Qualitative Risk Assessment

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 39 minutes
Difficulty
Intermediate
CEU/CPE
1
Video Transcription
00:00
This is risk management and information technology.
00:03
In this lesson we will be discussing the qualitative risk assessment process. Different methodologies for qualitative risk assessment and the Delphi technique.
00:12
In the previous lesson, we talked about the risk assessment process and an overview on how the risk assessment team gathers data during an assessment.
00:20
Qualitative risk assessment is a scenario based assessment
00:23
that involves data gathering of measurements using surveys, questionnaires and interviews.
00:28
Scenario based questions can destroy driven and the answers are asked in a scale to evaluate risk cause and effects of the risk.
00:36
Here are some qualitative risk assessment techniques,
00:40
brainstorming involves a group of people discussion the scenario and talking about the potential risks and mitigation.
00:46
Starboard is a visual session where scenarios are discussed and shaped, identify risks. This is usually done in a presentation tile studying.
00:55
Focus groups on the other hand are similar to brainstorming sessions but involve other key subject matter experts from different departments To give a more holistic view of the risk assessment
01:04
surveys and questionnaires are usually online, anonymous queries across the department.
01:08
The risk assessment team collects this information and identifies the risks, which are scaled and ranked checklists are given to key subject matter experts in the department and these answers are collected and scored by the risk assessment,
01:22
one on one meetings and interviews are discussed with the subject matter experts to identify risk and occurred mitigation procedures.
01:29
These are usually the grants of the team are most familiar with the overall process and procedures, as well as inherent risks of the operation
01:36
determining which technique to use varies. It is suggested that the methods used to gather information is designed to fit the culture of the organization. More conservative or large organizations would prefer service to collect information,
01:49
whereas larger busy departments will have limited time for face to face meetings and interviews may be preferred by smaller group or more. Extroverted department
01:57
techniques can also be used in combination with each other to uncover the most relevant risk and organization.
02:04
Different techniques will yield different results which can then be compared and contrasted against each other
02:09
with that in mind. Let's step through what content scenario based questions would look.
02:15
The risk assessment team creates a questionnaire which can come from various sources and may contain questions or surveys used throughout the industry.
02:23
This questionnaire may contain different scenarios pertaining to the potential risks,
02:28
may describe threat levels of a risk lost potential of probability, as well as advantages and disadvantages of safeguards for the risk if there are any,
02:37
these questioners are released a diverse group of participants.
02:39
These can be key subject matter experts or the actual operators of the process to ensure the usefulness ability of the service.
02:47
Another common tool used by risk assessment teams is called the Delphi technique
02:52
which involves an anonymous feedback questionnaire, a survey which is distributed and presented to a group for evaluation
02:58
and involves four ft
03:00
face. One of the Delphi technique involves administering the questionnaire to key subject matter experts in the department where the answers are collected,
03:08
which will be used to decide a second questionnaire.
03:12
In Phase two, the technique assessment improvised the feedback from Phase one and creates a new set of questions from the first questionnaire, which is then redistributed and collected back
03:22
In Phase three. This involves returning to feed back again from Phase two
03:27
And another set of questions are formed from the Phase two Answers. At this point the participants ranked statements and questions from the fever of Sue's
03:35
which had phase for the risk assessment team can consider more phases if needed. Our craft the survey to focus on less questions and repeat pastry until a consensus of the risk assessments that is achieved.
03:46
The reason why we administer the Delphi technique is to ensure a fair and holistic view of risks from virus department heads and subject matter experts.
03:54
The group will narrow don't risk into key items which are actionable by the organization.
04:00
Just a quick quiz.
04:03
True or false
04:04
Qualitative risk assessment is a calculation based assessment.
04:09
The answer is false. Qualitative risk assessment is not a calculation based assessment.
04:15
Next
04:17
your false
04:18
qualitative risk assessment includes the following its assessment
04:23
surveys, questionnaires, checklists and interviews.
04:27
Yes that's true.
04:29
Qualitative risk assessment uses surveys, questionnaires, checklists, interviews.
04:34
One more
04:35
qualitative risk assessment using Delphi technique include
04:40
a anonymous feedback questionnaire.
04:43
Be written on paper purpose responses
04:46
or C
04:46
compiled and presented to a group
04:49
or D. All of the above
04:53
the answer is D. All of the above.
04:56
Delphi technique
04:57
uses a four step process that involves anonymous feedback questionnaires that is compelling presented to a group until consensus is determined.
05:05
In summary,
05:08
we learn what is a qualitative risk assessment and a different data gathering methods, such as surveys, questionnaires and interviews.
05:15
We discuss how questions are structured,
05:16
and we also talked about the Delphi technique on how it is deployed.
05:25
Thank you for completing this lesson. This is your instructor robert gonna.
Up Next