SlideShare a Scribd company logo
1 of 9
Risk Equation
Most risk equations include the
standard approach of probability
and impact. Nowadays, with the
changing threat landscape, a new
approach to the risk equation
should be looked at.
Adesh Rampat (adeshpcs@yahoo.com)
Risk Equation
Standard risk equations use probability
and impact to calculate the extent of a
particular risk, often displaying the result
in a risk matrix. However, such an
approach neglects two important aspects
from an organizational perspective:
resilience and incident response. To rectify
this I propose a new approach, as follows:
Risk = Impact x Resilience/Incident
Response
Risk Equation
This equation allows for risk to be easily understood
especially when it comes to the level of incident
response required to address an event. It also
assists in the assessment process as to the critical
areas to focus on in today’s constantly changing
threat landscape.
When an organization is hit by a cyber attack, for
example, the probable questions that are asked
include:
What is the impact?
What systems within the network has the attack
penetrated?
Is our current incident response plan effective?
Risk Equation
Let’s analyze what this equation is about:
Impact: this is the effect on the organization due to the occurrence of a risk.
Resilience: organizational resilience against threats. This must take into
consideration the following:
Ability to deal with the effects of a natural disaster – this will include the
relocation of systems and staff required to have the organization functioning
within a reasonable period of time.
Ability to withstand the effect of technology related threats such as distributed
denial of service attacks (DDOS). Resiliency in this area would range from
employing sufficient bandwidth to ‘cushion’ such an attack to recognizing a threat
through the use of monitoring systems.
Conducting periodic penetration tests (both on the external perimeter and
internal network) to understand where vulnerability exists and implementing the
necessary fixes.
Employing user awareness programs, to combat, for example, against
Ransomware and other social engineering threats.
Risk Equation
Incident response: the time it takes for an organization
to respond to an attack in the event that its systems have
been penetrated or have been hit by a natural disaster. An
organization must have a sound incident management
plan which it can use to be able to recover within the
shortest possible time.
Risk Equation
Measurements
For measuring each of the variables in the equation
(impact, resilience and incident response) a scale of 1 to
10 can be used:
0-2 Low
3-5 Medium
6-8 High
9-10 Critical
Risk Equation
Example one
The organization is reviewing its ability to withstand a DDOS attack. The questions
that can be asked are: What is the impact of this attack on the organization if
systems deemed critical are affected? Can the organization’s IT infrastructure
withstand such an attack (resiliency)? In the event that the organization’s systems
have been penetrated, how sound is the incident response?
Applying the risk equation:
Impact: High (6-8)
Resilience: Medium (3-5) the organization has determined that its perimeter
defense / defence is adequate; however, it may need to make some
improvements.
Incident response: Medium (3-5) the organization already has an incident
response plan, however it has determined that this plan requires some
modification to ensure that its business continuity mechanisms are adequate.
Taking the low ends of the scale for each of the variables, the overall risk can be
calculated as follows: 6 x 3 / 3 = 6
Therefore, the organization’s overall risk to a DDOS attack considering the three
variables is rated as HIGH.
Risk Equation
Example two
In the following example an organization is looking at its internal controls to
determine effectiveness against fraud. The questions that can be asked are: What
is the impact to the organization of an employee committing fraud? Are the
organization’s IT internal controls and procedures sound enough to prevent fraud?
In the event that the organization’s systems and procedures have been
compromised, how sound is the organization’s incident response?
Applying the risk equation:
Impact: High (6-8)
Resilience: High (6-8) the organization has completed a risk assessment on its
systems and procedures and determined that is has a number of
recommendations to implement.
Incident response: High (6-8) the organization’s incident response plan does not
cover incidents relating to fraud and requires major modification to ensure that its
business continuity mechanisms are adequate enough to deal with this incident.
Taking the low ends of the scale for each of the variables, the overall risk can be
calculated as follows: 6 x 6 / 6 = 6
The organization’s overall risk in dealing with a fraud related incident considering
the three variables is rated as HIGH.
Risk Equation
With this new approach to calculating risk, organizations
can have a much clearer view as to the risks faced when its
resilience and incident response are being tested.

