IT	
  Risk	
  Management	
  
Digicomp	
  Hacking	
  Day,	
  11.06.2014	
  
Umberto	
  Annino	
  
•  Wer	
  spricht?	
  
Umberto	
  Annino	
  
WirtschaCsinformaEker,	
  InformaEon	
  Security	
  
•  Was	
  ist	
  ein	
  Risiko?	
  
!	
  Sicherheit	
  ist	
  das	
  Komplementärereignis	
  
zum	
  Risiko	
  
!	
  Risiko	
  ist	
  Schaden	
  mit	
  Potenzial	
  
2	
  
Risiko	
  
3	
  
Gefahr	
  
Bedrohung	
  
Schwach-­‐
stelle	
  
Asset	
  
Risiko	
  
Realitätsabgleich	
  
Compliance?	
  
Risk	
  Management?	
  
OperaEonal	
  Risk,	
  Business	
  ConEnuity?	
  
IT,	
  InformaEon	
  Security	
  –	
  Cyber	
  Security?	
  
Red	
  Team,	
  Threat	
  Modeling,	
  APT	
  and	
  openSSL?	
  
Big	
  Data???	
  
	
  
Security	
  ™	
  vs.	
  Compliance	
  ™	
  
4	
  
IT	
  Risiko	
  in	
  der	
  Risiko-­‐Hierarchie	
  
5	
  
COSO	
  
Enterprise	
  Risk	
  Management	
  Framework	
  
6	
  
ISO	
  31000	
  Risk	
  Mgmt	
  (2009)	
  
Guidelines	
  and	
  Principles	
  and	
  Framework	
  
7	
  
ISO	
  31000	
  Framework	
  
8	
  
ISO	
  31000	
  
Processes	
  
9	
  
ISO	
  31000	
  -­‐	
  Processes	
  
10	
  
Design	
  of	
  
framework	
  for	
  
managing	
  risk	
  
Understanding	
  of	
  the	
  organisaEon	
  and	
  its	
  context	
  
Establishing	
  risk	
  management	
  policy	
  
Accountability	
  
IntegraEon	
  into	
  organisaEonal	
  processes	
  
Resources	
  
Establishing	
  internal	
  communicaEon	
  and	
  reporEng	
  mechanisms	
  
Establishing	
  external	
  communicaEon	
  and	
  reporEng	
  mechanisms	
  
ImplemenEng	
  
risk	
  
management	
  
ImplemenEng	
  the	
  framework	
  for	
  managing	
  risk	
  
ImplemenEng	
  the	
  risk	
  management	
  process	
  
Monitoring	
  and	
  review	
  of	
  the	
  framework	
  
ConEnual	
  improvement	
  of	
  the	
  framework	
  
!	
  Mandate	
  and	
  commitment	
  
ISO	
  31000	
  -­‐	
  Processes	
  
11	
  
Risk	
  
Management	
  
Process	
  
CommunicaEon	
  and	
  consultaEon	
  
Establishing	
  the	
  external	
  context	
  
Establishing	
  the	
  internal	
  context	
  
Establishing	
  the	
  context	
  of	
  the	
  risk	
  
management	
  process	
  
Defining	
  risk	
  criteria	
  
Risk	
  assessment	
  
Risk	
  idenEficaEon	
  
Risk	
  analysis	
  
Risk	
  evaluaEon	
  
Risk	
  treatment	
  
Monitoring	
  and	
  review	
  
Recording	
  the	
  risk	
  management	
  
process	
  
ISO	
  31000	
  
Acributes	
  of	
  enhanced	
  risk	
  management	
  
•  Key	
  outcomes	
  
–  The	
  organisaEon	
  has	
  a	
  current,	
  correct	
  and	
  
comprehensive	
  understanding	
  of	
  its	
  risks	
  
–  The	
  organisaEon‘s	
  risks	
  are	
  within	
  its	
  risk	
  criteria	
  
•  Acributes	
  
–  ConEnual	
  improvement	
  
–  Full	
  accountability	
  for	
  risks	
  
–  ApplicaEon	
  of	
  risk	
  management	
  in	
  all	
  decision	
  making	
  
–  ConEnual	
  communicaEons	
  
–  Full	
  integraEon	
  in	
  the	
  organisaEon‘s	
  governance	
  
structure	
  
12	
  
ISO	
  27005	
  
InformaEon	
  Security	
  Risk	
  Management	
  
13	
  
ISO	
  27005	
  
Context	
  Establishment	
  
14	
  
Basic	
  
Criteria	
  
Risk	
  management	
  approach	
  
Risk	
  evaluaEon	
  criteria	
  
Impact	
  criteria	
  
Risk	
  acceptance	
  criteria	
  
! Scope	
  and	
  Boundaries	
  
! OrganisaEon	
  for	
  informaEon	
  security	
  risk	
  management	
  
ISO	
  27005	
  
InformaEon	
  security	
  risk	
  assessment	
  
15	
  
Risk	
  
idenEficaEon	
  
IdenEficaEon	
  of	
  assets	
  
IdenEficaEon	
  of	
  threats	
  
IdenEficaEon	
  of	
  exisEng	
  controls	
  
IdenEficaEon	
  of	
  vulnerabiliEes	
  
IdenEficaEon	
  of	
  consequences	
  
Risk	
  analysis	
   Risk	
  analysis	
  methodologies	
  
Assessment	
  of	
  consequences	
  
Assessment	
  of	
  incident	
  likelihood	
  
Level	
  of	
  risk	
  determinaEon	
  
ITGI	
  RiskIT	
  Framework	
  
PosiEonierung	
  
16	
  
IT	
  Risk	
  (high	
  level)	
  categories	
  
17	
  
RiskIT	
  Framework	
  
18	
  
Risk	
  maps...	
  
•  Risk	
  
appeEte	
  
•  Risk	
  
tolerance	
  
•  Risk	
  
culture	
  
19	
  
Risk	
  culture	
  
20	
  
IT	
  risk	
  scenario	
  development	
  
21	
  
Risk	
  scenario	
  components	
  
22	
  
Aber:	
  scenario	
  based...	
  
!	
  keeping	
  it	
  real!	
  
23	
  
IT	
  Risk	
  Response	
  
opEons	
  and	
  
prioriEsaEon	
  
24	
  
Verwalten	
  von	
  IT	
  Risiken	
  
Risiko	
  
management	
  
Risiko	
  
analyse	
  
Risiko	
  
idenEfikaEon	
  
Konsolidierung	
  
Link	
  to	
  
business	
  
Risiko	
  
bewertung	
  
QuanEtaEv	
  
QualiEaEv	
  
StaEsEsche	
  
Basis	
  
Risiko	
  
lenkung	
  
Risiko	
  
bearbeitung	
  
Admin	
  
Disziplin/
Aufwand	
  
Kosten	
  
ROI	
  
Risiko	
  
tracking	
  
Nachvollzieh-­‐	
  
barkeit	
  
Konstanz	
  
(Zahlen)	
   25	
  
QuanEfizieren	
  von	
  IT	
  Risiken	
  
26	
  
Big	
  Data?	
  Loss	
  DB?	
  
Komplexität	
  von	
  InformaEonssystemen	
  (und	
  SoCware)?	
  
QuanEfizieren	
  von	
  IT	
  Risiken	
  
•  In	
  der	
  Praxis	
  eher	
  qualitaEv	
  stac	
  quanEtaEv	
  
–  Fehlende	
  staEsEsche	
  Basis	
  
–  Prinzipiell	
  komplexe	
  Systeme	
  
–  Wenig	
  akuter	
  Bedarf	
  zur	
  QuanEfizierung	
  !	
  über	
  
Verknüpfung	
  mit	
  Business	
  Process	
  
•  Konsolidierung	
  der	
  Werte	
  für	
  Management	
  
ReporEng	
  als	
  Grundlage	
  für	
  QuanEfikaEon	
  
•  In	
  der	
  Praxis	
  eher	
  „erste	
  Schrice“	
  stac	
  best	
  
pracEse	
  
•  ISO	
  27005,	
  ITGI	
  RiskIT	
  Framework	
  und	
  
PracEcEoner	
  Guide	
  bieten	
  brauchbare	
  
Grundlagen	
  (Framework)	
  
27	
  
Risk	
  Treatment	
  
28	
  
Risk	
  
treatment	
  
Avoid	
  
Eliminate	
  
Reduce	
  
Minimize
	
  	
  
Transfer	
  
Externalize	
  
Accept	
  
Residual	
  Risk	
  
Controls	
  
Measures	
  
Avoid	
  /	
  
Verhindern	
  
Detect	
  /	
  
Entdecken	
  
Minimize	
  /	
  
Eindämmen	
  
Risk	
  Treatment	
  –	
  ISO	
  27005	
  
29	
  
Konsolidieren	
  von	
  IT	
  Risiken	
  
Disjointed	
  risks	
  
30	
  
Konsolidieren	
  von	
  IT	
  Risiken	
  
shared	
  risks	
  
31	
  
32	
  

More Related Content

PPTX
IT Risk Management
PDF
ISO 27005 Risk Assessment
PPTX
NIST 800 30 revision Sep 2012
PPTX
Mastering Information Technology Risk Management
PPTX
Iso27001 Risk Assessment Approach
PPT
Information Serurity Risk Assessment Basics
PPTX
Information systems risk assessment frame workisraf 130215042410-phpapp01
PPTX
Risk Management and Remediation
IT Risk Management
ISO 27005 Risk Assessment
NIST 800 30 revision Sep 2012
Mastering Information Technology Risk Management
Iso27001 Risk Assessment Approach
Information Serurity Risk Assessment Basics
Information systems risk assessment frame workisraf 130215042410-phpapp01
Risk Management and Remediation

What's hot (19)

PDF
Vendor Cybersecurity Governance: Scaling the risk
PPT
Risk Based Security and Self Protection Powerpoint
PPT
Review of Enterprise Security Risk Management
PPTX
Risk management ISO 27001 Standard
PPT
Risk Management 101
PPT
Security Maturity Assessment
PDF
Risk Assessments
PDF
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
PPSX
Risk Management Remediation Overview
PDF
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
PDF
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
PPTX
Microsoft Risk Management
PPTX
Risk Management Methodology - Copy
PPT
Social Enterprise Learning Toolkit (Risk Management Module)
PPTX
Information Security Cost Effective Managed Services
PDF
IIA Facilitated Risk Workshop
PPTX
Information Security Risk Management
PPTX
Cse it seminar ppt1, An Approach To IT Project Management
PPTX
Risk management in Software Industry
Vendor Cybersecurity Governance: Scaling the risk
Risk Based Security and Self Protection Powerpoint
Review of Enterprise Security Risk Management
Risk management ISO 27001 Standard
Risk Management 101
Security Maturity Assessment
Risk Assessments
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Risk Management Remediation Overview
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Microsoft Risk Management
Risk Management Methodology - Copy
Social Enterprise Learning Toolkit (Risk Management Module)
Information Security Cost Effective Managed Services
IIA Facilitated Risk Workshop
Information Security Risk Management
Cse it seminar ppt1, An Approach To IT Project Management
Risk management in Software Industry
Ad

Viewers also liked (19)

PPTX
Hacking Homework - AR triggered by GPS locations, tactile objects or print
PPTX
QR codes and their application in libraries
PPSX
A quick response to promoting library services - How you can use QR Codes
PPTX
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
PPT
QR CODES IN AN ACADEMIC SETTING
PPTX
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
PDF
IT Governance
PPTX
The Books "AR" Alive-Augmented Reality in Books
PDF
Sejarah Lisan Tajuk 1
PPTX
PDF
Sejarah Lisan Tajuk 2
PPT
3.5 ICT Policies
PDF
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
PPT
Pengurusan risiko projek
PPT
3.4 ict strategy
PPTX
How Augmented Reality can Boost Print Book Sales!
PPT
Modul 1 pengurusan projek
PDF
Kooperative VR - Collaborative Virtual Engineering: VDC-Whitepaper
PPTX
The new ISO 9001:2015
Hacking Homework - AR triggered by GPS locations, tactile objects or print
QR codes and their application in libraries
A quick response to promoting library services - How you can use QR Codes
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
QR CODES IN AN ACADEMIC SETTING
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
IT Governance
The Books "AR" Alive-Augmented Reality in Books
Sejarah Lisan Tajuk 1
Sejarah Lisan Tajuk 2
3.5 ICT Policies
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
Pengurusan risiko projek
3.4 ict strategy
How Augmented Reality can Boost Print Book Sales!
Modul 1 pengurusan projek
Kooperative VR - Collaborative Virtual Engineering: VDC-Whitepaper
The new ISO 9001:2015
Ad

Similar to IT-Risk-Management Best Practice (20)

PPTX
Risk Assessment
PPTX
Risk - IT Services
PPT
Risk Management Training 2013
PDF
Information Risk Management - Cyber Risk Management - IT Risks
PDF
Visió holística de la gestio de riscos de les TIC
DOCX
INFORMATION SECURITY MANAGEMENT
 
PPTX
Step by-step for risk analysis and management-yaser aljohani
PPTX
Step by-step for risk analysis and management-yaser aljohani
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
PDF
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
PDF
CRISC Domains Mind Map InfosecTrain .pdf
PDF
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞.pdf
PDF
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
PDF
𝐌𝐚𝐬𝐭𝐞𝐫𝐢𝐧𝐠 𝐂𝐑𝐈𝐒𝐂 𝐃𝐨𝐦𝐚𝐢𝐧𝐬: 𝐄𝐥𝐞𝐯𝐚𝐭𝐞 𝐘𝐨𝐮𝐫 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭 𝐆𝐚𝐦𝐞!
PDF
Management of Risk and its integration within ITIL
PPTX
Info sec 2011 julen c mohanty
PPTX
Info sec 2011 julen c mohanty
PPTX
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
PPTX
Risk managemet made easy
PDF
Risk management automation
Risk Assessment
Risk - IT Services
Risk Management Training 2013
Information Risk Management - Cyber Risk Management - IT Risks
Visió holística de la gestio de riscos de les TIC
INFORMATION SECURITY MANAGEMENT
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
CRISC Domains Mind Map InfosecTrain .pdf
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞.pdf
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
𝐌𝐚𝐬𝐭𝐞𝐫𝐢𝐧𝐠 𝐂𝐑𝐈𝐒𝐂 𝐃𝐨𝐦𝐚𝐢𝐧𝐬: 𝐄𝐥𝐞𝐯𝐚𝐭𝐞 𝐘𝐨𝐮𝐫 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭 𝐆𝐚𝐦𝐞!
Management of Risk and its integration within ITIL
Info sec 2011 julen c mohanty
Info sec 2011 julen c mohanty
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
Risk managemet made easy
Risk management automation

More from Digicomp Academy AG (20)

PDF
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
PDF
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
PPTX
Innovation durch kollaboration gennex 2018
PDF
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
PDF
Roger basler meetup_21082018_work-smarter-not-harder_handout
PDF
Xing expertendialog zu nudge unit x
PDF
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
PDF
IPv6 Security Talk mit Joe Klein
PDF
Agiles Management - Wie geht das?
PPTX
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
PDF
Querdenken mit Kreativitätsmethoden – XING Expertendialog
PDF
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
PDF
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
PDF
UX – Schlüssel zum Erfolg im Digital Business
PDF
Minenfeld IPv6
PDF
Was ist design thinking
PDF
Die IPv6 Journey der ETH Zürich
PDF
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
PDF
General data protection regulation-slides
PDF
Möglichkeiten der Online-Werbung - Referat von Matteo Schürch
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Innovation durch kollaboration gennex 2018
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
Xing expertendialog zu nudge unit x
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
IPv6 Security Talk mit Joe Klein
Agiles Management - Wie geht das?
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
UX – Schlüssel zum Erfolg im Digital Business
Minenfeld IPv6
Was ist design thinking
Die IPv6 Journey der ETH Zürich
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
General data protection regulation-slides
Möglichkeiten der Online-Werbung - Referat von Matteo Schürch

Recently uploaded (20)

PDF
the role of manager in strategic alliances
PPTX
Chapter 2 strategic Presentation (6).pptx
PDF
Handouts for Housekeeping.pdfbababvsvvNnnh
PPTX
UNIT 3 INTERNATIONAL BUSINESS [Autosaved].pptx
PPTX
IMM.pptx marketing communication givguhfh thfyu
PDF
Chembond Chemicals Limited Presentation 2025
PDF
Clouds that Assimilate the Build Parts I&II .pdf
PDF
Comments on Clouds that Assimilate Parts I&II.pdf
PDF
dataZense for Data Analytics unleashed features
PPTX
IndustrialAIGuerillaInnovatorsARCPodcastEp3.pptx
PDF
The Influence of Historical Figures on Legal Communication (www.kiu.ac.ug)
PPT
BCG内部幻灯片撰写. slide template BCG.slide template
PDF
The Impact of Historical Events on Legal Communication Styles (www.kiu.ac.ug)
PDF
How to run a consulting project from scratch
PPTX
Week2: Market and Marketing Aspect of Feasibility Study.pptx
PPTX
Leadership and leader jobs and ch - 2.pptx
PPTX
Supply Chain under WAR (Managing Supply Chain Amid Political Conflict).pptx
PDF
757557697-CERTIKIT-ISO22301-Implementation-Guide-v6.pdf
PPTX
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
PPTX
PwC consulting Powerpoint Graphics 2014 templates
the role of manager in strategic alliances
Chapter 2 strategic Presentation (6).pptx
Handouts for Housekeeping.pdfbababvsvvNnnh
UNIT 3 INTERNATIONAL BUSINESS [Autosaved].pptx
IMM.pptx marketing communication givguhfh thfyu
Chembond Chemicals Limited Presentation 2025
Clouds that Assimilate the Build Parts I&II .pdf
Comments on Clouds that Assimilate Parts I&II.pdf
dataZense for Data Analytics unleashed features
IndustrialAIGuerillaInnovatorsARCPodcastEp3.pptx
The Influence of Historical Figures on Legal Communication (www.kiu.ac.ug)
BCG内部幻灯片撰写. slide template BCG.slide template
The Impact of Historical Events on Legal Communication Styles (www.kiu.ac.ug)
How to run a consulting project from scratch
Week2: Market and Marketing Aspect of Feasibility Study.pptx
Leadership and leader jobs and ch - 2.pptx
Supply Chain under WAR (Managing Supply Chain Amid Political Conflict).pptx
757557697-CERTIKIT-ISO22301-Implementation-Guide-v6.pdf
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
PwC consulting Powerpoint Graphics 2014 templates

