Time
12 hours 41 minutes
Difficulty
Advanced
CEU/CPE
15

Video Description

This lesson covers risk assessment as whole which covers the following concepts:  Risk assessment  Risk analysis  Risk mitigation  Risk monitoring This lesson also covers NIST 800-30 which is the guideline for risk management guide for information management systems and it has a 9-step process which participants will learn about in the unit.

Video Transcription

00:04
as we talk about risk, we want to talk about risk management as a whole and what risk management is and what elements make up risk management and risk management really kind of an umbrella term. And what that means is, if you're talking about risk, you're doing some form of risk management
00:22
and their various elements of risk management. There's assessment, there's analysis, there's mitigation
00:27
and then ongoing monitoring of risks. So when we talk about risk assessment and we'll look at each of these in detail, more risk assessments really more about identification. Identify your assets, identify your threats and your vulnerabilities. Start out by identifying Figure out what's out there.
00:46
What am I protecting?
00:48
What are the things that could pose harm toe what I'm protecting as well as what weaknesses would exist to allow that.
00:55
Then we're gonna look at risk analysis, risk analysis. We're trying to get a value. What is the value of the potential for harm, which that risk worth and often we start off with getting a subjective value like that's a high risk, and then we move into wanting a quantitative or a numeric
01:15
assessment of the risk
01:15
saying things like that has lost potential of $8000. Ultimately, we generally do wantto wind out working towards that dollar value of the risk, because when I find out the dollar value of risk potential or lost potential, that will guide how much money I'll spend
01:34
in order to mitigate the risk. That's the cost benefit analysis right there.
01:40
All right, so risk analysis leads us directly to risk mitigation. And after we determined those values from analysis, we figure out a risk response. How are we going to respond to the risk? And remember, we're gonna respond in such a way that we reduce residual risk toe a level that's acceptable by senior management.
02:00
We don't think of eliminating risks. We think about lowering risks to a level that's acceptable
02:07
all right, and then we wind up or we wrap up risk with continuous monitoring because risk never dies. Risk is forever and ever, and we always have to be very cognizant of risks. Risks are frequently changing, especially in this field, so there is no rest for someone in risk management.
02:27
So let's talk about each of these areas. Let's talk about risk assessment analysis and so on.
02:31
So when we do talk about assessment, the most important thing in the first step of risk management and what drives all of our decisions, what are we protecting and what it's worth,
02:43
identify our assets many times our assets are gonna be the data that we protect
02:49
and how much value is associate ID by that data.
02:53
So let's just talk for a second. What drives the value of data?
02:58
You know, if you think about if I go to ensure my dad, I'm probably not gonna get much money from the insurance company if I've lost my data. But what gives it its value? And I kind of referred to this a little bit earlier. What's the value to meet? How much time did I take in creating the information?
03:15
What's the value to my customers? You know, if I hold customer personally identifiable information, if I have their credit card information, their health care information that becomes very valuable, what type of fines of my susceptible to
03:29
if the information gets compromised? So all of that goes into the value of the assets,
03:35
then we look at the threats and vulnerabilities, and that's our risk assessment.
03:39
Now, there are several different methodologies and approaches to accepting. I'm sorry to assessing risks. There's octave frappe and the NIST 800-30 which would be my focus on for this particular exam.
03:53
So Octave is really a self based assessment. Ah, where someone internally looks the criticality in the value of the assets, the threats and the vulnerabilities frappe, facilitated risk analysis process. This is a qualitative analysis,
04:12
and ultimately what it is is. It's a way of prioritizing
04:15
my assets to determine which ones are worthy or my risks rather which ones are worthy of going on toe. A quantitative analysis. We may decide with qualitative that this is such a low potential for loss. It's not even worth looking at the dollar value. So that's what frappe does
04:33
now, Mr 800. Dash 30
04:36
is the Risk Management guide for Information Technology systems, and it walks us through a nine step process of dealing with risk. And this isn't just risk assessment. This really goes through the full gamut of dealing with risks
04:53
where we characterize our system. And basically what that means is we look at the value of the assets.
04:58
Is this system hold top secret data or sensitive but unclassified.
05:03
Then we look ATT, threats and vulnerabilities, just like we talked about. Ah, threat is what could cause harm to the system of vulnerabilities, where the weaknesses,
05:13
then we analyze the controls that are already in place, and then we look at likelihood and impact. Sometimes you'll hear me talk about probability and impact or likelihood and severity. Those ideas air the same probability and impact. How likely is it toe happen? And if it does happen,
05:31
how big is the impact?
05:33
Then we determine the amount of risk, and that risk determination is really the analysis piece that will drive us to recommend controls.
05:43
Then ultimately, we're gonna document our decisions and be able to justify the decisions that we've made. So all of this ties in together, whether you're following the framework from Octave or frappe or NIST, or any of the other organizations that have a say in risk management, even though everyone says it perhaps a slightly different way.
06:02
The premise is all the same.
06:04
Identify your assets assets. Evaluate them,
06:09
look at your threats and your vulnerabilities. Figure out your potential for loss, which will guide your mitigation strategy, implement your mitigation strategy tested and then documented

Up Next

ISC2 CISSP

Our free online CISSP (8 domains) training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor