Sample Webinar Handbook PDF
Sample Webinar Handbook PDF
Sample Webinar Handbook PDF
Information Security Media Group would like to thank you for taking the time to
register for our online workshop entitled “Information Security Risk Assessments:
Understanding the Process. We appreciate your attendance and
hope that you will find the presentation comprehensive and insightful.
In this packet, you will find a plethora of items inclusive of your log-in details and
instructions on how to attend the online workshop. Also included are presentation
handouts as well as reference material that may be helpful to you and your
organization when it comes to assessing your institution’s information security
program.
We strive to continually improve the quality of our content provided during the
presentation. Your feedback will help us in meeting and exceeding future
expectations in your education and training needs.
Once again, thank you for your participation in this workshop and we look forward to
seeing you at our upcoming events.
Sincerely,
1
Information Security Risk Assessments:
Understanding the Process
Presented by: Information Security Media Group
2
Table of Contents
Section 1
• Workshop Background
Section 2
• Speaker Biography
Section 3
• Workshop Handouts (slides)
Section 4
• Reference Material
• BITS Key Risk Measurement Tool
o Narrative
o Excel Spreadsheet
• Sample Information Asset Classification Form
• Business Process Risk Assessment Sample Template
3
Workshop Overview and Background
Learn how in this exclusive new webinar, inspired by federal regulations and
guidance. You will receive timely, hands-on advice and new risk assessment tools from
banking executive Steven Jones of Synovus Financial Corp. regarding:
Background
The FFIEC IT Exam Handbook states that "A financial institution establishes and
maintains truly effective information security when it continuously integrates
processes, people, and technology to mitigate risk in accordance with risk
assessment and acceptable risk tolerance levels."
But the FFIEC doesn't tell financial institutions how to conduct an effective
risk assessment.
In this webinar, Steven Jones will discuss the importance of a sound risk assessment
methodology as an essential component of a successful information security
program. Taking a risk-based approach to information assurance is critical in a
widely diverse threatscape and evolving regulatory environment. This session will
provide real-world practices on identifying and classifying information assets and
relating threats, vulnerabilities and controls to determine risk. This will provide the
listener working knowledge of effective prioritization and communication of
information risk.
This session will illustrate how to build a process to identify risks, implement a
strategy to manage risks, and finally monitor the environment to control risks.
Additionally, this conference will demonstrate how a formalized risk assessment
process helps to align risk management practices with business strategy and improve
risk communication. Attendees also will learn on how to integrate the organization's
in-house, as well as outsourced, systems in the overall risk assessment.
4
Speaker Biography
As Director Information Security of Synovus Financial, Steven Jones holds responsibility for
the company's organizational policy, risk management, security awareness, identity
management, disaster recovery, and other areas of risk management. As a member of senior
management, he aids in technology planning, regulatory compliance, business solution
delivery, policy, and strategy. Mr. Jones joined Synovus Financial in 1995 before becoming
Vice President, Director of Network Research & Development in 1999 and ultimately, Vice
President Director Information Security in June 2001.
Mr. Jones has more than 10 years of IT & IS management experience in the financial services
industry. Jones established a best of class security program to meet increasing industry
regulations (such as SOX, GLBA, FFIEC, and SEC) and align with business needs through a risk
based approach. Through innovative implementations of access and identity management
technologies, Jones has enabled the business to bring low cost, secure, and compliant
solutions to market quickly. He is active in organizations such as BITS, Information Risk
Executive Council, ACH Data Security Rules Work Group, and serves on several advisory
boards including SecureWorks and Blue Coat.
5
Information Security Risk
Assessments: Understanding
the Process
Steven Jones
Synovus Financial Corp.
6
About Information Security Media Group
• Creators of BankInfoSecurity.com,
CUInfoSecurity.com, GovInfoSecurity.com and
HealthcareInfoSecurity.com
• Focused on providing content about information
security and risk management for our industry
specific and network communities
• Publish new articles, regulation/guidance
reviews, white papers, etc. daily
• Educational webinars offered everyday
• Career center: http://careers.bankinfosecurity.com
7
Annual Memberships
• Access to hundreds of hours of content
good towards CPE certificates
• Print CPE certificates and your transcript at
any time
• Attend unlimited webinars presented by
industry experts with regulatory agency
participation
• Education & training on risk management,
audit, compliance, and information security
topics
Learn more:
https://www.bankinfosecurity.com/memberships.php
8
Housekeeping
• Technical Support: (800) 944-0401 x111 or x115
9
Workshop Handbook
• A copy of today’s presentation
• BITS Key Risk Measurement Tool
– Narrative
– Excel Spreadsheet
• Sample Information Asset Classification
Form
• Business Process Risk Assessment
Sample Template
10
About Steven Jones
• Director Information Security Synovus Financial
Corp.
• Established a best-of-class security program for
holding company with 37 banks
• Active in various industry and security
organizations
• Frequently presents to banks, vendors, security
professionals
11
Agenda
• Why do we need risk assessments
• How to build process and strategies to identify
and manage risks;
• How to tie risk assessment to your institution’s
daily business decisions;
• The importance of risk communication to senior
leaders.
• Risk assessment techniques that work – and
those that don’t;
12
Benefits of a Risk Assessment
• What drives the need for a risk assessment process?
– GLBA / FFIEC requirements
– Best practice
• How will a formalized risk assessment process benefit
you?
