SlideShare uma empresa Scribd logo
1 de 13
Risk management and mitigation


Cian Blackwell
Partner, Business Risk Services


1 June 2011


© 2010 Grant Thornton International. All rights reserved.
Agenda and themes




• focus on cloud computing
• hype and renewed interest in risk
• dispelling a few myths about risk and new
  technologies
• back to fundamentals—a model for assessing and
  addressing risk




© 2010 Grant Thornton International. All rights reserved.
Cloud computing hype



• both positive
  and negative
  abounds
• positive hype is
  nothing unusual
• negative hype
  needs more
  attention....




© 2010 Grant Thornton International. All rights reserved.
© 2010 Grant Thornton International. All rights reserved.
What is the truth about cloud computing risk?




• much of what goes on in the cloud is risky....
• ... much of everything is risky

• cloud computing—or any form of outsourcing—is
  not inherently a 'bad idea'

• the risks with cloud computing are not inherently
  worse
   – they're just different
© 2010 Grant Thornton International. All rights reserved.
Risk and opportunity….




• "risk" only makes sense in the context of an
  organisation's objectives
• risk can be seen as:
   – anything that adversely affects the achievement
     of an organisation's goals
• opportunity can be seen as :
   – anything that positively affects the achievement
     of an organisation's goals

© 2010 Grant Thornton International. All rights reserved.
But it's not all negative hype….




• “…the cloud’s economies of scale and flexibility are
  both a friend and a foe from a security point of
  view.
• "The massive concentrations of resources and
  data present a more attractive target to attackers,
  but cloud-based defences can be more robust,
  scalable and cost effective”

         – Source: ENISA, Cloud computing: Benefits, risks and
           recommendations for information security
© 2010 Grant Thornton International. All rights reserved.
How does cloud computing change the risks?



• some risks have increased, and not always the ones you
  expect
   – for example, data protection risk is seen as significantly
     higher if the data is stored outside the EU
       • but even within the EU, and regardless of whether
         you use cloud computing, data protection risks are
         high
       • the risk is more closely linked to the nature of the
         data than the type of technologies used


© 2010 Grant Thornton International. All rights reserved.
How does cloud computing change the risks?



• some risks can increase, for example:
   – visibility and control of what's happening to your data
   – contractual risk, including SLAs and performance
   – bandwidth—especially "contingency bandwidth"
   – migration of data (out, rather than in....)
   – forensic considerations—incident response, e-discovery
   – general security issues—policies, standards,
     procedures—what about testing?



© 2010 Grant Thornton International. All rights reserved.
How does cloud computing change the risks?




• however, cloud computing can also reduce risk, for
  example
   – increase in independence and segregation of
     duties
   – increased economies of scale for security
     investment
   – availability of specialised security expertise
   – existence of a contractual or SLA framework

© 2010 Grant Thornton International. All rights reserved.
Managing risk (1)




• risks are not the same for everyone—
  circumstances differ, priorities differ
• however, the approach to addressing and
  mitigating risk needs to be standard
• a consistent risk management process should be
  organisation-wide, not IT-specific




© 2010 Grant Thornton International. All rights reserved.
Managing risk (2)




• the risk management process...
• controls need to
  match the risk—
  sufficient, but not                                                 Risk
  excessive
• auditing provides
  assurance the
  controls work—                                            Control          Audit
  and identifies risk
© 2010 Grant Thornton International. All rights reserved.
In summary




• don't believe the hype—everything is risky
• there are no default risks—every organisation has
  its own risk profile, and any change in technology
  changes the risks
• a consistent approach to evaluating and
  addressing risk is essential—the approach is the
  same regardless of the risks
• risk and opportunity go hand-in-hand

© 2010 Grant Thornton International. All rights reserved.

