100% found this document useful (1 vote)
44 views11 pages

IT Risk Management Course

Uploaded by

pshema29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
44 views11 pages

IT Risk Management Course

Uploaded by

pshema29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

IT Risk Management Course

Learning Goals
• Understand the risk management process
• Identify
• Assess/Analyze
• Treat/Control
• Communicate
• Monitor
Risk Identification
• Establish the scope and boundaries of the risk assessment process
• Identify the assets and systems that require risk assessment
• Determine the potential threats and vulnerabilities that may impact the
assets and systems
• Assess the impact and likelihood of the identified risks
• Prioritize the identified risks based on their severity and potential impact
• Document the identified risks and their associated information
Risk Analysis
• Gather more information about the identified risks
• Evaluate the risks against existing controls and risk tolerance levels
• Analyze the likelihood and impact of the risks
• Determine the potential consequences of the risks if they are not managed
• Assign a risk rating to each identified risk
• Document the results of the risk analysis process
Risk Treatment
• Identify and evaluate potential risk treatment options
• Select risk treatment options based on the risk assessment results
• Develop a risk treatment plan for each identified risk
• Obtain management approval for the risk treatment plan
• Implement the risk treatment plan
• Monitor and review the effectiveness of the risk treatment plan
Risk Communication
• Communicate the results of the risk assessment process to stakeholders
• Identify key risk communication objectives
• Develop a risk communication strategy
• Choose the appropriate communication channels and methods
• Prepare and distribute risk communication materials
• Evaluate the effectiveness of the risk communication strategy
Risk Monitoring and Review
• Monitor and review the effectiveness of the risk management process
• Collect and analyze feedback from stakeholders
• Identify and address any issues or concerns related to the risk management
process
• Review and update risk assessment results on a regular basis
• Assess the impact of any changes to the environment on the risk
management process
• Continuously improve the risk management process based on feedback and
new information
A Very Simple Example of Risk Documentation
(Risk Register)
Likelihood Impact Risk Level
Risk ID Risk Description (1-5) (1-5) (L x I) Mitigation Strategies
Unauthorized access to
Implement strict access controls, regularly review access logs,
IT-R-01 electronic health 3 4 12
conduct security awareness training for employees
records (EHR)
Malware or virus Regularly update antivirus software, conduct regular
IT-R-02 2 4 8
infections vulnerability scans, ensure all software is up to date
Data breaches resulting
Implement data encryption, restrict access to sensitive data,
IT-R-03 in loss of patient 2 5 10
conduct regular security audits
information
Network failures
Implement redundant systems, regularly test backup and
IT-R-04 resulting in system 4 3 12
recovery procedures, establish a disaster recovery plan
downtime
Develop and regularly test a disaster recovery plan, ensure
Inadequate disaster
IT-R-05 3 4 12 backup systems are up to date, establish communication
recovery plan
protocols in case of a disaster
Appendix
IT Risk Examples
Malware infection (e.g., ransomware, virus) - Third-party service provider failure (e.g., ISP, vendor) - Inadequate access controls and identity
impact: data loss, downtime; severity: high impact: disruption to services, data loss; severity: management - impact: data loss, unauthorized
medium to high
Cyber attacks (e.g., hacking, phishing) - impact: access, reputational damage; severity: high
data theft, reputation damage; severity: high Inadequate disaster recovery and business continuity
planning - impact: downtime, data loss, reputational Inadequate IT asset management - impact:
Insider threats (e.g., data theft, sabotage) - impact: damage; severity: high asset loss, data loss, reputational damage;
data loss, reputational damage, legal liability; Lack of IT governance and controls - impact: non- severity: medium to high
severity: high compliance, legal liability, reputational damage; Inadequate patch and vulnerability
Human error (e.g., accidental deletion, severity: high
management - impact: data loss, unauthorized
misconfiguration) - impact: data loss, downtime, Compliance and regulatory issues - impact: legal access, reputational damage; severity: high
reputational damage; severity: medium to high liability, fines, reputational damage; severity: high
Shadow IT (e.g., unauthorized software,
Hardware failure (e.g., server crash, power outage) Inadequate data protection and privacy controls -
- impact: downtime, data loss; severity: high impact: data loss, reputational damage, legal liability; BYOD) - impact: data loss, unauthorized
severity: high access, reputational damage; severity:
Software failure (e.g., bugs, glitches) - impact:
Unauthorized access to sensitive data (e.g., PII, medium to high
downtime, data corruption; severity: medium to
financial data) - impact: data loss, legal liability, Inadequate training and awareness programs -
high
reputational damage; severity: high
Network connectivity issues (e.g., outage, latency) impact: data loss, unauthorized access,
- impact: disruption to services, data loss; severity: reputational damage; severity: medium to high
medium to high Inadequate IT budget and resource allocation -
Cloud service provider outage (e.g., AWS, Azure) - impact: downtime, data loss, reputational
impact: disruption to services, data loss; severity: damage; severity: medium to high
high
Risk Register Ratings
Probability ratings: Impact ratings:
1: Insignificant - the risk event has minimal impact on
1: Highly unlikely - the risk event is not
the Ministry of Health's objectives and operations.
expected to occur.
2: Minor - the risk event has a slight impact on the
2: Unlikely - the risk event could occur, but it Ministry of Health's objectives and operations.
is not expected to happen. 3: Moderate - the risk event has a noticeable impact
3: Possible - the risk event could occur and on the Ministry of Health's objectives and operations.
there is a moderate chance that it might 4: Major - the risk event has a significant impact on
the Ministry of Health's objectives and operations.
happen.
5: Catastrophic - the risk event has a severe impact
4: Likely - the risk event is expected to occur, on the Ministry of Health's objectives and operations,
and there is a high chance that it will happen. potentially threatening its mission and existence.
5: Highly likely - the risk event is almost
certain to occur.

You might also like