SlideShare a Scribd company logo
Information Security
and Risk Management
Content
Introduction to risk management
What is risk
Example of risk assessment
Types of risk assessment
Why risk assessment is necessary
Legal and ethical considerations in cybersecurity.
Security policies, standards, and procedures.
Introduction to information security and
risk management
Information security and risk management are two critical and interconnected disciplines in
today's digital world.
work together to protect sensitive information from unauthorized access, use, disclosure,
disruption, modification, or destruction, and to minimize the potential harm that could result
from such events.
Information security is the practice of ensuring the confidentiality, integrity, and availability (CIA
triad) of information.
Risk management is the process of identifying, assessing, and controlling risks. In the context of
information security, this involves identifying potential threats and vulnerabilities, assessing the
likelihood and impact of those threats, and implementing controls to mitigate the risks.
Why are information security and risk
management important?
We use computers, smartphones, and other devices to store and access sensitive information,
such as financial data, personal information, and intellectual property. This information is
valuable, and it is also vulnerable to attack.
Cybercriminals are constantly developing new ways to steal, manipulate, or destroy information.
They can use a variety of methods, such as hacking, phishing, malware, and ransomware.
These attacks can have serious consequences for individuals, businesses, and governments.
Information security and risk
management can help to:
Protect sensitive information from unauthorized access
Prevent data breaches and other security incidents
Minimize the impact of security incidents that do occur
Ensure compliance with relevant laws and regulations
Build trust and confidence with stakeholders
key elements of an information security
and risk management program
effective information security and risk management program will typically include
the following elements
◦ Security policies and procedures: These documents outline the organization's
expectations for how information should be handled.
◦ Risk assessment: This process involves identifying and assessing the risks that the
organization faces.
◦ Controls: These are measures that are put in place to mitigate risks. Controls can be
technical, such as firewalls and intrusion detection systems, or administrative, such as
security awareness training.
◦ Incident response: This is a plan for how the organization will respond to a security
incident.
◦ Business continuity and disaster recovery: These plans are designed to help the
organization recover from a major disruption, such as a natural disaster or a cyberattack.
What is risk?
As per the ISO 27005 risk is the potential that a given threat will exploit vulnerabilities of an asset or
group of assets and thereby cause harm to the organization.
Risk Formula
Risk=impact of a threat exploiting the vulnerability * likelihood of a threat attempting to exploit the
vulnerability
Impact/consequence is the outcomes of a particular threat exploiting a vulnerability
Likelihood/occurrence is an chance of particular threats attempt or tries to exploit a vulnerability
Risk Management example
Threat
information disclosure
Vulnerability
lack of vulnerability assessment
and penetration testing
Likelihood
happens at least once daily
Likelihood rating = high
Impact
Financial impact greater
then 20 million or shall have
significant impact. Impact
rating=high
Risk
risk = impact*Likelihood
Risk rating = high * high =
high High probability of a
big financial hit
Why do we need risk management ?
Avoid unwanted losses
Oversight of the organization in terms of risk
Evade excessive control costs
Basic definitions
Asset / Process Inventory – list of assets and Process
Asset Valuation – process of defining the value of asset, e.g. monetary, based on confidentiality,
integrity, and availability etc.
Threat – A potential aspect that could result an impact on exploiting a vulnerability e.g.
information disclosure
Vulnerability – weakness e.g. lack of VAPT, lack of policies and procedures
Likelihood- how often threat tries or attempt to exploit vulnerability
impact=-the outcome of a particular threat exploiting the vulnerability
Basic definitions contd.
Inherent risk – risk which is naturally associated with asset / process
Control assessment and control value – control is a tool / solution/ process to manage the risk
and control assessment is an exercise of identifying control and measuring it effectiveness. The
score assigned is based on the control effectiveness to mitigate a particular risk is control value
Residual risk – After applying a control on a particular risk, the risk left behind is a residual risk
Definitions
Asset owner – usually a person from the business side
Asset custodian – usually from IT department or company who manage the assets
Risk owner – personal accountable for the risk
Types of risk assessment
Quantitative risk – Define the risk score in monetary value
Qualitative risk – Define the risk score in descriptive adjectives
Semi-quantitative – combination of quantitative and qualitative risk
Overview of Risk Management Process
Various international approaches and methodologies for risk assessment
◦ NIST SP 800-50
◦ ISO 27005
◦ COBIT
◦ Octave – Allegro
◦ FAIR
Risk Management = Asset/Process Valuation + Risk Assessment + Risk Treatment
Legal and ethical considerations in
cybersecurity
Legal Considerations
◦ Data Privacy Laws: Laws like the General Data Protection Regulation (GDPR) in
Europe and the California Consumer Privacy Act (CCPA) in the US govern how
organizations collect, store, and use personal data. These laws give individuals
certain rights over their data, such as the right to access, correct, and delete
their data.
◦ Cybersecurity Legislation: Many countries have enacted cybersecurity laws that
require organizations to take specific measures to protect their systems and
data. These laws may mandate reporting data breaches, implementing certain
security controls, or protecting critical infrastructure.
◦ Intellectual Property Protection: Cybersecurity law also protects intellectual
property (IP) rights. Unauthorized access to or theft of IP can lead to legal
disputes and lawsuits.
◦ Liability for Data Breaches: Organizations can be held liable for damages if
they fail to adequately protect customer or employee data.
Legal and ethical considerations in
cybersecurity contd.
Ethical Considerations
◦ Privacy: Respecting individuals' privacy rights is an important ethical
consideration in cybersecurity. Organizations should only collect and use
personal data that is necessary for legitimate purposes and should take steps to
protect that data from unauthorized access.
◦ Transparency: Organizations should be transparent about their cybersecurity
practices. They should disclose what data they collect, how they use it, and how
they protect it.
◦ Accountability: Organizations are accountable for the security of their systems
and data. They should take steps to prevent security incidents and should be
prepared to respond to them if they do occur.
◦ Proportionality: Cybersecurity measures should be proportionate to the risks
involved. Organizations should not implement overly restrictive measures that
could impede their operations or harm their customers.
◦ Non-discrimination: Cybersecurity measures should not be discriminatory.
Organizations should not discriminate against individuals or groups based on
their personal characteristics, such as their race, religion, or sexual orientation.
Class work
Perform a risk assessment based on following assets and process
◦ Laptop
◦ Servers
◦ Change management
◦ Access control
◦ Fire extinguisher
Information Security and Risk Management.pptx

More Related Content

PPT
Information security background
PPT
Information Security Background
PDF
Understanding Risk Management in Information Security
PDF
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
PDF
What Are The Six Pillars Of Cybersecurity.pdf
PPTX
Dancyrityshy 1foundatioieh
PPTX
Selling security to the C-level
PPTX
Module 3_Lesson 7.pptx
Information security background
Information Security Background
Understanding Risk Management in Information Security
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
What Are The Six Pillars Of Cybersecurity.pdf
Dancyrityshy 1foundatioieh
Selling security to the C-level
Module 3_Lesson 7.pptx

Similar to Information Security and Risk Management.pptx (20)

PPT
Convergence innovative integration of security
PPTX
Chapter-Seven.pptxhmhjmhjkhjkhjkljlhjkhjkhj
PPT
Testing
PPTX
Chapter 1 Introduction about information assurance.pptx
PDF
Vskills Certified Network Security Professional Sample Material
PDF
Cyber Security Risk Mitigation Checklist
PPT
Challenges in implementating cyber security
PPTX
IT Security and Management - Semi Finals by Mark John Lado
PDF
What is the role of risk management in cybersecurity
PPTX
CISSP- Security & Risk Management-Domain 1 Overview-Edited.pptx
PPTX
Cissp- Security and Risk Management
PDF
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
PDF
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
PDF
001_Cybersecurity Fundamentals Security Principles.pdf
PDF
Ch07 Managing Risk
PDF
Describe two methods for communicating the material in an Informatio.pdf
PPTX
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
PPTX
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
PPTX
Overview on Information Security Awareness.pptx
Convergence innovative integration of security
Chapter-Seven.pptxhmhjmhjkhjkhjkljlhjkhjkhj
Testing
Chapter 1 Introduction about information assurance.pptx
Vskills Certified Network Security Professional Sample Material
Cyber Security Risk Mitigation Checklist
Challenges in implementating cyber security
IT Security and Management - Semi Finals by Mark John Lado
What is the role of risk management in cybersecurity
CISSP- Security & Risk Management-Domain 1 Overview-Edited.pptx
Cissp- Security and Risk Management
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
001_Cybersecurity Fundamentals Security Principles.pdf
Ch07 Managing Risk
Describe two methods for communicating the material in an Informatio.pdf
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
Overview on Information Security Awareness.pptx
Ad

Recently uploaded (20)

PDF
Enhancing Bambara Groundnut Production Through Improved Agronomic Practices
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PPTX
Cohort Study_PPT.group presentation_pdf.pptx
PPTX
Bob Stewart Journey to Rome 07 30 2025.pptx
PPTX
What is Clause, definition and structure
PPTX
CASE PRESENTATION prev 1 lscs[1].pptxgyjgg
PPTX
DARKWEB Deepweb what to do or not ?.pptx
PDF
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
PPTX
Introduction to Effective Communication.pptx
PPTX
IBA DISTRICT PIR PRESENTATION.POWERPOINT
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
2025-08-03 Joseph 01 (shared slides).pptx
PPTX
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
PDF
protein structure and function for basics .pdf
PPTX
Caption Text about Social Media Post in Internet
PPTX
Assam' Vibrant Bihu Festival Bihu presentation.pptx
PPTX
business communication final draftt.pptx
PPTX
Selecting relevant value chain/s for Impactful Development Policies
Enhancing Bambara Groundnut Production Through Improved Agronomic Practices
Learning-Plan-5-Policies-and-Practices.pptx
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
Cohort Study_PPT.group presentation_pdf.pptx
Bob Stewart Journey to Rome 07 30 2025.pptx
What is Clause, definition and structure
CASE PRESENTATION prev 1 lscs[1].pptxgyjgg
DARKWEB Deepweb what to do or not ?.pptx
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
Introduction to Effective Communication.pptx
IBA DISTRICT PIR PRESENTATION.POWERPOINT
Emphasizing It's Not The End 08 06 2025.pptx
2025-08-03 Joseph 01 (shared slides).pptx
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
protein structure and function for basics .pdf
Caption Text about Social Media Post in Internet
Assam' Vibrant Bihu Festival Bihu presentation.pptx
business communication final draftt.pptx
Selecting relevant value chain/s for Impactful Development Policies
Ad

