SlideShare a Scribd company logo
RISK MANAGEMENT:
4 ESSENTIAL
FRAMEWORKS
Developing a Risk Management
Strategy with CAP
As an information security professional, it is your role to take on the cybersecurity
challenges in your organization. That is where a solid understanding of Risk
Management comes in. Risk Management is a lot like a chess game. To succeed
you need to understand the risks ahead and be able to plot future scenarios,
to weigh up the relative impacts and then plan accordingly.
The Certified Authorization Professional (CAP) certification attests to professionals’
expertise in risk assessment and security authorization.
Learn More about (ISC)2
’s
CAP Certification and
Training Options.
2
Risk management is the process of identifying, assessing and controlling threats
to an organization’s capital and earnings. In many ways, risk management is very
similar to a chess game. Of course, the main difference is that chess is only a
game, with predefined rules, but the strategies are easily transferrable to how
risk management works.
Think of a chess board. It is a deceptively simple, predefined field of 64 squares.
In a risk management scenario, the operational field is also predefined for the
industry in which the risk register is quantified. Careful risk planning is about
anticipating risks to a specific industry, rather than flights of fancy. This is why
it is important to have a qualified professional who is well-versed in various
risk frameworks on your team.
3
What is Risk Management?
Benefits of Risk Management
The opening moves of a chess game can have a lasting impact throughout
the entire contest. The most amazing part of the game is that no pieces are
hidden from view. How could such an obvious layout of pieces, all with
set rules for their movement, have seemingly infinite outcomes? This is due
to the robustness of strategy offered through the careful orchestration
of all the pieces working together.
A robust risk management strategy has many benefits, and must also function
in a prudently managed mode. Some ways that a sound risk management
strategy can work to protect a company include:
•	 Protecting its future by considering the risks
or events before they occur
•	 Helping a company establish procedures:
	
