CISM

Course
Time
12 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:02
So if risk management is our first step of the risk management lifecycle, let's go ahead and talk about that.
00:09
And let's compare and contrast it to some of the other steps.
00:12
Okay, So when we start with risk management, like I just mentioned, we've got four stages of the life cycle and this is the very first.
00:21
So when we look at risk management, what this is all about is identified.
00:26
I want to identify assets, threats and then ultimately find out where my weaknesses are.
00:33
What I've learned in risk identification is gonna feed into risk assessment.
00:39
All right, so figure out what my assets are in what they were,
00:43
and I look at things that would propose harm to the asset.
00:47
Now, identify what controls are in place because rarely are you going to just walk into an organization and they have nothing, right? No security program, no controls. So something's in place. I'm gonna identify what's in place and determine how much residual risk is left over.
01:04
So when we talk about identifying vulnerabilities,
01:07
what that means is,
01:10
in addition to control center their way almost assuredly have some weaknesses still left over.
01:17
Well, if we've got those weaknesses. What would the damage be if those weaknesses were compromised?
01:22
And then, of course, that's gonna lead into risk assessment. So really, these five kind of bullet points or what we're looking for with identify risk
01:30
now there are a 1,000,000 ways to identify risk within your organization. I mean, look around, right. But senior management's responsible for due care and due diligence and due diligence says We've got to go out and educate ourselves.
01:47
We've gotta look for industry standards and understand what those are. We need to understand laws and regulations that are applicable to us. What drivers are there within industry? What do our stakeholders expect? What do our customers expect?
02:01
We can look at audit logs and honeypot logs, intrusion to *** detection system logs.
02:08
We can watch the media because it seems like to me
02:12
every week there's an organization that's being compromised, and I almost wonder each Monday when I wake up Well, who's it gonna be this week?
02:21
You know, we've seen Facebook and Yahoo and linked in and Home Depot and on and on and on Target and all these others,
02:28
so really part of just staying knowledgeable and aware of the environment is looking, what's going on currently
02:37
all right, with risk, culture and communication. So the idea is that it's not enough for senior management toe. Understand what the threat landscape is or you know what our overview
02:49
that philosophy is. We've got to communicate that to our employees. We've gotta raise awareness. We've got to talk in clear and honest terms. We've gotta have them understand what our risk context is, what's at stake
03:05
and making sure that our employees understand that. Because many times we have employees that are a little bit lax with policies, and I know that's every, well where. But if we can help them understand
03:16
what's its state?
03:19
Ideally, they will have greater buyin
03:23
all right now. Risks, of course, are relevant to us
03:28
on Leah's. They support the business.
03:30
So when we're determining where to prioritize and how to prioritize which risks get the most money for us to address, the idea is those areas with the least amount of tolerance.
03:43
That's what we've got to spend our money on, right, so we have to know from senior management. They've got a really prioritize, and when senior management prioritizes our risk. There's a much greater likelihood we're gonna be in alignment with business goals and object.
03:58
Like we've said throughout I t people wanna prioritize and they want bigger, better, louder, faster controls and technology and equipment devices.
04:09
But senior management has to say, Listen,
04:12
you guys were here just to support the business unit and here's the degree of security, the business unit
04:18
and this is our top priority than this unit and then this unit.
04:24
So again, senior management really has to be in there. Otherwise, you're gonna have an I T department prioritizing risks based on the technology that may not sign. That may not wind up meeting the goals of the organization.
04:40
Now an organization should have three levels of defense.
04:44
Okay, there should be the business units themselves. The business units are involved in overseeing that risk. Management is implemented. Risk management controls are implemented that there's a risk process in place.
04:59
They want to make sure that the controls are applied properly,
05:03
all right, and then we back up and that second line we look for senior management to put the policies and procedures in place.
05:12
They're the ones who ultimately guarantee its compliance with walls and regulation.
05:17
And then that third step is gonna be audit
05:20
where audit goes through
05:24
with read only. There's never a point in time when an auditor will make a change right in autumn on auditor documents and report.
05:31
And what they're looking for is,
05:34
are we following policy as laid out by senior man?
05:40
Okay, so those are the three lines of defense and you'll notice down the bottom. A racy chart is mentioned
05:46
and racy stands for responsible, accountable
05:49
consult
05:50
and inform.
05:53
And so really, the accountable is kind of the buck stops here. It's their their ultimate requirement
06:00
that they
06:01
provide these elements. It's their ultimate requirement that they protect the assets of the organization. And if they don't, it really is on their shoulder.
06:14
Now responsible means that we're the worker. Bees were the ones who do
06:18
you know, senior management dictates what's happening, and then responsible people go through and implement the strategy.
06:26
Consult means I'm gonna get together and work with someone before the decisions made, and then inform means I'm gonna tell you happen,
06:34
right? So racy, responsible, accountable consult. And in four
06:41
All right
06:42
now,
06:43
risk controls proactive and reactive needs to come from a lot of different categories.
06:49
Segregation of Judy's, job response, a rotation,
06:54
mandatory vacations, M of in control, secure state principle of LISE privilege need to know, acceptable use policy and data and system ownership.
07:03
We're going to go through each of these terms
07:06
in the next second.

Up Next

CISM

Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor