Top Banner
Risk appetite for information security Simon Marvell Partner [email protected] www.acuityrm.com
22

Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Apr 12, 2018

Download

Documents

lamduong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Risk appetite for information security

Simon MarvellPartner

[email protected]

www.acuityrm.com

Page 2: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

ERM requirements for risk appetite

COSO Model for Enterprise Risk Management

ERM is designed to identify events potentially affecting the entity and manage risk within its risk appetite

BS31100BS31100

Both the risk appetite and risk profile should be continuously monitored by the Board (or equivalent) and formally reviewed at least annually …

This should consider whether the organisation’s risk appetite aligns with the organisation’s risk profile and that the risk appetite remains appropriate to deliver the organisation’s objectives …

Page 3: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Risk appetite for information security

UK National Information Assurance StrategyDepartments will need to take responsibility for determining

ISO 27001The organisation shall define criteria for accepting risks and identify the acceptable levels of risk

Departments will need to take responsibility for determining a level of risk tolerance or ‘appetite’, and tailoring the management of their information risks appropriately.

Page 4: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

What is risk appetite?

� The degree of risk, on a broad-based level, that a company or other entity is willing to accept in pursuit of its goals

COSO Model for Enterprise Risk Management

� Amount and type of risk an organisation is � Amount and type of risk an organisation is prepared to pursue or take

BS 31100

Page 5: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Methods for expressing risk appetite

1. Setting a boundary on a probability and impact grid

40322416840Major

504030201050Catastrophic

Units

40322416840Major

504030201050Catastrophic

Units

Bu

sin

ess Im

pact

Risk appetite threshold

Unacceptable

100%80%60%40%20%

10864210Insignificant

2016128420Minor

30241812630Moderate

100%80%60%40%20%

10864210Insignificant

2016128420Minor

30241812630Moderate

Bu

sin

ess Im

pact

Likelihood

Note: Units and percentages are for illustration only

Almost CertainLikelyProbablePossibleUnlikely Almost CertainLikelyProbablePossibleUnlikelyBroadly acceptable

Managementsign-off

Page 6: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example – Health & safety

Page 7: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Methods for expressing risk appetite

1. Setting a boundary on a probability and impact grid

2. Economic capital measures / balance sheet based expressions

3. Changes in credit ratings (headroom before a potential downgrade)

4. Profit and loss measures (e.g. tolerable level of annual loss)loss)

5. Value based measures (based on probability of ruin or default)

6. Limits / targets or thresholds for key indicators (e.g. +/-5% variation in profit or 1 - 2½ % variation in revenue)

7. Qualitative statements (e.g. zero tolerance for regulatory breaches or loss of life)

Source: Research into the definition and application of the concept of risk appetiteUndertaken by Marsh and University of Nottingham, June 2009

Page 8: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Rules of thumb

� Economic prosperity

� Environmental integrity / social contribution and reputation

Source: Research into the definition and application of the concept of risk appetiteUndertaken by Marsh and University of Nottingham, June 2009

Page 9: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Variations

� Risk appetite can vary:� Between organizations

� Across business units, processes, systems etc. within organizations

� By risk type

� For example, in banking:� For example, in banking:� Appetite might be higher in mature lending activities

than in an emerging business

� Appetite probably lower for fraud or unethical behaviour which can cause serious reputational impact than large lending losses in the normal course of business

Page 10: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example – Information risk

� Appetite might be very low for loss of high volumes of personal data

Bu

sin

ess Im

pact

40322416840Major

504030201050Catastrophic

Units

40322416840Major

504030201050Catastrophic

Units

Bu

sin

ess Im

pact

Likelihood

100%80%60%40%20%

10864210Insignificant

2016128420Minor

30241812630Moderate

100%80%60%40%20%

10864210Insignificant

2016128420Minor

30241812630Moderate

Almost CertainLikelyProbablePossibleUnlikely Almost CertainLikelyProbablePossibleUnlikely

Note: Units and percentages are for illustration only

Page 11: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example – Information risk

� Appetite might be medium for risks to confidentiality, integrity and availability of individual personal records

Bu

sin

ess Im

pact 504030201050Catastrophic

Units

504030201050Catastrophic

UnitsRisk appetite threshold

Bu

sin

ess Im

pact

100%80%60%40%20%

10864210Insignificant

2016128420Minor

30241812630Moderate

40322416840Major

100%80%60%40%20%

10864210Insignificant

2016128420Minor

30241812630Moderate

40322416840Major

Almost CertainLikelyProbablePossibleUnlikely Almost CertainLikelyProbablePossibleUnlikely

Likelihood

Note: Units and percentages are for illustration only

Page 12: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example – Information risk

� Appetite might be relatively high for risk arising from failures by trusted third parties

504030201050Catastrophic

Units

504030201050Catastrophic

Units

Bu

sin

ess Im

pact

Risk appetite threshold

100%80%60%40%20%

10864210Insignificant

2016128420Minor

30241812630Moderate

40322416840Major

100%80%60%40%20%

10864210Insignificant

2016128420Minor

30241812630Moderate

40322416840Major

Bu

sin

ess Im

pact

Almost CertainLikelyProbablePossibleUnlikely Almost CertainLikelyProbablePossibleUnlikely

Likelihood

Note: Units and percentages are for illustration only

Page 13: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

To manage risk within appetite

The most popular methods in practice are:

1. To set a boundary on probability and impact of events (65%)

2. To set limits, targets or thresholds for key indicators or KPI’s (39%)indicators or KPI’s (39%)

3. To compare with industry benchmarks / loss experience (30%)

4. To limit impact on profit and loss / earnings statement strength (26%)

Source: Research into the definition and application of the concept of risk appetiteUndertaken by Marsh and University of Nottingham, June 2009

Page 14: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example 1 – Risk boundaries

� Measure residual risk and take action to move red risks to amber or green

� Management decision on whether to accept risk

Page 15: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example 1 – Risk boundaries

� Two key controls for mitigating the risk of ‘theft or loss of media’ are weak

� By taking action to improve these controls the risk which was previously red can be moved to amber (see next slide)

Page 16: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example 1 – Risk boundaries

Page 17: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example 2 – Tolerable loss of profit

� Set risk appetite as tolerable loss of profit (e.g. $3m p.a.)

� Measure aggregate residual risk and compare with appetite, in this example current residual risk is 138% of appetite

Page 18: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example 2 – Tolerable loss of profit

� Take action to bring aggregate residual risk down to within risk appetite

Page 19: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example 3 – Loss reduction targets

� Set targets to reduce the annual cost of incidents by X% or to below the average for our industry

Page 20: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

Example 4 – KPI thresholds

� Set targets to maintain compliance with key controls at a level in excess of the benchmark for our industry

� Set targets to achieve a minimum performance on our KPIs

Page 21: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

STREAM Integrated Risk Manager

� Assurance that:

� All risks are being addressed

� All applicable controls are being addressed

� Key risk mitigating controls are being identified and monitored

� Risk is being measured & � Risk is being measured & managed within appetite

� Delivered by:

� Enterprise database application

� Asset based business model

� Automatic calculation & recalculation of residual risk

� Aggregation & reporting

� User managementCore Assurance Modules

Page 22: Risk appetite for information security.ppt appetite for information security UK National Information Assurance Strategy Departments will need to take responsibility for determining

[email protected]

www.acuityrm.com