– To avoid potential threats
	
– Minimize their impact should they occur and
	
– Cope with the results
•	 Creating a safe and secure environment for
all employees and customers
4
5
How Frameworks Help
Manage Risk
Sometimes, constraints can be crippling. A beginner in chess will often
wonder why a piece can only move a certain way. This presents often frustrating
predicaments. Yet, as one progresses and becomes more accustomed to the
movements, patterns emerge that can be liberating. What was once an empty
framework becomes an empty canvas with multiple possibilities.
A framework acts as a skeleton, and can give the total enterprise risk
management strategy a proper guideline with steps to follow.
They are used to:
•	 Assess the state of the overall security program
•	 Build a comprehensive security program
•	 Measure maturity and conduct industry comparisons
•	 Simplify communications with business leaders
There are 7 important principles in chess that can help guide your approach
to implementing a successful risk management framework.
1.	Develop all your pieces
2.	Create a favorable structure
3.	Restrict your opponent’s pieces
4.	Neutralize your opponent’s plan
5.	Accumulate small advantages
6.	Convert temporary advantages into
permanent ones
7.	Don’t take unnecessary chances
Start by choosing the most appropriate
frameworks for your organization
and build resilience over time using these
same principles.
The Most Important Principles
6
7
The National Institute of Standards and Technology (NIST) Risk Management
Framework (RMF) provides a flexible, holistic and repeatable 7-step process
to manage security and privacy risk:
1.	Prepare for risk management through essential activities critical to
design and implementation of a risk management program
2.	Categorize Information Systems
3.	Select Security Controls
4.	Implement Security Controls
5.	Assess Security Controls
6.	Authorize Information Systems
7.	Continuously Monitor Security Controls
NIST Risk Management Framework
The Legendary Move
NIST
RMF
RISK MANAGEMENT FRAMEWORK
nist.gov/rmf
CATEGORIZE
S
E
L
E
C
T
I
M
P
L
E
M
E
N
T
A
S
S
E
S
S
A
U
T
H
O
R
I
Z
E
M
O
N
I
T
O
R
P
REPARE
8
ISO 27001 “Information technology — Security techniques —
Information security management systems — Requirements” is a
framework that helps organizations “establish, implement, operate,
monitor, review, maintain and continually improve an ISMS”
.
The basic goal of ISO 27001 is to protect the confidentiality,
integrity and availability of information.
There are 5 steps for an effective
ISO 27001 risk assessment:
1.	Establish a risk management framework
2.	Identify risks
3.	Analyze risks
4.	Evaluate risks
5.	Select risk treatment options
ISO 27001
The Thunderbolt Gambit
ISO 27001
MANAGEMENT
SYSTEM CLAUSES
Scope, normative references
and terms and definitions.
Internal and external issues that
may be relevant to the business
and to the achievement of the
objectives of the ISMS. Includes
confirming interested parties
and scope.
How top management will
support the ISMS by creating
roles and measures to
implement and monitor it.
Includes developing an
information security policy
aligned to business objectives.
How the organization
creates actions to address risks.
Includes setting information
security objectives.
Securing the right resources,
the right people and the right
infrastructure to manage and
maintain the ISMS.
How the plans and processes
will be executed, including
documentation that needs
to be produced.
How the organization will
monitor, measure, analyze
and evaluate the ISMS.
Corrective action and
continual improvement
requirements.
1 2 3
4
5
6
7
8
9
10
CONTEXT
CONTEXT
4 4
7
SUPPO
RT
LEADERSHIP
5
ASSESS RISKS
ASSESS RISKS
6
&
8
6
&
8
6
PLANNING
1
0
I
M
P
R
O
V
E
8
O
P
E
R
A
T
I
O
N
9
PERFORMANCE
EVALUATION
9
ISO 31000 is an international standard for risk management that provides a set of
principles, a risk management framework and a risk management process, which
helps organizations take a proactive approach to risks they face.
The ISO 31000 standard has 8 principles:
1.	Integrated into all business operations
and activities
2.	Structured and comprehensive
3.	Tailored to the organization’s goals
and business environment
4.	Inclusive and involving all responsible
stakeholders
5.	Robust and dynamic, adapting to
the evolving risk landscape
6.	Limitations of available information
should be considered
7.	Human and cultural factors should
be considered
8.	The risk management framework is
continuously improved through lessons
learnt, feedback, and experience
ISO 31000
The Stunner Switch
VALUE CREATION
AND
PROTECTION
C
O
N
T
I
N
U
A
L
I
M
P
R
O
V
E
M
E
N
T
HUMAN
AND CULTURAL
FACTORS
BEST
AVAILABLE
INFORMATION
I
N
T
E
G
R
A
T
E
D
STRUCTURED
AND
COMPREHENSIVE
CUSTOMIZED
I
N
C
L
U
S
I
V
E
D
Y
N
A
M
I
C
10
COBIT is an IT management framework developed by ISACA to
help businesses develop, organize and implement strategies
around information management and governance.
The framework includes 40 objectives and focuses
specifically on:
•	 Security
•	 Risk Management
•	 Information Governance
Control Objectives for
Information Technologies (COBIT)
The King’s Counter
1. WHAT ARE THE DRIVERS?
2
.
W
H
E
R
E
A
R
E
W
E
N
O
W
?
6
.
D
I
D
W
E
G
E
T
T
H
E
R
E
?
THE
M
OMENTUM GOING?
7. HOW
DO WE KEEP
INITIATE PROGRAM
R
E
A
L
I
Z
E
B
E
N
E
F
I
T
S
EFFECTIVENESS
O
P
P
O
R
T
U
N
I
T
I
E
S
REVIEW
D
E
F
I
N
E
P
R
O
B
L
E
M
S
A
N
D
I
M
P
L
E
M
E
N
T
A
T
I
O
N
SUSTAIN
F
O
R
M
T
E
A
M
ESTABLISH DESIRE
E
M
B
E
D
N
E
W
TO CHANGE
A
P
P
R
O
A
C
H
E
S
R
E
C
O
G
N
I
Z
E
N
E
E
D
T
O
A
C
T
ASSESS
CURRENT STATE
BUILD
IMPROVEMENTS
DEFIN
E
TARGET
STATE
IM
PLEM
ENT
IM
PRO
VEM
ENTS
OPERATE AND
MEASURE
M
O
N
I
T
O
R
A
N
D
E
V
A
L
U
A
T
E
5
.
H
O
W
D
O
W
E
G
E
T
THERE?
4. WHAT NEEDS TO BE DONE?
3. W
HERE
D
O
W
E
W
A
N
T
T
O
B
E
?
E
X
E
C
U
T
E
P
LAN
PLAN PROGRAM
DEFIN
E
R
O
A
D
M
A
P
O
P
E
R
A
T
E
A
N
D
USE
IDENTIFY ROLE
CO
M
M
U
N
I
C
A
T
E
PLAYERS
O
U
T
C
O
M
E
•PROGRAM
MANAGEMENT
(outer ring)
•CHANGE
ENABLEMENT
(middle ring)
•CONTINUAL
IMPROVEMENT
LIFE CYCLE
(inner ring)
The Amazing Endgame
Chess is not an easy game to master. However, the correct understanding of the
nuances can make all the difference in one’s enjoyment of such a challenging
endeavour. Similarly, a solid risk management approach is based on many of the
same principles that make any disciplined undertaking valuable. The difference
is that, with risk management, the stakes are higher, as the protection of the
organization is the goal.
Understanding, selecting and applying the right
framework falls within the responsibilities of a CAP.
CAP professionals possess the knowledge to:
•	 Understand the foundations
•	 Define the scope
•	 Select and approve security and privacy controls
•	 Implement the selected security and privacy controls
•	 Assess the applicability and effectiveness of established
security and privacy controls
•	 Authorize an Information System.
•	 Establish continuous monitoring to adapt to the
changing risk environment
The Role of a Certified
Authorization Professional (CAP)
11
12
The CAP certification shows employers you have the advanced technical
skills and knowledge to understand Governance, Risk and Compliance (GRC)
and can authorize and maintain information systems utilizing various risk
management frameworks, as well as best practices, policies and procedures.
The CAP is ideal for IT, information security and information assurance
practitioners who work in GRC roles and have a need to understand,
apply and/or implement a risk management program for IT systems
within an organization.
Work in government? See how the CAP meets the
U.S. Department of Defense (DoD) Directive 8570.1.
Explore our (ISC)2
Official CAP training options:
online instructor-led, or self-study tools.
Learn More about CAP:
Cybersecurity’s Specialized Risk Management
Security Certification
13
Want More Insights?
Read Our Latest CAP Resources:
Your Guide to Mitigating Evolving Risk
Get the Guide
Advance Your Information Security Career Strategy
Read the eBook
For more guidance, contact your local office:
Looking to train
your team?
Get Team Consult
Americas
+1.866.331.4722 ext. 2
training@isc2.org
EMEA
+44-203-960-7800
info-emea@isc2.org
Asia-Pacific
+852-2850 6951
isc2asia@isc2.org

