SlideShare una empresa de Scribd logo
1 de 13
Risk management and mitigation


Cian Blackwell
Partner, Business Risk Services


1 June 2011


© 2010 Grant Thornton International. All rights reserved.
Agenda and themes




• focus on cloud computing
• hype and renewed interest in risk
• dispelling a few myths about risk and new
  technologies
• back to fundamentals—a model for assessing and
  addressing risk




© 2010 Grant Thornton International. All rights reserved.
Cloud computing hype



• both positive
  and negative
  abounds
• positive hype is
  nothing unusual
• negative hype
  needs more
  attention....




© 2010 Grant Thornton International. All rights reserved.
© 2010 Grant Thornton International. All rights reserved.
What is the truth about cloud computing risk?




• much of what goes on in the cloud is risky....
• ... much of everything is risky

• cloud computing—or any form of outsourcing—is
  not inherently a 'bad idea'

• the risks with cloud computing are not inherently
  worse
   – they're just different
© 2010 Grant Thornton International. All rights reserved.
Risk and opportunity….




• "risk" only makes sense in the context of an
  organisation's objectives
• risk can be seen as:
   – anything that adversely affects the achievement
     of an organisation's goals
• opportunity can be seen as :
   – anything that positively affects the achievement
     of an organisation's goals

© 2010 Grant Thornton International. All rights reserved.
But it's not all negative hype….




• “…the cloud’s economies of scale and flexibility are
  both a friend and a foe from a security point of
  view.
• "The massive concentrations of resources and
  data present a more attractive target to attackers,
  but cloud-based defences can be more robust,
  scalable and cost effective”

         – Source: ENISA, Cloud computing: Benefits, risks and
           recommendations for information security
© 2010 Grant Thornton International. All rights reserved.
How does cloud computing change the risks?



• some risks have increased, and not always the ones you
  expect
   – for example, data protection risk is seen as significantly
     higher if the data is stored outside the EU
       • but even within the EU, and regardless of whether
         you use cloud computing, data protection risks are
         high
       • the risk is more closely linked to the nature of the
         data than the type of technologies used


© 2010 Grant Thornton International. All rights reserved.
How does cloud computing change the risks?



• some risks can increase, for example:
   – visibility and control of what's happening to your data
   – contractual risk, including SLAs and performance
   – bandwidth—especially "contingency bandwidth"
   – migration of data (out, rather than in....)
   – forensic considerations—incident response, e-discovery
   – general security issues—policies, standards,
     procedures—what about testing?



© 2010 Grant Thornton International. All rights reserved.
How does cloud computing change the risks?




• however, cloud computing can also reduce risk, for
  example
   – increase in independence and segregation of
     duties
   – increased economies of scale for security
     investment
   – availability of specialised security expertise
   – existence of a contractual or SLA framework

© 2010 Grant Thornton International. All rights reserved.
Managing risk (1)




• risks are not the same for everyone—
  circumstances differ, priorities differ
• however, the approach to addressing and
  mitigating risk needs to be standard
• a consistent risk management process should be
  organisation-wide, not IT-specific




© 2010 Grant Thornton International. All rights reserved.
Managing risk (2)




• the risk management process...
• controls need to
  match the risk—
  sufficient, but not                                                 Risk
  excessive
• auditing provides
  assurance the
  controls work—                                            Control          Audit
  and identifies risk
© 2010 Grant Thornton International. All rights reserved.
In summary




• don't believe the hype—everything is risky
• there are no default risks—every organisation has
  its own risk profile, and any change in technology
  changes the risks
• a consistent approach to evaluating and
  addressing risk is essential—the approach is the
  same regardless of the risks
• risk and opportunity go hand-in-hand

© 2010 Grant Thornton International. All rights reserved.