Mais conteúdo relacionado

Mais procurados

Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014FERMA
 
Managing risk through effective team based decision making-A npower case study
Managing risk through effective team based decision making-A npower case studyManaging risk through effective team based decision making-A npower case study
Managing risk through effective team based decision making-A npower case studyMd.Masudur Rahaman
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksPhil Huggins FBCS CITP
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crainsegughana
 

Mais procurados (7)

Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014
 
Designing an effective Crisis Management Framework
Designing an effective Crisis Management FrameworkDesigning an effective Crisis Management Framework
Designing an effective Crisis Management Framework
 
Pitfalls of Cyber Data
Pitfalls of Cyber DataPitfalls of Cyber Data
Pitfalls of Cyber Data
 
Managing risk through effective team based decision making-A npower case study
Managing risk through effective team based decision making-A npower case studyManaging risk through effective team based decision making-A npower case study
Managing risk through effective team based decision making-A npower case study
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
VI.3 DAC-EPOC JOINT TASK TEAM ON CLIMATE CHANGE AND DEVELOPMENT CO-OPERATION
VI.3  DAC-EPOC JOINT TASK TEAM ON CLIMATE CHANGE AND DEVELOPMENT CO-OPERATIONVI.3  DAC-EPOC JOINT TASK TEAM ON CLIMATE CHANGE AND DEVELOPMENT CO-OPERATION
VI.3 DAC-EPOC JOINT TASK TEAM ON CLIMATE CHANGE AND DEVELOPMENT CO-OPERATION
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 

Destaque

Visual Process, an innovative analytical solution by bridging business and da...
Visual Process, an innovative analytical solution by bridging business and da...Visual Process, an innovative analytical solution by bridging business and da...
Visual Process, an innovative analytical solution by bridging business and da...Avraham CHOUKROUN
 
Com Score Webinar Getting Beyond Big In Online Video
Com Score Webinar   Getting Beyond Big In Online VideoCom Score Webinar   Getting Beyond Big In Online Video
Com Score Webinar Getting Beyond Big In Online Videobmohri
 
Who Smokes? Do You?
Who Smokes? Do You?Who Smokes? Do You?
Who Smokes? Do You?Who Smokes?
 
Energy Efficiency and Property Values
Energy Efficiency and Property ValuesEnergy Efficiency and Property Values
Energy Efficiency and Property ValuesJosh Develop
 
Drugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizenDrugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizen1003501090
 
Projet journalistique aldebaran
Projet journalistique aldebaranProjet journalistique aldebaran
Projet journalistique aldebaranEmma Burger
 
ASPerian - IBM 2004 Rev Ago
ASPerian - IBM 2004 Rev AgoASPerian - IBM 2004 Rev Ago
ASPerian - IBM 2004 Rev AgoJose E. Padua H.
 
Why researchers collaborate with technology companies - a behavioral data exa...
Why researchers collaborate with technology companies - a behavioral data exa...Why researchers collaborate with technology companies - a behavioral data exa...
Why researchers collaborate with technology companies - a behavioral data exa...Daan Versteeg
 
Xieg0955 ab
Xieg0955 abXieg0955 ab
Xieg0955 abGWROY
 
How to install a new moodle 2.4 theme
How to install a new moodle 2.4 themeHow to install a new moodle 2.4 theme
How to install a new moodle 2.4 themeParadiso LMS
 
Npds söderling june2010
Npds söderling june2010Npds söderling june2010
Npds söderling june2010Petra Soderling
 

Destaque (18)

WhoSmokes?
WhoSmokes?WhoSmokes?
WhoSmokes?
 
Visual Process, an innovative analytical solution by bridging business and da...
Visual Process, an innovative analytical solution by bridging business and da...Visual Process, an innovative analytical solution by bridging business and da...
Visual Process, an innovative analytical solution by bridging business and da...
 
Com Score Webinar Getting Beyond Big In Online Video
Com Score Webinar   Getting Beyond Big In Online VideoCom Score Webinar   Getting Beyond Big In Online Video
Com Score Webinar Getting Beyond Big In Online Video
 
Who Smokes? Do You?
Who Smokes? Do You?Who Smokes? Do You?
Who Smokes? Do You?
 
Energy Efficiency and Property Values
Energy Efficiency and Property ValuesEnergy Efficiency and Property Values
Energy Efficiency and Property Values
 
Drugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizenDrugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizen
 
FMurtagh_Sfi_3dec2009_Future_Internet
FMurtagh_Sfi_3dec2009_Future_InternetFMurtagh_Sfi_3dec2009_Future_Internet
FMurtagh_Sfi_3dec2009_Future_Internet
 
Calendar of Events
Calendar of EventsCalendar of Events
Calendar of Events
 
CV
CVCV
CV
 
Projet journalistique aldebaran
Projet journalistique aldebaranProjet journalistique aldebaran
Projet journalistique aldebaran
 
ASPerian - IBM 2004 Rev Ago
ASPerian - IBM 2004 Rev AgoASPerian - IBM 2004 Rev Ago
ASPerian - IBM 2004 Rev Ago
 
Mardi Gras
Mardi GrasMardi Gras
Mardi Gras
 
Why researchers collaborate with technology companies - a behavioral data exa...
Why researchers collaborate with technology companies - a behavioral data exa...Why researchers collaborate with technology companies - a behavioral data exa...
Why researchers collaborate with technology companies - a behavioral data exa...
 
