Call Us Today! (256) 704-0234 |solutions@techni-core.com
//Zero Risk? Not Exactly Possible.

Zero Risk? Not Exactly Possible.

[av_heading tag=’h3′ padding=’10’ heading=’Zero Risk? Not Exactly Possible. ‘ color=” style=’blockquote modern-quote modern-centered’ custom_font=” size=’30’ subheading_active=” subheading_size=’15’ custom_class=”][/av_heading]

[av_textblock size=’15’ font_color=” color=”]
If an IT security practitioner tells you that there is “zero-risk” of something happening, you should run…FAST….He/She is doing you a disservice and by lulling you into a false sense of security. First, let’s start with what risk actually is.

Risk is the potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization. It is measured in terms of a combination of the probability of occurrence of an event and its consequence.

[/av_textblock]

[av_heading tag=’h3′ padding=’10’ heading=’Remember – you Cannot Achieve Zero-Risk’ color=” style=” custom_font=” size=” subheading_active=” subheading_size=’15’ custom_class=”][/av_heading]

[av_textblock size=’15’ font_color=” color=”]
Assessing risk in an organization (also known as Information Risk Management) is very important. The first thing you need to do is identify and assess your risk exposure. Once you have done that, the goal is to mitigate each risk down to an acceptable level.

Your organization needs to be aware of the different types of risk and be able to address them accordingly:

  • Physical Damage: Fire, water, vandalism, power loss and natural disaster
  • Human Interaction: Accidental or intentional action or inaction that can disrupt productivity
  • Equipment Malfunction: Failure of systems or peripheral devices
  • Internal and External Attacks: Hacking, cracking, and attacking
  • Misuse of Data: Sharing trade secrets, fraud, espionage, and theft
  • Loss of Data: Intentional or unintentional loss of information through destructive means
  • Application Error: Computational errors, input errors, and buffer overflows

[/av_textblock]

[av_heading tag=’h3′ padding=’10’ heading='”So, where do I start?”‘ color=” style=” custom_font=” size=” subheading_active=” subheading_size=’15’ custom_class=”][/av_heading]

[av_textblock size=’15’ font_color=” color=”]
Start with assembling a Risk Management Team. Depending on your size, security posture requirements and security budget, your team may consist of one individual. A bigger organization will have the resources to put together a larger group.

Regardless, the “team” needs to implement the following:

  • Establish a risk acceptance level provided by senior management
  • Document risk assessment policies and procedures
  • Establish procedures for identifying and mitigating risks
  • Establish appropriate resource and fund allocation from senior management
  • Have contingency plans where assessments indicate they are necessary
  • Map legal and regulatory compliance requirements to control implementation requirements
  • Develop metrics and performance indicators so you can measure and manage different risks
  • Ensure you have the ability to identify and assess new risks as the company and environment changes
  • Integrate Risk Management Procedures and Change Control procedures to ensure that changes do not introduce new vulnerabilities

[/av_textblock]

[av_codeblock wrapper_element=” wrapper_element_attributes=”]

[/av_codeblock]

By | 2018-01-05T22:50:37+00:00 August 19th, 2016|Techni-Core Blog|0 Comments

About the Author:

Leave A Comment

Order our newest Book: "Weather the Storm in the Cloud"

Detailing how to move to the cloud and be DFARS 7012 Compliant.  Available on Amazon.com for Kindle!
PURCHASE ON AMAZON NOW
close-link