Overview
Syllabus
Intro
Unsolved problem in information security
Threat event
Vulnerability
Secondary loss event
Why have a risk management program?
Current options for small/immature orgs
Basic plan
Decide on scope
Inventory assets & owners
Sort the inventory by granularity
Example granularities
Perform Binary Risk Assessment
Binary Risk Assessment as part of a program
What is the purpose of risk assessment?
Asset owners decide what to do about low & medium risks
How to treat risk
What's the right level to sign off on a risk?
Likelihood/frequency of loss questions
Magnitude of loss questions
Binary Risk Assessment weaknesses
Add Factor Analysis of Information Risk
External Documentation
Risk Management Policy
Templates
Risk treatment decision template
Questions?
Taught by
BSidesLV