Xieg0955 ab
Xieg0955 abXieg0955 ab
Xieg0955 ab
 
Arun-J-resume
Arun-J-resumeArun-J-resume
Arun-J-resume
 
How to install a new moodle 2.4 theme
How to install a new moodle 2.4 themeHow to install a new moodle 2.4 theme
How to install a new moodle 2.4 theme
 
Npds söderling june2010
Npds söderling june2010Npds söderling june2010
Npds söderling june2010
 
Business Card_no Crops
Business Card_no CropsBusiness Card_no Crops
Business Card_no Crops
 

Semelhante a Cian Blackwell - Risk management and mitigation 2011

Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...Livingstone Advisory
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationFERMA
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big dataJames Deiotte
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards ComplianceDr. Prashant Vats
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalPatrick Florer
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docxLyndonPelletier761
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docxherminaprocter
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architectureiasaglobal
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Livingstone Advisory
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 

Semelhante a Cian Blackwell - Risk management and mitigation 2011 (20)

Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentation
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Cyber Risk in the Energy Industry
Cyber Risk in the Energy IndustryCyber Risk in the Energy Industry
Cyber Risk in the Energy Industry
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
 
Does it pay to be cyber-insured
Does it pay to be cyber-insuredDoes it pay to be cyber-insured
Does it pay to be cyber-insured
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 

Mais de Irish Future Internet Forum

4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...Irish Future Internet Forum
 
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Irish Future Internet Forum
 
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreRay Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreIrish Future Internet Forum
 
Michel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetMichel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetIrish Future Internet Forum
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 

Mais de Irish Future Internet Forum (20)

4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
 
Alan Smeaton Irish Future Internet Forum 2011
Alan Smeaton Irish Future Internet Forum 2011Alan Smeaton Irish Future Internet Forum 2011
Alan Smeaton Irish Future Internet Forum 2011
 
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
 
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreRay Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
 
CNGL Future Internet position - Vincent Wade.
CNGL Future Internet position - Vincent Wade.CNGL Future Internet position - Vincent Wade.
CNGL Future Internet position - Vincent Wade.
 
Barry Smyth Clarity Future Internet
Barry Smyth Clarity Future InternetBarry Smyth Clarity Future Internet
Barry Smyth Clarity Future Internet
 
NEMBES Future Internet position - Dirk Pesch
NEMBES Future Internet position - Dirk PeschNEMBES Future Internet position - Dirk Pesch
NEMBES Future Internet position - Dirk Pesch
 
Future internet Forum Google - Eoghan Nolan.
Future internet Forum Google - Eoghan Nolan. Future internet Forum Google - Eoghan Nolan.
Future internet Forum Google - Eoghan Nolan.
 
IBM Research Future Internet
IBM Research Future InternetIBM Research Future Internet
IBM Research Future Internet
 
Michel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetMichel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the Internet
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Model Smart City Barcelona
Model Smart City BarcelonaModel Smart City Barcelona
Model Smart City Barcelona
 
Irish Future Internet Forum Zed Sabeur
Irish Future Internet Forum Zed SabeurIrish Future Internet Forum Zed Sabeur
Irish Future Internet Forum Zed Sabeur
 
IFIF 2011 opening - Willie Donnelly
IFIF 2011 opening - Willie DonnellyIFIF 2011 opening - Willie Donnelly
IFIF 2011 opening - Willie Donnelly
 
SFI Irish Future Internet Forum
SFI Irish Future Internet ForumSFI Irish Future Internet Forum
SFI Irish Future Internet Forum
 
IFIF Ideas Submission
IFIF Ideas SubmissionIFIF Ideas Submission
IFIF Ideas Submission
 
