top of page

Cyber Risk Management

Updated: Aug 1, 2023

-Team DRASInt


Background


Our experts have analyzed that the Security and Investigative functions are linked to Cyber domain in one way or the other. Intricate knowledge of Cyber security and related processes is mandatory. In an attempt to arm our students with sound knowledge in the field of Cyber-security, we will be evolving a Cyber security module exclusively to be used in Security domain. The contents, which are basic in nature will be introduced to the audience in a series of introductory articles by our team. You can log on to the blog page to offer your valuable comments for suggesting improvements.


What is Risk Management?


Risk Management (RM) is the process of identifying potential risks, assessing the impact of those risks, and planning how to respond if the risks become reality.


Setting Up your RM System

The Company needs to determine what assets it needs to protect and prioritize. As the US National Institute of Standards and Technology (NIST) points out in its Framework for Improving Critical Infrastructure Cyber security, there is no one-size-fits all solution. Different organizations have different technology infrastructures and different potential risks. Some organizations such as financial services firms and healthcare organizations have regulatory in addition to business concerns that need to be addresses in a Cyber security RM system. Cyber security should follow a layered approach, with additional protections for the most important assets, such as corporate and customer data.


ISO 27001


The ISO 27001 defines five steps that are needed for managing Cyber security Risk and seven steps that must be followed for carrying out a Risk Assessment. They are as follows:


  • Risk identification

  • Vulnerability reduction

  • Threat reduction

  • Consequence mitigation

  • Enable cyber security outcome


ISO 27001 requires the organization to define the risk acceptance criteria and the criteria for performing security risk assessments:


  • Identify risks associated with the loss of confidentiality, availability and integrity of information within the scope of the Information Security Management System (ISMS)

  • Identify the risk owners.

  • Assess the consequences that may result if an identified risk materializes.

  • Assess the likelihood of that risk occurring.

  • Determine the level of the risk.

  • Compare the results of the analysis against the risk criteria.

  • Prioritize the risks for treatment.


Analyzing and Fixing Risk through RM


There are few ways to approach and treat risk in RM. They are given below :


Avoidance

This entails changing plans to eliminate a risk. This strategy is good for risks that could potentially have a significant impact on a business or project.


Transfer

Transfer is applicable to projects with multiple parties. It is not used frequently and often includes insurance. Transfer is also known as “Risk Sharing”.


Mitigation

Mitigation is limiting the impact of a risk so that if a problem occurs it will be easier to fix. This is the most common and also known as “Optimizing risk” or “Risk reduction”.


Exploitation

Some risks are good; such as if a product is popular there is not enough staff to keep up with sales. In such a case, the risk can be exploited by adding more sales staff.


Management should ensure that these risk identification activities are performed to determine the Company’s information security risk profile.


End of Part II

To be continued...


standby for our next blog


Meanwhile, you can log in to the blog page to offer your comments.


Enjoying the topics.....


Download complete digital DRASInt SECURITY OFFICER'S MANUAL from :




�� #DRASInt Risk Alliance #Security Officer's Manual, available, in soft copy option only ��


Are you a transitioning serviceman looking to excel in the corporate security environment? Or perhaps a corporate security professional aiming to enhance your knowledge and skills to match the industry's best? Look no further!


Introducing the Security Officer's Manual, a comprehensive guidebook designed specifically to equip servicemen transitioning into security portfolios and corporate security professionals with the necessary tools for success.


�� Transitioning from "Soldiering" to "Guarding-Prevent Losses" ��


This book serves as an essential resource to help servicemen make a seamless reorientation from the military mindset of "soldiering" during active service to the corporate world's imperative of "guarding and preventing losses." Discover effective strategies, techniques, and best practices to ensure robust security measures in any corporate environment.


�� Enhance Your Knowledge and Stand Among the Best ��


For corporate security professionals, the Security Officer's Manual acts as a valuable reference to augment your expertise and bring you on par with the industry's finest. Dive deep into the latest trends, emerging technologies, risk management methodologies, and security protocols that are essential for maintaining a secure corporate ecosystem.


�� Presented in Simple Hindi for Easy Comprehension ��


We understand the importance of clear communication and comprehension. That's why the subject matter of this book is presented in simple Hindi, ensuring security professionals can easily understand and successfully evaluate their skills. Language should never be a barrier when it comes to advancing in your career.


�� Concessional Rates and No Examinations ��


To make this valuable resource accessible to everyone, the Security Officer's Manual is being sold at concessional rates. Take advantage of this limited-time offer and secure your copy today. Plus, we believe in practical learning, so no examinations will be conducted, and certificates will not be issued.


�� Get Your Copy Now ��


Grab your soft copy.




Empower yourself with the knowledge and skills needed to excel in the corporate security industry. Don't miss this opportunity to invest in your professional growth and secure a brighter future.


AND AVAIL OUR RECRUITMENT SERVICES AT>>>>https://getjobsandskills.com/

Job portal dedicated to meet the requirements of Risk Management & Security Professionals.

Candidates | Employers | Recruiters

Book for free Consultation with our experts today.


Mobile Number:+918290439442, Email-forensic@drasintrisk.com


DRASInt Risk Alliance acts as your Consultative Investigative Unit (CIU) for Field Investigation Services and Surveillance. We specialize in investigations related to Arson, White Collar Crime, Financial Fraud and Malpractice, Corporate Fraud, and Forgery. We specialize in Protective Intelligence, Industrial Surveys, Asset Verification, Accident Investigation Services, and Fire Damage Investigation Services, Character Report, Background Verification, Identity Verification Services, Pre-Employment Check, Documentary Proofing, Bank Card Verification, Digital Forensics Services, and Forensic Audit Services, Insurance Fraud Investigation and Insurance Claim Verification. We also undertake to investigate Anti-Counterfeit Services, Infringement of Trade Mark, Trademark Verification, and Pilferage of Good. As private investigators, we undertake Property Dispute and Asset Verification Investigations, investigations related to Matrimonial Discord, Extra Marital Affairs, and Spouse Fidelity and Pre Matrimonial Verification. Sourcing and provisioning of Security Manpower and Equipment, and conducting Security, Investigation, Intelligence Awareness Training programs are some of our other specialties.


DRASINT RISK ALLIANCE प्रकाशित सामग्री का एकमात्र मालिक है।


DRASInt RISK ALLIANCE कॉपीराइट के उल्लंघन, साहित्यिक चोरी या प्रकाशन के अन्य उल्लंघनों के मुद्दों को बहुत गंभीरता से लेती है। हम अपने अधिकारों की रक्षा करना चाहते हैं और हम हमेशा साहित्यिक चोरी के दावों की जांच करते हैं। प्रस्तुत पाठ की जाँच की जाती है।जहाँ पाठों में पाया जाता है कि बिना अनुमति के या अपर्याप्त स्वीकृति के साथ तृतीय-पक्ष कॉपीराइट सामग्री शामिल है, हम कार्रवाई करने का अधिकार सुरक्षित रखते है। प्रतियाँ बनाने का अधिकार डेटाबेस, या वितरकों को उपलब्ध है जो विभिन्न दर्शकों को पांडुलिपियों या पत्रिकाओं को प्रसारित करने में शामिल हो सकते हैं।


References


bottom of page