– Better alignment of risk management practices with
business strategy
– Allow management to make informed risk management
decisions through improved risk communication
– Regulatory compliance
13
Triggers for Risk Assessment
14
Risk Definition
15
How to Build a Process to Manage Risk
• We will show you one approach that worked for us
• How to use existing tools to formalized risk assessment
process tailored to your organization with the following
objectives:
– Understand and identify your information architecture
– Engaging the business and effectively communicate
risk
– Prioritize IT risk management practices to what’s
important to the business
– Maintain regulatory compliance
16
Methodology Overview
Data Collection
Interviews Data
Reporting Remediation
• Business Process Analysis
• Enterprise
17
Business Process Risk Assessment Flow
Inputs Process Outputs
1
Assessment scope
and schedule
Develop assessment
scope
BITS Kalculator
Assessments
2
Updated Risk
Collect data from Assessments
Business Process
Owners
Information Asset
Inventory
3
Risk Assessment
Report
Produce Risk Reports
4
Risk Assessment
Remediation Plans
Report
Create Remediation
Plans
5
Remediation Plans
Manage Remediation
18
Step 1: Develop Assessment Scope
• Put together a list of 25-50 macro business processes with
– Organization Charts
– Business Work Flows
– SOX Processes
– Interview key individuals familiar with your business
• Identify business process owners
– Most senior and knowledgeable individual(s) responsible for
defining and understanding existing process for that process
• Define an assessment schedule and timeline
– Schedule interviews over a longer period of time
• Communicate process, roles, responsibilities and timeline
19
Step 2: Collect Data from Business Process Owners
20
Understanding Your Information Architecture
21
Information Asset Classification
• Public
– Brochures, news releases, correspondence
• Internal Use Only
– Intellectual data, corporate portal, business
processes, audit reports
• Confidential
– Personally identifiable customer and employee
information, exam reports, security information,
service provider information, passwords
22
Sample Information Asset Classification Form
Financial
Reputation
Legal
23
BITS Kalculator
The Key Risk Measurement Tool for Information Security
Operational Risks (“Kalculator”) is a product of a joint
subgroup of the BITS Operational Risk Management and
Security and Risk Assessment Working Groups. The
subgroup developed a spreadsheet template to identify
common, high-risk factors related to information security
along with a method to prioritize them. The resulting tool is
the Kalculator.
24
Business Process Risk Assessment
A separate template is used for Business
Processes
• Business Process Risk Assessment Sample
Template is included
• Impact score is based on worst case for all
information asset impact scores for that process
• Tracks separate impact scores
• confidentiality
• availability
• Can be used for availability impact (BIA) or
confidentiality (GLBA)
25
Business Process Sample Template
• Introduction
• Systems
• Information Assets
• Key Risk Measurement Tool
• Risk Scoring
26
Business Process Risk Assessment
Worst Case
Degree to which Worst Case Business Business Process Residual Risk Residual Risk
Likelihood of Control is Process Impact Impact Score Score Residual Risk
Threat Event Vulnerability Security Control Threat Implemented (Confidentiality) (Availability) (Confidentiality) (Availability) Score (Overall)
Human error Lack of appropriate level of Information assets that are processed, stored or
security controls applied to transmitted are handled in accordance with asset
sensitive information assets. classification (e.g., confidential, sensitive, and public) and
Unlawful disclosure of sensitive are in compliance with applicable laws and regulations.
information. 100% 4 3 3 1.00 1.00 2.00
Unauthorized network or Lack of appropriate level of Data encryption and authentication requirements are
system access security controls applied to established based on information asset classification.
sensitive information assets.
Unauthorized disclosure of
confidential information.
100% 4 3 3 1.00 1.00 2.00
DDoS or DoS attacks Business continuity and disaster End-to-end business continuity and recovery plans are
recovery plans will fail to meet the tested at appropriate intervals and results feed into a
recovery time objectives for continuous recovery plan improvement cycle that is
critical business functions and based on changes in business, technology, vulnerabilities
services. and/or culture.
100% 3 3 3 2.00 2.00 4.00
DDoS or DoS attacks Business recovery procedures, A comprehensive business continuity plan, including
roles and responsibilities, and technology solutions is in place to address recovery of
corresponding technology service during a time of business interruption.
recovery plans have not been
defined or tested.
100% 3 3 3 2.00 2.00 4.00
27
Likelihood of Threat
28
Degree to which Control is Implemented
29
Control vs. Impact Score
Impact If Not Implemented
0 1 2 3 4 5
Control Implemented 0 5 6 7 8 9 10
1 4 4 6 7 8 9
2 3 3 3 6 7 8
3 2 2 2 2 6 7
4 1 1 1 1 1 6
5 0 0 0 0 0 0
30
Residual Risk Score
Worst Case
Degree to which Worst Case Business Business Process Residual Risk Residual Risk
Likelihood of Control is Process Impact Impact Score Score Residual Risk
Threat Event Vulnerability Security Control Threat Implemented (Confidentiality) (Availability) (Confidentiality) (Availability) Score (Overall)
Human error Lack of appropriate level of Information assets that are processed, stored or
security controls applied to transmitted are handled in accordance with asset
sensitive information assets. classification (e.g., confidential, sensitive, and public) and
Unlawful disclosure of sensitive are in compliance with applicable laws and regulations.
information. 100% 4 3 3 1.00 1.00 2.00
Unauthorized network or Lack of appropriate level of Data encryption and authentication requirements are
system access security controls applied to established based on information asset classification.
sensitive information assets.
Unauthorized disclosure of
confidential information.
100% 4 3 3 1.00 1.00 2.00
DDoS or DoS attacks Business continuity and disaster End-to-end business continuity and recovery plans are
recovery plans will fail to meet the tested at appropriate intervals and results feed into a
recovery time objectives for continuous recovery plan improvement cycle that is
critical business functions and based on changes in business, technology, vulnerabilities
services. and/or culture.
100% 3 3 3 2.00 2.00 4.00
DDoS or DoS attacks Business recovery procedures, A comprehensive business continuity plan, including
roles and responsibilities, and technology solutions is in place to address recovery of
corresponding technology service during a time of business interruption.
recovery plans have not been
defined or tested.
The residual risk score equation is the interim score from the
intersection of the degree of control implementation and
impact multiplied by the likelihood of threat percentage.
31
Enterprise Risk Assessment
A separate template is used for Enterprise
Risk assessment
32
Enterprise Risk Assessment
Degree to
which Control Impact if
is Control is not
Likelihood of Implemented Implemented
Threat 10 0 - Low 0 - Low
Category - 100% 5 - High 5 - High Control vs. Residual Risk
Reference Threat Event Vulnerability Security Control (Input) (Input) (Input) Impact Score Score
Access Control Computer crime Policies that define the removal Policies that define the removal of
of information from company information from company
facilities are not in place and are facilities are in place and
not communicated to all communicated to all employees.
employees.
30% 2 3 6 1.80
Access Control Computer crime System access logs are not System access logs are created and
created and reviewed to identify reviewed to identify use or
use or attempted use and attempted use and modification or
modification or attempted attempted modification of critical
modification of critical systems systems components (files, registry
components (files, registry entries, configurations, security
entries, configurations, security settings/parameters, audit logs).
settings/parameters, audit logs).
20% 0 2 7 1.40
Access Control Computer crime System access logs are not stored System access logs are stored in a
in a secure fashion with limited secure fashion with limited access
access and are not protected and protected from alteration or
from alteration or deletion. deletion.
20% 0 2 7 1.40
33
Impact if Control is not Implemented
34
Impact Rating Guide
Impact Description Score
No impact No impact. 0
Minor Some effort required to repair; minimal cost. No revenue loss. 1
Tangible Days of unplanned effort required for repair/recovery. Significant 2
expenses and/or some loss of revenue.
Significant Weeks of unplanned effort required for repair/recovery. Significant 3
expense and loss of revenue. Breach of confidentiality of sensitive
information. Damage to reputation and confidence. Exposure to
litigation.
Serious Extended outage and/or loss of connectivity. Requires activation of 4
contingency site. Months of unplanned effort required for
repair/recovery. Extensive expense and loss of revenue.
Compromise to integrity of large amounts of data or services.
Temporary loss of facility. Damage to reputation. Regulatory
concerns raised.
Grave Permanent shutdown. Complete compromise. Inability to recover. 5
Permanent loss of facility. Loss of life.
35
Step 3: Produce Risk Reports
• Enterprise risk analysis report – a report
summarizing the top residual risk scores requiring
remediation
• Business process risk analysis report – a
report summarizing the top residual risk scores
from each business process risk assessment
provided to the business process owner
36
Risk Analysis Reporting Examples
• Executive Summary
• Top control weaknesses yielding a residual risk
score over the established tolerance level
• Heat map of risk by ISO-17799 domains
• Heat map of risk for all business processes
• The top 5 business processes with the most risk
• Recommended actions
37
Step 4: Create Remediation Plans
Determine appropriate remediation and escalation
plan based on residual risk score.
For Example:
– 7 or under requires no immediate mitigating action and
annual review
– 8 to 13 triggers further review of compensating control,
and may require additional controls
– 14 or above requires quarterly review and escalation to
board. Requires additional controls
38
Step 5: Manage Remediation
39
What Doesn’t Work
• An automated process reduces the effectiveness
of risk communication and precludes the
opportunity to
– educate the business
– demonstrate value in the process
• Not including the business process component
• Lack of management and board involvement
• Failure to consider risk assessments as an
essential element of risk management
40
Improved Risk Communication
• One on one risk assessments with business
process owners and other stakeholders provide a
more effective method for communicating risk.
• This allows the business to more clearly align
day to day decisions with information risk.
• Effective Risk Communication has been
determined to be one of the most important
measures of success in information security
41
Properties of an Effective Risk
Assessment
• Risk assessment should
– Provide an enterprise perspective
– Include business process perspective
– Include
• Information asset impact
• Likelihood of threat
• Control effectiveness
• Risk assessments are subjective
• Risk assessments are unique
42
Other Critical Success Factors
• Management oversight and support
• Formally documented
• Report out to the Board
• Manage scope
• Follow through with remediation
43
Review
• Importance of an effective risk assessment
• How to build a risk assessment process
and strategies to identify and manage
risks
• Risk assessment techniques that work –
and those that don’t
• The importance of engaging the business
and effectively communicate risk
44
Questions?
http://www.bankinfosecurity.com/webinar-feedback.php
Or contact us at:
(800) 944-0401
45
Questions?
http://www.bankinfosecurity.com/webinar-feedback.php
Or contact us at:
(800) 944-0401
46
Other Resources
• FFIEC Information Security Handbook,
July 2006 www.ffiec.gov
• FDIC FIL 68-1999 Risk Assessment Tools
and Practices
• NIST Risk Management Guide for
Information Technology Systems, SP 800-
30 www.nist.gov
47
Resources
• BITS Key Risk Measurement Tool for
Information Security Operational Risks
www.bitsinfo.org
48
KALCULATOR:
BITS KEY RISK MEASUREMENT TOOL
FOR
INFORMATION SECURITY
OPERATIONAL RISKS
BITS · 1001 PENNSYLVANIA AVENUE NW · SUITE 500 SOUTH · WASHINGTON DC 20004 ·202-289-4322
49
TABLE OF CONTENTS
I. EXECUTIVE SUMMARY.............................................................................................................. 3
The financial services industry needs new forms of risk management. The reasons for this are numerous and
include the deregulation and globalization of financial services, the industry’s growing reliance on technology,
and a perceived increase in the risk profile of financial services business models. Operational risk
management will become a priority at major financial institutions as they respond to pending regulatory
capital requirements and competitive pressure requiring stronger internal controls.
Often considered the backbone of operations, computer hardware and software systems play a major role in
any financial institution’s operational risk profile. Ensuring information confidentiality, integrity and
availability is a significant component of operational risk. Unique challenges are associated with this specific
risk component.
The Key Risk Measurement Tool for Information Security Operational Risks (“Kalculator”) is a product of a joint
subgroup of the BITS Operational Risk Management and Security and Risk Assessment Working Groups.
The subgroup developed a spreadsheet template to identify common, high-risk factors related to information
security along with a method to prioritize them. The resulting tool is the Kalculator.
The Kalculator is intended for use by financial institutions to identify key information security risks that should
be considered in broader enterprise-wide operational risk models. The Kalculator provides an extensive, but
not exhaustive, list of common information security threats, vulnerabilities and corresponding controls to
mitigate risk. It also offers a method for scoring and prioritizing risks based on the likelihood of threat
occurrence, the degree of control implementation, and the level of control effectiveness. Providing sort
capabilities based on ISO 177991 categories and Basel II loss event (Level 1) categories, the tool can facilitate
an organization’s internal communication by using a risk context that is understood by information security,
audit, operational risk and others.
Financial institutions are required to employ information security assessments to satisfy federal and state
regulations. Though various assessment models are already in use, a secondary benefit of the Kalculator is its
use in developing, enhancing or augmenting internal or third-party information security assessment models.
Results produced from the scoring exercise can assist an organization’s security personnel in preparing for
audits, identifying resource requirements, and gaining an understanding of needed system security
improvements. In addition, the Kalculator has the potential to produce industry benchmarking data.
While multi-level quantitative and qualitative risk assessments and sophisticated analysis processes are
evolving, they are difficult to implement for many institutions. This is in part because implementing a
successful operational risk discipline often requires a significant change in corporate culture. Success depends
on an organization’s board of directors and senior-level management understanding of and commitment to
creating an internal, enterprise-wide operational risk management structure.
1 International
Organization for Standardization/International Electrotechnical Commission “International Standard
ISO: 17799: 2000 Information Technology – Code of Practice for Information Security Management” (2000).
Participating Organizations
The Bank of New York Company, Inc.
BANK ONE CORPORATION
BB&T Corporation/First Virginia Banks, Inc.
City National Corporation
Comerica Incorporated
Credit Suisse First Boston
FleetBoston Financial Corporation (Bank of America Corporation)
Fortis, Inc.
National City Corporation
Northern Trust Corporation
Pershing
Raymond James Financial, Inc.
Regions Financial Corporation
SouthTrust Bank
State Farm Insurance Companies
USAA
Washington Mutual, Inc.
Special Contributions
Sharon Kaufman, The Bank of New York Company, Inc.
Roxanne Carr, Comerica Incorporated
Kenneth Schaeffler, Comerica Incorporated
Kenneth Vowels, Comerica Incorporated
Anne Thomas, Credit Suisse First Boston
Lori Blair, Fortis, Inc.
Adam Stone, Fortis, Inc.
Lori Lucas, Raymond James Financial, Inc.
Landy Dutton, Regions Financial Corporation
Marc Menninger, Washington Mutual, Inc.
Stewart Milus, State Farm Insurance Companies
Flora Stevens, Washington Mutual, Inc.
BITS would like to acknowledge the efforts of Paul Smocer, Senior Vice President, Technology Assurance
Services, Mellon Financial Corporation, and former BITS Senior Director Laura Lundin for their efforts in
creating this project.
Overview
Banks are in the business of managing risk. Risk management in the financial services industry has
traditionally focused on credit, market and interest rate risks on which the industry’s products and services
rest. However, operational risk management has recently taken on greater strategic importance within the
financial services industry. Deregulation, globalization of financial services, the industry’s growing IT
sophistication and reliance on technology, and a perceived increase in the risk profile of evolving financial
services business models underscore the need for new forms of operational risk management.
Over the next several years, pending regulatory capital requirements will form the basis for increased
prioritization of operational risk management within every major financial institution. Recent revisions to
international capital standards by the Basel Committee on Banking Supervision (the “Basel Committee”) have
focused on risk-measurement practices and have encouraged investment in technologies to improve the
measurement and management of risk.2
Integrated risk-management frameworks are emerging and multi-level, quantitative and qualitative risk
assessments and sophisticated analysis processes are evolving. However, implementing a successful
operational risk discipline will require significant changes in corporate cultures. Success depends on senior
management understanding of and commitment to a robust internal risk management structure. This
requires ongoing identification, evaluation, and use of “what-if” and “worst-case” scenarios based on internal
and external data.
Operational risk management activities are even more complex when considered in a regulatory context.
Significant changes in regulatory capital requirements for the ten to 12 largest U.S.-based and international
financial services companies are introduced in the New Basel Capital Accord (Basel II). Basel II will make
capital reserves more risk-sensitive and representative of the institutions’ risk profile. Basel II includes a
proposed addition of specific operational risk components into the capital calculation. The implementation
of Basel II requires participating financial institutions to maintain a sophisticated operational risk
management infrastructure to ensure the integrity of their internal risk estimates. Although the new Accord
will go into effect in 2007, it requires three years of prior risk-measurement efforts. This places the onus on
those financial institutions for which Basel II regulation will be mandatory (and those that are eligible and
choose to participate) to implement the requirements as early as 2004. Regardless of size and the application
of new capital regulation to select financial institutions, U.S. banking supervisors are likely to require all
financial institutions to implement an effective framework to identify, assess, monitor, and control material
operational risks as part of an overall approach to risk management.
Aside from the Basel II and regulations, there are strong motivations for instituting an enterprise-wide
concentration on operational risk management. The Zurich IC2 database captured $6.5 billion in financial
institution operational losses in 2002. Better business management can reduce losses, improve earnings and
drive shareholder value. In addition, according to Moody’s Investor’s Service, “Since operational risk will
affect credit ratings, share prices, and organizational reputation, analysts will increasingly include it in their
assessment of the management, their strategy and the expected long-term performance of the business.” 3
2
Statement of Chairman Alan Greenspan on The State of the Banking Industry Before the Committee on Banking,
Housing, and Urban Affairs, U.S. Senate, April 20, 2004.
3 Moody's Analytical Framework for Operational Risk Management of Banks, January 2003.
Operational risk is defined by the Basel Committee as “the risk of loss resulting from inadequate or failed
internal processes, people and systems or from external events.” Operational risk is inherent risk that affects
every business unit and key support functions. For the Basel Committee and its measurement of operational
risk exercises, operational risk includes legal risk but excludes strategy, reputation and systemic risk.4 For
most comprehensive, qualitative risk management programs, these risk concepts are considered and managed
even if they cannot be accurately quantified.
The primary focus on operational risk has been in those categories the Committee identifies as having the
potential to cause major losses, including:
1. Internal Fraud. Acts and activities that result in defrauding the bank, its customers, or tax
authorities; misappropriation of property; circumvention of regulations, the law or company policy;
and diversity/discrimination events involving at least one internal party. Examples include: reporting
of positions; employee theft; insider trading on an employee’s own account; and fraudulent advice
given to clients to encourage trading activities—such as when the investment-banking function sells a
stock but advises clients to buy that stock.
2. External Fraud. Acts by a third party with the intent or result of defrauding the institution,
misappropriating property, or circumventing the law. Examples include robbery, forgery, check
kiting, computer hacking, and denial-of-service attacks.
3. Employment Practices and Workplace Safety. All activities and acts consistent with employment,
health and safety laws and/or agreements, or which result in personal-injury claims relating to
employment contracts and diversity/discrimination issues. Examples include workers’ compensation
claims, violation of employee health and safety rules, organized labor activities, discrimination claims
and all general liability.
5. Damage to Physical Assets. Loss or damage to physical assets from natural disasters or other
events such as terrorism, vandalism, fires, floods, storms, civil wars and strife. This extends to the
risk to assets from third-party suppliers and outsourcers.
6. Business Disruption and System Failures. Includes all hardware, software, telecommunications
outages, utility outages, and real estate facilities problems.
7. Execution, Delivery and Process Management. Includes the complete transaction processing
environment of a financial institution. Failed transaction processing or process management,
relations with trade counterparties, and relations with vendors are also included. Examples include:
data-entry vendors; offshore processing vendors; collateral management and administration failures;
incomplete legal documentation; unapproved access given to client accounts; outsourcing vendor
disruptions and failures; non-client counterparty non-performance or mis-performance (such as
4Basel Committee on Banking Supervision Consultative Document Operational Risk, Supporting Document to the New
Basel Capital Accord (January 2001).
Operational risk management is evolving in concept and practice. Developing an appropriate risk-
management framework and demonstrating effective risk management is achieved through the explicit
identification, assessment, monitoring and mitigation/control of operational risk. A solid risk-management
framework involves:
• Clear strategies and oversight by the board of directors and senior management
• An appropriately robust internal control culture
• Effective internal reporting processes
• Effective contingency planning processes
The Basel Committee issued its guidance in the document “Sound Practices for Management and Supervision
of Operational Risk” in February 2003 as follows:
Principle 1: The board of directors should be aware of the major aspects of the bank’s operational
risks as a distinct risk category that should be managed, and it should approve and periodically review
the bank’s operational risk management framework. The framework should provide a firm-wide
definition of operational risk and lay down the principles of how operational risk is to be identified,
assessed, monitored, and controlled/mitigated.
Principle 2: The board of directors should ensure that the bank’s operational risk management
framework is subject to effective and comprehensive internal audit by operationally independent,
appropriately trained and competent staff. The internal audit function should not be directly
responsible for operational risk management.
Principle 3: Senior management should have responsibility for implementing the operational risk
management framework approved by the board of directors. The framework should be consistently
implemented throughout the whole banking organization, and all levels of staff should understand
their responsibilities with respect to operational risk management. Senior management should also
have responsibility for developing policies, processes and procedures for managing operational risk in
all of the bank’s material products, activities, processes and systems.
Principle 4: Banks should identify and assess the operational risk inherent in all material products,
activities, processes and systems. Banks should also ensure that before new products, activities,
processes and systems are introduced or undertaken, the operational risk inherent in them is subject
to adequate assessment procedures.
Principle 5: Banks should implement a process to regularly monitor operational risk profiles and
material exposures to losses. There should be regular reporting of pertinent information to senior
management and the board of directors that supports the proactive management of operational risk.
Principle 6: Banks should have policies, processes and procedures to control and/or mitigate material
operational risks. Banks should periodically review their risk limitation and control strategies and
Principle 7: Banks should have in place contingency and business continuity plans to ensure their
ability to operate on an ongoing basis and limit losses in the event of severe business disruption.
3. Role of Supervisors
Principle 8: Banking supervisors should require that all banks, regardless of size, have an effective
framework in place to identify, assess, monitor and control/mitigate material operational risks as part
of an overall approach to risk management.
4. Role of Disclosure
Principle 10: Banks should make sufficient public disclosure to allow market participants to assess
their approach to operational risk management.
Security is a fundamental building block for all financial services. It is also a legal and regulatory requirement
that financial institutions must comply with to ensure the privacy and security of customer information.
Securing the integrity, availability and confidentiality of information is a significant component of operational
risk management. Therefore, computer hardware and software systems must play a major role in any financial
institution’s operational risk profile.
Information security professionals must be able to identify and communicate key operational risks (both
threats and vulnerabilities). Measuring these risks requires estimating both the probability of an operational
loss event and the potential scope of the loss. Risk factors that indicate the likelihood of an operational loss
event occurring vary from business unit to business unit. Individual business units typically “own” their risk.
Corporate support functions such as human resources, legal, and technology often are either responsible for
the offshore components of related operational risks and/or feed their associated risk information into the
individual business units.
Historical loss data is necessary to understand risk factors as well as to accurately model operational risks.
However, since few organizations track and quantify historical loss data, information security operational risk
assessments are most often judgment-based.
Financial institutions are developing and implementing a variety of enterprise-wide operational risk
management techniques. These include both top-down and bottom-up approaches to assessing, measuring
and managing operational risks. Scorecards, loss distributions, scenario analysis and self-assessment models
are among the common tools. In most organizations, operational risk tools, data collection, and monitoring
and reporting are coordinated across the enterprise.
General Description
The BITS Operational Risk Management Information Security subgroup was created to address financial
institutions’ need to better manage the information security component of operational risk. As part of this
work, the subgroup developed the Kalculator, a spreadsheet template, to identify high-risk factors related to
information security and provide a method to prioritize those risk factors. While the risk factors used in the
Kalculator could feed into an institution’s broader enterprise-wide operational risk model, they are not
intended to address enterprise-wide risks.
The Kalculator provides an extensive list of common information-security threats, vulnerabilities and
corresponding controls to mitigate those risks. The Kalculator should not be considered comprehensive
and/or inclusive of all risks and controls. Based on the subjectivity of the inputs, the Kalculator is not intended
to act as a reporting mechanism for an institution or the industry as a whole. Rather, it is a source of
information to complement an institution’s approach to identifying and prioritizing information security risk.
Because there is no standard approach to the structure of financial institutions’ operational risk departments,
the template was designed to be flexible and customizable to suit most companies’ needs. The Kalculator
contains a method for scoring and prioritizing risks based on the likelihood of threat occurrence, the degree
of control implementation, and the level of control effectiveness. Because it can sort data based on ISO
17799 categories (current default) or Basel II loss event (Level 1) categories, the Kalculator can facilitate an
organization’s internal communication by using a risk context that information security, audit, operational risk
and others understand.
The risk scoring can be customized for various audiences. For example, if the data is sorted by ISO 17799
domains, security practitioners can get an overview of the ten domains to see where an institution faced the
most challenges in modeling ISO 17799 guidelines. Similarly, if the data is sorted by threat events, an
institution can assess whether it is responding to certain threats appropriately when compared to other
institutions. The significance of risk is determined by the user inputs and considers account frequency,
severity and resulting damage to mission-critical business operations, revenues or shareholder value.
Financial institutions are required to conduct information-security assessments to satisfy federal and state
regulations and supervisory guidance. Though various assessment models are already in use, a secondary
benefit of the Kalculator is its usefulness in developing, enhancing or augmenting internal or third-party
information-security assessment models. Scoring exercise results can assist an organization’s information
security personnel in preparing for audits, identifying resource requirements, and gaining an understanding of
needed system security improvements.
Development Process
There are several ways to analyze risk from information security. Information-security practitioners, auditors
and others tend to take an “upstream” view of risk, focusing on threats, vulnerabilities and controls, while
executive management and risk managers often focus on a “downstream” view of risk or the risk exposure
and damage to assets. While the Kalculator was created on the basis of threats, vulnerabilities and controls, it
provides a bridge to downstream risks through measurement inputs.
A comprehensive information-security assessment begins with defining the boundary or scope of the assets
that may be at risk and a critical asset-identification exercise. This step should be completed by the
organization prior to using the Kalculator. Models are based on the assumption that critical assets are identified
and system boundaries are defined.
The Kalculator rests on the following relationships of risk terms (see Appendix B, Figure 1):
• Threats exploit vulnerabilities, which lead to risk.
• Controls stop threat exploits, thus eliminating or reducing vulnerabilities.
• Risk exposure is the potential sum of damage (costs), from risk to critical assets.
The default threat, vulnerability and control data in the Kalculator is taken from a list of control questions
identified by the BITS Security Assessments Project Team of the BITS IT Service Providers Working Group.
Based upon the format of ISO 17799 and consistent with industry and regulatory requirements, this team of
industry experts developed a worksheet (the BITS IT Service Providers Expectations Matrix) outlining the security
practices, processes and controls that may be included in an assessment or audit of an IT service provider’s
operations. These control questions were converted by the subgroup into control statements and mapped to
corresponding threat/vulnerability pairs.
The threat, vulnerability and control data were formatted according to ISO 17799’s ten security controls5. The
ISO 17799 standard, which is used as the basis for security risk analysis, provides recommendations for
managing information security and business continuity for those responsible for initiating, implementing, or
maintaining security and continuity planning in their organization.
The Kalculator is intended to provide a common basis for developing organizational security and recovery
standards and effective risk management practices, and to provide confidence in inter-organizational dealings.
Many financial services organizations are identifying their operational risk models in the context of the Basel
II6 loss event risk and data context. By using the sort function, the Kalculator can be reformatted based on
Basel II loss event categories.
A threat event is an occurrence or circumstance that has the potential to have an undesirable impact on an
asset. A successful threat exploits a known or previously unknown vulnerability. A threat agent (the source of
a threat) can be human-made or natural. Human-made threats can be further categorized as deliberate or
accidental. Intentional threats have three important attributes: capability, motivation, and opportunity. In
addition to threats that exist within a financial institution, those resulting from third-party vendor
relationships must also be considered.
There are many different ways to articulate threat statements using the components listed above (actors,
sources, actions, events, motivation), with no one commonly acceptable method. Publicly available resources
such as ISO 17799, Carnegie Mellon University’s CERT Octave program, the Information Security Forum’s
(ISF) Firm Methodology, and the National Institute of Standards and Technology (NIST) 800-30 publication
each express information-security threats in different formats. Some models focus on threat sources or
actors, while others concentrate on threat actions or events. Others incorporate both a source and an event at
various levels of detail. The Kalculator highlights only the threat event in order to provide consistency and the
ability to sort information easily.
Each threat event could be caused by multiple actors or sources with different motivations. The user of the
Kalculator should consider the possible sources of a threat event when completing the input ratings. Once a
list of top risks is determined, additional analysis should be incorporated into the risk statement before it is
communicated so that the full threat event, including the various sources of a particular threat, can be fully
understood.
Not all threats can be predicted or reasonably anticipated. Figure 1, “Approach to Information Security
Threat Analysis,” depicts the framework and a sample inventory of threats the subgroup used in creating the
tool. This list provides a comprehensive set of known threats, but does not include all possible threats.
The Kalculator is one method for scoring and prioritizing the threat/vulnerability pairs. The method is based
on subjective user inputs for the likelihood of threat occurrence, the degree of control implementation, and
the level of control effectiveness. Numeric values are required for the spreadsheet inputs and are used for the
scoring model. This approach provides a more specific level of measurement versus the simple “high,
medium, and low” measurement many information-security assessment models use.
Inputs:
• The likelihood of threat, i.e., the probability of an occurrence, is defined on a 10 to 100% scale. A
threat likelihood of 0% is not an option because, by definition, there is always a likelihood of a threat
occurring no matter how low the probability.
• An input measure of 0 to 5 is required to indicate the degree to which a control is implemented and
the impact if the control is not implemented.
Scoring Array:
A 0-to-10 numeric scoring array quantifies the intersection of the control implemented and impact inputs.
The scoring array is defined as follows:
If a control is completely implemented the score will always be zero because there is no room for
improvement in action/control. Even if impact is zero, a zero control will produce a risk score of 5 because
impact may change over time and organizations should be practicing at least some level of due care—a low
level of control but not zero control.
Interface
The Kalculator uses a standard Microsoft Excel spreadsheet format. All functions and options related to the
program, including filter and sort capabilities, can be applied to the tool.
Collaboration
Institutions using the Kalculator may need to involve individuals from disciplines outside of information
security to complete the subjective input fields. Depending on company structure and/or the data already
available through assessment exercises, collaboration may be necessary so that data can be contributed from
one or more of the following areas:
• Business units, which initiate e-business projects to meet customer demands or a market opportunity
• Technologists, who assemble the architecture capable of performing the necessary transactions
(including security services)
• Finance, which resolves the costs and benefits associated with the project’s risks
• Third-party IT service providers, including cross-border outsourcing partners
• Compliance/general counsel/internal audit or other relevant control and oversight functions within
the organization.
Customizing Data
The spreadsheet is completed with default information on information-security threats, vulnerabilities and
controls, along with a mapping to the ISO 17799 and Basel II categories. This default information can be
customized based on the institution’s individual experience, environment and/or information needs. The
Kalculator was designed for use at the enterprise level; however, it can be completed for a particular unit or
specific computing platform. A sample of how one institution modified the format of Kalculator for their use
is available on the BITS website: www.bitsinfo.org.
Likelihood of Threat
This input column allows for a percentage input from 10 to 100% for each threat/vulnerability pair.
The likelihood of threat is highly subjective. Statistically relevant measures of frequency for many threat
events associated with information security do not exist. This is a significant constraint to assessing risk. The
default information has been set to the average likelihood identified by the subgroup members. The average
of the likelihood of threat responses from subgroup members has been set as the default position/percent for
this field. The user may change the input for any given threat based on:
• The circumstances and environment of an individual institution;
• Historical experience;
• Other third-party information that may be available; and
• Personal expertise.
Users should factor several considerations into their input selection, including:
• The degree of change at the organization;
• Unique system characteristics;
• Potential threat actors/sources; and
• Available access.
When considering unauthorized access, the privilege that is acquired would also determine the risk level.
Super-user privilege would allow unlimited access to the entire system, so the subsequent risk is the highest.
Security systems administrators’ and normal users’ privileges would contribute less risk as a result of more
limited access to “sensitive data.”7
Implementation of Controls
Users can input a score ranging from 0 to 5, with 0 being low and 5 being high.
Not accounted for in the Kalculator are the potential cumulative effects that multiple or layered controls have
on addressing a particular threat/vulnerability. Users can factor the cumulative effect by modifying the score.
Impact
Users can input a score ranging from 0 to 5, with 0 being low and 5 being high.
“Impact” refers to the magnitude of harm caused by a threat’s exercise of vulnerability. This is also highly
subjective. Users must factor several considerations into their input selection, including the nature and
sensitivity of information at risk (e.g., proprietary information, public information, customer data), its
criticality to business operations, and the technology function (e.g., storage, processing, transmission,)
involved in the scenario.
• Loss of Availability. If a mission-critical IT system is unable to reach its end users, the organization’s
mission may be affected. Loss of system functionality and operational effectiveness, for example, may
result in loss of productive time, thus impeding the end users’ ability to function in support of the
organization’s mission.
• Loss of Confidentiality. System and data confidentiality refers to the protection of information from
unauthorized disclosure. The impact of unauthorized disclosure of confidential information can range
from jeopardizing national security to disclosure of Privacy Act data. Unauthorized, unanticipated or
unintentional disclosure could result in loss of public confidence, embarrassment, or legal action against
the organization.
8 National Institute of Standards and Technology, Risk Management Guide for Information Technology Systems, Pub 800-30
(January 2002).
5 0.0
Access Control External Fraud Computer crime System access logs are not System access logs are stored in a
stored in a secure fashion with secure fashion with limited access
limited access and are not and protected from alteration or
protected from alteration or deletion.
deletion. 5 0.0
Access Control Internal Fraud Computer crime Policies that define the removal Policies that define the removal of
of information from company information from company
facilities are not in place and are facilities are in place and
not communicated to all communicated to all employees.
employees.
5 0.0
Basel II Accord: The new capital reserve regulation for financial institutions under proposal by the Bank for
International Settlements for application to the world’s major financial services companies.
Control: A safeguard put in place to eliminate or reduce the threat exploitation of a vulnerability.
Control factor: A subjective value assigned to reflect the degree to which the control is implemented and
assesses the robustness of a control or the ability for the control to eliminate vulnerability.
Distributed denial of service (DDoS): An attack in which a multitude of compromised systems attack a
single target, thereby causing denial of service for users of the targeted system.
Domain name service (DNS): Machines responsible for maintaining lists that translate Internet names to
numbers and vice versa. DNS allows you to reference domain names instead of their actual IP address for
easier recollection.
Impact: The sum of potential damage (cost) from risk to critical assets.
ISO/IEC 17799: 2000 Code of Practice for Information Security Management: This document offers
guidelines and voluntary directions for information-security managers responsible for initiating, implementing
or maintaining security in their organization. It is intended to provide a common basis for developing
organization security standards and effective-security management practice, and to provide confidence in
inter-organizational dealings. The document is intended to be a starting point for developing organization-
specific guidance, rather than to give definitive instructions or “how-tos”.
Operational risk: The risk of loss resulting from inadequate or failed internal processes, people and systems
or from external events.
Risk: A function of the likelihood of a given threat-source exercising a particular potential vulnerability and
the resulting impact of that adverse event on the organization’s assets.
Risk assessment: A study of vulnerabilities, threats, likelihood, loss or impact, and the theoretical
effectiveness of security measures. The process of evaluating threats and vulnerabilities (known and
postulated), to determine expected loss and establish the degree of acceptability to system operations.
Risk management: The total process to identify, control, and minimize the impact of uncertain events. The
objective of the risk-management program is to reduce risk.
Threat event: An occurrence or circumstance with the potential to have an undesirable impact on an asset.
Threat: The potential for a threat agent or source to exercise (accidentally trigger or intentionally exploit) a
specific vulnerability.
Threat agent: The source of a threat, which can be human-made or natural. Human threats can be further
categorized as intentional or unintentional.
Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls
that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a
violation of the system’s security policy.
Leads to Damages
Risk
Exploits
Vulnerability Assets Results in
Control
Threat Exposure
1. Security Policy
Security Policy control addresses management support, commitment, and direction in accomplishing
information security goals, including:
• Information Security Policy document – A set of implementation-independent, conceptual
information security policy statements governing the security goals of the organization. This
document, along with a hierarchy of standards, guidelines, and procedures, helps implement
and enforce policy statements.
• Ownership and review – Ongoing management commitment to information security is
established by assigning ownership and review schedules for the Information Security Policy
document.
2. Organizational Security
Organizational Security control addresses the need for a management framework that creates,
sustains, and manages the security infrastructure, including:
• Management Information Security Forum – Provides a multi-disciplinary committee
chartered to discuss and disseminate information security issues throughout the
organization.
• Information System Security Officer (ISSO) – Acts as a central point of contact for
information security issues, direction, and decisions.
• Information Security responsibilities – Individual information security responsibilities are
unambiguously allocated and detailed within job descriptions.
• Authorization processes – Ensures that security considerations are evaluated and approvals
obtained for new and modified information processing systems.
• Specialist information – Maintains relationships with independent specialists to allow access
to expertise not available within the organization.
• Organizational cooperation – Maintains relationships with both information-sharing partners
and local law-enforcement authorities.
• Independent review – Mechanisms to allow independent review of security effectiveness.
• Third-party access – Mechanisms to govern third-party interaction within the organization
based on business requirements.
• Outsourcing – Organizational outsourcing arrangements should have clear contractual
security requirements.
9 Info Security Mgmt.: ISO 17799 October 2001 International Network Security (INS) Whitepaper
7. Access Control
Access Control addresses an organization’s ability to control access to assets based on business and
security requirements, including:
• Business requirements – Policy controlling access to organizational assets based on business
requirements and “need to know.”
• User management – Mechanisms to:
Register and deregister users
Control and review access and privileges
Manage passwords
• User responsibilities – Informing users of their access control responsibilities, including
password stewardship and unattended equipment.
• Network access control – Policy on usage of network services, including mechanisms (when
appropriate) to:
Authenticate nodes
Authenticate external users
Define routing
Control network device security
Maintain network segregation or segmentation
Control network connections
Maintain the security of network services
• Host access control – Mechanisms (when appropriate) to:
Automatically identify terminals
Securely log-on
Authenticate users
Manage passwords
Secure system utilities
Furnish user duress capability, such as “panic buttons”
Enable terminal, user, or connection timeouts
• Application access control – Limits access to applications based on user or application
authorization levels.
• Access monitoring – Mechanisms to monitor system access and system use to detect
unauthorized activities.
• Mobile computing – Policies and standards to address asset protection, secure access, and
user responsibilities.
10. Compliance
Compliance control addresses an organization’s ability to remain in compliance with regulatory,
statutory, contractual, and security requirements, including:
• Legal requirements – awareness of:
Relevant legislation
Intellectual property rights
Safeguarding of organizational records
Data privacy
Prevention of misuse
Regulation of cryptography
Collection of evidence
• Technical requirements – Mechanism to verify execution of security policies and
implementations.
• System audits – Auditing controls to maximize effectiveness, minimize disruption, and
protect audit tools.
Employee Losses arising from acts inconsistent Employee Compensation, benefit, termination
practices and with employment, health or safety laws relations issues
workplace or agreements, from payment of personal Organized labor activity
safety industry claims, or from
diversity/discrimination events
Safe environment General liability (slips and falls, etc.)
Employee health & safety rules
events
Workers compensation
Employment Practices and
Workplace Safety
Diversity & All discrimination types
discrimination
Information Asset:
Information Asset Owner: Associated Business Process: Date:
Information Asset Description:
78
2011 COURSE CATALOG