SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
IT	
  Risk	
  Management	
  
Digicomp	
  Hacking	
  Day,	
  11.06.2014	
  
Umberto	
  Annino	
  
•  Wer	
  spricht?	
  
Umberto	
  Annino	
  
WirtschaCsinformaEker,	
  InformaEon	
  Security	
  
•  Was	
  ist	
  ein	
  Risiko?	
  
!	
  Sicherheit	
  ist	
  das	
  Komplementärereignis	
  
zum	
  Risiko	
  
!	
  Risiko	
  ist	
  Schaden	
  mit	
  Potenzial	
  
2	
  
Risiko	
  
3	
  
Gefahr	
  
Bedrohung	
  
Schwach-­‐
stelle	
  
Asset	
  
Risiko	
  
Realitätsabgleich	
  
Compliance?	
  
Risk	
  Management?	
  
OperaEonal	
  Risk,	
  Business	
  ConEnuity?	
  
IT,	
  InformaEon	
  Security	
  –	
  Cyber	
  Security?	
  
Red	
  Team,	
  Threat	
  Modeling,	
  APT	
  and	
  openSSL?	
  
Big	
  Data???	
  
	
  
Security	
  ™	
  vs.	
  Compliance	
  ™	
  
4	
  
IT	
  Risiko	
  in	
  der	
  Risiko-­‐Hierarchie	
  
5	
  
COSO	
  
Enterprise	
  Risk	
  Management	
  Framework	
  
6	
  
ISO	
  31000	
  Risk	
  Mgmt	
  (2009)	
  
Guidelines	
  and	
  Principles	
  and	
  Framework	
  
7	
  
ISO	
  31000	
  Framework	
  
8	
  
ISO	
  31000	
  
Processes	
  
9	
  
ISO	
  31000	
  -­‐	
  Processes	
  
10	
  
Design	
  of	
  
framework	
  for	
  
managing	
  risk	
  
Understanding	
  of	
  the	
  organisaEon	
  and	
  its	
  context	
  
Establishing	
  risk	
  management	
  policy	
  
Accountability	
  
IntegraEon	
  into	
  organisaEonal	
  processes	
  
Resources	
  
Establishing	
  internal	
  communicaEon	
  and	
  reporEng	
  mechanisms	
  
Establishing	
  external	
  communicaEon	
  and	
  reporEng	
  mechanisms	
  
ImplemenEng	
  
risk	
  
management	
  
ImplemenEng	
  the	
  framework	
  for	
  managing	
  risk	
  
ImplemenEng	
  the	
  risk	
  management	
  process	
  
Monitoring	
  and	
  review	
  of	
  the	
  framework	
  
ConEnual	
  improvement	
  of	
  the	
  framework	
  
!	
  Mandate	
  and	
  commitment	
  
ISO	
  31000	
  -­‐	
  Processes	
  
11	
  
Risk	
  
Management	
  
Process	
  
CommunicaEon	
  and	
  consultaEon	
  
Establishing	
  the	
  external	
  context	
  
Establishing	
  the	
  internal	
  context	
  
Establishing	
  the	
  context	
  of	
  the	
  risk	
  
management	
  process	
  
Defining	
  risk	
  criteria	
  
Risk	
  assessment	
  
Risk	
  idenEficaEon	
  
Risk	
  analysis	
  
Risk	
  evaluaEon	
  
Risk	
  treatment	
  
Monitoring	
  and	
  review	
  
Recording	
  the	
  risk	
  management	
  
process	
  
ISO	
  31000	
  
Acributes	
  of	
  enhanced	
  risk	
  management	
  
•  Key	
  outcomes	
  
–  The	
  organisaEon	
  has	
  a	
  current,	
  correct	
  and	
  
comprehensive	
  understanding	
  of	
  its	
  risks	
  
–  The	
  organisaEon‘s	
  risks	
  are	
  within	
  its	
  risk	
  criteria	
  
•  Acributes	
  
–  ConEnual	
  improvement	
  
–  Full	
  accountability	
  for	
  risks	
  
–  ApplicaEon	
  of	
  risk	
  management	
  in	
  all	
  decision	
  making	
  
–  ConEnual	
  communicaEons	
  
–  Full	
  integraEon	
  in	
  the	
  organisaEon‘s	
  governance	
  
structure	
  
12	
  
ISO	
  27005	
  
InformaEon	
  Security	
  Risk	
  Management	
  
13	
  
ISO	
  27005	
  
Context	
  Establishment	
  
14	
  
Basic	
  
Criteria	
  
Risk	
  management	
  approach	
  
Risk	
  evaluaEon	
  criteria	
  
Impact	
  criteria	
  
Risk	
  acceptance	
  criteria	
  
! Scope	
  and	
  Boundaries	
  
! OrganisaEon	
  for	
  informaEon	
  security	
  risk	
  management	
  
ISO	
  27005	
  
InformaEon	
  security	
  risk	
  assessment	
  
15	
  
Risk	
  
idenEficaEon	
  
IdenEficaEon	
  of	
  assets	
  
IdenEficaEon	
  of	
  threats	
  
IdenEficaEon	
  of	
  exisEng	
  controls	
  
IdenEficaEon	
  of	
  vulnerabiliEes	
  
IdenEficaEon	
  of	
  consequences	
  
Risk	
  analysis	
   Risk	
  analysis	
  methodologies	
  
Assessment	
  of	
  consequences	
  
Assessment	
  of	
  incident	
  likelihood	
  
Level	
  of	
  risk	
  determinaEon	
  
ITGI	
  RiskIT	
  Framework	
  
PosiEonierung	
  
16	
  
IT	
  Risk	
  (high	
  level)	
  categories	
  
17	
  
RiskIT	
  Framework	
  
18	
  
Risk	
  maps...	
  
•  Risk	
  
appeEte	
  
•  Risk	
  
tolerance	
  
•  Risk	
  
culture	
  
19	
  
Risk	
  culture	
  
20	
  
IT	
  risk	
  scenario	
  development	
  
21	
  
Risk	
  scenario	
  components	
  
22	
  
Aber:	
  scenario	
  based...	
  
!	
  keeping	
  it	
  real!	
  
23	
  
IT	
  Risk	
  Response	
  
opEons	
  and	
  
prioriEsaEon	
  
24	
  
Verwalten	
  von	
  IT	
  Risiken	
  
Risiko	
  
management	
  
Risiko	
  
analyse	
  
Risiko	
  
idenEfikaEon	
  
Konsolidierung	
  
Link	
  to	
  
business	
  
Risiko	
  
bewertung	
  
QuanEtaEv	
  
QualiEaEv	
  
StaEsEsche	
  
Basis	
  
Risiko	
  
lenkung	
  
Risiko	
  
bearbeitung	
  
Admin	
  
Disziplin/
Aufwand	
  
Kosten	
  
ROI	
  
Risiko	
  
tracking	
  
Nachvollzieh-­‐	
  
barkeit	
  
Konstanz	
  
(Zahlen)	
   25	
  
QuanEfizieren	
  von	
  IT	
  Risiken	
  
26	
  
Big	
  Data?	
  Loss	
  DB?	
  
Komplexität	
  von	
  InformaEonssystemen	
  (und	
  SoCware)?	
  
QuanEfizieren	
  von	
  IT	
  Risiken	
  
•  In	
  der	
  Praxis	
  eher	
  qualitaEv	
  stac	
  quanEtaEv	
  
–  Fehlende	
  staEsEsche	
  Basis	
  
–  Prinzipiell	
  komplexe	
  Systeme	
  
–  Wenig	
  akuter	
  Bedarf	
  zur	
  QuanEfizierung	
  !	
  über	
  
Verknüpfung	
  mit	
  Business	
  Process	
  
•  Konsolidierung	
  der	
  Werte	
  für	
  Management	
  
ReporEng	
  als	
  Grundlage	
  für	
  QuanEfikaEon	
  
•  In	
  der	
  Praxis	
  eher	
  „erste	
  Schrice“	
  stac	
  best	
  
pracEse	
  
•  ISO	
  27005,	
  ITGI	
  RiskIT	
  Framework	
  und	
  
PracEcEoner	
  Guide	
  bieten	
  brauchbare	
  
Grundlagen	
  (Framework)	
  
27	
  
Risk	
  Treatment	
  
28	
  
Risk	
  
treatment	
  
Avoid	
  
Eliminate	
  
Reduce	
  
Minimize
	
  	
  
Transfer	
  
Externalize	
  
Accept	
  
Residual	
  Risk	
  
Controls	
  
Measures	
  
Avoid	
  /	
  
Verhindern	
  
Detect	
  /	
  
Entdecken	
  
Minimize	
  /	
  
Eindämmen	
  
Risk	
  Treatment	
  –	
  ISO	
  27005	
  
29	
  
Konsolidieren	
  von	
  IT	
  Risiken	
  
Disjointed	
  risks	
  
30	
  
Konsolidieren	
  von	
  IT	
  Risiken	
  
shared	
  risks	
  
31	
  
32	
  

Mais conteúdo relacionado

Mais procurados

Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskSarah Clarke
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101Barry Caplin
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Ahmed Al Enizi
 
Risk Management Remediation Overview
Risk Management Remediation OverviewRisk Management Remediation Overview
Risk Management Remediation OverviewRuss Pizzuto
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1Denise Tawwab
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Smart Assessment
 
Microsoft Risk Management
Microsoft Risk ManagementMicrosoft Risk Management
Microsoft Risk ManagementUlukman Mamytov
 
Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)Enterprising Non-Profits
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingPECB
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesJorge Sebastiao
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop Ersoy AKSOY
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementGirija Sankar Dash
 

Mais procurados (20)

Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 
Risk Management Remediation Overview
Risk Management Remediation OverviewRisk Management Remediation Overview
Risk Management Remediation Overview
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
 
Microsoft Risk Management
Microsoft Risk ManagementMicrosoft Risk Management
Microsoft Risk Management
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems Auditing
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project Management
 

Destaque

Hacking Homework - AR triggered by GPS locations, tactile objects or print
Hacking Homework - AR triggered by GPS locations, tactile objects or printHacking Homework - AR triggered by GPS locations, tactile objects or print
Hacking Homework - AR triggered by GPS locations, tactile objects or printBrendan O'Keefe
 
QR codes and their application in libraries
QR codes and their application in librariesQR codes and their application in libraries
QR codes and their application in librariesGeoffrey Lowe
 
A quick response to promoting library services - How you can use QR Codes
A quick response to promoting library services - How you can use QR CodesA quick response to promoting library services - How you can use QR Codes
A quick response to promoting library services - How you can use QR CodesScott Hibberson
 
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010Robin M. Ashford, MSLIS
 
QR CODES IN AN ACADEMIC SETTING
QR CODES IN AN ACADEMIC SETTINGQR CODES IN AN ACADEMIC SETTING
QR CODES IN AN ACADEMIC SETTINGgenelg
 
The Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in BooksThe Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in BooksCindy Wright
 
Sejarah Lisan Tajuk 1
Sejarah Lisan Tajuk 1Sejarah Lisan Tajuk 1
Sejarah Lisan Tajuk 1Alif Akram
 
Sejarah Lisan Tajuk 2
Sejarah Lisan Tajuk 2Sejarah Lisan Tajuk 2
Sejarah Lisan Tajuk 2Alif Akram
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policiesmrmwood
 
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docxfiro HAR
 
Pengurusan risiko projek
Pengurusan risiko projekPengurusan risiko projek
Pengurusan risiko projekAmir Sagiran
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategymrmwood
 
How Augmented Reality can Boost Print Book Sales!
How Augmented Reality can Boost Print Book Sales!How Augmented Reality can Boost Print Book Sales!
How Augmented Reality can Boost Print Book Sales!Reality Premedia
 

Destaque (19)

Hacking Homework - AR triggered by GPS locations, tactile objects or print
Hacking Homework - AR triggered by GPS locations, tactile objects or printHacking Homework - AR triggered by GPS locations, tactile objects or print
Hacking Homework - AR triggered by GPS locations, tactile objects or print
 
QR codes and their application in libraries
QR codes and their application in librariesQR codes and their application in libraries
QR codes and their application in libraries
 
A quick response to promoting library services - How you can use QR Codes
A quick response to promoting library services - How you can use QR CodesA quick response to promoting library services - How you can use QR Codes
A quick response to promoting library services - How you can use QR Codes
 
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
Qr Codes & Simple Augmented Reality in Academic Libraries - Oct. 2010
 
QR CODES IN AN ACADEMIC SETTING
QR CODES IN AN ACADEMIC SETTINGQR CODES IN AN ACADEMIC SETTING
QR CODES IN AN ACADEMIC SETTING
 
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
Sncs2015 cybersecurityy risk and control   jakarta 3-4 juni 2015 ver01Sncs2015 cybersecurityy risk and control   jakarta 3-4 juni 2015 ver01
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
The Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in BooksThe Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in Books
 
Sejarah Lisan Tajuk 1
Sejarah Lisan Tajuk 1Sejarah Lisan Tajuk 1
Sejarah Lisan Tajuk 1
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Sejarah Lisan Tajuk 2
Sejarah Lisan Tajuk 2Sejarah Lisan Tajuk 2
Sejarah Lisan Tajuk 2
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
182764707 nota-sjh3104-sejarah-lisan-dan-pendokumentasian-bab-1-docx
 
Pengurusan risiko projek
Pengurusan risiko projekPengurusan risiko projek
Pengurusan risiko projek
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 
How Augmented Reality can Boost Print Book Sales!
How Augmented Reality can Boost Print Book Sales!How Augmented Reality can Boost Print Book Sales!
How Augmented Reality can Boost Print Book Sales!
 
Modul 1 pengurusan projek
Modul 1 pengurusan projekModul 1 pengurusan projek
Modul 1 pengurusan projek
 
Kooperative VR - Collaborative Virtual Engineering: VDC-Whitepaper
Kooperative VR - Collaborative Virtual Engineering: VDC-WhitepaperKooperative VR - Collaborative Virtual Engineering: VDC-Whitepaper
Kooperative VR - Collaborative Virtual Engineering: VDC-Whitepaper
 
The new ISO 9001:2015
The new ISO 9001:2015The new ISO 9001:2015
The new ISO 9001:2015
 

Semelhante a IT-Risk-Management Best Practice

PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierRamsés Gallego
 
Cyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planningCyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planningPECB
 
Operational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in KenyaOperational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in Kenyachasecooper
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 
Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising riskDavid Berkelmans
 
Risk Management Life Cycle – 4-1-4.pptx
Risk Management Life Cycle – 4-1-4.pptxRisk Management Life Cycle – 4-1-4.pptx
Risk Management Life Cycle – 4-1-4.pptxAlejandroDaricz2
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
 
Information Security in the Gaming World
Information Security in the Gaming WorldInformation Security in the Gaming World
Information Security in the Gaming WorldDimitrios Stergiou
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Master thesis defence Shu Pei Oei
Master thesis defence Shu Pei OeiMaster thesis defence Shu Pei Oei
Master thesis defence Shu Pei OeiMIPLM
 

Semelhante a IT-Risk-Management Best Practice (20)

PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
 
MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1
 
Risk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public SectorRisk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public Sector
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
Gestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector PúblicoGestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector Público
 
Cyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planningCyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planning
 
Operational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in KenyaOperational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in Kenya
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
Visió holística de la gestio de riscos de les TIC
Visió holística de la gestio de riscos de les TICVisió holística de la gestio de riscos de les TIC
Visió holística de la gestio de riscos de les TIC
 
Value creation through optimising risk
Value creation through optimising riskValue creation through optimising risk
Value creation through optimising risk
 
Governance, Risk Management, and Internal Control in the Public Sector
Governance, Risk Management, and Internal Control in the Public SectorGovernance, Risk Management, and Internal Control in the Public Sector
Governance, Risk Management, and Internal Control in the Public Sector
 
Risk Management Life Cycle – 4-1-4.pptx
Risk Management Life Cycle – 4-1-4.pptxRisk Management Life Cycle – 4-1-4.pptx
Risk Management Life Cycle – 4-1-4.pptx
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Information Security in the Gaming World
Information Security in the Gaming WorldInformation Security in the Gaming World
Information Security in the Gaming World
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Risk Governance, Culture and CPS 220
Risk Governance, Culture and CPS 220Risk Governance, Culture and CPS 220
Risk Governance, Culture and CPS 220
 
