Key Takeaways

  • Risk = Likelihood × Impact
  • Frameworks provide structure
  • Risk registers track findings
  • Accept, mitigate, transfer, avoid

1. Risk Management Fundamentals

Risk management is the process of identifying, assessing, and controlling threats to an organization. It enables informed decision-making about security investments and priorities.

Risk Formula

Risk = Likelihood × Impact
Where likelihood is probability of occurrence and impact is business harm if it occurs.

2. Risk Assessment Process

  1. Identify assets: What needs protection?
  2. Identify threats: What could harm assets?
  3. Identify vulnerabilities: Weaknesses that enable threats
  4. Assess likelihood: How probable is exploitation?
  5. Assess impact: What's the business harm?
  6. Calculate risk: Prioritize findings
  7. Recommend treatment: How to address risks

3. Risk Management Frameworks

4. Quantitative Risk Analysis

# FAIR methodology components:
# Loss Event Frequency (LEF)
# - Threat Event Frequency (TEF)
# - Vulnerability (probability of success)

# Loss Magnitude (LM)  
# - Primary loss (direct impact)
# - Secondary loss (response, reputation)

# Example calculation:
ALE = SLE × ARO
# Annual Loss Expectancy = Single Loss × Frequency

# SLE = $500,000 (data breach cost)
# ARO = 0.2 (20% chance per year)
# ALE = $100,000

5. Risk Registers

FieldDescription
Risk IDUnique identifier
DescriptionWhat could happen
Likelihood1-5 or probability
Impact1-5 or dollar value
Risk ScoreLikelihood × Impact
OwnerAccountable person
TreatmentAccept/Mitigate/Transfer/Avoid
StatusOpen/In Progress/Closed

6. Risk Treatment Options

7. Reporting to Leadership

8. Building a Risk Program

  1. Define risk appetite with leadership
  2. Select framework and methodology
  3. Inventory assets and create risk register
  4. Conduct regular assessments
  5. Track and report on risks
  6. Integrate with security operations

FAQ

Qualitative vs quantitative risk?
Start with qualitative (High/Medium/Low) for speed. Move to quantitative (dollar values, FAIR) for better decision support and executive communication. Most organizations use both.

Compliance Vuln Management Security Architecture