Sdecker
SdeckerSdecker
Sdecker
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
Donal Simmie Ifif Poster 1209
Donal Simmie Ifif Poster 1209Donal Simmie Ifif Poster 1209
Donal Simmie Ifif Poster 1209
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 

Último

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 

Último (20)

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 

Cian Blackwell - Risk management and mitigation 2011

  • 1. Risk management and mitigation Cian Blackwell Partner, Business Risk Services 1 June 2011 © 2010 Grant Thornton International. All rights reserved.
  • 2. Agenda and themes • focus on cloud computing • hype and renewed interest in risk • dispelling a few myths about risk and new technologies • back to fundamentals—a model for assessing and addressing risk © 2010 Grant Thornton International. All rights reserved.
  • 3. Cloud computing hype • both positive and negative abounds • positive hype is nothing unusual • negative hype needs more attention.... © 2010 Grant Thornton International. All rights reserved.
  • 4. © 2010 Grant Thornton International. All rights reserved.
  • 5. What is the truth about cloud computing risk? • much of what goes on in the cloud is risky.... • ... much of everything is risky • cloud computing—or any form of outsourcing—is not inherently a 'bad idea' • the risks with cloud computing are not inherently worse – they're just different © 2010 Grant Thornton International. All rights reserved.
  • 6. Risk and opportunity…. • "risk" only makes sense in the context of an organisation's objectives • risk can be seen as: – anything that adversely affects the achievement of an organisation's goals • opportunity can be seen as : – anything that positively affects the achievement of an organisation's goals © 2010 Grant Thornton International. All rights reserved.
  • 7. But it's not all negative hype…. • “…the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. • "The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost effective” – Source: ENISA, Cloud computing: Benefits, risks and recommendations for information security © 2010 Grant Thornton International. All rights reserved.
  • 8. How does cloud computing change the risks? • some risks have increased, and not always the ones you expect – for example, data protection risk is seen as significantly higher if the data is stored outside the EU • but even within the EU, and regardless of whether you use cloud computing, data protection risks are high • the risk is more closely linked to the nature of the data than the type of technologies used © 2010 Grant Thornton International. All rights reserved.
  • 9. How does cloud computing change the risks? • some risks can increase, for example: – visibility and control of what's happening to your data – contractual risk, including SLAs and performance – bandwidth—especially "contingency bandwidth" – migration of data (out, rather than in....) – forensic considerations—incident response, e-discovery – general security issues—policies, standards, procedures—what about testing? © 2010 Grant Thornton International. All rights reserved.
  • 10. How does cloud computing change the risks? • however, cloud computing can also reduce risk, for example – increase in independence and segregation of duties – increased economies of scale for security investment – availability of specialised security expertise – existence of a contractual or SLA framework © 2010 Grant Thornton International. All rights reserved.
  • 11. Managing risk (1) • risks are not the same for everyone— circumstances differ, priorities differ • however, the approach to addressing and mitigating risk needs to be standard • a consistent risk management process should be organisation-wide, not IT-specific © 2010 Grant Thornton International. All rights reserved.
  • 12. Managing risk (2) • the risk management process... • controls need to match the risk— sufficient, but not Risk excessive • auditing provides assurance the controls work— Control Audit and identifies risk © 2010 Grant Thornton International. All rights reserved.
  • 13. In summary • don't believe the hype—everything is risky • there are no default risks—every organisation has its own risk profile, and any change in technology changes the risks • a consistent approach to evaluating and addressing risk is essential—the approach is the same regardless of the risks • risk and opportunity go hand-in-hand © 2010 Grant Thornton International. All rights reserved.