Information Security and Risk Management.pptx

  • 2. Content Introduction to risk management What is risk Example of risk assessment Types of risk assessment Why risk assessment is necessary Legal and ethical considerations in cybersecurity. Security policies, standards, and procedures.
  • 3. Introduction to information security and risk management Information security and risk management are two critical and interconnected disciplines in today's digital world. work together to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction, and to minimize the potential harm that could result from such events. Information security is the practice of ensuring the confidentiality, integrity, and availability (CIA triad) of information. Risk management is the process of identifying, assessing, and controlling risks. In the context of information security, this involves identifying potential threats and vulnerabilities, assessing the likelihood and impact of those threats, and implementing controls to mitigate the risks.
  • 4. Why are information security and risk management important? We use computers, smartphones, and other devices to store and access sensitive information, such as financial data, personal information, and intellectual property. This information is valuable, and it is also vulnerable to attack. Cybercriminals are constantly developing new ways to steal, manipulate, or destroy information. They can use a variety of methods, such as hacking, phishing, malware, and ransomware. These attacks can have serious consequences for individuals, businesses, and governments.
  • 5. Information security and risk management can help to: Protect sensitive information from unauthorized access Prevent data breaches and other security incidents Minimize the impact of security incidents that do occur Ensure compliance with relevant laws and regulations Build trust and confidence with stakeholders
  • 6. key elements of an information security and risk management program effective information security and risk management program will typically include the following elements ◦ Security policies and procedures: These documents outline the organization's expectations for how information should be handled. ◦ Risk assessment: This process involves identifying and assessing the risks that the organization faces. ◦ Controls: These are measures that are put in place to mitigate risks. Controls can be technical, such as firewalls and intrusion detection systems, or administrative, such as security awareness training. ◦ Incident response: This is a plan for how the organization will respond to a security incident. ◦ Business continuity and disaster recovery: These plans are designed to help the organization recover from a major disruption, such as a natural disaster or a cyberattack.
  • 7. What is risk? As per the ISO 27005 risk is the potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization. Risk Formula Risk=impact of a threat exploiting the vulnerability * likelihood of a threat attempting to exploit the vulnerability Impact/consequence is the outcomes of a particular threat exploiting a vulnerability Likelihood/occurrence is an chance of particular threats attempt or tries to exploit a vulnerability
  • 8. Risk Management example Threat information disclosure Vulnerability lack of vulnerability assessment and penetration testing Likelihood happens at least once daily Likelihood rating = high Impact Financial impact greater then 20 million or shall have significant impact. Impact rating=high Risk risk = impact*Likelihood Risk rating = high * high = high High probability of a big financial hit
  • 9. Why do we need risk management ? Avoid unwanted losses Oversight of the organization in terms of risk Evade excessive control costs
  • 10. Basic definitions Asset / Process Inventory – list of assets and Process Asset Valuation – process of defining the value of asset, e.g. monetary, based on confidentiality, integrity, and availability etc. Threat – A potential aspect that could result an impact on exploiting a vulnerability e.g. information disclosure Vulnerability – weakness e.g. lack of VAPT, lack of policies and procedures Likelihood- how often threat tries or attempt to exploit vulnerability impact=-the outcome of a particular threat exploiting the vulnerability
  • 11. Basic definitions contd. Inherent risk – risk which is naturally associated with asset / process Control assessment and control value – control is a tool / solution/ process to manage the risk and control assessment is an exercise of identifying control and measuring it effectiveness. The score assigned is based on the control effectiveness to mitigate a particular risk is control value Residual risk – After applying a control on a particular risk, the risk left behind is a residual risk
  • 12. Definitions Asset owner – usually a person from the business side Asset custodian – usually from IT department or company who manage the assets Risk owner – personal accountable for the risk
  • 13. Types of risk assessment Quantitative risk – Define the risk score in monetary value Qualitative risk – Define the risk score in descriptive adjectives Semi-quantitative – combination of quantitative and qualitative risk
  • 14. Overview of Risk Management Process Various international approaches and methodologies for risk assessment ◦ NIST SP 800-50 ◦ ISO 27005 ◦ COBIT ◦ Octave – Allegro ◦ FAIR Risk Management = Asset/Process Valuation + Risk Assessment + Risk Treatment
  • 15. Legal and ethical considerations in cybersecurity Legal Considerations ◦ Data Privacy Laws: Laws like the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the US govern how organizations collect, store, and use personal data. These laws give individuals certain rights over their data, such as the right to access, correct, and delete their data. ◦ Cybersecurity Legislation: Many countries have enacted cybersecurity laws that require organizations to take specific measures to protect their systems and data. These laws may mandate reporting data breaches, implementing certain security controls, or protecting critical infrastructure. ◦ Intellectual Property Protection: Cybersecurity law also protects intellectual property (IP) rights. Unauthorized access to or theft of IP can lead to legal disputes and lawsuits. ◦ Liability for Data Breaches: Organizations can be held liable for damages if they fail to adequately protect customer or employee data.
  • 16. Legal and ethical considerations in cybersecurity contd. Ethical Considerations ◦ Privacy: Respecting individuals' privacy rights is an important ethical consideration in cybersecurity. Organizations should only collect and use personal data that is necessary for legitimate purposes and should take steps to protect that data from unauthorized access. ◦ Transparency: Organizations should be transparent about their cybersecurity practices. They should disclose what data they collect, how they use it, and how they protect it. ◦ Accountability: Organizations are accountable for the security of their systems and data. They should take steps to prevent security incidents and should be prepared to respond to them if they do occur. ◦ Proportionality: Cybersecurity measures should be proportionate to the risks involved. Organizations should not implement overly restrictive measures that could impede their operations or harm their customers. ◦ Non-discrimination: Cybersecurity measures should not be discriminatory. Organizations should not discriminate against individuals or groups based on their personal characteristics, such as their race, religion, or sexual orientation.
  • 17. Class work Perform a risk assessment based on following assets and process ◦ Laptop ◦ Servers ◦ Change management ◦ Access control ◦ Fire extinguisher