SlideShare a Scribd company logo
RISK QUANTIFICATION
FROM RAINBOWS TO DOLLARS
1
Disclaimer
These slides and accompanying presentation represent the author’s
opinions and experience and are not necessarily those of any organization,
including his past, current or future employers. All results are illustrated
using randomly generated data and therefore DO NOT reflect actual
results nor disclose any organization’s sensitive or proprietary information.
Please direct all concerns related to this material to the author via email at
joel.baese@yahoo.com. 2
Introduction
• Joel Baese
• Email: joel.baese@yahoo.com
• LinkedIn: https://www.linkedin.com/in/jbaese
• ISACA member since June 2010, CRISC since July 2010
• 18 years in IT
• Currently a Senior Manager II at Walmart building and leading the
Information Security Tactical Risk Analysis team
• GRC experience includes:
• Quantitative risk analysis at Walmart, qualitative risk analysis at Raytheon;
• Policy author and manager at Raytheon;
• Information systems security officer for DoD programs up to and including
Top Secret Special Access
MBA
BSIT
3
Overview
The Challenge
The Path
The Result
4
The Challenge
Meaningful
measurement
Effective comparisons
Well-informed
decisions
Cost effective accurate
risk management
5
Best Practice Risk Measurement
1. Cloud computing
2. Insider threat
3. External/third parties
4. Application vulnerabilities
5. Hardware vulnerabilities
6. Mobile malware
7. Social engineering
8. Organized crime
9. State sponsored attacks
10. Hacktivists
6
List adapted from: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
How much risk is there?
7
Source: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
How much risk is there?
8
Source: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
How much risk is there?
9
Source: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
How much risk is there?
10
Source: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
Did we all mean the same thing?
• What’s the asset?
• What’s the threat?
• What’s the threat vector?
• What’s the control?
• What’s the loss type?
• What’s the vulnerability?
• What’s the risk?
11
• The tire
• The Earth
• Gravity
• The rope
• Availability
• The probability gravity > rope
• The probability gravity overcomes rope resulting in loss
combined with the probable resulting financial loss
Credit: Jack Jones for the example 12
Best Practice Risk Measurement
1. Cloud computing
2. Insider threat
3. External/third parties
4. Application vulnerabilities
5. Hardware vulnerabilities
6. Mobile malware
7. Social engineering
8. Organized crime
9. State sponsored attacks
10. Hacktivists
13
List adapted from: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
Human Biases
• We tend to exaggerate spectacular
and rare risks and downplay
common risks.
• The unknown is perceived to be
riskier than the familiar.
• Personified risks are perceived to
be riskier than anonymous risks.
• We underestimate risks in
situations we do control, and
overestimate risks in situations we
don't control.
• We estimate the probability of
something by how easy it is to
bring examples to mind.
14The 5 Biggest Biases We Fall Victim To – Bruce Schneier
• Cloud computing
• Insider threat
• External/third parties
• Application vulnerabilities
• Hardware vulnerabilities
• Mobile malware
• Social engineering
• Organized crime
• State sponsored attacks
• Hacktivists
Risk is a reality and a perception
15
The Missing Ingredient
Accurate Models
Meaningful
measurement
Effective comparisons
Well-informed
decisions
Cost effective accurate
risk management
16
The Path
17
Probable
Loss Event Frequency
FAIR Ontology
18
Probable
Loss Magnitude
The probable magnitude and probable frequency of future loss
Factor Analysis of Information Risk
Productivity (P)
Replacement (P)
Response (PS)
Fines and Judgments (S)
Competitive Advantage (S)
Reputation (S)
FAIR Process
Stages of the Analysis Process
1. Identify Scenario Components (Scope the Analysis)
 Asset
 Threat
 Loss Event
2. Evaluate Loss Event Frequency (LEF)
 Threat Events
 Vulnerability
3. Evaluate Loss Magnitude (LM)
 Primary Loss Magnitude
 Secondary Loss
 Frequency
 Magnitude
4. Derive and Articulate Risk
Source: Risk Analysis (O-RA) from The Open Group
19
The Project
• 3 Months
• 2 FTEs + ≈1 Contractor
• Over 50 Scenarios
• Over 100 SMEs
• Over 500 Questions
• Over 1,400 data points
• To get to one number
What is our risk?
20
The Resultsish
21
Aggregate Average ALE By Environment
Total: $3 Billion
22
All results are illustrated using
randomly generated data and
therefore DO NOT reflect
actual results nor disclose any
organization’s sensitive or
proprietary information.
Potential Comprehensive Key Risk Metrics
𝐴𝑔𝑔𝑟𝑒𝑔𝑎𝑡𝑒 𝐴𝐿𝐸
𝐴𝑛𝑛𝑢𝑎𝑙 𝑅𝑒𝑣𝑒𝑛𝑢𝑒
$3 𝐵𝑖𝑙𝑙𝑖𝑜𝑛
$10 𝐵𝑖𝑙𝑙𝑖𝑜𝑛
30%
𝐴𝑔𝑔𝑟𝑒𝑔𝑎𝑡𝑒 𝐴𝐿𝐸
𝑀𝑎𝑟𝑘𝑒𝑡 𝐶𝑎𝑝
$3 𝐵𝑖𝑙𝑙𝑖𝑜𝑛
$5 𝐵𝑖𝑙𝑙𝑖𝑜𝑛
60%
23
All results are illustrated using
randomly generated data and
therefore DO NOT reflect
actual results nor disclose any
organization’s sensitive or
proprietary information.
Potential Comprehensive Key Risk Metrics
(continued)
𝐴𝑔𝑔𝑟𝑒𝑔𝑎𝑡𝑒 𝐴𝐿𝐸 ∝ 𝐿𝑜𝑠𝑡 𝐶𝑢𝑠𝑡𝑜𝑚𝑒𝑟 𝑉𝑎𝑙𝑢𝑒
$3 𝐵𝑖𝑙𝑙𝑖𝑜𝑛
Level of Impact
% of customers
lost
Households
Impacted
Revenue
Impact
(Lost Customer
Value)
Significant 50.00% 500,000 $5 billion
Major 25.00% 250,000 $2.5 billion
Moderate 12.50% 125,000 $1.25 billion
Minor 6.25% 62,500 $625 million
Slight 3.13% 31,500 $315 million
Avg value of a
household:
$10,000 Households: 1 million
Major
24
All results are illustrated using
randomly generated data and
therefore DO NOT reflect
actual results nor disclose any
organization’s sensitive or
proprietary information.
Top 10
25
All results are illustrated using randomly generated data
and therefore DO NOT reflect actual results nor disclose
any organization’s sensitive or proprietary information.
Aggregate ALE By Threats
26
All results are illustrated using randomly
generated data and therefore DO NOT reflect
actual results nor disclose any organization’s
sensitive or proprietary information.
Aggregate ALE By Assets
27
All results are illustrated using
randomly generated data and
therefore DO NOT reflect
actual results nor disclose any
organization’s sensitive or
proprietary information.
Materialized Areas of Loss (Aggregate)
PrimaryLossesSecondaryLosses
28All results are illustrated using randomly generated data and therefore DO NOT reflect actual
results nor disclose any organization’s sensitive or proprietary information.
Focus Adjustment for Future Analyses
29
All results are illustrated using
randomly generated data and
therefore DO NOT reflect
actual results nor disclose any
organization’s sensitive or
proprietary information.
Lessons Learned
• Challenges
• Finding the right PoCs/SMEs
• Significant difference in data request than what they were used to
• Risk quantification skeptics
• Significant data validation required due to basic definition differences
• Ex. contact event vs. threat event vs. loss event
• No established workflow process made tracking all the people and data inputs more difficult
than it probably needed to be
• Notes, notes, notes
• Sources
• Rationale
• Know the model and definitions well
30
Additional Resources
• The FAIR Institute
• http://www.fairinstitute.org
• The Open Group
• Open FAIR Standards
• http://www.opengroup.org/standards/security
• The Society of Information Risk Analysts
• https://societyinforisk.org
• Measuring and Managing Information Risk A FAIR Approach
• Authors: Jack Freund & Jack Jones
• http://store.elsevier.com/product.jsp?isbn=9780124202313
31
My contact information:
• Email: joel.baese@yahoo.com
• LinkedIn: https://www.linkedin.com/in/jbaese
Special thanks to Jack Jones
for allowing use of several of
his slides and examples .

More Related Content

PDF
Risk Analysis Webinar
PPTX
Introduction to FAIR - Factor Analysis of Information Risk
PPTX
Economically driven Cyber Risk Management
PPTX
Introduction to Open FAIR
PPTX
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
PDF
Executive Travel, Keeping Your Employees Safe
PDF
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
PPTX
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Risk Analysis Webinar
Introduction to FAIR - Factor Analysis of Information Risk
Economically driven Cyber Risk Management
Introduction to Open FAIR
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Executive Travel, Keeping Your Employees Safe
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Crash Course: Managing Cyber Risk Using Quantitative Analysis

What's hot (19)

PPTX
Risk Analysis for Dummies
PDF
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
PDF
Social Media Risk Metrics
PPTX
Risk Assessment About Building And Risk
PPTX
How to Do a Formal Risk Assessment
PPTX
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
PDF
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
PDF
From your Pocket to your Heart and Back
PPTX
Intro to a Data-Driven Computer Security Defense
PDF
Risk Calculator PowerPoint Presentation Slides
PDF
Hutton/Miller SourceBarcelona
PDF
Eco secu infocom
PDF
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
PPTX
The New Risk Management Framework after the 2008 Financial Crisis
PPTX
Risk-benefit analysis
DOC
Adversarial Safety Analysis
PPT
Calculate the Risk
PPT
Lesson 2- Information Asset Valuation
PPT
Risk Management 101
Risk Analysis for Dummies
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
Social Media Risk Metrics
Risk Assessment About Building And Risk
How to Do a Formal Risk Assessment
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
From your Pocket to your Heart and Back
Intro to a Data-Driven Computer Security Defense
Risk Calculator PowerPoint Presentation Slides
Hutton/Miller SourceBarcelona
Eco secu infocom
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
The New Risk Management Framework after the 2008 Financial Crisis
Risk-benefit analysis
Adversarial Safety Analysis
Calculate the Risk
Lesson 2- Information Asset Valuation
Risk Management 101
Ad

Similar to Information Security Risk Quantification (20)

DOCX
Risk Management Insight FAIR(FACTOR AN.docx
DOCX
Risk Management Insight FAIR(FACTOR AN.docx
DOCX
Risk Management Insight FAIR(FACTOR ANA
DOCX
Risk Management Insight FAIR(FACTOR AN.docx
PPTX
Risk is not a Hammer Usenix Enigma 2025 Shostack
PDF
Microsoft InfoSec for cloud and mobile
PPTX
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
PPTX
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
PPTX
Information systems risk assessment frame workisraf 130215042410-phpapp01
DOCX
Risk Management Insight FAIR(FACTOR ANA.docx
DOCX
Risk Management Insight FAIR(FACTOR AN.docx
DOCX
Risk Management Insight FAIR(FACTOR ANA.docx
PDF
Dj24712716
PDF
IS-Risk-Management-Lecture-2.pdf
PDF
Understanding enterprise risk management and fair
PPTX
Risk Management / Information Security
PPTX
Agile risk management - Enterprise agility
PPT
PDF
Quantifying Cyber Risk
PPTX
2016 - IQPC - Understanding and Assessing Corruption Risk
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR ANA
Risk Management Insight FAIR(FACTOR AN.docx
Risk is not a Hammer Usenix Enigma 2025 Shostack
Microsoft InfoSec for cloud and mobile
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
Information systems risk assessment frame workisraf 130215042410-phpapp01
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR ANA.docx
Dj24712716
IS-Risk-Management-Lecture-2.pdf
Understanding enterprise risk management and fair
Risk Management / Information Security
Agile risk management - Enterprise agility
Quantifying Cyber Risk
2016 - IQPC - Understanding and Assessing Corruption Risk
Ad

Recently uploaded (20)

PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PDF
How to Get Business Funding for Small Business Fast
PDF
Introduction to Generative Engine Optimization (GEO)
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
Building a Smart Pet Ecosystem: A Full Introduction to Zhejiang Beijing Techn...
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPTX
operations management : demand supply ch
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
Keppel_Proposed Divestment of M1 Limited
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PPTX
sales presentation، Training Overview.pptx
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
How to Get Business Funding for Small Business Fast
Introduction to Generative Engine Optimization (GEO)
Slide gioi thieu VietinBank Quy 2 - 2025
NEW - FEES STRUCTURES (01-july-2024).pdf
Building a Smart Pet Ecosystem: A Full Introduction to Zhejiang Beijing Techn...
Digital Marketing & E-commerce Certificate Glossary.pdf.................
Lecture 3344;;,,(,(((((((((((((((((((((((
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
operations management : demand supply ch
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Booking.com The Global AI Sentiment Report 2025
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Keppel_Proposed Divestment of M1 Limited
Principles of Marketing, Industrial, Consumers,
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
sales presentation، Training Overview.pptx
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics

Information Security Risk Quantification

  • 2. Disclaimer These slides and accompanying presentation represent the author’s opinions and experience and are not necessarily those of any organization, including his past, current or future employers. All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information. Please direct all concerns related to this material to the author via email at [email protected]. 2
  • 3. Introduction • Joel Baese • Email: [email protected] • LinkedIn: https://www.linkedin.com/in/jbaese • ISACA member since June 2010, CRISC since July 2010 • 18 years in IT • Currently a Senior Manager II at Walmart building and leading the Information Security Tactical Risk Analysis team • GRC experience includes: • Quantitative risk analysis at Walmart, qualitative risk analysis at Raytheon; • Policy author and manager at Raytheon; • Information systems security officer for DoD programs up to and including Top Secret Special Access MBA BSIT 3
  • 6. Best Practice Risk Measurement 1. Cloud computing 2. Insider threat 3. External/third parties 4. Application vulnerabilities 5. Hardware vulnerabilities 6. Mobile malware 7. Social engineering 8. Organized crime 9. State sponsored attacks 10. Hacktivists 6 List adapted from: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
  • 7. How much risk is there? 7 Source: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
  • 8. How much risk is there? 8 Source: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
  • 9. How much risk is there? 9 Source: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
  • 10. How much risk is there? 10 Source: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
  • 11. Did we all mean the same thing? • What’s the asset? • What’s the threat? • What’s the threat vector? • What’s the control? • What’s the loss type? • What’s the vulnerability? • What’s the risk? 11 • The tire • The Earth • Gravity • The rope • Availability • The probability gravity > rope • The probability gravity overcomes rope resulting in loss combined with the probable resulting financial loss
  • 12. Credit: Jack Jones for the example 12
  • 13. Best Practice Risk Measurement 1. Cloud computing 2. Insider threat 3. External/third parties 4. Application vulnerabilities 5. Hardware vulnerabilities 6. Mobile malware 7. Social engineering 8. Organized crime 9. State sponsored attacks 10. Hacktivists 13 List adapted from: Jones, J. (2016). FAIR & RiskLens Executive Overview. Retrieved July 14, 2016, from FAIR Institute: http://www.fairinstitute.org/member-resources
  • 14. Human Biases • We tend to exaggerate spectacular and rare risks and downplay common risks. • The unknown is perceived to be riskier than the familiar. • Personified risks are perceived to be riskier than anonymous risks. • We underestimate risks in situations we do control, and overestimate risks in situations we don't control. • We estimate the probability of something by how easy it is to bring examples to mind. 14The 5 Biggest Biases We Fall Victim To – Bruce Schneier • Cloud computing • Insider threat • External/third parties • Application vulnerabilities • Hardware vulnerabilities • Mobile malware • Social engineering • Organized crime • State sponsored attacks • Hacktivists