More Related Content

What's hot

Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
ansula
 
AIRPORT PAVEMENT - CONSTRUCTION & REPAIR.pptx
AIRPORT PAVEMENT -  CONSTRUCTION & REPAIR.pptxAIRPORT PAVEMENT -  CONSTRUCTION & REPAIR.pptx
AIRPORT PAVEMENT - CONSTRUCTION & REPAIR.pptx
Anujyadav514462
 

What's hot (20)

Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk management
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
 
Terminal area
Terminal areaTerminal area
Terminal area
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
AIRPORT PAVEMENT - CONSTRUCTION & REPAIR.pptx
AIRPORT PAVEMENT -  CONSTRUCTION & REPAIR.pptxAIRPORT PAVEMENT -  CONSTRUCTION & REPAIR.pptx
AIRPORT PAVEMENT - CONSTRUCTION & REPAIR.pptx
 
Project appraisal for financial markets
Project appraisal for financial marketsProject appraisal for financial markets
Project appraisal for financial markets
 
Layout of Airport Planning
Layout of Airport PlanningLayout of Airport Planning
Layout of Airport Planning
 
Project risk management focus on risk identification techniques
Project risk management   focus on risk identification techniquesProject risk management   focus on risk identification techniques
Project risk management focus on risk identification techniques
 
06 Crisis & Risk management
06 Crisis & Risk management06 Crisis & Risk management
06 Crisis & Risk management
 
09-Runway Configuration ( Highway and Airport Engineering Dr. Sherif El-Badawy )
09-Runway Configuration ( Highway and Airport Engineering Dr. Sherif El-Badawy )09-Runway Configuration ( Highway and Airport Engineering Dr. Sherif El-Badawy )
09-Runway Configuration ( Highway and Airport Engineering Dr. Sherif El-Badawy )
 
Taxiway design and geometrical design of taxiway
Taxiway design and geometrical design of taxiwayTaxiway design and geometrical design of taxiway
Taxiway design and geometrical design of taxiway
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Classification of airport
Classification of airportClassification of airport
Classification of airport
 
Lect 28-traffic intersections
Lect 28-traffic intersectionsLect 28-traffic intersections
Lect 28-traffic intersections
 
Law on obligations and contracts
Law on obligations and contractsLaw on obligations and contracts
Law on obligations and contracts
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
Airport apron and holding bays
Airport apron and holding baysAirport apron and holding bays
Airport apron and holding bays
 
Qualitative risk analysis
Qualitative risk analysisQualitative risk analysis
Qualitative risk analysis
 
Presentation airport planning
Presentation airport planningPresentation airport planning
Presentation airport planning
 

Similar to Risk Equation

4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
gilbertkpeters11344
 
Introductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docxIntroductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docx
bagotjesusa
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
MatthewTennant613
 
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdfRISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
olabisiali
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
walterl4
 
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxChapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
christinemaritza
 

Similar to Risk Equation (20)

Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
 
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
CISSPills #3.04
CISSPills #3.04CISSPills #3.04
CISSPills #3.04
 
Incident Response Test
Incident Response TestIncident Response Test
Incident Response Test
 
Optimization of different objective function in risk assessment system
Optimization of different objective function in risk assessment  systemOptimization of different objective function in risk assessment  system
Optimization of different objective function in risk assessment system
 
Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approach
 
Introductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docxIntroductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docx
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
 
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdfRISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
Risk analysis in detail
Risk analysis in detailRisk analysis in detail
Risk analysis in detail
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
 
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxChapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
 
Dj24712716
Dj24712716Dj24712716
Dj24712716
 

More from Adesh Rampat (6)

Using FIRM to assess risk
Using FIRM to assess riskUsing FIRM to assess risk
Using FIRM to assess risk
 
IDEA
IDEAIDEA
IDEA
 
Fraud Diamond
Fraud DiamondFraud Diamond
Fraud Diamond
 
IDEA Logo
IDEA LogoIDEA Logo
IDEA Logo
 
Risk equation
Risk equationRisk equation
Risk equation
 
Fraud Diamond with Resilience
Fraud Diamond with ResilienceFraud Diamond with Resilience
Fraud Diamond with Resilience
 

