia, Founder/President, HealthGuard
  • 7. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved What is scenario based risk analysis? Basic scenario elements Benefits of scenario based analysis
  • 8. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Audience Poll
  • 9. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved What is scenario based risk analysis?
  • 10. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Risk scenario analysis is a technique to make IT risk more concrete and tangible and to allow for proper risk analysis and assessment. It is a core approach to bring realism, insight, organisational engagement, improved analysis and structure to the complex matter of IT risk.” - ISACA
  • 11. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Scenario analysis is a process of analyzing possible future events by considering alternative possible outcomes (sometimes called "alternative worlds"). Thus, scenario analysis, which is one of the main forms of projection, does not try to show one exact picture of the future. Instead, it presents several alternative future developments. - Wikipedia
  • 12. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Basic Elements of a Risk Scenario
  • 13. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Threat
  • 14. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Threats
  • 15. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Threat Asset
  • 16. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Assets
  • 17. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Threat Asset Loss Event / Effect
  • 18. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Loss Event / Effect Confidentiality Integrity Availability Financial Loss (Open FAIR) ● Productivity ● Response ● Replacement ● Fines & Judgement ● Competitive Advantage ● Reputation Patient Safety (AHRQ Harm Scale) ● No Harm ● Mild Harm ● Moderate Harm ● Severe Harm ● Death Privacy ● Information Exposure ● Data Theft
  • 19. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Threat Asset Acts On
  • 20. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved ControlsThreat Asset
  • 21. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Loss Event ControlsThreat Asset
  • 22. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Threat Controls Primary Loss Event Threat Event Frequency Primary Loss Event Frequency & Magnitude Vulnerability Secondary Loss Event Frequency & Magnitude Secondary Loss Event
  • 23. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Benefits of Scenario Based Risk Analysis
  • 24. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Why do Scenario Based Risk Analysis? “Scenarios are a powerful tool in a risk manager’s armory—they help professionals ask the right questions and prepare for the unexpected. Scenario analysis has become a ‘new’ and best practice in enterprise risk management (ERM). - ISACA
  • 25. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Why do Scenario Based Risk Analysis? “Risk scenario analysis is a structured process that leads to better understanding of the ways multiple factors may combine to create both vulnerabilities and opportunities. It is often applied to expand perceptions prior to formulating specific business plans by focusing on factors that often get dismissed or shortchanged.” “Risk scenario analysis helps overcome organizational resistance in discussions of low-probability events or events that have not occurred in the recent past. Such risks often receive low rankings in standard risk assessments, but they can be revealed to be very challenging when introduced within risk scenarios.” - PwC
  • 26. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Scenario based risk analysis is an analysis methodology to prioritize and quantify risk and to take action. Scenario Risk Analysis summary in 3 words 1. Context 2. Context 3. Context
  • 27. © 2017 HealthGuard All rights reserved © 2017 HealthGuard All rights reserved Introduction to Scenario Based Risk Analysis - Part 2: How to Build a Scenario Wednesday, May 24th @ 1pm Register on Eventbrite