More Related Content

What's hot

NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
Brian Matteson, CISSP CISA
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides
SlideTeam
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
healthpoint
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
Chaitanya Bhatt
 
Risk management
Risk managementRisk management
Risk management
Babasab Patil
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
Smart Assessment
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
Dragos, Inc.
 
Risk Assessment Step Powerpoint Presentation Slides
Risk Assessment Step Powerpoint Presentation SlidesRisk Assessment Step Powerpoint Presentation Slides
Risk Assessment Step Powerpoint Presentation Slides
SlideTeam
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
SlideTeam
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation Slides
SlideTeam
 
Risk Management Overview Powerpoint Presentation Slides
Risk Management Overview Powerpoint Presentation SlidesRisk Management Overview Powerpoint Presentation Slides
Risk Management Overview Powerpoint Presentation Slides
SlideTeam
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
Sounil Yu
 
How to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkHow to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management Framework
Colleen Beck-Domanico
 
Risk Mitigation
Risk MitigationRisk Mitigation
Risk Mitigation
primeteacher32
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Risk management presentation
Risk management presentationRisk management presentation
Risk management presentation
abpeters82
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
SlideTeam
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
Priyanka Aash
 

What's hot (20)

NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
Risk management
Risk managementRisk management
Risk management
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
Risk Assessment Step Powerpoint Presentation Slides
Risk Assessment Step Powerpoint Presentation SlidesRisk Assessment Step Powerpoint Presentation Slides
Risk Assessment Step Powerpoint Presentation Slides
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation Slides
 
Risk Management Overview Powerpoint Presentation Slides
Risk Management Overview Powerpoint Presentation SlidesRisk Management Overview Powerpoint Presentation Slides
Risk Management Overview Powerpoint Presentation Slides
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
How to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkHow to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management Framework
 
Risk Mitigation
Risk MitigationRisk Mitigation
Risk Mitigation
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Risk management presentation
Risk management presentationRisk management presentation
Risk management presentation
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 

Similar to RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS

Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
infosec train
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
PlatformSecurityManagement
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Strategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptxStrategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptx
elizabethrdusek
 
Strategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdfStrategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdf
elizabethrdusek
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Discussion1Explaining the results of Efficient Frontier Analysis.docx
Discussion1Explaining the results of Efficient Frontier Analysis.docxDiscussion1Explaining the results of Efficient Frontier Analysis.docx
Discussion1Explaining the results of Efficient Frontier Analysis.docx
madlynplamondon
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
IJNSA Journal
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
IJNSA Journal
 
Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit
Aurelien Domont, MBA
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
savassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
Sanjay Chadha, CPA, CA
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
Naushad Rajani. - CISA, CISSP, CCSP, PMP, DCPP (Privacy)
 
Risk Management Toolkit
Risk Management ToolkitRisk Management Toolkit
Risk Management Toolkit
PeterFranz6
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
DaneWarren
 
Risk Mgmt - Define_And_Articulate
Risk Mgmt - Define_And_ArticulateRisk Mgmt - Define_And_Articulate
Risk Mgmt - Define_And_ArticulateAnthony Chiusano
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
Suresh Kanniappan
 

Similar to RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS (20)

Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
PB CV v0.4
PB CV v0.4PB CV v0.4
PB CV v0.4
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Strategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptxStrategic Risk Management - Keys to a Safer Future.pptx
Strategic Risk Management - Keys to a Safer Future.pptx
 
Strategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdfStrategic Risk Management - Keys to a Safer Future.pdf
Strategic Risk Management - Keys to a Safer Future.pdf
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Discussion1Explaining the results of Efficient Frontier Analysis.docx
Discussion1Explaining the results of Efficient Frontier Analysis.docxDiscussion1Explaining the results of Efficient Frontier Analysis.docx
Discussion1Explaining the results of Efficient Frontier Analysis.docx
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Risk Management Toolkit
Risk Management ToolkitRisk Management Toolkit
Risk Management Toolkit
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Risk Mgmt - Define_And_Articulate
Risk Mgmt - Define_And_ArticulateRisk Mgmt - Define_And_Articulate
Risk Mgmt - Define_And_Articulate
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 

Recently uploaded

Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
uptheratios
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 

Recently uploaded (20)

Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 

RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS

  • 2. Developing a Risk Management Strategy with CAP As an information security professional, it is your role to take on the cybersecurity challenges in your organization. That is where a solid understanding of Risk Management comes in. Risk Management is a lot like a chess game. To succeed you need to understand the risks ahead and be able to plot future scenarios, to weigh up the relative impacts and then plan accordingly. The Certified Authorization Professional (CAP) certification attests to professionals’ expertise in risk assessment and security authorization. Learn More about (ISC)2 ’s CAP Certification and Training Options. 2
  • 3. Risk management is the process of identifying, assessing and controlling threats to an organization’s capital and earnings. In many ways, risk management is very similar to a chess game. Of course, the main difference is that chess is only a game, with predefined rules, but the strategies are easily transferrable to how risk management works. Think of a chess board. It is a deceptively simple, predefined field of 64 squares. In a risk management scenario, the operational field is also predefined for the industry in which the risk register is quantified. Careful risk planning is about anticipating risks to a specific industry, rather than flights of fancy. This is why it is important to have a qualified professional who is well-versed in various risk frameworks on your team. 3 What is Risk Management?
  • 4. Benefits of Risk Management The opening moves of a chess game can have a lasting impact throughout the entire contest. The most amazing part of the game is that no pieces are hidden from view. How could such an obvious layout of pieces, all with set rules for their movement, have seemingly infinite outcomes? This is due to the robustness of strategy offered through the careful orchestration of all the pieces working together. A robust risk management strategy has many benefits, and must also function in a prudently managed mode. Some ways that a sound risk management strategy can work to protect a company include: • Protecting its future by considering the risks or events before they occur • Helping a company establish procedures: – To avoid potential threats – Minimize their impact should they occur and – Cope with the results • Creating a safe and secure environment for all employees and customers 4
  • 5. 5 How Frameworks Help Manage Risk Sometimes, constraints can be crippling. A beginner in chess will often wonder why a piece can only move a certain way. This presents often frustrating predicaments. Yet, as one progresses and becomes more accustomed to the movements, patterns emerge that can be liberating. What was once an empty framework becomes an empty canvas with multiple possibilities. A framework acts as a skeleton, and can give the total enterprise risk management strategy a proper guideline with steps to follow. They are used to: • Assess the state of the overall security program • Build a comprehensive security program • Measure maturity and conduct industry comparisons • Simplify communications with business leaders
  • 6. There are 7 important principles in chess that can help guide your approach to implementing a successful risk management framework. 1. Develop all your pieces 2. Create a favorable structure 3. Restrict your opponent’s pieces 4. Neutralize your opponent’s plan 5. Accumulate small advantages 6. Convert temporary advantages into permanent ones 7. Don’t take unnecessary chances Start by choosing the most appropriate frameworks for your organization and build resilience over time using these same principles. The Most Important Principles 6
  • 7. 7 The National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) provides a flexible, holistic and repeatable 7-step process to manage security and privacy risk: 1. Prepare for risk management through essential activities critical to design and implementation of a risk management program 2. Categorize Information Systems 3. Select Security Controls 4. Implement Security Controls 5. Assess Security Controls 6. Authorize Information Systems 7. Continuously Monitor Security Controls NIST Risk Management Framework The Legendary Move NIST RMF RISK MANAGEMENT FRAMEWORK nist.gov/rmf CATEGORIZE S E L E C T I M P L E M E N T A S S E S S A U T H O R I Z E M O N I T O R P REPARE
  • 8. 8 ISO 27001 “Information technology — Security techniques — Information security management systems — Requirements” is a framework that helps organizations “establish, implement, operate, monitor, review, maintain and continually improve an ISMS” . The basic goal of ISO 27001 is to protect the confidentiality, integrity and availability of information. There are 5 steps for an effective ISO 27001 risk assessment: 1. Establish a risk management framework 2. Identify risks 3. Analyze risks 4. Evaluate risks 5. Select risk treatment options ISO 27001 The Thunderbolt Gambit ISO 27001 MANAGEMENT SYSTEM CLAUSES Scope, normative references and terms and definitions. Internal and external issues that may be relevant to the business and to the achievement of the objectives of the ISMS. Includes confirming interested parties and scope. How top management will support the ISMS by creating roles and measures to implement and monitor it. Includes developing an information security policy aligned to business objectives. How the organization creates actions to address risks. Includes setting information security objectives. Securing the right resources, the right people and the right infrastructure to manage and maintain the ISMS. How the plans and processes will be executed, including documentation that needs to be produced. How the organization will monitor, measure, analyze and evaluate the ISMS. Corrective action and continual improvement requirements. 