+ All Categories
Home > Documents > Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk...

Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk...

Date post: 04-Aug-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
164
Masterclass: Information/Cyber Security Risk Management Gary Gaskell (CISSP, CISM, CISA, CCSP, FACS, CP-Cyber Security (ACS), GAICD M App Sc, B Eng, B IT) E: [email protected] W: www.infosecservices.com.au M: 0438 603 307 With thanks to Mark Ames, CISA, CISM, CRISC Infosec Services Pty Ltd 29 May 2019 Copyright © Infosec Services Pty Ltd 2019 1
Transcript
Page 1: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Masterclass:Information/Cyber Security Risk

Management

Gary Gaskell(CISSP, CISM, CISA, CCSP, FACS, CP-Cyber Security (ACS), GAICD

M App Sc, B Eng, B IT)E: [email protected]

W: www.infosecservices.com.auM: 0438 603 307

With thanks to Mark Ames, CISA, CISM, CRISC

Infosec Services Pty Ltd

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 1

Page 2: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 2

Risk Management Objectives ? Risk reduction Fix risks in the best order Translate the information into a

business context Determine work priorities Credibility with senior

management Your objectives?

Page 3: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Two Key Objectives

Reporting up E.g. risk to the board or executive

Security Management Designing a security program

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 3

Page 4: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 4

Agenda Share experiences Get better at our day jobs

Basic risk management process Application to security risks Techniques for

identification analysis evaluation Reporting

Decisions and Judgements Workshop – put it into practice

Page 5: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

5

Today’s Rules

Get involved!All contributions are

valuable.If you don’t understand

something –stop us and ask!

We are here to learn and have a laugh as well.

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 6: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Why are we here ?

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 6

Sony $2 billionHeartland payments Business failureDigi notar Business failureRSA Significant loss of good will and status,

$$ replacement tokens, liabilityPayrolls – QH $$, Loss of confidence in a Government

PCEHR 4 months delay in detection penetrationUS Govt leakage to wikileaks TBAUS nuclear superiority TBABanks – incorrect interest calculations

Inversely proportional cost of rectification

Yahoo 3 billion accounts - $350 million price drop for Verizon acquisition (ouch!)

PageUP TBAEquifax CISO fired, CEO testify to congress, shares ↓ 14%Target USA Loss of CEO (34 years), CIO, $162 million, shares ↓

Page 7: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Why are we Again?

Demonstrate we made a sound plan!

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 7

Page 8: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

What’s Changed

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 8

Page 9: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

The Controls Just Moved

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 9

Page 10: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 10

Seaforth Baptist websiteCopyright © Infosec Services Pty Ltd 2019

Is this Your Workplace?

Page 11: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 11Lynnemarshall.comCopyright © Infosec Services Pty Ltd 2019

Page 12: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Getting Management’s Attention

LoudLogicPower structureRegulatorCredibility

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 12

Page 13: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Decisions

Decision is a bet

Bayes theorem

Decision process quality AKA Risk management as a tool

“Improve your Luck”

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 13

Page 14: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 14

Deliverables ?

Decision Support List of critical functions and assets Catalogue of major risks

Rate risk level

Identify control gaps Where risk level is high or

extreme Action plan

Page 15: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Security Planning Options

Know the Threat

Assess risks

Plan Security

Baseline controls

Interim Security

Plan

Page 16: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 16

Masterclass Overview

Formal risk management standards

Some theory & definitions

Techniques

Communicating better

Page 17: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 17

Establish the Scope

Determine Review Method

Treat Risks

Analyse Risks

Determine Existing Controls

Estimate Likelihood

Estimate Impact

Risk Impact

Analyse Risks

Determine Existing Controls

Estimate Likelihood

Estimate Impact

Risk Impact

Determine Existing Controls

Estimate Likelihood

Estimate Impact

Risk Impact

AcceptRisk?

Yes

NoEvaluate Risks

Identify Participants and Stakeholders

IT Risk Management

Policy&

Risk Profile

ISO 31000

Page 18: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 18

Standards and Guides

ISO 31000 and 31010 ISO 27005 ISO 31000 interpreted for securityMore than ISMS Risk

NIST - FREE !! SP800-30 Guide for conducting risk assessments SP800-37 – Manage Information Security Risk SP800-161 – Supply chain risk

Page 19: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 19

More standards

ISO Guide 73 Risk Management Vocabulary

Bank for International Settlements (Basel III) Sound Practices for the Management

and Supervision of Operational Risk Regulators APRA - Prudential Standards and guides AEMO – Cyber security framework

Page 20: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 20

THEORY AND DEFINITIONS

Page 21: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 21

Theory and Definitions

Hazards A source of potential harm

Threats Potential cause of an unwanted incident, which

may result in harm to a system or organisation Vulnerabilities

Weakness of an asset or control that can be exploited by one or more threats

Risk “Effect of uncertainty on objectives” A combination of consequences and likelihood

Page 22: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 22

More Terminology

Uncertainty is the state … of deficiency of information

related to, understanding or knowledge of, an event, its consequence or likelihood

Risk owner, Senior Responsible Officer person or entity with the accountability

and authority to manage a risk

Page 23: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 23

Temporal Aspects of Risk

Inherent

Current risk

Target risk

Residual risk

Page 24: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Get the Timing Right!

