risk assessment for
play

RISK ASSESSMENT FOR EXTERNAL VENDORS Luciano Ferrari, CISSP, MBA - PowerPoint PPT Presentation

RISK ASSESSMENT FOR EXTERNAL VENDORS Luciano Ferrari, CISSP, MBA lferrari@lufsec.com www.lufsec.com November, 2013 Risk Assessment is Difficult Multiple scenarios Interpreted as a negative activity Single method/tool not practical


  1. RISK ASSESSMENT FOR EXTERNAL VENDORS Luciano Ferrari, CISSP, MBA lferrari@lufsec.com www.lufsec.com November, 2013

  2. Risk Assessment is Difficult • Multiple scenarios • Interpreted as a negative activity • Single method/tool not practical • Requires key competencies

  3. Categorize your cases • Standardization/Consistency is good • Less complexity, less risk • Experience is a key element

  4. Prerequisites for selection a toolbox • Typical use cases for Risk Assessment • The various approaches for risk assessments • The characteristics of available methods/tools Gather info Analyze Report

  5. Selecting the tools/methods • Characterize use cases Analyze primary • Group similar use cases use cases • Aim for three to five • Characterize typical Map against assessment methods assessment • Map against case model requirements • Functionality criteria Derive evaluation • Practicality, actionability and criteria compatibility requirements • 2-4 that will Select satisfy most tools/approaches cases

  6. Examples – functionality assessment Cases Project/ DRP/BCP ERM Rollup/ Security Procurement Compliance Prioritization Explore: One-to-one Survey Scenario Survey People interviews and questionnaire planning and questionnaire scenario collective and one-to- planning brainstorm one interviews Explore: Risk inventory Vulnerability Threat Threat Systems analysis and inventory inventory threat inventory Assess: - What-if- Deviance and Ranking and Qualitative modeling intuitive intuitive Assess: Automated - - Quantitative calculation Express Absolute/ Scenarios Dashboard Heat map and scalar ALE and heat map projects/ actions

  7. Tools/Methods Explore Assess Express Collective brainstorm Intuitive/discussion/ranking Scenarios and actions FRAP (facilitated workshop) Deviance Questionnaires/scorecards Quantitative: Scorecards ISF SARA and Intuitive/discussion, SPRINT deviance from controls/standards Workshops Qualitative: Scenario-based Status reports and ISF IRAM discussion/brainstorm controls Questionnaires/scorecards Qualitative: Intuitive, Status/heat maps, Citicus ONE deviance from action plan controls/standards Collective brainstorm Qualitative: intuitive against Action Scenarios, OCTAVE (facilitated workshop) threat profile, catalog of projects/actions vulnerabilities Scenario planning Qualitative: Delphic what-if Scenarios GRAM modeling Survey Questionnaire Qualitative: Deviance from Risk status reports, RiskWatch standards. Quantitative: absolute ALE, return on Monte Carlo simulation investment, actions Asset register, Qualitative: deviance, what Actions: Scenarios: CRAMM threat/vulnerability if modeling, automated controls, risk profile, inventory,questionnaire, calculation. Qualitative: BIA register, risk score workshop

  8. Information Classification • If you don’t know what to protect and where it is how can you protect?

  9. Information Security is not an island • Formal engage with other areas is key • Risk Management • Legal • HR • Procurement

  10. Risk Assessment for Cloud Providers Control implications of different models Accountability cannot be outsourced

  11. Master Agreement / SLAs

  12. Tree of Provider Chains • Are you aware of all the parties? • Will you be notified when parties change? • Does your contract require all parties to comply with it? • Do you force clauses applying to the entire chain of providers? • How visible are the finances of the parties?

  13. What service level to look for? • Planned Downtime • Service Availability • Support/Mean time to restore service • Data recovery • RTO/RPO

  14. Risk Assessment on Social Media

  15. Top Social Media issues • Employee productivity • Record Retention • Company reputation/image • Inappropriate content posted by employees • Compliance with regulation/laws • Discovering and assessing social media risks

  16. How and what to monitor? • Analysis • Assessment • Mitigation

  17. Action Plans • Don’t wait for a call from marketing to get involved. • Think of social media as your most popular cloud platform. • Integrate social media processes and drivers into risk assessment processes. • Accept the reality that your enterprise has social risks to manage.

  18. Regulation • HIPAA • PII • PCI • GBA • SOX

  19. • Use the new grouping model • Engage other areas or your organization • Promote Risk Assessment Awareness • Use it for vendor selection criteria • Continuous Improvement

Recommend


More recommend