An Overview of Risk Management

 Over 2,400 years ago by Chinese General Sun Tzu said

 “1.If you know the enemy & know yourself, you need not fear the result of a hundred battles.

·         If you know yourself but not the enemy, for every victory gained  you will also suffer a defeat.

·         If you know neither the enemy nor yourself, you will succumb in every battle”

 Know Yourself 

·         Identify, Examine & Understand the information systems.

·         To protect assets, you must understand what they are? How they add value to the organization, and to which vulnerabilities they are susceptible. 

·         The policies, Education and training programs, and technologies that protect information must be carefully maintained and administered to ensure that they are still effective.

 Know the Enemy 

·          Identifying, Examining & Understanding the threats facing the organization. 

The Roles of the Communities of Interest 

· It is the responsibility of each community of interest to manage the risks that organization encounters.

 Information Security

 ·    Understand the threats and attacks that introduce risk into the organization.

·    Take a leadership role in addressing risk.

 Management & Users 

· Management must ensure that sufficient resource are allocated to the information security & Information technology groups to meet the security needs of the organization. 

· Users work with the systems and the data and are therefore well positioned to understand the value of the information assets.

 Information Technology 

·          Must build secure systems and operate them safely.

 

Three communities of interest are also responsible for the following 

· Evaluating the risk controls.

· Determining which control options are cost effective.

· Acquiring or installing the needed controls.

· Overseeing that the controls remain effective.

 

1.           Important Risk Factors of information Security are 

·          Understand the threats and attacks that introduce risk into the organization.

·          Taking asset inventory. 

·          Verify the threats and vulnerabilities that have been identified as dangerous to the asset inventory, as well as the current controls and mitigation strategies.

·          Review the cost effectiveness of various risk control measures.