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 24

Page 25: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 25

Controls & Countermeasures

Preventive

Detective

Corrective

Page 26: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 26

IIA & Controls

Page 27: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 27

KNOWLEDGE ABOUT OUTCOMES

Well-defined outcomes

Poorly defined outcomes

Some basis for probabilities risk ambiguity

KNOWLEDGE ABOUT

LIKELIHOODS

“INCERTITUDE”

No basis for probabilities

uncertainty ignorance

O’Riordan, T, and Cox, P. 2001. Science, Risk, Uncertainty and Precaution. Senior Executive’s Seminar – HRH the Prince of Wales’s Business and the Environment Programme. University of Cambridge.

Uncertainty

Page 28: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 28

Control Cost/Benefit Analysis- It usually comes down to $$

Level of Risk

Catastrophic

Cost of Treatment

Insignificant

$ $$$$

Uneconomic

Implement Risk TreatmentNo Brainer

Open for debate!

Forget it!

Page 29: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Enterprise Risk Management

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 29

Page 30: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 30

A LITTLE MORE THEORY

Page 31: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 31

Threats, Vulnerabilities and Risks

VulnerabilitiesThreats exploit expose Value

Assets (including Business

Processes)

Risks

Page 32: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 32

Page 33: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Risk

Can be

Will exploit

Toattack

Availability

Integrity

LowMedium

HighValue & Importance

Impact

ThreatsHuman, Natural

Technical, PhysicalEnvironmental, Operational

classified for

- Administrative- Technical- Physical

Must cost less than possible

Impact

That

Vulnerabilities

X =causing

withto

ReducingVulnerabilities

Reduced after Controls implemented

Acceptedby

Executive

Transferred Mitigated

External- Insurance

- Contracted Out Must cost less than possible

Impact

Complex Cyber Risk View

Attack Surface

Attack Surface

Likelihood

Reducing

Risk Reduced afterRisk Transfer

and/orControls

implemented

and/or

and/or

Reducing

Confidentiality

Information

LowMedium

High

LowMedium

High

ReputationFinancial

Life

Productivity

Impact Reduced afterRisk Transfer

Reputation

Financial

Life

Productivity

High

Medium

Low

High

Medium

Low

LikelihoodReduced after

Controls implemented

ControlsTargetsPeoplePlaces

ProcessesSystems

and compromise

High

©Hugh Burley – Thompson Rivers University - 2008

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 33

Page 34: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 34

MISNOMERS AND VARIANTS -

LET’S BE CLEAR WHAT WE SAY . . .

Page 35: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 35

Risk Assessment Variants

Id threats

(actors, objectives)Id likelihood

(set a threshold)

Defined Threats(known enemies)

Risk Assessment

Undesirable events

Variant 1 – Security EngineeringVariant 2 – “Risk Assessment”

Page 36: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 36

Gap Analysis

Current controls

Gap Analysis Risk Assessment

Baseline/checklist

Page 37: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 37

Vulnerability Assessment

Risk AssessmentList of vulnerabilities

Absent controls Weak controls

Page 38: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 38

Inherent Risk

Current Controls

Risk Assessment

Risk Register

Business Objectives &Environment

Inherent Risk Risk Assessment

Treatment Plan

Page 39: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 39

Risk Assessment Approaches

High level Identify major risks to achieving objectives Identify significant threats and vulnerabilities Focus on consequences to operational

objectives and processes

Low level Detailed inventory of assets, Catalogue all threats and vulnerabilities Focus on consequences to individual assets

Page 40: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 40

Risk Assessment Methods

Qualitative – Relative ratings of risk Facilitated workshops Educated best estimates from operational staff and managers

Semi-Quantitative - Puts $$ to relative ratings According to organisational criteria Software tools (CRAMM, Phoenix)

Quantitative - $$ Ratings of risk Specialist consultancy, actuarial Annual Loss Expectancy, etc Detailed formal analysis & reviews Tends to be very costly

Page 41: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 41

Risk Management Frameworks

ISO/IEC/AS/NZS 27001 Code of practice & specification for information security management

systems (ISMS)

ISO/IEC TR 13335-3 Guidelines for the Management of IT Security – This is getting old

ISO 31000 Risk Management Generic & Independent Good framework

Australian Government Information Security Manual Your CFO/ finance division

Page 42: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Mandate and

Commitment(4.2)

Implementing risk

Management(4.4)

Design of framework

(4.3)

Continual improvement

of the Framework

(4.6)

Monitoring and review

of the Framework

(4.5)

Framework(Clause 4)

a) Creates valueb) Integral part of

organizationalprocesses

c) Part of decisionmaking

d) Explicitly addressesuncertainty

e) Systematic, structured and timely

f) Based on the bestavailable information

g) Tailoredh) Takes human and

cultural factors into account

i) Transparent and inclusive

j) Dynamic, iterative andresponsive to change

k) Facilitates continual improvement and enhancement of the organization

Principles(Clause 3)

Process(Clause 5)

Establishingthe context (5.3)

Risk treatment(5.5)

Riskidentification

(5.4.2)

Risk analysis(5.4.3)

Riskevaluation

(5.4.4)

Risk assessment(5.4)

Monitoring

&

review

(5.6)

Comunication&consultation

5.2

ISO 31000 – Relationship between the principles, framework and process29 May 2019 Copyright © Infosec Services Pty Ltd 2019 42

Page 43: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

5.2COMMUNICATION

&

CONSULTATION

5.6

MONITOR

&

REVIEW

5.3 ESTABLISHING THE CONTEXT

5.4.3 RISK ANALYSIS

5.4.4 RISK EVALUATION

5.5 RISK TREATMENT

5.3.2 External Context5.3.3 Internal Context5.3.4 Risk Management Process Context5.3.5 Developing Risk Criteria

5.5.2 Selection of risk treatment options5.5.3 Preparing and implementing risk

treatment plans

Determine existing controlsDetermineLikelihood

DetermineConsequences

Estimate Level of Risk

Compare against criteria.Identify & assess options.Decide on response.Establish priorities.

5.4

RISK

ASSESSMENT

5.4.2 RISK IDENTIFICATIONWhat can happen, when, where, how & why

ISO 31000:2018 Risk management process in detail29 May 2019 Copyright © Infosec Services Pty Ltd 2019 43

Page 44: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 4413 May 2014 © Infosec Services 44

Risk Analysis

Legend - E: extreme risk; immediate action required, H: high risk; senior management attention neededM: moderate risk; management responsibility must be specified, L: low risk; manage by routine procedures

Treatment Decisions

Context & Scope

Risk Management Method

Identify Risks

Analyse Risks

Evaluate Risks

Com

mun

icat

e &

Con

sult

Monitor &

Review

Analyse Risks

Use your organisation’s matrix

Page 45: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 45

Context & Scope• What’s the environment and what

are we analysing?• How will we approach it• How deep will we go?

Page 46: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 46

Define the Context

Context Why is the review taking place? Who are the consumers? What are the expectations and

deliverables? Is there an existing framework? Are results of previous reviews

available?

Page 47: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 47

Agency risk management

Operational risk management

Financial risk management including fraud risk

Agency business plan

Security risk management

Personnel risk review elements incorporating:•agency requirements•program requirements•sub-program requirements•key individual requirements

Physical risk review elements incorporating:•agency requirements•site requirements•area requirements

Information risk review elements incorporating:•agency requirements•site requirements•compartmental requirements

Operational plan Security plan Financial plan including fraud control plan

Business continuity plan

Personnel security policy and procedures elements:•eligibility policy•employment conditions (fit and proper person) checks policy•DSAP and security clearance policy•aftercare policy

Physical security policy and plan elements including:•site security plans•personal safety and security measures•physical asset protection measures•information protection measures

ICT and information security policy and plan elements including:•ICT plan•information classification policy•access and availability policies

Security and fraud governance policies and procedures elements including•contractor security/fraud management policy•security/fraud awareness training, investigations and review policy•audit and reporting policy

International obligations

Protective Security Better Practice Guide, Australian Government

Page 48: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 48

Risk Management Context

How are other risks managed?

Senior management risk managementexperience.

Does the organisation plan or react?

Who are risks reported to, accepted by?

How do risk criteria fit the culture and practices?

Are there specific business criteria?

Page 49: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

How Mature is the Organisation?

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 49

Optimised

Initial/Adhoc

Managed

Defined

Repeatable

Capability Maturity Model

Page 50: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 50

Scope the Review

Scope What exactly is being reviewed? Are there specific focus areas within the

scope?Hot buttons

How far will the review go? Level of detail

Who is affected within the agency?

Page 51: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 51

Typical Scope Options

Organisation wide systems and operational processes

Specific information systems Projects Technical analysis of software and

configurations Operations, Infrastructure

Page 52: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 52

Organisational Context

Identify Internal policies Business processes & goals Legislation/regulations

Operational context Administrative processes Team/division/section objectives

Page 53: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 53

Planning

Agree objectives with management & sponsors

Identify key resources Set out a project plan Tasks Resources Stakeholder scheduling Timetable

Page 54: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 54

First know what’s important

Identify major operational processes What’s your organisations’ purpose in life? What’s your most important product?

Identify Stakeholders Who are your customers? Who benefits from your activities?

Operational, strategic, legislative & legal requirements

Page 55: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 55

Preparation - Outcomes

Context & Scope Defined

Management & Stakeholders on side

Metrics and methods agreed

Do-able Plan

Page 56: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 56

Risk IdentificationList what could go wrong

Page 57: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

5.2COMMUNICATION

&

CONSULTATION

5.6

MONITOR

&

REVIEW

5.3 ESTABLISHING THE CONTEXT

5.4.3 RISK ANALYSIS

5.4.4 RISK EVALUATION

5.5 RISK TREATMENT

5.3.2 External Context5.3.3 Internal Context5.3.4 Risk Management Process Context5.3.5 Developing Risk Criteria

5.5.2 Selection of risk treatment options5.5.3 Preparing and implementing risk

treatment plans

Determine existing controlsDetermineLikelihood

DetermineConsequences

Estimate Level of Risk

Compare against criteria.Identify & assess options.Decide on response.Establish priorities.

5.4

RISK

ASSESSMENT

5.4.2 RISK IDENTIFICATIONWhat can happen, when, where, how & why

ISO 31000:2018 Risk management process in detail29 May 2019 Copyright © Infosec Services Pty Ltd 2019 57

Page 58: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 58

Identification

What?

When? (as in triggers)

Where? What?

How?

Why?

Page 59: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 59

Activities

Identify critical assets

Identify known and perceived

threats

Plot the threats in the Threat Matrix Integrity Confidentiality Availability

Page 60: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 60

Examples of Key Assets Reputation Payroll Process

supporting systems General Ledger

Access control, integrity checks Client list

Privacy and accuracy Intellectual Property

Timeliness and accuracy Sales & cash flow

And cancelled ones!

Page 61: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 61

Major Areas of Risk Human factors

Errors, fraud, unauthorised activity

Disruptive software Viruses, worms, programming errors

Technical Configuration & Change Management Hackers, operational errors, inappropriate

access

Information & Privacy Appropriate management of sensitive and

personal Information

Physical and Environmental Theft, disruption, flood, fire Environment / Physical

Technical Infrastructure

Software

Information & Privacy

Human Factors

Page 62: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 62

Threats

Errors and omissions Malicious activity internal external

Environmental threats Fire, Flood Power loss natural disasters

Page 63: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 63

Breadth First Search

Integrity Confidentiality Availability

Fraud,Hacking

Malicious Events

1

2

3

4

5

6

Accidental Events

Errors &Omissions

Page 64: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 64

Examples of Risks

Integrity Modified data in forms or databases Unauthorised transactions

Confidentiality Sensitive personal information available on web Disclosure of sensitive documents to a competitor

Availability Inadequate operational performance of IT systems IT outage due to hardware failure Customers cannot use online services due to denial of

service attacks

Integrity Confidentiality Availability

Accidental Events

Fraud,Hacking

Malicious Events

Errors &Omissions

1

2

3

4

5

6

Page 65: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 65

Risks and Threats

Confidentiality Hacker puts customer file on the Web Email orders are read by competitors

Integrity Disgruntled employee modifies data in manufacturing database –

produce faulty goods MIS files modified by operators Wrong pathology results lead to death

Availability Technician trips over cable Power supply blows up Denial of service attacks No backups Ransomware and extortion

Treatment Decisions

Context & Scope

Risk Management Method

Identify Risks

Analyse Risks

Evaluate Risks

Com

mun

icat

e &

Cons

ult

Monitor & Review

Identify Risks

Page 66: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 66

Vulnerabilities - examples

Operational complexity Lack of skills and competence Inadequate documentation No fall-back or recovery plans Poor access controls Software flaws Software Misconfiguration

Page 67: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 67

How to List the Risks Workshop

Brainstorm

Don’t debate

Value all input

Record the risks

Vulnerabilities

Gap Analysis

Vulnerability Scanner

Pen test

Page 68: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 68

Risk Analysis Estimate the Likelihood and

Consequences Identified Risks

Page 69: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

5.2COMMUNICATION

&

CONSULTATION

5.6

MONITOR

&

REVIEW

5.3 ESTABLISHING THE CONTEXT

5.4.3 RISK ANALYSIS

5.4.4 RISK EVALUATION

5.5 RISK TREATMENT

5.3.2 External Context5.3.3 Internal Context5.3.4 Risk Management Process Context5.3.5 Developing Risk Criteria

5.5.2 Selection of risk treatment options5.5.3 Preparing and implementing risk

treatment plans

Determine existing controlsDetermineLikelihood

DetermineConsequences

Estimate Level of Risk

Compare against criteria.Identify & assess options.Decide on response.Establish priorities.

5.4

RISK

ASSESSMENT

5.4.2 RISK IDENTIFICATIONWhat can happen, when, where, how & why

ISO 31000 Risk management process in detail29 May 2019 Copyright © Infosec Services Pty Ltd 2019 69

Page 70: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 70

Risk Analysis

Determine likelihood

Usually assume current controls

Identify and scope consequences

Determine levels of risk

Identify

Medium/High/Extreme risk levels

Page 71: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 71

Risk Analysis

Measure Description

High Is expected to occur in most conditions (1 or more times per year).

Medium The event will probably happen in most conditions (2 years).

Low The event should happen at some time(5 years).

Unlikely The event could happen at some time (10 years).In

crea

sing

Pro

babi

lity Likelihood Treatment Decisions

Context & Scope

Risk Management Method

Identify Risks

Analyse Risks

Evaluate RisksCom

mun

icat

e &

Con

sult

Monitor &

Review

Analyse Risks

Customise for your organisation

Page 72: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 72

Likelihood of Specific Threats

Information sources Operational history General experience Intelligence Industry information sharing

Likelihood ratings High, medium or low

Page 73: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 73

Risk AnalysisIn

crea

sing

Dam

age

ImpactTreatment Decisions

Context & Scope

Risk Management Method

Identify Risks

Analyse Risks

Evaluate RisksCom

mun

icat

e &

Con

sult

Monitor &

Review

Analyse Risks

Customise for your organisation

Measure Description

Major Major problems would occur and threaten the operation of important processes resulting in significant financial loss.

Moderate Business would continue, but would be severely limited, resulting in some financial or opportunity loss.

Minor Effectiveness of business operations would be threatened but dealt with.

Insignificant Dealt with as a part of routine operations.

Page 74: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Impact Categories

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 74

Safety Financial Reputation Legal EnvironmentCatastrophic Many deaths bankrupt Lost govt

customer confidence, global

Govt takeover,CEO jailed

Long term huge impact

Major One death Major loss Nation wide adverse coverage, board spill

Govt intervention, major fines, board sacked

Severe impact

Moderate Disabled Lost profit Adverse news Fines, extra audit

Impact, major response

Minor Hurt < $100 K Local issue Low fines Special response

Insignificant Timeoff Petty cash No one care Noted Normal response

Page 75: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 75

Direct Consequences/Costs

Work around costs

Recovery costs

Staff overtime

Equipment replacement

Data re-entry

Reputation recovery

Page 76: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

76

Consequential Loss - Examples

Operational impairments Loss of capability and function “Courier Mail” factor Recovery, restoration, and penalty costs Damage or impact to other areas of operations Financial Opportunity lost Political Reputation & Confidence Liability – damages or criminal

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 77: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 77

Current Mitigations

Assess likelihood and consequences levels according to existing controls

Controls include any mitigating circumstances Fire alarms, evacuation plans Insurance Access Controls & IT controls Management Supervision, business processes BCP, DRP. etc

Likelihood ConsequencesExisting Controls

Page 78: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 7813 May 2014 © Infosec Services 78

Risk Analysis

Legend - E: extreme risk; immediate action required, H: high risk; senior management attention neededM: moderate risk; management responsibility must be specified, L: low risk; manage by routine procedures

Treatment Decisions

Context & Scope

Risk Management Method

Identify Risks

Analyse Risks

Evaluate Risks

Com

mun

icat

e &

Con

sult

Monitor &

Review

Analyse Risks

Use your organisation’s matrix

Page 79: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 79

Analysis Progress Identified assets at risk

Identified threats

Identify threat likelihood

Estimate Consequences

Rate Consequence

Risks ranked

Page 80: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 80

Risk Evaluation

Page 81: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Decisions Decisions . . .

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 81

image courtesy of www.novodiem-bv.com

Page 82: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

5.2COMMUNICATION

&

CONSULTATION

5.6

MONITOR

&

REVIEW

5.3 ESTABLISHING THE CONTEXT

5.4.3 RISK ANALYSIS

5.4.4 RISK EVALUATION

5.5 RISK TREATMENT

5.3.2 External Context5.3.3 Internal Context5.3.4 Risk Management Process Context5.3.5 Developing Risk Criteria

5.5.2 Selection of risk treatment options5.5.3 Preparing and implementing risk

treatment plans

Determine existing controlsDetermineLikelihood

DetermineConsequences

Estimate Level of Risk

Compare against criteria.Identify & assess options.Decide on response.Establish priorities.

5.4

RISK

ASSESSMENT

5.4.2 RISK IDENTIFICATIONWhat can happen, when, where, how & why

ISO 31000 Risk management process in detail29 May 2019 Copyright © Infosec Services Pty Ltd 2019 82

Page 83: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Risk Evaluation

8 & 9 November 2018 © Copyright Infosec Services Pty Ltd 2018 83

Risk 1 Risk 2 Risk 3 Risk 4

Risk Level

Risk Appetite

Page 84: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 84

Evaluation

Compare to criteria from the context phase

Identify and assess options Decide on the response Accept Treat Avoid Transfer

Establish priorities

Page 85: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 85

Risk Evaluation - Document

Identification Analysis Evaluation

Threat Existing Controls Likelihood Impact Current

Risk Decide

Payroll delayed due to EFT file corrupted

CRC checks Possible Moderate Medium Accept

IT outage - Floodeddata centre, loss of sales, backups onsite

Backups Rare Major Medium Treat

….

Page 86: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 86

Risk Treatment & Acceptance

Determine appropriate actions to manage risk

Page 87: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

5.2COMMUNICATION

&

CONSULTATION

5.6

MONITOR

&

REVIEW

5.3 ESTABLISHING THE CONTEXT

5.4.3 RISK ANALYSIS

5.4.4 RISK EVALUATION

5.5 RISK TREATMENT

5.3.2 External Context5.3.3 Internal Context5.3.4 Risk Management Process Context5.3.5 Developing Risk Criteria

5.5.2 Selection of risk treatment options5.5.3 Preparing and implementing risk

treatment plans

Determine existing controlsDetermineLikelihood

DetermineConsequences

Estimate Level of Risk

Compare against criteria.Identify & assess options.Decide on response.Establish priorities.

5.4

RISK

ASSESSMENT

5.4.2 RISK IDENTIFICATIONWhat can happen, when, where, how & why

ISO 31000 Risk management process in detail29 May 2019 Copyright © Infosec Services Pty Ltd 2019 87

Page 88: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 88

Risk EvaluationRisk register

Existing controls

Action priority

Risk Description

Consequences

Consequence rating

Likelihood rating

Level of risk

Failure of payroll file transfer

Consequences of the Event

Courier backup

4 Days DelayPaying employees

MODERATE HIGH HIGH ?

Flooded data centre

IT Outage, No sales

DR Plan MAJOR POSSIBLE HIGH ?

Page 89: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 89

Level of Risk

Catastrophic

Cost of Treatment

Insignificant

$ $$$$

Uneconomic

Implement Risk TreatmentNo Brainer

Open for debate!

Forget it!

Risk Management Decisions

Page 90: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 90

Set Treatment Priorities

Highest level risks first don’t ignore the hard issue/high risk

Schedule the simple and cheap ‘quick fixes’

Must plan to treat high or extreme risks Often regulated requirements

Report other risks

Page 91: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 91

Set Treatment Priorities

Risk level does not equal priority! Fixing one risk could reduce other high risks Quick wins = commonsense

Priorities must be set within risk levels Constraints, timing, ease of implementation Treating certain risks may have greater effect

on overall organizational risk

Page 92: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 92

Risk Treatment

Treatment options

Treatment decision

Consider constraints

Control classes

Plan

Page 93: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 93

Control Constraints

Internal competition for priority My risk is bigger than yours

Impact on operational staff Additional human resources

may be required

Effort RM effort must be balanced

against other activities

Culture System lifecycle Skilled resources

Training and experience

Funding Budget and finance

processes may be inadequate

Page 94: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 94

Control Classes Major/Classic

Prevention Detection Correction

Minor Deterrence Limitation Recovery

Page 95: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 95

Treatment Plans

Senior Management Accountability Funding

Existing operational budget Additional funding

Scheduling

Page 96: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 96

Risk Acceptance

Risk can only be accepted by accountable management or board

The higher the risk level, the higher the appropriate authority required

Page 97: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 97

Risk Acceptance

Report residual risk to process owners, senior management

Accepting the risk is not the end of the process!! Changes to the risk and operating

environment require ongoing monitoring

Page 98: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 98

Tools

Page 99: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 99

Tools for Risk Assessments Risk identification

The risk analysis matrix – via a spreadsheet!

Documentation for each phase Emphasis on appropriate level of detail/abstraction

More advanced tools Risk databases Workflow Corpgovrisk.com CRAMM Acuity RM (http://www.acuityrm.com/) Enterprise Risk Manager

(http://www.incom.com.au/Home.aspx) ENISA list (http://rm-inv.enisa.europa.eu/tools) SAAS – e.g. intelligence bank – GRC tools

Page 100: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 100

Identification Tools

Interviews Workshops Experienced staff/consultants Checklists of risks, standards Process flowcharts CIA analysis Scenario analysis Formal tools

Page 101: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 101

Risk Analysis Tools

Matrices Likelihood (Threat/Vulnerability) Risk (Impact/Likelihood)

Spreadsheets

Page 102: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 102

Sample RM TableRisk Assessment Analysis Treatment

Threat Likelihood Impact Risk Level Priority Acceptable?Existing Controls

Likelihood after controls Impact

Residual Risk

Control Cost Responsible Timeframe

Page 103: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 103

Gap Analysis Table

Requirements Current controls

Compliance Level

Residual risk

Recommendation Responsibility

Classify assets

PolicyTraining

Partial High Reduce riskTrain staff

Security Manager

Business Continuity Management

No BCP Nil Extreme Reduce riskDevelop BCP

CIO

Page 104: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 104

Gap Analysis Inputs

Standards ISO/AS 27002 PCIDSS Aust Govt – ISM, Top Mitigations list

Sector Guides APRA TISN – Critical Infrastructure

Vendor Guides IT Infrastructure

Page 105: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 105

Documentation Risk identification List of threats and vulnerabilities

Risk analysis List of risks including probability and the

likely impact Risk evaluation List of prioritised risks

Risk acceptance Management acknowledgement of current

risks Risk treatment Plans for risk mitigation

Page 106: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 106

Techniques

Find the ‘best fit’ approach

Page 107: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 107

Levels of Rigour Informal judgement (for high level RA)

Rely on local skills and experience Operational history Expert review and assistance

Semi formal (appropriate for subsequent detailed RA)

Workshopping, scenario walkthroughs Delphi technique

Formal Actuary Fault tree analysis

CRAMM, RAMP and other (expensive) software

Page 108: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 108

Techniques – Context & Scope

Page 109: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 109

Context & Scope Techniques

Sponsor

Legal drivers

General Counsel

Page 110: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 110

Techniques – Risk Identification

Page 111: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 111

Identification Techniques

Brainstorming Interviews Workshops

Standards & guidelines Project, IT documentation Industry experience

Verizon Data Breach Investigations Report Industry information sharing networks

• Formal and informal! AusCERT, CERT Australia

Page 112: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 112

Techniques – Risk Analysis

Page 113: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 113

Analysis Techniques

Likelihood Collecting opinions Industry averages

Impacts Corporate documentation Interview C suite

Risk level Use/extend enterprise risk framework

Page 114: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 114

Techniques - Evaluation

Page 115: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 115

Evaluation Techniques

Compare against criteria Assess options Accept Treat Avoid Transfer

Executive discussions Record recommendations and

decisions

Page 116: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 116

Techniques – Treatment Plans

Page 117: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Treatment Techniques

Treatment plans, security plans, programsPrioritise actionsTreatment planning Identify control options Costs v’s benefits

• Financial costs• Operational costs• Opportunity costs

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 117

Page 118: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 118

Treatment Costing Business as usual Operation funding

Management level approvals?

Capital expenditure funding Timeframes Benefits

Is the treatment worth the effort?

