HCISPP

Course
Time
5 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
Hi there, Cyber your friends and welcome back to the Hcs PP certification course risk management frame words. My name is Charlene Hutchins, and I will be your instructor today.
00:13
In this video, we're going to discuss the exciting subject of risk pension. It frameworks will review at a very high level in this four phase process for risk management and touch on some other frameworks.
00:29
So I want to give a little detail around in this four days model for risk management from the missed 839.
00:38
The steps and the risk management process are not inherently sequential in nature. The steps are performed in different ways, depending on the particular tear where the step is applied and on prior activities related to each of the steps.
00:53
What is consistent is the outputs or post conditions from a particular risk management step.
01:00
They directly impact one or more of the other steps in the process.
01:04
But, uh,
01:08
framing the risk establishes the context and provides a common perspective on how organization manages risk.
01:17
Its primary output is pretty to producer strategy that addresses how an organization intends to assess risk and respond to and monitored risk.
01:30
The risk management strategy makes the specific assumptions constraints, risk tolerances and priorities or trade offs use for making investment and operational decisions.
01:42
The strategy also included it, or includes how risks will be managed by senior leaders and executives.
01:53
The risk assessment includes threats and vulnerability, identification and risk determination.
02:00
Threat identification requires examination of threats, sources and defense,
02:07
identifying the threat capabilities, intentions and targeting information from all available sources.
02:14
Organizations with more established enterprise architectures and mature lifecycle processes have outputs that can be used to inform the risk assessment process.
02:24
For example, within an organization that has an internal audit department,
02:29
a regular review and monitoring of audit findings and the remediation activities can be an input into the risk management process.
02:38
If there's a particular area or finding that consistently has weaknesses in the control or lack of controls that can identify a potential vulnerability,
02:50
organizations can employ a variety of approaches to determine the likelihood of threats exploiting vulnerabilities.
02:57
Likelihood Determinations can be based on eager threat assumptions or actual threat information. For example, historical data on cyber attacks or specific information on adversary capabilities and targeting
03:15
risk response includes risk response, identification, evaluation of alternatives and risk response decision and risk response implementation.
03:25
In addition to the risk assessment and risk framing steps, the risk response step can receive inputs from the risk monitoring step, for example, in an organization experiences of breach or compromise to the information systems or environments of operation that require an immediate response to address the incident.
03:46
A risk response can be risk acceptance avoidance, mitigation, sharing,
03:53
transfer or a combination of the above.
04:00
Lastly,
04:01
and the risk process in the process of risk monitoring, which includes a risk of monitoring strategy and risk monitoring itself. A risk management strategy or risk monitoring strategy includes the purpose,
04:15
tight and frequency of monitoring activities.
04:19
Determining the purpose directly impacts the means used to conduct the monitoring activities and where monitoring occurs,
04:28
such as at risk at the risk management tear.
04:32
A strategy also determines which type of monitoring will be employed, including approaches that rely on automation or will be procedural or manual and requires human intervention.
04:46
Finally, a strategy determines the frequency that monitoring will occur.
04:51
Areas that are typically included in risk monitoring are monitoring for compliance with legal regulatory requirements, internal policies and procedures in the mission and business requirements
05:04
or monitoring for effectiveness.
05:08
This type of monitoring is used to determine if the implemented risk response measures have actually been effective in reducing the identified risk to the desired level.
05:17
Failure to achieve desired levels of effectiveness may be an indication that the risk response measures that have been implemented and correctly or not operating as intended.
05:31
Monitoring changes to information systems and environments of operations is not linked directly to previous risk response measures, but is important to detect changes that may affect the risk to the operations, assets or individuals.
05:53
Other frame words that you were here, here about and see in this study materials include those listed here.
06:00
But it's not an exhaustive list
06:02
and my personal opinion High trust is not a true framework.
06:08
Hi Trust combines various
06:11
other frameworks.
06:12
They've done a magnificent job of mapping all other frameworks. Such a Zionist
06:17
Kobe, It co. So I till and some regulatory requirements such as HIPPA and some other state requirements, and that mapping they've broken out into various categories and that's high trust.
06:32
It is a very expensive process to perform on. While you may conduct the self assessment
06:39
after purchasing a subscription.
06:42
It can only be validated by hiring an external third party C p A or auditing firm who's been trained to convict the assessments.
06:50
It is based on a five level maturity model, and you must achieve at least the maturity level of three in most areas, with few corrective action plans for where controls for controls that require remediation
07:05
again, This is just my personal opinion and not the opinion of anyone else. That's library,
07:12
and that's all I'll say about that
07:14
now. There is a framework and not a life cycle.
07:17
Fair is a quantitative model for understanding, analyzing and quantifying cyber risk. An operational risk in Financial Terms
07:28
CO. So
07:30
identifies five areas of internal control necessary to meet the financial reporting and disclosure objectives.
07:36
They include control, environment,
07:40
risk assessment,
07:42
control activities,
07:44
information and communication and monitoring activities.
07:49
Now I till is not a framework,
07:53
but it is the I T Infrastructure library that's based on Isil 20,000.
08:00
The Isil 20,000 standard is focused on service and management.
08:05
The thought is because risk in disrupt service delivery.
08:09
There is some consideration of risk management, but not a risk management life cycle.
08:16
So in summary, we've talked about the exciting, this four face process for risk management and other risk management frameworks and approaches to risk management.
08:28
Thank you for joining me, and I'll see you in the next video.

Up Next

HCISPP

The HCISSP certification course provides students with the knowledge and skills to successfully pass the certification test needed to become a healthcare information security and privacy practitioner. The course covers all seven domains included on the exam.

Instructed By

Instructor Profile Image
Schlaine Hutchins
Director, Information Security / Security Officer
Instructor