Risk management for a solid appropriate protection

 

The second step towards managed security

Risk management is the next important process step in setting up an information security management system (ISMS). This page presents different methodologies for risk management.

See also: Entry page Managed Security for the remaining process steps to build an ISMS.

A known risk is half a risk

After vulnerabilities have been identified in the GAP analysis, we need to find out whether there are also threat scenarios that could exploit our vulnerabilities and what the consequences of such an event occurring could be. Risk management has the task of identifying these risks and formulating appropriate treatment measures to eliminate the risk or limit the damage.

Because of the broad threat landscapes, there are different approaches to risk identification, which can also be combined if necessary.

Approach

With the threat catalogue from the GAP analyses, technical and organisational countermeasures are developed with which you address security problems successively and in a resource-saving manner. Not every gap found is also a risk to your business. Since only you know your business, I work with you to assess the likelihood of a security incident and its potential impact, with the aim of determining your real protection needs.

The risk analysis uses standardised methods or proven best practices from the open source community. This ensures that the risk analyses are carried out according to the current state of the art and that the results are evaluated uniformly. With the risk assessment according to standardised procedures, you avoid costly "overreactions" and still ensure that no important risks are overlooked. The result is a prioritised catalogue of measures with an assessment of the remaining residual risks.

There is special software for risk assessment, which I can of course use if desired, but with the right templates this can also be done with standard office software. In one or more workshops, I conduct the risk analyses with you, I provide the templates and, if necessary, also impart the necessary basics in a training course.

Intended audience, prerequisites and duration

The different risk rating methods presented

In the following, the different risk assessment methods I use are briefly presented with their respective peculiarities. The different methodologies can, but do not have to, be combined if necessary. The list is also not exhaustive. Own customised risk rating methodologies are possible. But why reinvent the wheel when there are industry standards with best practices for risk management? Please contact me if you would like to learn more about methodologies or a custom risk process.

General procedure for determining risk values

Risk assessment according to ISO27005:2013

Protection needs analysis according to BSI IT-Grundschutz

Assessment according to the OWASP risk rating method

 

Personal Impact Analysis (PIA)

 

Your benefits

Initial discussion free of charge and without obligation
Risk treatment with appropriate measures and residual risks for your company
You do not reinvent the wheel and benefit from expert knowledge in risk assessment
Reproducible results through standardised and professional risk reports
Document templates for conducting risk analyses and reporting
On request, staff training courses on "IT risk management with Excel" or "modelling IT baseline protection
Last but not least: you sleep more peaceful

Further information

Would you like a non-binding initial meeting or a personal consultation?
A simple enquiry is all it takes!
Call me: 06423 963 410 or write to: info(at)vangestel.de