Page 119: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 119

Advanced Risk Management

Page 120: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Objectives

Moving on from the simple view Adapting to achieve your goals Avoiding pitfalls

Confident RM application Hypothetical risk assessment Sharing experiences and insight

Copyright © Infosec Services Pty Ltd 2019 12029 May 2019

Page 121: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Agenda

Your experiences What worked What didn’t

Deep dive – Risk assessmentsTraps for young playersPractice Run

Copyright © Infosec Services Pty Ltd 2019 12129 May 2019

Page 122: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 122

Institute of Internal Auditors

Page 123: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

NIST SP800-30 (USA)

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 123

Page 124: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

NIST SP800-30 (USA)

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 124

Page 125: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Support for Security

Copyright © Infosec Services Pty Ltd 2019 125

Difficult

Usually controlled

No Arguments

Low priority

Impact

Likelihood

29 May 2019

Page 126: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Traps & Pitfalls

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 126

Page 127: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Don’t Expect PerfectionNot all threats may be identified before hand

Remember September 11

Likelihood is an educated guess Imperfect information Predicting the future Betting with the odds

Vulnerability is variable Human perception Changing circumstances

Consequences are often hypothetical What if? Worst case or likely case impacts?

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 127

Page 128: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

128

Traps for New Players

IdeologyIgnorancePoliticsSecurity is only confidentiality Auditing detailed controlsAll risks are highQuantitative Too much detail

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Presenter
Presentation Notes
14:30 – 14:40 (10 mins)
Page 129: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

129

Security is not just Secrets

Security is: Confidentiality Integrity Availability

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 130: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

130

Auditing

It is not necessary to audit controls to prepare a risk assessmentDetailed risk assessments analyse control

effectiveness High level risk assessments focus on major control

gaps

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 131: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

131

Details, details, . . .

Don’t get too detailed “breadth first” rather than “depth first” Group similar assets

Quantitative assessments Many information security issues don’t suit an

analysis based on $$ Aim for qualitative assessments

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 132: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

132

An Imperfect Process

Not all threats may be identified Remember September 11

Likelihood is an educated guess Imperfect information Predicting the future Betting with the odds

Vulnerability is variable Human perception Changing circumstances

Consequences are often hypothetical What if?

Copyright © Infosec Services Pty Ltd 201929 May 2019

Page 133: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Managing Risk

Not all risks can be eliminated Doing business is taking a risk!

Not all risks can be anticipated SARS, September 11

Management makes investment decisions Cost of controls vs cost of potential consequences

Risk analysis is only the beginningAn ongoing program is essential

Copyright © Infosec Services Pty Ltd 2019 13329 May 2019

Page 134: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

134

Fact: Commitment Varies

Management perception of threats Ignorance is bliss? Credibility of the risk management process Priorities from Board or Cabinet

Risk appetite Willingness to accept potential losses and disruptions

Context of existing “culture” Not invented here Head in the sand Full speed ahead CYA

Copyright © Infosec Services Pty Ltd 201929 May 2019

Page 135: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

135

ConstraintsSkilled resources

Training and experience

Funding Budget and finance processes may be inadequate

Internal competition for priority My risk is bigger than yours

Impact on operational staff Additional human resources may be required Or fear of this

Effort RM effort must be balanced against other activities

Copyright © Infosec Services Pty Ltd 201929 May 2019

Page 136: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

136

Time and MoneyLead times for risk treatment

The longer you wait, the more it costs Today’s major risk could be irrelevant next year New and urgent critical risks can intervene The worst could happen before you’re prepared

Costs Design and development Implementation Management and maintenance Operational overheads Impact on system reliability or availability

Copyright © Infosec Services Pty Ltd 201929 May 2019

Page 137: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Accurate Analysis

Correct Context Audiences

• Decisions & funding• Implementation of Recommendations

Crucial for the communication Setting the criteria for acceptance, treatment . . Know who and why you’re doing the risk

assessment Know the management’s drivers

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 137

Presenter
Presentation Notes
Common complaints “They just don’t understand” Projects doing RA when the business owns the risk Different skills profiles CEO – heavy on ‘networking’ Management – heavy on processes, weaker on tech and networking Technical/workforce – heavy on hands on skills, low on networking and process
Page 138: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Agree on the Threats

A major source of disengagementTools Case studies Regulations, industry experience Threat assessment process (formal)

• Standards Australia Handbook 167 – Security Risk Assessment

» (this is a physical security document)

Copyright © Infosec Services Pty Ltd 2019 13829 May 2019

Page 139: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Scope of Threats

errors and omissionsfraud and theftemployee sabotageloss of physical and infrastructure supportmalicious hackingmalicious codeindustrial espionage

Copyright © Infosec Services Pty Ltd 2019 139

Australian Government TISN – Defence in Depth

29 May 2019

Page 140: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Threat Assessment

Copyright © Infosec Services Pty Ltd 2019 140

Source Motivation Intent Capability Threat Level Evaluation & Comments

29 May 2019

Page 141: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Threat & Likelihood

Low skill threat

Medium skill threat actors, not targeted

Medium skill threat actors, targeted

High skill threat actors, targeted (Capability & Intent)

Low maturity controls

Unlikely Possible Probable Almost Certain

Repeatable controls, no assurance

Unlikely Possible Possible Probable

Reasonable controls

Rare Unlikely Unlikely Possible

Strong and verified controls

Rare Rare Unlikely Possible

© Copyright Infosec Services Pty Ltd 2018 14127-28 June 2018

Page 142: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Risk Likelihood via Threat Analysis

