Time
5 hours 54 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Description

This lesson covers risk mitigation. Risks need to be managed in order to keep that at a level in which senior management of a company deems acceptable. Risk mitigation includes the following points: • Quantitative analysis leads to proper risk mitigation strategy • Reduce • Accept • Transfer • Avoidance • Rejection It is important to remember that it is rare for an organization to focus on eliminating risks, as this is very expensive and rarely successful. The instructor also offers a review of what was covered in previous units as a conclusion to the module.

Video Transcription

00:04
so risk mitigation leads to or really is the so what of risk management.
00:11
So we figured out the potential for laws. Well, we provide the appropriate mitigation so that the residual risk falls within the range that's acceptable by the business. We're lowering that risk, that potential for loss to a point that's acceptable because at some point in time, we have to accept
00:31
a small degree of risk.
00:33
Or even if we don't have to. It's cost effective, you know, if you go to senior management and say, Well, how long can we have our domain to be down? You know, during a normal business day,
00:44
Usually the response from senior management is done. We can't afford any downtime.
00:49
My response to that is we'll get your checkbook because it will cost a lot of money to give an organization 24 7 up time.
00:59
Now who would spend that kind of money? And Amazon or many online providers were they lose millions of dollars per minutes that they're down. But many organizations, you know, may have a higher tolerance or a higher capability to withstand downtime based on once again cost benefit analysis.
01:19
So when I come back to senior management say we'll get your checkbook cause it's gonna cost millions of dollars to get 24 7 up time.
01:26
They come back and say, Well, what we really meant was two hours downtime,
01:30
right? There's that negotiation process because once again, security costs money and we have to figure out the potential for loss
01:38
versus the cost of the mitigating strategy.
01:41
All right, now, when we do look a risk mitigation, they're generally three basic ways we consider we think about reduce except in transfer,
01:51
risk reduction, risk, acceptance in risk transference.
01:56
So they're very much like they sound when we talk about reducing a risk. We're talking about lessening the probability end or impact of a risk. I can't lessen the probability of rain, but I can bring an umbrella and lessen its impact.
02:10
Right, Um, so we're bringing either probability or impact, or if we're lucky, we're bringing probability and impact down again to that tolerable love.
02:22
If I'm to eliminate a risk or avoid a risk when I'm really doing is lessening probability. Indoor impact down to zero. I've eliminated the risk.
02:32
I've chosen, not have the picnic outdoors. I'm gonna have it indoors, so I've eliminated the possibility of weather interfering with my picnic.
02:44
All right, so that's risk avoidance. A risk avoidance is really extreme risk reduction.
02:50
Now, I'll mention on a skip over acceptance for just a minute.
02:53
I want to talk about risk transference. So what risk transfer its means is I'm gonna share that risk with someone else. When we get insurance, fire insurance, for instance, it doesn't lessen the likelihood of having a fire. I mean, they're gonna have a firearm. Not
03:08
it doesn't lessen how much damage is gonna be to the house. The house is going to get damaged to certain degree. Whether or not I have insurance would I am lessening is my portion of the loss. I'm gonna share that loss with the insurance company. So when you hear about insurance, that's risk transfers.
03:24
When you hear about service level agreements and those air really important in the I T world.
03:30
And that's that commitment from a vendor to a certain degree of performance or up time for a product that's transferring the loss. Because if the vendor doesn't meet those agreement levels, then ultimately there's usually some sort of financial compensation. So I'm sharing in that loss. So insurance,
03:50
service level agreements,
03:52
contract modification.
03:53
This vendors been late every time we've dealt with him. So we're gonna modify the contract that says for each day late he's gonna return 1% of the value of the contract to us. That's again transferring the risk.
04:09
Okay, So we can reduce the risk. We can transfer a risk. Or ultimately, we might just accept the risk.
04:15
And we accept the risk when we determine
04:18
that the potential for loss is less than
04:23
the cost of the countermeasure. I'm not gonna spend $50 to protect a $20 bill,
04:29
So I'm not going to spend more than the potential for loss to protect a product.
04:33
But again, this is where it's so important. I really understand the value of my asset.
04:39
Because if I make the mistake of thinking, remember that laptop we talked about earlier? If I think that laptops values $300 I won't spend 500 to protect it.
04:48
But if I don't consider all the data that's on there and its value, I don't consider the potential for fines from my industry. Ah, via HIPPA or any of the other regulations and laws and standards. If I don't factor all those many other elements and give value to my asset,
05:06
then I'm gonna make a poor decision.
05:09
But when the cost of mitigation is greater than the potential for laws, we accept a risk.
05:16
Okay? And what do we do when we accept the risk?
05:20
Honestly, we do nothing. We have chosen to allow that risk to exist. We're gonna keep an eye on it. We documented the risk. We also have a paper trail as of why we've chosen not to implement a strategy because remember, we don't want to be found liable. We want to make sure that we protect the assets to the degree that's warranted.
05:40
But ultimately we do
05:42
nothing.
05:43
Now it's worth mentioning that with risk rejection, you do nothing about a risk, but with risk rejection. We don't have that paper trail. We haven't done the investigation. We haven't set up
05:57
a means of evaluating the loss potential. What we've basically done is la la la la la That won't happen to me. And that is actually not a good form of risk management. So risk rejection is not allowed. We put it out there because unfortunately, many organizations do risk rejection instead of acceptance. They don't
06:15
work through and decide
06:16
we'll deal with this risk later because of the value potential. Many times organizations just say, I don't want to hear it. We can't deal with this right now. Risk rejection is not allowed.
06:28
Okay? So when we look back through risk mitigation are big three elements. We reduce the risk by lessening probability and or impact
06:38
risk acceptance. We choose not to implement a mitigation strategy because the potential for loss is greater than the cost of mitigation
06:47
or we transfer risk. We find someone else to share in the risk events with us that would include insurance or ah S L. A's
06:59
now few other terms in addition with risk, total risk. And I think I already mentioned these earlier. But just to review total risk is thea amount of risk that exists before we implement some sort of control. So it's the total potential value for loss. If we don't do anything, how much money will we lose
07:18
if we don't back up our data?
07:19
That's the total risk.
07:21
Residual risk is what's left over after you've applied a risk mitigation strategy, and sometimes we have to apply multiple mitigation strategies.
07:30
Yes, I'm going to transfer the risk of fire by having fire insurance. But I'm also going to try to reduce that risk by storing flammable material in a safe place, having good policies, having sprinkler systems, those ideas so often we have multiple risk strategies,
07:49
but eventually there will be some risk that's left over. And that's called residual risk.
07:56
Secondary risk is when one risk response triggers another risk event. We talked about that as well.
08:03
So the idea here is when we talk about risk, the vulnerabilities and the assets come together. Okay, so let me let me reward that the amount of threats, the amount of vulnerabilities and the value of the assets all that is considered to give us the total risk these air just conceptual calculations thes aren't really
08:20
things that you need to plug values in.
08:24
And then when we talk about the total risk
08:26
and then we add an element of control called the controls gap, that's what gives us the residual risk. So just a few extra additional terms when it comes to dealing with risk.
08:39
Now, as we wrap up risk management if you'll recall three main elements of risk and then ongoing monitoring, we have risk assessment where we identify,
08:50
Ah, we identify our assets. And then we also have to evaluate her assets. This is, ah, hard process. It's not easy to look at my company and say our reputation is worth so many $1,000,000. It's very difficult to get a dollar value for intangible assets, but we have to.
09:07
That will then lead us to risk analysis where we prioritize our risks based on their qualitative value. And then they're quantitative value.
09:18
That quantitative value would then drive me to know how much money to spend or how much money I should spend on risk mitigation. Do I reduce the risk to accept the risk? So I transferred. How do I address this risk injury in general? And remember anything that talks about
09:37
eliminating risk
09:39
is gonna be wrong. What we have to do is manage risk, reduce risk we can totally eliminate.
09:45
All right, so we've gone through the definitions in terms. We talk about the different types of risk. We'll talk a little bit more about governance and appliance in the next section

Up Next

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)

This course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep organizations systems running well.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor