SlideShare a Scribd company logo
REPORTING RELEVANT IT
RISKS TO STAKEHOLDERS
Marc Vael, Brussels, 24 June 2015
WHO ARE THE STAKEHOLDERS?
Stakeholders can affect or be affected by the
organization's actions, objectives and policies.
Examples of key stakeholders are creditors, directors,
employees, government (and its agencies), owners
(shareholders), suppliers, unions, and the community
from which the business draws its resources.
WHO ARE THE STAKEHOLDERS?
WHO ARE THE STAKEHOLDERS?
WHO ARE THE STAKEHOLDERS?
WHO ARE THE STAKEHOLDERS?
WHO ARE THE STAKEHOLDERS?
Big problem #1: 

Stakeholders all speak different
“languages
WHAT ARE RELEVANT IT RISKS?
Information technology risk / IT risk / IT-related risk is the business risk
associated with the use, ownership, operation, involvement, influence and
adoption of IT within an enterprise.
Assessing the probability of likelihood of various types of event/incident with their
predicted impacts or consequences should they occur is a common way to assess and
measure IT risks. 

Alternative methods of measuring IT risk typically involve assessing other contributory
factors such as the threats, vulnerabilities, exposures, and asset values.
IT risk has a broader meaning: it encompasses not just only the negative impact of
operations and service delivery which can bring destruction or reduction of the value of
the organization, but also the benefitvalue enabling risk associated to missing
opportunities to use technology to enable or enhance business or the IT project
management for aspects like overspending or late delivery with adverse business
impact.
WHO ARE THE STAKEHOLDERS?
Big problem #2: 

“Risk” is inherently subjective
(qualitative)
MEASURING IT RISKS?
Information security event: identified occurrence of a system, service
or network state indicating a possible breach of information security
policy or failure of safeguards, or a previously unknown situation that may
be security relevant.

Occurrence of a particular set of circumstances.

The event can be certain or uncertain. 

The event can be a single occurrence or a series of occurrences.
Information security incident: single or series of unwanted information
security events that have a significant probability of compromising
business operations and threatening information security

An event that has been assessed as having an actual or potentially
adverse effect on the security or performance of a system.
MEASURING IT RISKS?
Impact: result of an unwanted incident
Consequence: Outcome of an event

There can be more than one consequence from one event.
Consequences can range from positive to negative. 

Consequences can be expressed qualitatively or quantitatively
R = L × I

Likelihood of a security incident occurrence is a function of the likelihood that a threat appears
and likelihood that the threat can successfully exploit the relevant system vulnerabilities.
Consequence of the occurrence of a security incident is a function of likely impact that the
incident will have on the organization as a result of the harm the organization assets will
sustain. Harm is related to the value of the assets to the organization; the same asset can
have different values to different organizations.
MEASURING IT RISKS?
R can be function of four factors:
A = Value of the assets
T = Likelihood of the threat
V = Nature of vulnerability i.e. the likelihood that can be exploited
(proportional to the potential benefit for the attacker and inversely
proportional to the cost of exploitation)
I = the likely impact, the extent of the harm
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
MEASURING IT RISKS?
OWASP approach to IT risk
Estimation of Likelihood in a 0 to 9 scale:
Threat agent factors
Vulnerability Factors
Estimation of Impact in a 0 to 9 scale
Technical Impact Factors
Business Impact Factors
MEASURING IT RISKS?
OWASP approach to IT risk
Threat agent factors
Skill level: How technically skilled is this group of threat agents? No technical skills (1),
some technical skills (3), advanced computer user (4), network and programming skills
(6), security penetration skills (9)
Motive: How motivated is this group of threat agents to find and exploit this vulnerability?
Low or no reward (1), possible reward (4), high reward (9)
Opportunity: What resources and opportunity are required for this group of threat agents
to find and exploit this vulnerability? full access or expensive resources required (0),
special access or resources required (4), some access or resources required (7), no
access or resources required (9)
Size: How large is this group of threat agents? Developers (2), system administrators (2),
intranet users (4), partners (5), authenticated users (6), anonymous Internet users (9)
MEASURING IT RISKS?
OWASP approach to IT risk
Vulnerability Factors: estimate the likelihood of the particular
vulnerability involved being discovered and exploited. Assume the
threat agent selected above.
Ease of discovery: How easy is it for this group of threat agents to discover this
vulnerability? Practically impossible (1), difficult (3), easy (7), automated tools available (9)
Ease of exploit: How easy is it for this group of threat agents to actually exploit this
vulnerability? Theoretical (1), difficult (3), easy (5), automated tools available (9)
Awareness: How well known is this vulnerability to this group of threat agents? Unknown
(1), hidden (4), obvious (6), public knowledge (9)
Intrusion detection: How likely is an exploit to be detected? Active detection in application
(1), logged and reviewed (3), logged without review (8), not logged (9)
MEASURING IT RISKS?
OWASP approach to IT risk
Technical Impact Factors; estimate the magnitude of the impact on the
system if the vulnerability were to be exploited.
Loss of confidentiality: How much data could be disclosed and how sensitive is it? Minimal non-
sensitive data disclosed (2), minimal critical data disclosed (6), extensive non-sensitive data disclosed
(6), extensive critical data disclosed (7), all data disclosed (9)
Loss of integrity: How much data could be corrupted and how damaged is it? Minimal slightly corrupt
data (1), minimal seriously corrupt data (3), extensive slightly corrupt data (5), extensive seriously
corrupt data (7), all data totally corrupt (9)
Loss of availability How much service could be lost and how vital is it? Minimal secondary services
interrupted (1), minimal primary services interrupted (5), extensive secondary services interrupted (5),
extensive primary services interrupted (7), all services completely lost (9)
Loss of accountability: Are the threat agents' actions traceable to an individual? Fully traceable (1),
possibly traceable (7), completely anonymous (9)
MEASURING IT RISKS?
OWASP approach to IT risk
Business Impact Factors: requires a deep understanding of what is
important to the company running the application. Aiming to support risks
with business impact, particularly if the audience is executive level. The
business risk is what justifies investment in fixing security problems.
Financial damage: How much financial damage will result from an exploit? Less than the cost to fix the
vulnerability (1), minor effect on annual profit (3), significant effect on annual profit (7), bankruptcy (9)
Reputation damage: Would an exploit result in reputation damage that would harm the business?
Minimal damage (1), Loss of major accounts (4), loss of goodwill (5), brand damage (9)
Non-compliance: How much exposure does non-compliance introduce? Minor violation (2), clear
violation (5), high profile violation (7)
Privacy violation: How much personally identifiable information could be disclosed? One individual (3),
hundreds of people (5), thousands of people (7), millions of people (9)
24
MEASURING IT RISKS?
MEASURING IT RISKS?
MEASURING IT RISKS?
MEASURING IT RISKS?
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
WHO ARE THE STAKEHOLDERS?
Big problem #3: 

The risks that frighten people 

are not the same ones that “kill”
them.
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHO ARE THE STAKEHOLDERS?
Big problem #4: 

Risks are difficult to compare across
the board
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT
RISKS TO STAKEHOLDERS?
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders

More Related Content

PDF
Justifying IT Security: Managing Risk
PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PPTX
Risk Management Methodology - Copy
PDF
introducing-MEA-Risk
PDF
Preparing for future attacks - the right security strategy
PDF
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
PDF
Preparing for future attacks. Solution Brief: Implementing the right securit...
PDF
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Justifying IT Security: Managing Risk
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Risk Management Methodology - Copy
introducing-MEA-Risk
Preparing for future attacks - the right security strategy
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
Preparing for future attacks. Solution Brief: Implementing the right securit...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...

What's hot (20)

PDF
2013 Incident Response Survey
PDF
VIPRE --Responding to Cyberattacks
PDF
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
PPTX
Ivanti - Continuous Vulnerability Management
PDF
u10a1-Risk Assessment Report-Beji Jacob
PPTX
Crash Course: Managing Cyber Risk Using Quantitative Analysis
PDF
Outsourcing
PDF
Risk Analysis Webinar
PDF
Social Media Risk Metrics
PPTX
Managing Reputation
PDF
Importance of Risk alert services in Business Continuity Planning
PDF
SANS 2013 Report: Digital Forensics and Incident Response Survey
PPTX
Information Security Risk Quantification
PDF
Eco secu infocom
PDF
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
PDF
Prieto Black Swans
PDF
From your Pocket to your Heart and Back
PPTX
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
PDF
Root causes
2013 Incident Response Survey
VIPRE --Responding to Cyberattacks
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
Ivanti - Continuous Vulnerability Management
u10a1-Risk Assessment Report-Beji Jacob
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Outsourcing
Risk Analysis Webinar
Social Media Risk Metrics
Managing Reputation
Importance of Risk alert services in Business Continuity Planning
SANS 2013 Report: Digital Forensics and Incident Response Survey
Information Security Risk Quantification
Eco secu infocom
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Prieto Black Swans
From your Pocket to your Heart and Back
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Root causes
Ad

Viewers also liked (20)

PDF
Brief overview on Microsoft Solution Framework (MSF)
PPTX
Microsoft solutions framework
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
PPTX
What's new in Visual Studio 2013 & TFS 2013
PPT
Microsoft solutions framework
PPT
Patient management 1 /certified fixed orthodontic courses by Indian dental ac...
PPT
MSF (Microsoft Solution Framework)
PDF
Business IT Management - Intro to CobiT & ITIL
PPTX
Sap health care patient management
PPT
TFS Administration Overview
PPTX
Sap is utilities-cs
PPT
Visual Studio IDE
PDF
Microsoft Test Manager
PPT
IT Governance Concept
PDF
Agile project management with visual studio tfs 2013 - My presentation at Reg...
PPTX
Business management (1)
PPT
IT Governance Introduction
PPTX
Introduction to Team Foundation Server (TFS) Online
PPT
Chap1 2007 Cisa Review Course
PDF
How to implement effective ITSM System
Brief overview on Microsoft Solution Framework (MSF)
Microsoft solutions framework
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
What's new in Visual Studio 2013 & TFS 2013
Microsoft solutions framework
Patient management 1 /certified fixed orthodontic courses by Indian dental ac...
MSF (Microsoft Solution Framework)
Business IT Management - Intro to CobiT & ITIL
Sap health care patient management
TFS Administration Overview
Sap is utilities-cs
Visual Studio IDE
Microsoft Test Manager
IT Governance Concept
Agile project management with visual studio tfs 2013 - My presentation at Reg...
Business management (1)
IT Governance Introduction
Introduction to Team Foundation Server (TFS) Online
Chap1 2007 Cisa Review Course
How to implement effective ITSM System
Ad

Similar to ISACA Reporting relevant IT risks to stakeholders (20)

DOCX
Risk management planExecutive SummaryThe past.docx
PDF
Vulnerability Assessment ( Va )
PDF
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
PPTX
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
PPTX
Cybersecurity Risk Management Tools and Techniques (1).pptx
PDF
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
Symantec cyber-resilience
PPTX
Assess risks to IT security.pptx
PDF
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
PDF
2016 trustwave global security report
PDF
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
PPTX
OWASP Risk Rating Methodology.pptx
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
COVID-19 free penetration tests by Pentest-Tools.com
PDF
Cyber Threat Landscape- Security Posture - ver 1.0
PDF
Relating Risk to Vulnerability
PDF
Insider Threat Detection Recommendations
Risk management planExecutive SummaryThe past.docx
Vulnerability Assessment ( Va )
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
Cybersecurity Risk Management Tools and Techniques (1).pptx
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Symantec cyber-resilience
Assess risks to IT security.pptx
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
2016 trustwave global security report
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
OWASP Risk Rating Methodology.pptx
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Before the Breach: Using threat intelligence to stop attackers in their tracks
Accounting Information Systems 11th Edition Bodnar Solutions Manual
COVID-19 free penetration tests by Pentest-Tools.com
Cyber Threat Landscape- Security Posture - ver 1.0
Relating Risk to Vulnerability
Insider Threat Detection Recommendations

More from Marc Vael (20)

PDF
How secure are chat and webconf tools
PDF
my experience as ciso
PDF
Advantages of privacy by design in IoE
PDF
Cybersecurity governance existing frameworks (nov 2015)
PDF
Cybersecurity nexus vision
PDF
Cloud security lessons learned and audit
PDF
Value-added it auditing
PDF
ISACA Internet of Things open forum presentation
PDF
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
PDF
The value of big data analytics
PDF
Social media risks and controls
PDF
The view of auditor on cybercrime
PDF
ISACA Mobile Payments Forum presentation
PDF
Belgian Data Protection Commission's new audit programme
PDF
ISACA Cloud Computing Risks
PDF
Information security awareness (sept 2012) bis handout
PPTX
ISACA smart security for smart devices
PPTX
Securing big data (july 2012)
PDF
Valuendo cyberwar and security (jan 2012) handout
PDF
How to handle multilayered IT security today
How secure are chat and webconf tools
my experience as ciso
Advantages of privacy by design in IoE
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity nexus vision
Cloud security lessons learned and audit
Value-added it auditing
ISACA Internet of Things open forum presentation
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
The value of big data analytics
Social media risks and controls
The view of auditor on cybercrime
ISACA Mobile Payments Forum presentation
Belgian Data Protection Commission's new audit programme
ISACA Cloud Computing Risks
Information security awareness (sept 2012) bis handout
ISACA smart security for smart devices
Securing big data (july 2012)
Valuendo cyberwar and security (jan 2012) handout
How to handle multilayered IT security today

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hybrid model detection and classification of lung cancer
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
project resource management chapter-09.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A novel scalable deep ensemble learning framework for big data classification...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
WOOl fibre morphology and structure.pdf for textiles
Hybrid model detection and classification of lung cancer
Programs and apps: productivity, graphics, security and other tools
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Getting Started with Data Integration: FME Form 101
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A comparative analysis of optical character recognition models for extracting...
Heart disease approach using modified random forest and particle swarm optimi...
Chapter 5: Probability Theory and Statistics
Assigned Numbers - 2025 - Bluetooth® Document
SOPHOS-XG Firewall Administrator PPT.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Enhancing emotion recognition model for a student engagement use case through...
project resource management chapter-09.pdf
Tartificialntelligence_presentation.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A novel scalable deep ensemble learning framework for big data classification...

ISACA Reporting relevant IT risks to stakeholders

  • 1. REPORTING RELEVANT IT RISKS TO STAKEHOLDERS Marc Vael, Brussels, 24 June 2015
  • 2. WHO ARE THE STAKEHOLDERS? Stakeholders can affect or be affected by the organization's actions, objectives and policies. Examples of key stakeholders are creditors, directors, employees, government (and its agencies), owners (shareholders), suppliers, unions, and the community from which the business draws its resources.
  • 3. WHO ARE THE STAKEHOLDERS?
  • 4. WHO ARE THE STAKEHOLDERS?
  • 5. WHO ARE THE STAKEHOLDERS?
  • 6. WHO ARE THE STAKEHOLDERS?
  • 7. WHO ARE THE STAKEHOLDERS? Big problem #1: 
 Stakeholders all speak different “languages
  • 8. WHAT ARE RELEVANT IT RISKS? Information technology risk / IT risk / IT-related risk is the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise. Assessing the probability of likelihood of various types of event/incident with their predicted impacts or consequences should they occur is a common way to assess and measure IT risks. 
 Alternative methods of measuring IT risk typically involve assessing other contributory factors such as the threats, vulnerabilities, exposures, and asset values. IT risk has a broader meaning: it encompasses not just only the negative impact of operations and service delivery which can bring destruction or reduction of the value of the organization, but also the benefitvalue enabling risk associated to missing opportunities to use technology to enable or enhance business or the IT project management for aspects like overspending or late delivery with adverse business impact.
  • 9. WHO ARE THE STAKEHOLDERS? Big problem #2: 
 “Risk” is inherently subjective (qualitative)
  • 10. MEASURING IT RISKS? Information security event: identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be security relevant.
 Occurrence of a particular set of circumstances.
 The event can be certain or uncertain. 
 The event can be a single occurrence or a series of occurrences. Information security incident: single or series of unwanted information security events that have a significant probability of compromising business operations and threatening information security
 An event that has been assessed as having an actual or potentially adverse effect on the security or performance of a system.
  • 11. MEASURING IT RISKS? Impact: result of an unwanted incident Consequence: Outcome of an event
 There can be more than one consequence from one event. Consequences can range from positive to negative. 
 Consequences can be expressed qualitatively or quantitatively R = L × I
 Likelihood of a security incident occurrence is a function of the likelihood that a threat appears and likelihood that the threat can successfully exploit the relevant system vulnerabilities. Consequence of the occurrence of a security incident is a function of likely impact that the incident will have on the organization as a result of the harm the organization assets will sustain. Harm is related to the value of the assets to the organization; the same asset can have different values to different organizations.
  • 12. MEASURING IT RISKS? R can be function of four factors: A = Value of the assets T = Likelihood of the threat V = Nature of vulnerability i.e. the likelihood that can be exploited (proportional to the potential benefit for the attacker and inversely proportional to the cost of exploitation) I = the likely impact, the extent of the harm
  • 19. MEASURING IT RISKS? OWASP approach to IT risk Estimation of Likelihood in a 0 to 9 scale: Threat agent factors Vulnerability Factors Estimation of Impact in a 0 to 9 scale Technical Impact Factors Business Impact Factors
  • 20. MEASURING IT RISKS? OWASP approach to IT risk Threat agent factors Skill level: How technically skilled is this group of threat agents? No technical skills (1), some technical skills (3), advanced computer user (4), network and programming skills (6), security penetration skills (9) Motive: How motivated is this group of threat agents to find and exploit this vulnerability? Low or no reward (1), possible reward (4), high reward (9) Opportunity: What resources and opportunity are required for this group of threat agents to find and exploit this vulnerability? full access or expensive resources required (0), special access or resources required (4), some access or resources required (7), no access or resources required (9) Size: How large is this group of threat agents? Developers (2), system administrators (2), intranet users (4), partners (5), authenticated users (6), anonymous Internet users (9)
  • 21. MEASURING IT RISKS? OWASP approach to IT risk Vulnerability Factors: estimate the likelihood of the particular vulnerability involved being discovered and exploited. Assume the threat agent selected above. Ease of discovery: How easy is it for this group of threat agents to discover this vulnerability? Practically impossible (1), difficult (3), easy (7), automated tools available (9) Ease of exploit: How easy is it for this group of threat agents to actually exploit this vulnerability? Theoretical (1), difficult (3), easy (5), automated tools available (9) Awareness: How well known is this vulnerability to this group of threat agents? Unknown (1), hidden (4), obvious (6), public knowledge (9) Intrusion detection: How likely is an exploit to be detected? Active detection in application (1), logged and reviewed (3), logged without review (8), not logged (9)
  • 22. MEASURING IT RISKS? OWASP approach to IT risk Technical Impact Factors; estimate the magnitude of the impact on the system if the vulnerability were to be exploited. Loss of confidentiality: How much data could be disclosed and how sensitive is it? Minimal non- sensitive data disclosed (2), minimal critical data disclosed (6), extensive non-sensitive data disclosed (6), extensive critical data disclosed (7), all data disclosed (9) Loss of integrity: How much data could be corrupted and how damaged is it? Minimal slightly corrupt data (1), minimal seriously corrupt data (3), extensive slightly corrupt data (5), extensive seriously corrupt data (7), all data totally corrupt (9) Loss of availability How much service could be lost and how vital is it? Minimal secondary services interrupted (1), minimal primary services interrupted (5), extensive secondary services interrupted (5), extensive primary services interrupted (7), all services completely lost (9) Loss of accountability: Are the threat agents' actions traceable to an individual? Fully traceable (1), possibly traceable (7), completely anonymous (9)
  • 23. MEASURING IT RISKS? OWASP approach to IT risk Business Impact Factors: requires a deep understanding of what is important to the company running the application. Aiming to support risks with business impact, particularly if the audience is executive level. The business risk is what justifies investment in fixing security problems. Financial damage: How much financial damage will result from an exploit? Less than the cost to fix the vulnerability (1), minor effect on annual profit (3), significant effect on annual profit (7), bankruptcy (9) Reputation damage: Would an exploit result in reputation damage that would harm the business? Minimal damage (1), Loss of major accounts (4), loss of goodwill (5), brand damage (9) Non-compliance: How much exposure does non-compliance introduce? Minor violation (2), clear violation (5), high profile violation (7) Privacy violation: How much personally identifiable information could be disclosed? One individual (3), hundreds of people (5), thousands of people (7), millions of people (9)
  • 24. 24
  • 31. WHO ARE THE STAKEHOLDERS? Big problem #3: 
 The risks that frighten people 
 are not the same ones that “kill” them.
  • 32. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS? ?
  • 33. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 34. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 35. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 36. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 37. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 38. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 39. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 40. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 41. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 42. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 43. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 44. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 45. WHO ARE THE STAKEHOLDERS? Big problem #4: 
 Risks are difficult to compare across the board
  • 46. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 47. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 48. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 49. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 50. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 51. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 52. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 53. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 54. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?
  • 55. WHAT ARE EFFECTIVE WAYS TO COMMUNICATE / REPORT RELEVANT IT RISKS TO STAKEHOLDERS?