  • 15. Risk is a reality and a perception 15
  • 16. The Missing Ingredient Accurate Models Meaningful measurement Effective comparisons Well-informed decisions Cost effective accurate risk management 16
  • 18. Probable Loss Event Frequency FAIR Ontology 18 Probable Loss Magnitude The probable magnitude and probable frequency of future loss Factor Analysis of Information Risk Productivity (P) Replacement (P) Response (PS) Fines and Judgments (S) Competitive Advantage (S) Reputation (S)
  • 19. FAIR Process Stages of the Analysis Process 1. Identify Scenario Components (Scope the Analysis)  Asset  Threat  Loss Event 2. Evaluate Loss Event Frequency (LEF)  Threat Events  Vulnerability 3. Evaluate Loss Magnitude (LM)  Primary Loss Magnitude  Secondary Loss  Frequency  Magnitude 4. Derive and Articulate Risk Source: Risk Analysis (O-RA) from The Open Group 19
  • 20. The Project • 3 Months • 2 FTEs + ≈1 Contractor • Over 50 Scenarios • Over 100 SMEs • Over 500 Questions • Over 1,400 data points • To get to one number What is our risk? 20
  • 22. Aggregate Average ALE By Environment Total: $3 Billion 22 All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information.
  • 23. Potential Comprehensive Key Risk Metrics 𝐴𝑔𝑔𝑟𝑒𝑔𝑎𝑡𝑒 𝐴𝐿𝐸 𝐴𝑛𝑛𝑢𝑎𝑙 𝑅𝑒𝑣𝑒𝑛𝑢𝑒 $3 𝐵𝑖𝑙𝑙𝑖𝑜𝑛 $10 𝐵𝑖𝑙𝑙𝑖𝑜𝑛 30% 𝐴𝑔𝑔𝑟𝑒𝑔𝑎𝑡𝑒 𝐴𝐿𝐸 𝑀𝑎𝑟𝑘𝑒𝑡 𝐶𝑎𝑝 $3 𝐵𝑖𝑙𝑙𝑖𝑜𝑛 $5 𝐵𝑖𝑙𝑙𝑖𝑜𝑛 60% 23 All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information.
  • 24. Potential Comprehensive Key Risk Metrics (continued) 𝐴𝑔𝑔𝑟𝑒𝑔𝑎𝑡𝑒 𝐴𝐿𝐸 ∝ 𝐿𝑜𝑠𝑡 𝐶𝑢𝑠𝑡𝑜𝑚𝑒𝑟 𝑉𝑎𝑙𝑢𝑒 $3 𝐵𝑖𝑙𝑙𝑖𝑜𝑛 Level of Impact % of customers lost Households Impacted Revenue Impact (Lost Customer Value) Significant 50.00% 500,000 $5 billion Major 25.00% 250,000 $2.5 billion Moderate 12.50% 125,000 $1.25 billion Minor 6.25% 62,500 $625 million Slight 3.13% 31,500 $315 million Avg value of a household: $10,000 Households: 1 million Major 24 All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information.
  • 25. Top 10 25 All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information.
  • 26. Aggregate ALE By Threats 26 All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information.
  • 27. Aggregate ALE By Assets 27 All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information.
  • 28. Materialized Areas of Loss (Aggregate) PrimaryLossesSecondaryLosses 28All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information.
  • 29. Focus Adjustment for Future Analyses 29 All results are illustrated using randomly generated data and therefore DO NOT reflect actual results nor disclose any organization’s sensitive or proprietary information.
  • 30. Lessons Learned • Challenges • Finding the right PoCs/SMEs • Significant difference in data request than what they were used to • Risk quantification skeptics • Significant data validation required due to basic definition differences • Ex. contact event vs. threat event vs. loss event • No established workflow process made tracking all the people and data inputs more difficult than it probably needed to be • Notes, notes, notes • Sources • Rationale • Know the model and definitions well 30
  • 31. Additional Resources • The FAIR Institute • http://www.fairinstitute.org • The Open Group • Open FAIR Standards • http://www.opengroup.org/standards/security • The Society of Information Risk Analysts • https://societyinforisk.org • Measuring and Managing Information Risk A FAIR Approach • Authors: Jack Freund & Jack Jones • http://store.elsevier.com/product.jsp?isbn=9780124202313 31 My contact information: • Email: [email protected] • LinkedIn: https://www.linkedin.com/in/jbaese Special thanks to Jack Jones for allowing use of several of his slides and examples .

Editor's Notes

  • #6: How close are we to employing meaningful measurement in our risk analysis? But let’s talk about how we measure risk today …
  • #8: Let’s walk through a scenario together …
  • #13: Now what if I told you the engineers who designed and built the ship had varying definitions of mass, weight, and velocity? Still want to go?
  • #15: Schneier: "Newspapers repeat rare risks again and again. When something is in the news, it is, by definition, something that almost never happens. Things that are so common they stop becoming newsworthy -- like car accidents -- are what you need to worry about." Risk is a reality and a perception Confirmation bias Flashbulb Event = Significant Emotional Event
  • #17: But what do we give them?
  • #23: Random numbers generated between $1M and $2B rounded up to nearest $10M.