IT-Risk-Management Best Practice

  • 1. IT  Risk  Management   Digicomp  Hacking  Day,  11.06.2014   Umberto  Annino  
  • 2. •  Wer  spricht?   Umberto  Annino   WirtschaCsinformaEker,  InformaEon  Security   •  Was  ist  ein  Risiko?   !  Sicherheit  ist  das  Komplementärereignis   zum  Risiko   !  Risiko  ist  Schaden  mit  Potenzial   2  
  • 3. Risiko   3   Gefahr   Bedrohung   Schwach-­‐ stelle   Asset   Risiko  
  • 4. Realitätsabgleich   Compliance?   Risk  Management?   OperaEonal  Risk,  Business  ConEnuity?   IT,  InformaEon  Security  –  Cyber  Security?   Red  Team,  Threat  Modeling,  APT  and  openSSL?   Big  Data???     Security  ™  vs.  Compliance  ™   4  
  • 5. IT  Risiko  in  der  Risiko-­‐Hierarchie   5  
  • 6. COSO   Enterprise  Risk  Management  Framework   6  
  • 7. ISO  31000  Risk  Mgmt  (2009)   Guidelines  and  Principles  and  Framework   7  
  • 10. ISO  31000  -­‐  Processes   10   Design  of   framework  for   managing  risk   Understanding  of  the  organisaEon  and  its  context   Establishing  risk  management  policy   Accountability   IntegraEon  into  organisaEonal  processes   Resources   Establishing  internal  communicaEon  and  reporEng  mechanisms   Establishing  external  communicaEon  and  reporEng  mechanisms   ImplemenEng   risk   management   ImplemenEng  the  framework  for  managing  risk   ImplemenEng  the  risk  management  process   Monitoring  and  review  of  the  framework   ConEnual  improvement  of  the  framework   !  Mandate  and  commitment  
  • 11. ISO  31000  -­‐  Processes   11   Risk   Management   Process   CommunicaEon  and  consultaEon   Establishing  the  external  context   Establishing  the  internal  context   Establishing  the  context  of  the  risk   management  process   Defining  risk  criteria   Risk  assessment   Risk  idenEficaEon   Risk  analysis   Risk  evaluaEon   Risk  treatment   Monitoring  and  review   Recording  the  risk  management   process  
  • 12. ISO  31000   Acributes  of  enhanced  risk  management   •  Key  outcomes   –  The  organisaEon  has  a  current,  correct  and   comprehensive  understanding  of  its  risks   –  The  organisaEon‘s  risks  are  within  its  risk  criteria   •  Acributes   –  ConEnual  improvement   –  Full  accountability  for  risks   –  ApplicaEon  of  risk  management  in  all  decision  making   –  ConEnual  communicaEons   –  Full  integraEon  in  the  organisaEon‘s  governance   structure   12  
  • 13. ISO  27005   InformaEon  Security  Risk  Management   13  
  • 14. ISO  27005   Context  Establishment   14   Basic   Criteria   Risk  management  approach   Risk  evaluaEon  criteria   Impact  criteria   Risk  acceptance  criteria   ! Scope  and  Boundaries   ! OrganisaEon  for  informaEon  security  risk  management  
  • 15. ISO  27005   InformaEon  security  risk  assessment   15   Risk   idenEficaEon   IdenEficaEon  of  assets   IdenEficaEon  of  threats   IdenEficaEon  of  exisEng  controls   IdenEficaEon  of  vulnerabiliEes   IdenEficaEon  of  consequences   Risk  analysis   Risk  analysis  methodologies   Assessment  of  consequences   Assessment  of  incident  likelihood   Level  of  risk  determinaEon  
  • 16. ITGI  RiskIT  Framework   PosiEonierung   16  
  • 17. IT  Risk  (high  level)  categories   17  
  • 19. Risk  maps...   •  Risk   appeEte   •  Risk   tolerance   •  Risk   culture   19  
  • 21. IT  risk  scenario  development   21  
  • 23. Aber:  scenario  based...   !  keeping  it  real!   23  
  • 24. IT  Risk  Response   opEons  and   prioriEsaEon   24  
  • 25. Verwalten  von  IT  Risiken   Risiko   management   Risiko   analyse   Risiko   idenEfikaEon   Konsolidierung   Link  to   business   Risiko   bewertung   QuanEtaEv   QualiEaEv   StaEsEsche   Basis   Risiko   lenkung   Risiko   bearbeitung   Admin   Disziplin/ Aufwand   Kosten   ROI   Risiko   tracking   Nachvollzieh-­‐   barkeit   Konstanz   (Zahlen)   25  
  • 26. QuanEfizieren  von  IT  Risiken   26   Big  Data?  Loss  DB?   Komplexität  von  InformaEonssystemen  (und  SoCware)?  
  • 27. QuanEfizieren  von  IT  Risiken   •  In  der  Praxis  eher  qualitaEv  stac  quanEtaEv   –  Fehlende  staEsEsche  Basis   –  Prinzipiell  komplexe  Systeme   –  Wenig  akuter  Bedarf  zur  QuanEfizierung  !  über   Verknüpfung  mit  Business  Process   •  Konsolidierung  der  Werte  für  Management   ReporEng  als  Grundlage  für  QuanEfikaEon   •  In  der  Praxis  eher  „erste  Schrice“  stac  best   pracEse   •  ISO  27005,  ITGI  RiskIT  Framework  und   PracEcEoner  Guide  bieten  brauchbare   Grundlagen  (Framework)   27  
  • 28. Risk  Treatment   28   Risk   treatment   Avoid   Eliminate   Reduce   Minimize     Transfer   Externalize   Accept   Residual  Risk   Controls   Measures   Avoid  /   Verhindern   Detect  /   Entdecken   Minimize  /   Eindämmen  
  • 29. Risk  Treatment  –  ISO  27005   29  
  • 30. Konsolidieren  von  IT  Risiken   Disjointed  risks   30  
  • 31. Konsolidieren  von  IT  Risiken   shared  risks   31  
  • 32. 32