Top Banner
IDENTIFYING AND ANALYZING RISK IN INFORMATION SYSTEMS ERIC SORENSON Utah Chapter of ISACA April 21, 2016
21

ISACA April 21 - Eric Sorenson - Risk Presentation

Apr 15, 2017

Download

Documents

Eric Sorenson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ISACA April 21 - Eric Sorenson - Risk Presentation

IDENTIFYING AND ANALYZING RISK IN INFORMATION SYSTEMS

ERIC SORENSON

Utah Chapter of ISACAApril 21, 2016

Page 2: ISACA April 21 - Eric Sorenson - Risk Presentation
Page 3: ISACA April 21 - Eric Sorenson - Risk Presentation

Identifying and Analyzing Risk In Information Systems

• Identify – establish who or what is

• Analyze – examine in detail the information for purpose

• Risk – the potential of gaining or losing something of value

• Harm from current or future event

• Threat - accidentally trigger or intentionally exploit a specific vulnerability

Page 4: ISACA April 21 - Eric Sorenson - Risk Presentation

UNUSUAL PLOY IN ANTHEM BREACH CASE FAILS

• You may recall, ≈ 80 million records breached

• Database Administrator discovers his credentials are being used to execute a questionable query

• Someone had gained unauthorized access to their IT systems

• Health Plan Anthem Inc., makes a bold motion, “to access plaintiffs’ computers, smartphones and tablets to image and copy them to determine whether the data breach or embedded malware was responsible for the potential harm that could include identity theft and tax problems”**

• Could the consumer be at fault?

**http://www.databreachtoday.com/blogs/unusual-ploy-in-anthem-breach-case-fails-p-2101

Page 5: ISACA April 21 - Eric Sorenson - Risk Presentation

What Do You Think?

• Should consumers bear some of the risk?

Page 6: ISACA April 21 - Eric Sorenson - Risk Presentation

https://www.youtube.com/watch?v=NZJrGuC92U8

Page 7: ISACA April 21 - Eric Sorenson - Risk Presentation

InformationalAuthentication

Threat Landscape

Execution

Denial of Service

Users Acts of Nature

Page 8: ISACA April 21 - Eric Sorenson - Risk Presentation
Page 9: ISACA April 21 - Eric Sorenson - Risk Presentation

How is Risk Assessed?

• Identify the threats and vulnerabilities

• Analyze the impact to the organization or process, then determine the likelihood of an event

• Easy right?

Page 10: ISACA April 21 - Eric Sorenson - Risk Presentation

What Do You Think?

• What are some guiding principles you use to analyze risk?

Page 11: ISACA April 21 - Eric Sorenson - Risk Presentation

Internal and External Risks Effect Decision-Making

INTERNAL EXTERNAL

• Employees

• Technology

• Security

• Compliance – legal and regulatory

• IP

• Former Employees

• Natural Disasters

• Hackers

• Vendors

• Regulators looking at compliance

Page 12: ISACA April 21 - Eric Sorenson - Risk Presentation

https://www.youtube.com/watch?v=opRMrEfAIiI

Page 13: ISACA April 21 - Eric Sorenson - Risk Presentation

How I Identify and Analyze Risk

• First• Identify threats

• Identify vulnerabilities

• Second• Relate threats to vulnerabilities

• Threat VulnerabilityPair

Page 14: ISACA April 21 - Eric Sorenson - Risk Presentation

How I Identify and Analyze Risk (Continued)

• Define the likelihood• You have a threat, how likely is it going to occur against

the vulnerability?

Likelihood – These percentages are relative to your organization

Low 0 – 40%

Medium 41 – 75%

High 76 – 100%

Page 15: ISACA April 21 - Eric Sorenson - Risk Presentation

How I Identify and Analyze Risk (Continued)

• What’s the Impact?• Availability

• I use the CIA triad• Confidentiality – loss leads to limited, serious, or severe

effect upon the organization• Integrity• Availability

• I categorize them by low, medium, and high

Page 16: ISACA April 21 - Eric Sorenson - Risk Presentation

How I Identify and Analyze Risk (Continued)

• Organizational Effect?• Business Disruption – Capability how is it effected

• Financial loss – Assigned dollar amount

• Employees – Incapacitated

• I categorize them by limited, serious, and severe

Page 17: ISACA April 21 - Eric Sorenson - Risk Presentation

How I Identify and Analyze Risk (Continued)

• “Assessing risk is determining the likelihood of the threat being exercised against the vulnerability and the resulting impact from a successful compromise.” SANS Institute

• The purpose of assessing risk is to assist management in decision making on where resources should be assigned

Page 18: ISACA April 21 - Eric Sorenson - Risk Presentation

How I Identify and Analyze Risk (Continued)

• Four strategies for managing risk• Mitigation – Most common. Fixing the flaw or a control

• Transference – Primarily financial. Another party assumes the risk

• Acceptance – We know the risk is there, so we accept it.

• Avoidance – Remove the vulnerability or even eliminate the system

Page 19: ISACA April 21 - Eric Sorenson - Risk Presentation

How I Identify and Analyze Risk (Continued)

• In many ways, our greatest risk are employees within organizations

• Is he your employee?

Page 20: ISACA April 21 - Eric Sorenson - Risk Presentation

How I Identify and Analyze Risk (Continued)

• COMMUNICATE• Management and employees to know and understand the risks

and how the organization will deal with risks

• I’m going to say it again, COMMUNICATE!

• Train, Train, and Train• I cannot stress enough how important training is

• Every month, test the employees

• Send out examples of attacks and what the outcome was

Page 21: ISACA April 21 - Eric Sorenson - Risk Presentation

“Apply” What I’ve Learned

• Risk will always be unique to an organization

• Know the threats and vulnerabilities

• Need to analyze all aspects of the business

• Create or enhance a Risk Management Program

• Communicate

• Train