Low Medium High

High Moderate LikelyAlmostCertain

Medium Unlikely Moderate Likely

Low Rare Unlikely Moderate

Vulnerability Level

Threat

Level

Page 143: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Analyse ConsequencesConsequence Financial WHS Legal Reputation Environment

Catastrophic Profit x 10 Multiple Loss of licence Long term negative brand

Long term severe damage

Severe Profit x 1 Death, severe injury

Restricted licence,

Media campaign

Short term severe damage

Major 10% of profit Serious injury Fines, damages

Adverse media Major damage

Minor 1% profit Minor injury Technicality Minor exposure

Repairable

Insignificant > $ 5000 Loss of time Mediation Limited Negligible

Copyright © Infosec Services Pty Ltd 2019 14329 May 2019

Page 144: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

RM Process – Analysis Pitfalls

Traps : Wrong audience Inaccurate consequence Ignoring compensating controls

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 144

Page 145: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Compensating Factors

Search for other controls that limit the risk

Business process level Financial separation of duties Detective controls, eg.

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 145

Page 146: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Document Decisions

Risk register

Password Only MODERATE HIGH HIGHMany times

per yearRouter Compromise

Intrusion,Disruption

Existing controls

Risk priority

Risk Assessment

Threat Probability

ImpactRating

Level of

Risk

Risk Description

Likelihood Rating

2None(Not addressed in BCP)

MAJOR LOW HIGHOnce in 25 Years

Physical Destruction of Data Centre

Operations Disrupted for one month 1

Document Decisions

Context & Scope

Risk Management Method

Identify Risks

Analyse Risks

Treat Risks

Com

mun

icat

e &

Con

sult

Monitor &

Review

Document

TreatmentPlan

Project Y03

Project Z21

Copyright © Infosec Services Pty Ltd 2019 14629 May 2019

Page 147: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

NIST SP800-30 (USA)

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 147

Page 148: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

TECHNIQUES – PROGRESS REPORTS

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 148

Page 149: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Scorecards & Self Assessment

Effective shortcuts and metricsCustomised to organisationIntegrated with performance reporting and

project methodologies

Copyright © Infosec Services Pty Ltd 2019 14929 May 2019

Page 150: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Balanced ScorecardsProjects

Target Measure Score85% of new projects Completed Self

Assessments

85% of new projects Completed Security Plans

Security plans on schedule

Milestones and deliverables

100% of project managers trained in year

25% of project managers in training this quarter

880%

Result: 6.5 out of 10

14%25%

5

60%85%

7

50%85%

6

Page 151: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Capability Maturity Model

151

Optimised

Initial/Adhoc

Managed

Defined

Repeatable

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 152: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 152

Risk Acceptance

Don’t surprise managementResidual risk acceptanceContinual improvement Monitor & review

Presenter
Presentation Notes
11:45 (5 mins)
Page 153: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

153

Shortcuts

Combine threat and vulnerability assessmentsInclude existing controls Skip calculating the inherent risk

Exclude common (non-critical) risks Protected by baseline controls

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 154: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

154

Critical Success Factors

Stakeholder involvementRegular/appropriate communication with

stakeholdersManage perceptions perceptions drive decisions

Balancing effort, risks and opportunity

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 155: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

155

Critical Success Factors (2)

Executive supportEffective communication based on the target audience

Balancing precision/accuracy and timeframes

29 May 2019 Copyright © Infosec Services Pty Ltd 2019

Page 156: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 156

Decisions and Outcomes

Page 157: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Persuasion

Aristotle - three factors in persuasion: intellectual (logos) psychological (pathos) social or ethical (ethos).

Objective evidence rarely changes minds People & decisions

• personal relevance and impact of a claim, • Trustworthy source

Alan Alda Tell a story !

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 157

Page 158: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Decision Making

Risk Assessment goal = decisionsPsychology of decision making and

judgements Kahneman and Tversky Prof Richard Thaler

Decision theory debate Rational decision theory v’s Biased and heuristic decisions

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 158

Page 159: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Heuristics

“Rules of thumb”‘industry good practice’‘major change = major risk’. . . . . . .

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 159

Page 160: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

Cognitive Biases Deviations from rational judgement Availability bias

More frequent, recent information = higher weight Anchoring bias

Tendency to use the first piece of information Optimism bias

less at risk of experiencing a negative event compared to others I’m a lucky person – always have been !!

Confirmation bias Due to preconceptions

Conservatism or regressive bias high values and high likelihoods overestimated low values and low likelihoods are underestimated

Conflict of Interest Bonuses

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 160

Page 161: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 161

Workshop

Page 162: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 162

Page 163: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 163

You don’t have to manage risk

Survival is not compulsory!

Page 164: Masterclass: Information/Cyber Security Risk Management · Masterclass Overview Formal risk management standards Some theory & definitions Techniques Communicating better. ... Must

29 May 2019 Copyright © Infosec Services Pty Ltd 2019 164

Best of Luck !

Gary GaskellE: [email protected]

W: www.infosecservices.com.auM: 0438 603 307

Infosec Services Pty Ltd


Recommended