0% found this document useful (0 votes)
8 views

Lect 11

The document discusses how to translate a risk assessment into an actionable risk mitigation plan. It covers prioritizing risks, verifying risks can be mitigated, performing cost-benefit analyses, implementing and following up on the risk mitigation plan.

Uploaded by

dungnthe172688
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Lect 11

The document discusses how to translate a risk assessment into an actionable risk mitigation plan. It covers prioritizing risks, verifying risks can be mitigated, performing cost-benefit analyses, implementing and following up on the risk mitigation plan.

Uploaded by

dungnthe172688
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Turning Your Risk Assessment

into a Risk Mitigation Plan


Objectives

• Reviewing a Risk Assessment


• Overview of conversion to a mitigation plan
• Prioritizing risk elements
• Verifying risk elements entails
• Performing a cost-benefit analysis for risk elements
• Following up on a risk mitigation plan
• Best practices for enabling a risk mitigation plan

http://fpt.edu.vn 05/11/202 2
4
Review the Risk Assessment
for Your IT Infrastructure

• Identifying and evaluate relevant threats


• Identifying and evaluate relevant vulnerabilities
• Identifying and evaluate countermeasures
• Developing mitigation recommendations

http://fpt.edu.vn 05/11/202 3
4
Review the Risk Assessment for
Your IT Infrastructure (cont.)

• In-place countermeasures
• Planned countermeasures
• Approved countermeasures

http://fpt.edu.vn 05/11/202 4
4
Review the Risk Assessment for
Your IT Infrastructure (cont.)

• Overlapping countermeasures
• Matching threats with vulnerabilities
• Identifying countermeasures

http://fpt.edu.vn 05/11/202 5
4
Translating Your Risk Assessment
into a Risk Mitigation Plan

• Cost to implement the countermeasures


• Time to implement the countermeasures
• Operational impact of the countermeasures

http://fpt.edu.vn 05/11/202 6
4
Prioritizing Risk Elements That
Require Risk Mitigation

• Using a Threat/Vulnerability Matrix

http://fpt.edu.vn 05/11/202 7
4
Prioritizing Risk Elements That
Require Risk Mitigation
• Prioritizing Countermeasures

http://fpt.edu.vn 05/11/202 8
4
Verifying Risk Elements and How
These Risks Can Be Mitigated

• Ensuring the threats and vulnerabilities you’re trying to


mitigate still exist.
• Verifying the approved countermeasure can still mitigate
the current risk

http://fpt.edu.vn 05/11/202 9
4
Performing a Cost-Benefit Analysis
on the Identified Risk Elements

• Calculating the CBA


• A CBA Report

http://fpt.edu.vn 05/11/202 10
4
Implementing a Risk Mitigation Plan

• Staying Within Budget


• Staying on Schedule

http://fpt.edu.vn 05/11/202 11
4
Following Up on the Risk Mitigation Plan

• Ensuring countermeasures are implemented


• Ensuring security gaps have been closed

http://fpt.edu.vn 05/11/202 12
4
Best Practices for Enabling a Risk Mitigation Plan
from Your Risk Assessment

• Staying within scope


• Redoing CBAs if new costs are identified
• Prioritizing countermeasures
• Including current countermeasures in analysis
• Controlling costs
• Controlling the schedule
• Following up

http://fpt.edu.vn 05/11/202 13
4

You might also like