Notas do Editor

  1. In general, the agenda for the presentation is to dispel some of the myths associated with cloud computing hype. The presentation will cover how the risks of cloud computing are not as obvious as they seem—some risks get too much attention, some don't get enough—and will also cover some of the risks that can be mitigated by a move to cloud computing. Finally, we will cover some of the approaches to mitigating risk, including the risk management model, and certification.
  2. Cloud computing has attracted a considerable amount of hype recently, and continues to do so. The Gartner Hype Cycle from 2010 shows "Cloud Computing" just beyond the "Peak of Inflated Expectations." Although positive hype is nothing unusual for new technologies, negative hype—specifically about the risks of cloud computing—is potentially more damaging and needs to be addressed.
  3. Coverage in February 2010 of a Department of Finance memo warning public sector bodies not to purchase cloud computing services. Whilst this was really just good advice—don't embark on something new unless you have dealt with the issues—much of the coverage interpreted it as a dire warning of the risks of cloud computing.
  4. Science fiction author Theodore Sturgeon (http://en.wikipedia.org/wiki/Theodore_Sturgeon) originated what has since become known (in science fiction circles at least) as Sturgeon's Law. He found he was frequently defending the genre from people citing examples of trashy pulp sci-fi as "evidence" that 90% of science fiction—and thus the genre itself—was rubbish. He argued that, in his own words: of course 90% of science fiction is "crud" — "90% of everything is crud". His point of course was that just because science fiction is an easily identifiable genre of fiction, it's easy to 'tar it all with the same brush'. Likewise for cloud computing—an easily identifiable genre of technology—just because much of it is risky doesn't mean it should all be dismissed. There is nothing inherently risky about outsourcing critical processes—finance departments have been doing it for years, for example to shared service centres within or outside their own company. Just because the risks related to cloud computing are different to what we may be used to, does not mean that they are worse .
  5. We need to be aware of the appropriate perspective from which to view our risks—as a general rule, one person's risk is another person's opportunity. It's easy to work out the major risk from the cloud service provider's perspective—it's the commercial risk of not enough customers paying enough for your cloud services. We can take that for granted, and look at it from the customer's perspective, where in general terms, a risk is not just some theoretical "adverse event" but, in very real terms, anything that can adversely affect the achievement of the customer's business goals. Obviously the service provider needs to focus on the customer's perception of risk.
  6. This is an example of what I call a "red herring" risk. Data protection is seen as being much riskier when you move beyond the perceived safety of the relatively strong legislative framework in the EU. Although it is indeed true that the EU (and a small number of other jurisdictions) have stronger data protection legislation than most of the rest of the world, the protection provided by legislation is largely illusory. Mitigating data protection risk is almost entirely a behavioural issue, with behavioural solutions (policies, procedures, training, communication, restricting potentially risky practices, etc). There are huge data protection issues in any jurisdiction, regardless of how good the legislation is.
  7. The above are a number of examples of risks that increase when you move to a cloud environment. Most are self-explanatory; a few need more explanation. Contingency bandwidth is not the same as peak bandwidth—it means the bandwidth required in exceptional circumstances, such as re-uploading a month's worth of transactions to resolve a database corruption issue, or restoring your data from the cloud archiving solution you use. The migration point relates to the safeguards that should be in place if you decide to terminate your contract with a cloud service provider—do they make it easy to get the data back out again? As easy as it was when you were signing up? Forensic issues relate to whether you have sufficient access to the cloud systems in the event that you need to perform a forensic investigation. Regarding general security issues—the use of security testing (e.g. penetration tests) is a common control, but cloud service providers may be very reluctant to allow customers to attempt to hack their systems, requiring a rethink and a different approach. Unfortunately, not all of the above get the attention they deserve.
  8. The often overlooked point is that there are some risks that are greater when you stick with a non-cloud "solution." Having your infrastructure and apps in-house, managed by your own team that only deals with your company means that you don't have the levels of objectivity, economies of scale and contractual guarantees that you should (although may not always) have with a cloud service provider.
  9. There is no "one-size-fits-all" solution to managing risk—it all depends on your organisation. However, the approach to identifying, managing and mitigating risks should be consistent across an organisation. "Cloud risks" don't deserve special treatment; nor do "IT risks". A "risk" is either a risk to the achievement of the organisation's strategic objectives, or it isn't. The response should be commensurate with the magnitude of the risk, i.e. impact x likelihood.
  10. This is the overall risk management cycle consists of three major steps: Risks are identified Controls are put in place to mitigate the risks Auditing (internal, external, compliance reviews, security reviews, etc) provides assurance that controls are working and risks are being mitigated It's important to note that there must be a correlation between controls and risk . It doesn't have to be a 1:1 correlation—you can have a single control that mitigates multiple risks, or a single risk that requires multiple controls to mitigate it effectively. The crucial points are that: Every risk must have control(s) that mitigate it effectively Every control must be there to mitigate specific risk(s)—otherwise it's a waste of resources