SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
IT	
  Risk	
  Management	
  
Digicomp	
  Hacking	
  Day,	
  11.06.2014	
  
Umberto	
  Annino	
  
•  Wer	
  spricht?	
  
Umberto	
  Annino	
  
WirtschaCsinformaEker,	
  InformaEon	
  Security	
  
•  Was	
  ist	
  ein	
  Risiko?	
  
!	
  Sicherheit	
  ist	
  das	
  Komplementärereignis	
  
zum	
  Risiko	
  
!	
  Risiko	
  ist	
  Schaden	
  mit	
  Potenzial	
  
2	
  
Risiko	
  
3	
  
Gefahr	
  
Bedrohung	
  
Schwach-­‐
stelle	
  
Asset	
  
Risiko	
  
Realitätsabgleich	
  
Compliance?	
  
Risk	
  Management?	
  
OperaEonal	
  Risk,	
  Business	
  ConEnuity?	
  
IT,	
  InformaEon	
  Security	
  –	
  Cyber	
  Security?	
  
Red	
  Team,	
  Threat	
  Modeling,	
  APT	
  and	
  openSSL?	
  
Big	
  Data???	
  
	
  
Security	
  ™	
  vs.	
  Compliance	
  ™	
  
4	
  
IT	
  Risiko	
  in	
  der	
  Risiko-­‐Hierarchie	
  
5	
  
COSO	
  
Enterprise	
  Risk	
  Management	
  Framework	
  
6	
  
ISO	
  31000	
  Risk	
  Mgmt	
  (2009)	
  