Maximising value to stakeholders through risk management
Maximising value to stakeholders through risk managementMaximising value to stakeholders through risk management
Maximising value to stakeholders through risk management
 
Master thesis defence Shu Pei Oei
Master thesis defence Shu Pei OeiMaster thesis defence Shu Pei Oei
Master thesis defence Shu Pei Oei
 
Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 

Mais de Digicomp Academy AG

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Digicomp Academy AG
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xDigicomp Academy AG
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Digicomp Academy AG
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnDigicomp Academy AG
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessDigicomp Academy AG
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Digicomp Academy AG
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceDigicomp Academy AG
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slidesDigicomp Academy AG
 

Mais de Digicomp Academy AG (20)

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
 
Minenfeld IPv6
Minenfeld IPv6Minenfeld IPv6
Minenfeld IPv6
 
Was ist design thinking
Was ist design thinkingWas ist design thinking
Was ist design thinking
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slides
 

Último

Hyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseHyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseirhcs
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxmy Pandit
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...srcw2322l101
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024Adnet Communications
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsSlidesAI
 
What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...AnaBeatriz125525
 
Revolutionizing Industries: The Power of Carbon Components
Revolutionizing Industries: The Power of Carbon ComponentsRevolutionizing Industries: The Power of Carbon Components
Revolutionizing Industries: The Power of Carbon ComponentsConnova AG
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsAlejandro Cremades
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future worldChris Skinner
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastInstBlast Marketing
 
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteriamilos639
 
Aptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfAptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfprchbhandari
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionAlejandro Cremades
 
Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfhostl9518
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdflinciy03
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsRajesh Gupta
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...Khaled Al Awadi
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesHaseebBashir5
 
Unveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the TwinsUnveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the Twinsmy Pandit
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxSaksham Gupta
 

Último (20)

Hyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseHyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings release
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team Presentations
 
What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...
 
Revolutionizing Industries: The Power of Carbon Components
Revolutionizing Industries: The Power of Carbon ComponentsRevolutionizing Industries: The Power of Carbon Components
Revolutionizing Industries: The Power of Carbon Components
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
 
Aptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfAptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdf
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdf
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdf
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future Prospects
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
Unveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the TwinsUnveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the Twins
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 

IT-Risk-Management Best Practice

  • 1. IT  Risk  Management   Digicomp  Hacking  Day,  11.06.2014   Umberto  Annino  
  • 2. •  Wer  spricht?   Umberto  Annino   WirtschaCsinformaEker,  InformaEon  Security   •  Was  ist  ein  Risiko?   !  Sicherheit  ist  das  Komplementärereignis   zum  Risiko   !  Risiko  ist  Schaden  mit  Potenzial   2  
  • 3. Risiko   3   Gefahr   Bedrohung   Schwach-­‐ stelle   Asset   Risiko  
  • 4. Realitätsabgleich   Compliance?   Risk  Management?   OperaEonal  Risk,  Business  ConEnuity?   IT,  InformaEon  Security  –  Cyber  Security?   Red  Team,  Threat  Modeling,  APT  and  openSSL?   Big  Data???     Security  ™  vs.  Compliance  ™   4  
  • 5. IT  Risiko  in  der  Risiko-­‐Hierarchie   5  
  • 6. COSO   Enterprise  Risk  Management  Framework   6  
  • 7. ISO  31000  Risk  Mgmt  (2009)   Guidelines  and  Principles  and  Framework   7  
  • 10. ISO  31000  -­‐  Processes   10   Design  of   framework  for   managing  risk   Understanding  of  the  organisaEon  and  its  context   Establishing  risk  management  policy   Accountability   IntegraEon  into  organisaEonal  processes   Resources   Establishing  internal  communicaEon  and  reporEng  mechanisms   Establishing  external  communicaEon  and  reporEng  mechanisms   ImplemenEng   risk   management   ImplemenEng  the  framework  for  managing  risk   ImplemenEng  the  risk  management  process   Monitoring  and  review  of  the  framework   ConEnual  improvement  of  the  framework   !  Mandate  and  commitment  
  • 11. ISO  31000  -­‐  Processes   11   Risk   Management   Process   CommunicaEon  and  consultaEon   Establishing  the  external  context   Establishing  the  internal  context   Establishing  the  context  of  the  risk   management  process   Defining  risk  criteria   Risk  assessment   Risk  idenEficaEon   Risk  analysis   Risk  evaluaEon   Risk  treatment   Monitoring  and  review   Recording  the  risk  management   process  
  • 12. ISO  31000   Acributes  of  enhanced  risk  management   •  Key  outcomes   –  The  organisaEon  has  a  current,  correct  and   comprehensive  understanding  of  its  risks   –  The  organisaEon‘s  risks  are  within  its  risk  criteria   •  Acributes   –  ConEnual  improvement   –  Full  accountability  for  risks   –  ApplicaEon  of  risk  management  in  all  decision  making   –  ConEnual  communicaEons   –  Full  integraEon  in  the  organisaEon‘s  governance   structure   12  
  • 13. ISO  27005   InformaEon  Security  Risk  Management   13  
  • 14. ISO  27005   Context  Establishment   14   Basic   Criteria   Risk  management  approach   Risk  evaluaEon  criteria   Impact  criteria   Risk  acceptance  criteria   ! Scope  and  Boundaries   ! OrganisaEon  for  informaEon  security  risk  management  
  • 15. ISO  27005   InformaEon  security  risk  assessment   15   Risk   idenEficaEon   IdenEficaEon  of  assets   IdenEficaEon  of  threats   IdenEficaEon  of  exisEng  controls   IdenEficaEon  of  vulnerabiliEes   IdenEficaEon  of  consequences   Risk  analysis   Risk  analysis  methodologies   Assessment  of  consequences   Assessment  of  incident  likelihood   Level  of  risk  determinaEon  
  • 16. ITGI  RiskIT  Framework   PosiEonierung   16  
  • 17. IT  Risk  (high  level)  categories   17  
  • 19. Risk  maps...   •  Risk   appeEte   •  Risk   tolerance   •  Risk   culture   19  
  • 21. IT  risk  scenario  development   21  
  • 23. Aber:  scenario  based...   !  keeping  it  real!   23  
  • 24. IT  Risk  Response   opEons  and   prioriEsaEon   24  
  • 25. Verwalten  von  IT  Risiken   Risiko   management   Risiko   analyse   Risiko   idenEfikaEon   Konsolidierung   Link  to   business   Risiko   bewertung   QuanEtaEv   QualiEaEv   StaEsEsche   Basis   Risiko   lenkung   Risiko   bearbeitung   Admin   Disziplin/ Aufwand   Kosten   ROI   Risiko   tracking   Nachvollzieh-­‐   barkeit   Konstanz   (Zahlen)   25  
  • 26. QuanEfizieren  von  IT  Risiken   26   Big  Data?  Loss  DB?   Komplexität  von  InformaEonssystemen  (und  SoCware)?  
  • 27. QuanEfizieren  von  IT  Risiken   •  In  der  Praxis  eher  qualitaEv  stac  quanEtaEv   –  Fehlende  staEsEsche  Basis   –  Prinzipiell  komplexe  Systeme   –  Wenig  akuter  Bedarf  zur  QuanEfizierung  !  über   Verknüpfung  mit  Business  Process   •  Konsolidierung  der  Werte  für  Management   ReporEng  als  Grundlage  für  QuanEfikaEon   •  In  der  Praxis  eher  „erste  Schrice“  stac  best   pracEse   •  ISO  27005,  ITGI  RiskIT  Framework  und   PracEcEoner  Guide  bieten  brauchbare   Grundlagen  (Framework)   27  
  • 28. Risk  Treatment   28   Risk   treatment   Avoid   Eliminate   Reduce   Minimize     Transfer   Externalize   Accept   Residual  Risk   Controls   Measures   Avoid  /   Verhindern   Detect  /   Entdecken   Minimize  /   Eindämmen  
  • 29. Risk  Treatment  –  ISO  27005   29  
  • 30. Konsolidieren  von  IT  Risiken   Disjointed  risks   30  
  • 31. Konsolidieren  von  IT  Risiken   shared  risks   31  
  • 32. 32