Recently uploaded

Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 

Recently uploaded (20)

(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 

Risk Equation

  • 1. Risk Equation Most risk equations include the standard approach of probability and impact. Nowadays, with the changing threat landscape, a new approach to the risk equation should be looked at. Adesh Rampat (adeshpcs@yahoo.com)
  • 2. Risk Equation Standard risk equations use probability and impact to calculate the extent of a particular risk, often displaying the result in a risk matrix. However, such an approach neglects two important aspects from an organizational perspective: resilience and incident response. To rectify this I propose a new approach, as follows: Risk = Impact x Resilience/Incident Response
  • 3. Risk Equation This equation allows for risk to be easily understood especially when it comes to the level of incident response required to address an event. It also assists in the assessment process as to the critical areas to focus on in today’s constantly changing threat landscape. When an organization is hit by a cyber attack, for example, the probable questions that are asked include: What is the impact? What systems within the network has the attack penetrated? Is our current incident response plan effective?
  • 4. Risk Equation Let’s analyze what this equation is about: Impact: this is the effect on the organization due to the occurrence of a risk. Resilience: organizational resilience against threats. This must take into consideration the following: Ability to deal with the effects of a natural disaster – this will include the relocation of systems and staff required to have the organization functioning within a reasonable period of time. Ability to withstand the effect of technology related threats such as distributed denial of service attacks (DDOS). Resiliency in this area would range from employing sufficient bandwidth to ‘cushion’ such an attack to recognizing a threat through the use of monitoring systems. Conducting periodic penetration tests (both on the external perimeter and internal network) to understand where vulnerability exists and implementing the necessary fixes. Employing user awareness programs, to combat, for example, against Ransomware and other social engineering threats.
  • 5. Risk Equation Incident response: the time it takes for an organization to respond to an attack in the event that its systems have been penetrated or have been hit by a natural disaster. An organization must have a sound incident management plan which it can use to be able to recover within the shortest possible time.
  • 6. Risk Equation Measurements For measuring each of the variables in the equation (impact, resilience and incident response) a scale of 1 to 10 can be used: 0-2 Low 3-5 Medium 6-8 High 9-10 Critical
  • 7. Risk Equation Example one The organization is reviewing its ability to withstand a DDOS attack. The questions that can be asked are: What is the impact of this attack on the organization if systems deemed critical are affected? Can the organization’s IT infrastructure withstand such an attack (resiliency)? In the event that the organization’s systems have been penetrated, how sound is the incident response? Applying the risk equation: Impact: High (6-8) Resilience: Medium (3-5) the organization has determined that its perimeter defense / defence is adequate; however, it may need to make some improvements. Incident response: Medium (3-5) the organization already has an incident response plan, however it has determined that this plan requires some modification to ensure that its business continuity mechanisms are adequate. Taking the low ends of the scale for each of the variables, the overall risk can be calculated as follows: 6 x 3 / 3 = 6 Therefore, the organization’s overall risk to a DDOS attack considering the three variables is rated as HIGH.
  • 8. Risk Equation Example two In the following example an organization is looking at its internal controls to determine effectiveness against fraud. The questions that can be asked are: What is the impact to the organization of an employee committing fraud? Are the organization’s IT internal controls and procedures sound enough to prevent fraud? In the event that the organization’s systems and procedures have been compromised, how sound is the organization’s incident response? Applying the risk equation: Impact: High (6-8) Resilience: High (6-8) the organization has completed a risk assessment on its systems and procedures and determined that is has a number of recommendations to implement. Incident response: High (6-8) the organization’s incident response plan does not cover incidents relating to fraud and requires major modification to ensure that its business continuity mechanisms are adequate enough to deal with this incident. Taking the low ends of the scale for each of the variables, the overall risk can be calculated as follows: 6 x 6 / 6 = 6 The organization’s overall risk in dealing with a fraud related incident considering the three variables is rated as HIGH.
  • 9. Risk Equation With this new approach to calculating risk, organizations can have a much clearer view as to the risks faced when its resilience and incident response are being tested.