Guidelines	
  and	
  Principles	
  and	
  Framework	
  
7	
  
ISO	
  31000	
  Framework	
  
8	
  
ISO	
  31000	
  
Processes	
  
9	
  
ISO	
  31000	
  -­‐	
  Processes	
  
10	
  
Design	
  of	
  
framework	
  for	
  
managing	
  risk	
  
Understanding	
  of	
  the	
  organisaEon	
  and	
  its	
  context	
  
Establishing	
  risk	
  management	
  policy	
  
Accountability	
  
IntegraEon	
  into	
  organisaEonal	
  processes	
  
Resources	
  
Establishing	
  internal	
  communicaEon	
  and	
  reporEng	
  mechanisms	
  
Establishing	
  external	
  communicaEon	
  and	
  reporEng	
  mechanisms	
  
ImplemenEng	
  
risk	
  
management	
  
ImplemenEng	
  the	
  framework	
  for	
  managing	
  risk	
  
ImplemenEng	
  the	
  risk	
  management	
  process	
  
Monitoring	
  and	
  review	
  of	
  the	
  framework	
  
ConEnual	
  improvement	
  of	
  the	
  framework	
  
!	
  Mandate	
  and	
  commitment	
  
ISO	
  31000	
  -­‐	
  Processes	
  
11	
  
Risk	
  
Management	
  
Process	
  
CommunicaEon	
  and	
  consultaEon	
  
Establishing	
  the	
  external	
  context	
  
Establishing	
  the	
  internal	
  context	
  
Establishing	
  the	
  context	
  of	
  the	
  risk	
  
management	
  process	
  
Defining	
  risk	
  criteria	
  
Risk	
  assessment	
  
Risk	
  idenEficaEon	
  
Risk	
  analysis	
  
Risk	
  evaluaEon	
  
Risk	
  treatment	
  
Monitoring	
  and	
  review	
  
Recording	
  the	
  risk	
  management	
  
process	
  
ISO	
  31000	
  
Acributes	
  of	
  enhanced	
  risk	
  management	
  
•  Key	
  outcomes	
  
–  The	
  organisaEon	
  has	
  a	
  current,	
  correct	
  and	
  
comprehensive	
  understanding	
  of	
  its	
  risks	
  
–  The	
  organisaEon‘s	
  risks	
  are	
  within	
  its	
  risk	
  criteria	
  
•  Acributes	
  
–  ConEnual	
  improvement	
  
–  Full	
  accountability	
  for	
  risks	
  
–  ApplicaEon	
  of	
  risk	
  management	
  in	
  all	
  decision	
  making	
  
–  ConEnual	
  communicaEons	
  
–  Full	
  integraEon	
  in	
  the	
  organisaEon‘s	
  governance	
  
structure	
  
12	
  
ISO	
  27005	
  
InformaEon	
  Security	
  Risk	
  Management	
  
13	
  
ISO	
  27005	
  
Context	
  Establishment	
  
14	
  
Basic	
  
Criteria	
  
Risk	
  management	
  approach	
  
Risk	
  evaluaEon	
  criteria	
  
Impact	
  criteria	
  
Risk	
  acceptance	
  criteria	
  
! Scope	
  and	
  Boundaries	
  
! OrganisaEon	
  for	
  informaEon	
  security	
  risk	
  management	
  
ISO	
  27005	
  
InformaEon	
  security	
  risk	
  assessment	
  
15	
  
Risk	
  
idenEficaEon	
  
IdenEficaEon	
  of	
  assets	
  
IdenEficaEon	
  of	
  threats	
  
IdenEficaEon	
  of	
  exisEng	
  controls	
  
IdenEficaEon	
  of	
  vulnerabiliEes	
  
IdenEficaEon	
  of	
  consequences	
  
Risk	
  analysis	
   Risk	
  analysis	
  methodologies	
  
Assessment	
  of	
  consequences	
  
Assessment	
  of	
  incident	
  likelihood	
  
Level	
  of	
  risk	
  determinaEon	
  
ITGI	
  RiskIT	
  Framework	
  
PosiEonierung	
  
16	
  
IT	
  Risk	
  (high	
  level)	
  categories	
  
17	
  
RiskIT	
  Framework	
  
18	
  
Risk	
  maps...	
  
•  Risk	
  
appeEte	
  
•  Risk	
  
tolerance	
  
•  Risk	
  
culture	
  
19	
  
Risk	
  culture	
  
20	
  
IT	
  risk	
  scenario	
  development	
  
21	
  
Risk	
  scenario	
  components	
  
22	
  
Aber:	
  scenario	
  based...	
  
!	
  keeping	
  it	
  real!	
  
23	
  
IT	
  Risk	
  Response	
  
opEons	
  and	
  
prioriEsaEon	
  
24	
  
Verwalten	
  von	
  IT	
  Risiken	
  
Risiko	
  
management	
  
Risiko	
  
analyse	
  
Risiko	
  
idenEfikaEon	
  
Konsolidierung	
  
Link	
  to	
  
business	
  
Risiko	
  
bewertung	
  
QuanEtaEv	
  
QualiEaEv	
  
StaEsEsche	
  
Basis	
  
Risiko	
  
lenkung	
  
Risiko	
  
bearbeitung	
  
Admin	
  
Disziplin/
Aufwand	
  
Kosten	
  
ROI	
  
Risiko	
  
tracking	
  
Nachvollzieh-­‐	
  
barkeit	
  
Konstanz	
  
(Zahlen)	
   25	
  
QuanEfizieren	
  von	
  IT	
  Risiken	
  
26	
  
Big	
  Data?	
  Loss	
  DB?	
  
Komplexität	
  von	
  InformaEonssystemen	
  (und	
  SoCware)?	
  
QuanEfizieren	
  von	
  IT	
  Risiken	
  
•  In	
  der	
  Praxis	
  eher	
  qualitaEv	
  stac	
  quanEtaEv	
  
–  Fehlende	
  staEsEsche	
  Basis	
  
–  Prinzipiell	
  komplexe	
  Systeme	
  
–  Wenig	
  akuter	
  Bedarf	
  zur	
  QuanEfizierung	
  !	
  über	
  
Verknüpfung	
  mit	
  Business	
  Process	
  
•  Konsolidierung	
  der	
  Werte	
  für	
  Management	
  
ReporEng	
  als	
  Grundlage	
  für	
  QuanEfikaEon	
  
•  In	
  der	
  Praxis	
  eher	
  „erste	
  Schrice“	
  stac	
  best	
  
pracEse	
  
•  ISO	
  27005,	
  ITGI	
  RiskIT	
  Framework	
  und	
  
PracEcEoner	
  Guide	
  bieten	
  brauchbare	
  
Grundlagen	
  (Framework)	
  
27	
  
Risk	
  Treatment	
  
28	
  
Risk	
  
treatment	
  
Avoid	
  
Eliminate	
  
Reduce	
  
Minimize
	
  	
  