Más contenido relacionado

La actualidad más candente

Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014FERMA
 
Managing risk through effective team based decision making-A npower case study
Managing risk through effective team based decision making-A npower case studyManaging risk through effective team based decision making-A npower case study
Managing risk through effective team based decision making-A npower case studyMd.Masudur Rahaman
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksPhil Huggins FBCS CITP
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crainsegughana
 

La actualidad más candente (7)

Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014
 
Designing an effective Crisis Management Framework
Designing an effective Crisis Management FrameworkDesigning an effective Crisis Management Framework
Designing an effective Crisis Management Framework
 
Pitfalls of Cyber Data
Pitfalls of Cyber DataPitfalls of Cyber Data
Pitfalls of Cyber Data
 
Managing risk through effective team based decision making-A npower case study
Managing risk through effective team based decision making-A npower case studyManaging risk through effective team based decision making-A npower case study
Managing risk through effective team based decision making-A npower case study
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
VI.3 DAC-EPOC JOINT TASK TEAM ON CLIMATE CHANGE AND DEVELOPMENT CO-OPERATION
VI.3  DAC-EPOC JOINT TASK TEAM ON CLIMATE CHANGE AND DEVELOPMENT CO-OPERATIONVI.3  DAC-EPOC JOINT TASK TEAM ON CLIMATE CHANGE AND DEVELOPMENT CO-OPERATION
VI.3 DAC-EPOC JOINT TASK TEAM ON CLIMATE CHANGE AND DEVELOPMENT CO-OPERATION
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 

Destacado

Visual Process, an innovative analytical solution by bridging business and da...
Visual Process, an innovative analytical solution by bridging business and da...Visual Process, an innovative analytical solution by bridging business and da...
Visual Process, an innovative analytical solution by bridging business and da...Avraham CHOUKROUN
 
Com Score Webinar Getting Beyond Big In Online Video
Com Score Webinar   Getting Beyond Big In Online VideoCom Score Webinar   Getting Beyond Big In Online Video
Com Score Webinar Getting Beyond Big In Online Videobmohri
 
Who Smokes? Do You?
Who Smokes? Do You?Who Smokes? Do You?
Who Smokes? Do You?Who Smokes?
 
Energy Efficiency and Property Values
Energy Efficiency and Property ValuesEnergy Efficiency and Property Values
Energy Efficiency and Property ValuesJosh Develop
 
Drugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizenDrugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizen1003501090
 
Projet journalistique aldebaran
Projet journalistique aldebaranProjet journalistique aldebaran
Projet journalistique aldebaranEmma Burger
 
ASPerian - IBM 2004 Rev Ago
ASPerian - IBM 2004 Rev AgoASPerian - IBM 2004 Rev Ago
ASPerian - IBM 2004 Rev AgoJose E. Padua H.
 
Why researchers collaborate with technology companies - a behavioral data exa...
Why researchers collaborate with technology companies - a behavioral data exa...Why researchers collaborate with technology companies - a behavioral data exa...
Why researchers collaborate with technology companies - a behavioral data exa...Daan Versteeg
 
Xieg0955 ab
Xieg0955 abXieg0955 ab
Xieg0955 abGWROY
 
How to install a new moodle 2.4 theme
How to install a new moodle 2.4 themeHow to install a new moodle 2.4 theme
How to install a new moodle 2.4 themeParadiso LMS
 
Npds söderling june2010
Npds söderling june2010Npds söderling june2010
Npds söderling june2010Petra Soderling
 

Destacado (18)

WhoSmokes?
WhoSmokes?WhoSmokes?
WhoSmokes?
 
Visual Process, an innovative analytical solution by bridging business and da...
Visual Process, an innovative analytical solution by bridging business and da...Visual Process, an innovative analytical solution by bridging business and da...
Visual Process, an innovative analytical solution by bridging business and da...
 
Com Score Webinar Getting Beyond Big In Online Video
Com Score Webinar   Getting Beyond Big In Online VideoCom Score Webinar   Getting Beyond Big In Online Video
Com Score Webinar Getting Beyond Big In Online Video
 
Who Smokes? Do You?
Who Smokes? Do You?Who Smokes? Do You?
Who Smokes? Do You?
 
Energy Efficiency and Property Values
Energy Efficiency and Property ValuesEnergy Efficiency and Property Values
Energy Efficiency and Property Values
 
Drugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizenDrugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizen
 
FMurtagh_Sfi_3dec2009_Future_Internet
FMurtagh_Sfi_3dec2009_Future_InternetFMurtagh_Sfi_3dec2009_Future_Internet
FMurtagh_Sfi_3dec2009_Future_Internet
 
Calendar of Events
Calendar of EventsCalendar of Events
Calendar of Events
 
CV
CVCV
CV
 
Projet journalistique aldebaran
Projet journalistique aldebaranProjet journalistique aldebaran
Projet journalistique aldebaran
 
ASPerian - IBM 2004 Rev Ago
ASPerian - IBM 2004 Rev AgoASPerian - IBM 2004 Rev Ago
ASPerian - IBM 2004 Rev Ago
 
Mardi Gras
Mardi GrasMardi Gras
Mardi Gras
 
Why researchers collaborate with technology companies - a behavioral data exa...
Why researchers collaborate with technology companies - a behavioral data exa...Why researchers collaborate with technology companies - a behavioral data exa...
Why researchers collaborate with technology companies - a behavioral data exa...
 
Xieg0955 ab
Xieg0955 abXieg0955 ab
Xieg0955 ab
 
Arun-J-resume
Arun-J-resumeArun-J-resume
Arun-J-resume
 
How to install a new moodle 2.4 theme
How to install a new moodle 2.4 themeHow to install a new moodle 2.4 theme
How to install a new moodle 2.4 theme
 
Npds söderling june2010
Npds söderling june2010Npds söderling june2010
Npds söderling june2010
 
Business Card_no Crops
Business Card_no CropsBusiness Card_no Crops
Business Card_no Crops
 

Similar a Cian Blackwell - Risk management and mitigation 2011

Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...Livingstone Advisory
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationFERMA
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big dataJames Deiotte
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards ComplianceDr. Prashant Vats
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalPatrick Florer
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docxLyndonPelletier761
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docxherminaprocter
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architectureiasaglobal
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Livingstone Advisory
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 

Similar a Cian Blackwell - Risk management and mitigation 2011 (20)

Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentation
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Cyber Risk in the Energy Industry
Cyber Risk in the Energy IndustryCyber Risk in the Energy Industry
Cyber Risk in the Energy Industry
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
 
Does it pay to be cyber-insured
Does it pay to be cyber-insuredDoes it pay to be cyber-insured
Does it pay to be cyber-insured
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 

Más de Irish Future Internet Forum

4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...Irish Future Internet Forum
 
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Irish Future Internet Forum
 
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreRay Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreIrish Future Internet Forum
 
Michel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetMichel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetIrish Future Internet Forum
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 

Más de Irish Future Internet Forum (20)

4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
 
Alan Smeaton Irish Future Internet Forum 2011
Alan Smeaton Irish Future Internet Forum 2011Alan Smeaton Irish Future Internet Forum 2011
Alan Smeaton Irish Future Internet Forum 2011
 
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
 
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreRay Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
 
CNGL Future Internet position - Vincent Wade.
CNGL Future Internet position - Vincent Wade.CNGL Future Internet position - Vincent Wade.
CNGL Future Internet position - Vincent Wade.
 
Barry Smyth Clarity Future Internet
Barry Smyth Clarity Future InternetBarry Smyth Clarity Future Internet
Barry Smyth Clarity Future Internet
 
NEMBES Future Internet position - Dirk Pesch
NEMBES Future Internet position - Dirk PeschNEMBES Future Internet position - Dirk Pesch
NEMBES Future Internet position - Dirk Pesch
 
Future internet Forum Google - Eoghan Nolan.
Future internet Forum Google - Eoghan Nolan. Future internet Forum Google - Eoghan Nolan.
Future internet Forum Google - Eoghan Nolan.
 
IBM Research Future Internet
IBM Research Future InternetIBM Research Future Internet
IBM Research Future Internet
 
Michel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetMichel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the Internet
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Model Smart City Barcelona
Model Smart City BarcelonaModel Smart City Barcelona
Model Smart City Barcelona
 
Irish Future Internet Forum Zed Sabeur
Irish Future Internet Forum Zed SabeurIrish Future Internet Forum Zed Sabeur
Irish Future Internet Forum Zed Sabeur
 
IFIF 2011 opening - Willie Donnelly
IFIF 2011 opening - Willie DonnellyIFIF 2011 opening - Willie Donnelly
IFIF 2011 opening - Willie Donnelly
 
SFI Irish Future Internet Forum
SFI Irish Future Internet ForumSFI Irish Future Internet Forum
SFI Irish Future Internet Forum
 
IFIF Ideas Submission
IFIF Ideas SubmissionIFIF Ideas Submission
IFIF Ideas Submission
 
