Cyber Risk Management
Cyber Risk Management
Cyber Risk Management
Review Time
● Confidentiality
● Integrity
● Availability
Source: http://blogs.technet.com/b/seanearp/archive/2007/08/01/layers-defense-in-depth-part-1.aspx
What is Risk?
So Many Definition(s):
The level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or
individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat
occurring. FIPS 200 under RISK
A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the
adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence. See Information
System-Related Security Risk. NIST SP 800-30 Rev. 1 under Risk CNSSI 4009
A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the
adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence. [Note: Information
system-related security risks are those risks that arise from the loss of confidentiality, integrity, or availability of information or
information systems and reflect the potential adverse impacts to organizational operations (including mission, functions, image, or
reputation), organizational assets, individuals, other organizations, and the Nation. Adverse impacts to the Nation include, for example,
compromises to information systems that support critical infrastructure applications or are paramount to government continuity of
operations as defined by the Department of Homeland Security.] NIST SP 800-137 under Risk FIPS 200 - Adapted NIST SP 800-37 Rev. 1
under Risk FIPS 200 - Adapted NIST SP 800-53A Rev. 4 under Risk CNSSI 4009
The level of impact on agency operations (including mission, functions, image, or reputation), agency assets, or individuals resulting
from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring. NIST SP
800-18 Rev. 1 under Risk NIST SP 800-30
Risk is the possibility or likelihood that a threat will exploit a vulnerability to cause harm to an asset. (ISC)2 CISSP Eighth Edition
Risk - Keep it Simple
Vulnerability
Exposure, Footprint, Weakness and/or susceptible to a threat
Threat
Actions or inaction that could cause damage, destruction, alterations, loss, etc. Intentional or accidental. From
people, hardware, network, structure, nature.
• Qualitative Analysis
• Relies on prioritization of threats based upon their severity
• Quantitative Analysis
• Uses financial measures and dollar values to determine risk
exposure
• If the TCO is less than the ALE, then the ROI is positive
Cost-Benefit Analysis Example
$10K ALE (before – per calculation)
________________________________________
=======
Risk Matrix for Qualitative
Risk Handling
Avoid Transfer/Share
Mitigate Accept
Third Party Risk
Vendors (Supply Chain)
Business Partners
Contractors
Information & Data
Systems
Security Control (Countermeasures)
• Controls – technical or nontechnical risk mitigation mechanisms
• Safeguards are preventative (proactive) controls
• Countermeasures are detective (reactive) controls
• Technical
• Network access, application access, malware control, encryption
• Physical
• Locks, guards, fire suppression systems
Security Control Types
• Preventative
• Detective
• Corrective
• Deterrent
• Recovery
• Compensating
Residual Risk
• Residual risk is that risk that exists after the
organization deploys a management-approved
security control
(Controls Gap)
Residual Risk Z
0% Risk Exposure ==========
Class Exercise
Review: Cybersecurity Risk
Management
Review: Cybersecurity Risk Management
Current State Desired State