Transfer	
  
Externalize	
  
Accept	
  
Residual	
  Risk	
  
Controls	
  
Measures	
  
Avoid	
  /	
  
Verhindern	
  
Detect	
  /	
  
Entdecken	
  
Minimize	
  /	
  
Eindämmen	
  
Risk	
  Treatment	
  –	
  ISO	
  27005	
  
29	
  
Konsolidieren	
  von	
  IT	
  Risiken	
  
Disjointed	
  risks	
  
30	
  
Konsolidieren	
  von	
  IT	
  Risiken	
  
shared	
  risks	
  
31	
  
32	
  

Mais conteúdo relacionado

Mais procurados

Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
Rand W. Hirt
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
Claude Baudoin
 
Risk Management Remediation Overview
Risk Management Remediation OverviewRisk Management Remediation Overview
Risk Management Remediation Overview
Russ Pizzuto
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
Jorge Sebastiao
 

Mais procurados (20)

Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 
Risk Management Remediation Overview
Risk Management Remediation OverviewRisk Management Remediation Overview
Risk Management Remediation Overview
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
 
Microsoft Risk Management
Microsoft Risk ManagementMicrosoft Risk Management
Microsoft Risk Management
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems Auditing
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project Management
 

Destaque

Hacking Homework - AR triggered by GPS locations, tactile objects or print
Hacking Homework - AR triggered by GPS locations, tactile objects or printHacking Homework - AR triggered by GPS locations, tactile objects or print
Hacking Homework - AR triggered by GPS locations, tactile objects or print
Brendan O'Keefe
 
QR CODES IN AN ACADEMIC SETTING
QR CODES IN AN ACADEMIC SETTINGQR CODES IN AN ACADEMIC SETTING
QR CODES IN AN ACADEMIC SETTING
genelg
 
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
firo HAR
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
mrmwood
 

Destaque (19)

Hacking Homework - AR triggered by GPS locations, tactile objects or print
Hacking Homework - AR triggered by GPS locations, tactile objects or printHacking Homework - AR triggered by GPS locations, tactile objects or print
Hacking Homework - AR triggered by GPS locations, tactile objects or print
 
QR codes and their application in libraries
QR codes and their application in librariesQR codes and their application in libraries
QR codes and their application in libraries
 
A quick response to promoting library services - How you can use QR Codes
A quick response to promoting library services - How you can use QR CodesA quick response to promoting library services - How you can use QR Codes
A quick response to promoting library services - How you can use QR Codes
 
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
 
QR CODES IN AN ACADEMIC SETTING
QR CODES IN AN ACADEMIC SETTINGQR CODES IN AN ACADEMIC SETTING
QR CODES IN AN ACADEMIC SETTING
 
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
Sncs2015 cybersecurityy risk and control   jakarta 3-4 juni 2015 ver01Sncs2015 cybersecurityy risk and control   jakarta 3-4 juni 2015 ver01
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
The Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in BooksThe Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in Books
 
Sejarah Lisan Tajuk 1
Sejarah Lisan Tajuk 1Sejarah Lisan Tajuk 1
Sejarah Lisan Tajuk 1
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Sejarah Lisan Tajuk 2
Sejarah Lisan Tajuk 2Sejarah Lisan Tajuk 2
Sejarah Lisan Tajuk 2
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
 
Pengurusan risiko projek
Pengurusan risiko projekPengurusan risiko projek
Pengurusan risiko projek
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 
How Augmented Reality can Boost Print Book Sales!
How Augmented Reality can Boost Print Book Sales!How Augmented Reality can Boost Print Book Sales!
How Augmented Reality can Boost Print Book Sales!
 