Sdecker
SdeckerSdecker
Sdecker
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
Donal Simmie Ifif Poster 1209
Donal Simmie Ifif Poster 1209Donal Simmie Ifif Poster 1209
Donal Simmie Ifif Poster 1209
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 

Último

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 

Último (20)

Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 

Cian Blackwell - Risk management and mitigation 2011

  • 1. Risk management and mitigation Cian Blackwell Partner, Business Risk Services 1 June 2011 © 2010 Grant Thornton International. All rights reserved.
  • 2. Agenda and themes • focus on cloud computing • hype and renewed interest in risk • dispelling a few myths about risk and new technologies • back to fundamentals—a model for assessing and addressing risk © 2010 Grant Thornton International. All rights reserved.
  • 3. Cloud computing hype • both positive and negative abounds • positive hype is nothing unusual • negative hype needs more attention.... © 2010 Grant Thornton International. All rights reserved.
  • 4. © 2010 Grant Thornton International. All rights reserved.
  • 5. What is the truth about cloud computing risk? • much of what goes on in the cloud is risky.... • ... much of everything is risky • cloud computing—or any form of outsourcing—is not inherently a 'bad idea' • the risks with cloud computing are not inherently worse – they're just different © 2010 Grant Thornton International. All rights reserved.
  • 6. Risk and opportunity…. • "risk" only makes sense in the context of an organisation's objectives • risk can be seen as: – anything that adversely affects the achievement of an organisation's goals • opportunity can be seen as : – anything that positively affects the achievement of an organisation's goals © 2010 Grant Thornton International. All rights reserved.
  • 7. But it's not all negative hype…. • “…the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. • "The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost effective” – Source: ENISA, Cloud computing: Benefits, risks and recommendations for information security © 2010 Grant Thornton International. All rights reserved.
  • 8. How does cloud computing change the risks? • some risks have increased, and not always the ones you expect – for example, data protection risk is seen as significantly higher if the data is stored outside the EU • but even within the EU, and regardless of whether you use cloud computing, data protection risks are high • the risk is more closely linked to the nature of the data than the type of technologies used © 2010 Grant Thornton International. All rights reserved.
  • 9. How does cloud computing change the risks? • some risks can increase, for example: – visibility and control of what's happening to your data – contractual risk, including SLAs and performance – bandwidth—especially "contingency bandwidth" – migration of data (out, rather than in....) – forensic considerations—incident response, e-discovery – general security issues—policies, standards, procedures—what about testing? © 2010 Grant Thornton International. All rights reserved.
  • 10. How does cloud computing change the risks? • however, cloud computing can also reduce risk, for example – increase in independence and segregation of duties – increased economies of scale for security investment – availability of specialised security expertise – existence of a contractual or SLA framework © 2010 Grant Thornton International. All rights reserved.
  • 11. Managing risk (1) • risks are not the same for everyone— circumstances differ, priorities differ • however, the approach to addressing and mitigating risk needs to be standard • a consistent risk management process should be organisation-wide, not IT-specific © 2010 Grant Thornton International. All rights reserved.
  • 12. Managing risk (2) • the risk management process... • controls need to match the risk— sufficient, but not Risk excessive • auditing provides assurance the controls work— Control Audit and identifies risk © 2010 Grant Thornton International. All rights reserved.
  • 13. In summary • don't believe the hype—everything is risky • there are no default risks—every organisation has its own risk profile, and any change in technology changes the risks • a consistent approach to evaluating and addressing risk is essential—the approach is the same regardless of the risks • risk and opportunity go hand-in-hand © 2010 Grant Thornton International. All rights reserved.

Notas del editor

  1. In general, the agenda for the presentation is to dispel some of the myths associated with cloud computing hype. The presentation will cover how the risks of cloud computing are not as obvious as they seem—some risks get too much attention, some don't get enough—and will also cover some of the risks that can be mitigated by a move to cloud computing. Finally, we will cover some of the approaches to mitigating risk, including the risk management model, and certification.
  2. Cloud computing has attracted a considerable amount of hype recently, and continues to do so. The Gartner Hype Cycle from 2010 shows "Cloud Computing" just beyond the "Peak of Inflated Expectations." Although positive hype is nothing unusual for new technologies, negative hype—specifically about the risks of cloud computing—is potentially more damaging and needs to be addressed.
  3. Coverage in February 2010 of a Department of Finance memo warning public sector bodies not to purchase cloud computing services. Whilst this was really just good advice—don't embark on something new unless you have dealt with the issues—much of the coverage interpreted it as a dire warning of the risks of cloud computing.
  4. Science fiction author Theodore Sturgeon (http://en.wikipedia.org/wiki/Theodore_Sturgeon) originated what has since become known (in science fiction circles at least) as Sturgeon's Law. He found he was frequently defending the genre from people citing examples of trashy pulp sci-fi as "evidence" that 90% of science fiction—and thus the genre itself—was rubbish. He argued that, in his own words: of course 90% of science fiction is "crud" — "90% of everything is crud". His point of course was that just because science fiction is an easily identifiable genre of fiction, it's easy to 'tar it all with the same brush'. Likewise for cloud computing—an easily identifiable genre of technology—just because much of it is risky doesn't mean it should all be dismissed. There is nothing inherently risky about outsourcing critical processes—finance departments have been doing it for years, for example to shared service centres within or outside their own company. Just because the risks related to cloud computing are different to what we may be used to, does not mean that they are worse .
  5. We need to be aware of the appropriate perspective from which to view our risks—as a general rule, one person's risk is another person's opportunity. It's easy to work out the major risk from the cloud service provider's perspective—it's the commercial risk of not enough customers paying enough for your cloud services. We can take that for granted, and look at it from the customer's perspective, where in general terms, a risk is not just some theoretical "adverse event" but, in very real terms, anything that can adversely affect the achievement of the customer's business goals. Obviously the service provider needs to focus on the customer's perception of risk.
  6. This is an example of what I call a "red herring" risk. Data protection is seen as being much riskier when you move beyond the perceived safety of the relatively strong legislative framework in the EU. Although it is indeed true that the EU (and a small number of other jurisdictions) have stronger data protection legislation than most of the rest of the world, the protection provided by legislation is largely illusory. Mitigating data protection risk is almost entirely a behavioural issue, with behavioural solutions (policies, procedures, training, communication, restricting potentially risky practices, etc). There are huge data protection issues in any jurisdiction, regardless of how good the legislation is.
  7. The above are a number of examples of risks that increase when you move to a cloud environment. Most are self-explanatory; a few need more explanation. Contingency bandwidth is not the same as peak bandwidth—it means the bandwidth required in exceptional circumstances, such as re-uploading a month's worth of transactions to resolve a database corruption issue, or restoring your data from the cloud archiving solution you use. The migration point relates to the safeguards that should be in place if you decide to terminate your contract with a cloud service provider—do they make it easy to get the data back out again? As easy as it was when you were signing up? Forensic issues relate to whether you have sufficient access to the cloud systems in the event that you need to perform a forensic investigation. Regarding general security issues—the use of security testing (e.g. penetration tests) is a common control, but cloud service providers may be very reluctant to allow customers to attempt to hack their systems, requiring a rethink and a different approach. Unfortunately, not all of the above get the attention they deserve.
  8. The often overlooked point is that there are some risks that are greater when you stick with a non-cloud "solution." Having your infrastructure and apps in-house, managed by your own team that only deals with your company means that you don't have the levels of objectivity, economies of scale and contractual guarantees that you should (although may not always) have with a cloud service provider.
  9. There is no "one-size-fits-all" solution to managing risk—it all depends on your organisation. However, the approach to identifying, managing and mitigating risks should be consistent across an organisation. "Cloud risks" don't deserve special treatment; nor do "IT risks". A "risk" is either a risk to the achievement of the organisation's strategic objectives, or it isn't. The response should be commensurate with the magnitude of the risk, i.e. impact x likelihood.
  10. This is the overall risk management cycle consists of three major steps: Risks are identified Controls are put in place to mitigate the risks Auditing (internal, external, compliance reviews, security reviews, etc) provides assurance that controls are working and risks are being mitigated It's important to note that there must be a correlation between controls and risk . It doesn't have to be a 1:1 correlation—you can have a single control that mitigates multiple risks, or a single risk that requires multiple controls to mitigate it effectively. The crucial points are that: Every risk must have control(s) that mitigate it effectively Every control must be there to mitigate specific risk(s)—otherwise it's a waste of resources