5 hours 58 minutes
Welcome back to CyberRays. This, of course.
I'm your instructor. Bread Roads. Let's now jump into risk context, analysis and evaluation.
We've got a lot to cover in this video. We're gonna talk about context. We're gonna talk about identifying risk. We're gonna talk about analysis. We'll talk about the all important thing of prioritizing risk. Because if you don't prioritize, everything is important. And then nothing is important.
We're gonna talk about risk response strategies, and we're gonna talk about why we need to monitor, evaluate and adjust.
So risk context is incredibly important. Ah, lot of risk context comes from these two areas. What industry vertical you're in. So, for example, if you are in the health care industry, your risk context is different than if you are in the energy industry or, say the services industry. So
you need to understand context in terms of your industry vertical
and and and that also drives laws and regulations and rules that you might have to follow. So you gotta pay attention to that,
then the other area of context is critical infrastructure. Are you a critical infrastructure provider? If you're an ISI working for an organization that provides like power, water, sewer, those kinds of things, right? Your risk context is very different because you actually are delivering capabilities to the general consumer. The general public
that is absolutely critical. And so your
risk context is different.
Each of those drives and organizations risk attitude and appetite. So attitude is what do they think about risk? Some organizations are very risk averse, while others are very loose when it comes to risk. Additionally, we have appetite, right? Which is how much risk are you willing to take on?
If an organization has, ah, high appetite for risk, they're going to do a lot of risky things.
If there are low appetite for risk, they're going to be very risk averse. And so those things go hand in glove. You need to understand what it is for your organization.
When we identify risk. We look at these six areas, right? The technical areas. That's pretty obvious, right? Can we actually, is it feasible to do something? Can we test it? Um, cost. We've seen cost before, right? Are we meeting estimates or is the actual costs so high are going to be so high that we're gonna have a problem schedule. Right.
Are we going to meet our schedule requirements? Is there a way to track version
programmatic? Well, this is interesting. This is where we talk about contracts and personnel and resource is right. If we don't have, the resource is we're gonna find risk. Uh, many organizations say they want to do the greatest thing since sliced bread. They actually don't have the money to do it when they don't have the money to do it. It causes problems.
Obviously, there's laws and regulations we have to follow. And then, of course, guess who else gets a vote?
Adversaries. Those internal on an external threat, Actors right internal Could be the the malicious insider or the inadvertent insider. And then external threat actors out there be they advanced. Persistent threats, script, kiddies, cybercriminals, activists. You name it right. Those external actors get a vote when it comes to your risks.
So we analyze risk using the two formulas we talked about earlier. Probability of occurrence times the consequence of occurrence or threat times vulnerability divided by our controls and consequence. Second one, I think is better and more accurate. So we want to keep that in mind.
But here's the thing I want you to remember.
If you don't have a threat or vulnerability, then that risk is not existent. It's not that you don't have risk. It's just that specific risk area that you're looking at doesn't exist. So don't try to assign risk where there are none.
Okay, when it comes to probability, if there is a no probability of occurrence of a risk, right like say, for example, if you live in Florida, the probability of occurrence of a blizzard is near zero. So maybe you don't even think about that, Okay, so we have to prioritize our risk. If we don't prioritize our risk,
then we're going to make everything an important thing. And then nothing is an important thing. And priorities of risk
is really tied back to your organizational context and then your attitude and appetite, right? If you are in organization, that accepts a lot of risk. Well, guess what, then Your priority listing is very different than an organization that is very risk averse.
So here's how we talk about planning and executing risk response strategies, right? We look at control solutions, decisions and analysis, so controls are pretty straightforward. You've got technical control. So think technology.
You have operational controls and those could be policies, processes, procedures. Right. And then you have management controls. And those are kind of a mix of both technical operational,
which allows us to track what's going on with the control controls are a great way to respond and mitigate risk.
Um, security solutions. Well, maybe, instead of that is part of your controls. The technical side of house. You go out and buy something. It could be God's government off the shelf. It could be caused commercial shelf. You might actually build it. Now, when you bill something custom, guess what if there's a zero day you own the zero day, so just keep that in mind
decisions. We have to make decisions about risk, and that's all tied back to our context, attitude and appetite. Um,
I would say is, it sees you're going to spend a fair amount of your time pushing for decisions to protect your systems on. If you're not willing to communicate that stuff right, probably not the right spot for you to be in. And then, of course, we look at the analysis process. We look at the quantitative and qualitative aspects of things, right?
Quantitative is something measurable? Can I actually count the beans and the bullets, if you will,
that allow us to understand our risk, right? Or its qualitative right. Maybe I'm going to describe the risk is high, medium or low. But as part of our response, we need to understand what that is so that we can communicate that properly
when we monitor, evaluate and adjust. We do that based on our organizational tears, right from a risk management tractors perspective at the enterprise level. So obviously a tier one, Tier two and tier three tier three, I'm gonna tell you right is is really tied to the decisions of tier two and tier one
right here, too, is tied to the decisions of tier one. And Tier one makes the decisions many of the case, right?
And so obviously, at each of those different levels, right, we need to understand how we share those triggers up and down this chain, right?
Monitoring, evaluating adjustment is a continuous monitoring process. Conman, you're gonna hear me talk about this later, but we have to do
continuous monitoring of our risk via the available data and tools, or we're going to miss a risk and we're going to cause a problem for our organization. So if you take anything away from this chart is one. We're continuously monitoring risk at each of the levels of systems, mission, business process and organization to support
managing enterprise risk.
So in this lesson, what did we cover? We talked about identifying risk and that pieces and parts of context and how important that is. We talked about identifying risk. Where do they come from? We did some analysis discussion. We reviewed how that how important it is to prioritize your risk, because if we don't do that, everything is important than nothing is important. We then look at our
our risk response strategies and those could be controls. This could be based on decisions.
This could be based on on different metrics. Right then we talked about the fact how important it is to monitor, evaluated and adjust throughout the course of the life cycle of our systems.
As I said before,
risk management is a continuous process. We don't just do it once, and if we just do it once, we're going to expose our organizations.
We'll see you next time
ISC2 CISSP Practice Test: Certified Information Systems Security Professional
There is a growing need for information security leaders who possess the depth of expertise ...
Certified Information Systems Security Professional (CISSP)
CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to ...
19 CEU/CPE Hours Available
Certificate of Completion Offered