Modul 1 pengurusan projek
Modul 1 pengurusan projekModul 1 pengurusan projek
Modul 1 pengurusan projek
 
Kooperative VR - Collaborative Virtual Engineering: VDC-Whitepaper
Kooperative VR - Collaborative Virtual Engineering: VDC-WhitepaperKooperative VR - Collaborative Virtual Engineering: VDC-Whitepaper
Kooperative VR - Collaborative Virtual Engineering: VDC-Whitepaper
 
The new ISO 9001:2015
The new ISO 9001:2015The new ISO 9001:2015
The new ISO 9001:2015
 

Semelhante a IT-Risk-Management Best Practice

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Risk Management Life Cycle – 4-1-4.pptx
Risk Management Life Cycle – 4-1-4.pptxRisk Management Life Cycle – 4-1-4.pptx
Risk Management Life Cycle – 4-1-4.pptx
AlejandroDaricz2
 
Information Security in the Gaming World
Information Security in the Gaming WorldInformation Security in the Gaming World
Information Security in the Gaming World
Dimitrios Stergiou
 

Semelhante a IT-Risk-Management Best Practice (20)

PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
 
MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1
 
Risk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public SectorRisk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public Sector
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
Gestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector PúblicoGestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector Público
 
Cyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planningCyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planning
 
Operational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in KenyaOperational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in Kenya
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
Visió holística de la gestio de riscos de les TIC
Visió holística de la gestio de riscos de les TICVisió holística de la gestio de riscos de les TIC
Visió holística de la gestio de riscos de les TIC
 
Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising risk
 
Governance, Risk Management, and Internal Control in the Public Sector
Governance, Risk Management, and Internal Control in the Public SectorGovernance, Risk Management, and Internal Control in the Public Sector
Governance, Risk Management, and Internal Control in the Public Sector
 
Risk Management Life Cycle – 4-1-4.pptx
Risk Management Life Cycle – 4-1-4.pptxRisk Management Life Cycle – 4-1-4.pptx
Risk Management Life Cycle – 4-1-4.pptx
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Information Security in the Gaming World
Information Security in the Gaming WorldInformation Security in the Gaming World
Information Security in the Gaming World
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Risk Governance, Culture and CPS 220
Risk Governance, Culture and CPS 220Risk Governance, Culture and CPS 220
Risk Governance, Culture and CPS 220
 
Maximising value to stakeholders through risk management
Maximising value to stakeholders through risk managementMaximising value to stakeholders through risk management
Maximising value to stakeholders through risk management
 
Master thesis defence Shu Pei Oei
Master thesis defence Shu Pei OeiMaster thesis defence Shu Pei Oei
Master thesis defence Shu Pei Oei
 
Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 

Mais de Digicomp Academy AG

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Digicomp Academy AG
 

Mais de Digicomp Academy AG (20)

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
 
Minenfeld IPv6
Minenfeld IPv6Minenfeld IPv6
Minenfeld IPv6
 
Was ist design thinking
Was ist design thinkingWas ist design thinking
Was ist design thinking
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slides
 

Último

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 

Último (20)

Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 

IT-Risk-Management Best Practice

  • 1. IT  Risk  Management   Digicomp  Hacking  Day,  11.06.2014   Umberto  Annino  
  • 2. •  Wer  spricht?   Umberto  Annino   WirtschaCsinformaEker,  InformaEon  Security   •  Was  ist  ein  Risiko?   !  Sicherheit  ist  das  Komplementärereignis   zum  Risiko   !  Risiko  ist  Schaden  mit  Potenzial   2  
  • 3. Risiko   3   Gefahr   Bedrohung   Schwach-­‐ stelle   Asset   Risiko  
  • 4. Realitätsabgleich   Compliance?   Risk  Management?   OperaEonal  Risk,  Business  ConEnuity?   IT,  InformaEon  Security  –  Cyber  Security?   Red  Team,  Threat  Modeling,  APT  and  openSSL?   Big  Data???     Security  ™  vs.  Compliance  ™   4  
  • 5. IT  Risiko  in  der  Risiko-­‐Hierarchie   5  
  • 6. COSO   Enterprise  Risk  Management  Framework   6  
  • 7. ISO  31000  Risk  Mgmt  (2009)   Guidelines  and  Principles  and  Framework   7  
  • 10. ISO  31000  -­‐  Processes   10   Design  of   framework  for   managing  risk   Understanding  of  the  organisaEon  and  its  context   Establishing  risk  management  policy   Accountability   IntegraEon  into  organisaEonal  processes   Resources   Establishing  internal  communicaEon  and  reporEng  mechanisms   Establishing  external  communicaEon  and  reporEng  mechanisms   ImplemenEng   risk   management   ImplemenEng  the  framework  for  managing  risk   ImplemenEng  the  risk  management  process   Monitoring  and  review  of  the  framework   ConEnual  improvement  of  the  framework   !  Mandate  and  commitment  
  • 11. ISO  31000  -­‐  Processes   11   Risk   Management   Process   CommunicaEon  and  consultaEon   Establishing  the  external  context   Establishing  the  internal  context   Establishing  the  context  of  the  risk   management  process   Defining  risk  criteria   Risk  assessment   Risk  idenEficaEon   Risk  analysis   Risk  evaluaEon   Risk  treatment   Monitoring  and  review   Recording  the  risk  management   process  
  • 12. ISO  31000   Acributes  of  enhanced  risk  management   •  Key  outcomes   –  The  organisaEon  has  a  current,  correct  and   comprehensive  understanding  of  its  risks   –  The  organisaEon‘s  risks  are  within  its  risk  criteria   •  Acributes   –  ConEnual  improvement   –  Full  accountability  for  risks   –  ApplicaEon  of  risk  management  in  all  decision  making   –  ConEnual  communicaEons   –  Full  integraEon  in  the  organisaEon‘s  governance   structure   12  
  • 13. ISO  27005   InformaEon  Security  Risk  Management   13  
  • 14. ISO  27005   Context  Establishment   14   Basic   Criteria   Risk  management  approach   Risk  evaluaEon  criteria   Impact  criteria   Risk  acceptance  criteria   ! Scope  and  Boundaries   ! OrganisaEon  for  informaEon  security  risk  management  
  • 15. ISO  27005   InformaEon  security  risk  assessment   15   Risk   idenEficaEon   IdenEficaEon  of  assets   IdenEficaEon  of  threats   IdenEficaEon  of  exisEng  controls   IdenEficaEon  of  vulnerabiliEes   IdenEficaEon  of  consequences   Risk  analysis   Risk  analysis  methodologies   Assessment  of  consequences   Assessment  of  incident  likelihood   Level  of  risk  determinaEon  
  • 16. ITGI  RiskIT  Framework   PosiEonierung   16  
  • 17. IT  Risk  (high  level)  categories   17  
  • 19. Risk  maps...   •  Risk   appeEte   •  Risk   tolerance   •  Risk   culture   19  
  • 21. IT  risk  scenario  development   21  
  • 23. Aber:  scenario  based...   !  keeping  it  real!   23  
  • 24. IT  Risk  Response   opEons  and   prioriEsaEon   24  
  • 25. Verwalten  von  IT  Risiken   Risiko   management   Risiko   analyse   Risiko   idenEfikaEon   Konsolidierung   Link  to   business   Risiko   bewertung   QuanEtaEv   QualiEaEv   StaEsEsche   Basis   Risiko   lenkung   Risiko   bearbeitung   Admin   Disziplin/ Aufwand   Kosten   ROI   Risiko   tracking   Nachvollzieh-­‐   barkeit   Konstanz   (Zahlen)   25  
  • 26. QuanEfizieren  von  IT  Risiken   26   Big  Data?  Loss  DB?   Komplexität  von  InformaEonssystemen  (und  SoCware)?  
  • 27. QuanEfizieren  von  IT  Risiken   •  In  der  Praxis  eher  qualitaEv  stac  quanEtaEv   –  Fehlende  staEsEsche  Basis   –  Prinzipiell  komplexe  Systeme   –  Wenig  akuter  Bedarf  zur  QuanEfizierung  !  über   Verknüpfung  mit  Business  Process   •  Konsolidierung  der  Werte  für  Management   ReporEng  als  Grundlage  für  QuanEfikaEon   •  In  der  Praxis  eher  „erste  Schrice“  stac  best   pracEse   •  ISO  27005,  ITGI  RiskIT  Framework  und   PracEcEoner  Guide  bieten  brauchbare   Grundlagen  (Framework)   27  
  • 28. Risk  Treatment   28   Risk   treatment   Avoid   Eliminate   Reduce   Minimize     Transfer   Externalize   Accept   Residual  Risk   Controls   Measures   Avoid  /   Verhindern   Detect  /   Entdecken   Minimize  /   Eindämmen  
  • 29. Risk  Treatment  –  ISO  27005   29  
  • 30. Konsolidieren  von  IT  Risiken   Disjointed  risks   30  
  • 31. Konsolidieren  von  IT  Risiken   shared  risks   31  
  • 32. 32