1 2 3 4 5 6 7 8 9 10 CONTEXT CONTEXT 4 4 7 SUPPO RT LEADERSHIP 5 ASSESS RISKS ASSESS RISKS 6 & 8 6 & 8 6 PLANNING 1 0 I M P R O V E 8 O P E R A T I O N 9 PERFORMANCE EVALUATION
  • 9. 9 ISO 31000 is an international standard for risk management that provides a set of principles, a risk management framework and a risk management process, which helps organizations take a proactive approach to risks they face. The ISO 31000 standard has 8 principles: 1. Integrated into all business operations and activities 2. Structured and comprehensive 3. Tailored to the organization’s goals and business environment 4. Inclusive and involving all responsible stakeholders 5. Robust and dynamic, adapting to the evolving risk landscape 6. Limitations of available information should be considered 7. Human and cultural factors should be considered 8. The risk management framework is continuously improved through lessons learnt, feedback, and experience ISO 31000 The Stunner Switch VALUE CREATION AND PROTECTION C O N T I N U A L I M P R O V E M E N T HUMAN AND CULTURAL FACTORS BEST AVAILABLE INFORMATION I N T E G R A T E D STRUCTURED AND COMPREHENSIVE CUSTOMIZED I N C L U S I V E D Y N A M I C
  • 10. 10 COBIT is an IT management framework developed by ISACA to help businesses develop, organize and implement strategies around information management and governance. The framework includes 40 objectives and focuses specifically on: • Security • Risk Management • Information Governance Control Objectives for Information Technologies (COBIT) The King’s Counter 1. WHAT ARE THE DRIVERS? 2 . W H E R E A R E W E N O W ? 6 . D I D W E G E T T H E R E ? THE M OMENTUM GOING? 7. HOW DO WE KEEP INITIATE PROGRAM R E A L I Z E B E N E F I T S EFFECTIVENESS O P P O R T U N I T I E S REVIEW D E F I N E P R O B L E M S A N D I M P L E M E N T A T I O N SUSTAIN F O R M T E A M ESTABLISH DESIRE E M B E D N E W TO CHANGE A P P R O A C H E S R E C O G N I Z E N E E D T O A C T ASSESS CURRENT STATE BUILD IMPROVEMENTS DEFIN E TARGET STATE IM PLEM ENT IM PRO VEM ENTS OPERATE AND MEASURE M O N I T O R A N D E V A L U A T E 5 . H O W D O W E G E T THERE? 4. WHAT NEEDS TO BE DONE? 3. W HERE D O W E W A N T T O B E ? E X E C U T E P LAN PLAN PROGRAM DEFIN E R O A D M A P O P E R A T E A N D USE IDENTIFY ROLE CO M M U N I C A T E PLAYERS O U T C O M E •PROGRAM MANAGEMENT (outer ring) •CHANGE ENABLEMENT (middle ring) •CONTINUAL IMPROVEMENT LIFE CYCLE (inner ring)
  • 11. The Amazing Endgame Chess is not an easy game to master. However, the correct understanding of the nuances can make all the difference in one’s enjoyment of such a challenging endeavour. Similarly, a solid risk management approach is based on many of the same principles that make any disciplined undertaking valuable. The difference is that, with risk management, the stakes are higher, as the protection of the organization is the goal. Understanding, selecting and applying the right framework falls within the responsibilities of a CAP. CAP professionals possess the knowledge to: • Understand the foundations • Define the scope • Select and approve security and privacy controls • Implement the selected security and privacy controls • Assess the applicability and effectiveness of established security and privacy controls • Authorize an Information System. • Establish continuous monitoring to adapt to the changing risk environment The Role of a Certified Authorization Professional (CAP) 11
  • 12. 12 The CAP certification shows employers you have the advanced technical skills and knowledge to understand Governance, Risk and Compliance (GRC) and can authorize and maintain information systems utilizing various risk management frameworks, as well as best practices, policies and procedures. The CAP is ideal for IT, information security and information assurance practitioners who work in GRC roles and have a need to understand, apply and/or implement a risk management program for IT systems within an organization. Work in government? See how the CAP meets the U.S. Department of Defense (DoD) Directive 8570.1. Explore our (ISC)2 Official CAP training options: online instructor-led, or self-study tools. Learn More about CAP: Cybersecurity’s Specialized Risk Management Security Certification
  • 13. 13 Want More Insights? Read Our Latest CAP Resources: Your Guide to Mitigating Evolving Risk Get the Guide Advance Your Information Security Career Strategy Read the eBook For more guidance, contact your local office: Looking to train your team? Get Team Consult Americas +1.866.331.4722 ext. 2 training@isc2.org EMEA +44-203-960-7800 info-emea@isc2.org Asia-Pacific +852-2850 6951 isc2asia@isc2.org