Cover image for How to complete a risk assessment in 5 days or less
Title:
How to complete a risk assessment in 5 days or less
Personal Author:
Publication Information:
FL : CRC, Press 2008
Physical Description:
xvi, 440 p. : ill. ; 25 cm.
ISBN:
9781420062755

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010196949 HD61 P44 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization.

To help you determine the best way to mitigate risk levels in any given situation, How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists, forms, questionnaires, and sample assessments.

Presents Case Studies and Examples of all Risk Management Components

Based on the seminars of information security expert Tom Peltier, this volume provides the processes that you can easily employ in your organization to assess risk.

Answers such FAQs as:

Why should a risk analysis be conducted? Who should review the results? How is the success measured?

Always conscious of the bottom line, Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization--and it's not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.


Author Notes

Peltier, Thomas R.


Table of Contents

Acknowledgmentsp. xi
About the Authorp. xiii
Introductionp. xv
1 The Facilitated Risk Analysis and Assessment Process (FRAAP)p. 1
1.1 Introductionp. 1
1.2 FRAAP Overviewp. 2
1.3 FRAAP Historyp. 3
1.4 Introducing the FRAAPp. 5
1.4.1 Key Conceptsp. 6
1.5 The Pre-FRAAP Meetingp. 8
1.5.1 Pre-FRAAP Meeting Checklistp. 13
1.5.2 Pre-FRAAP Meeting Summaryp. 18
1.6 The FRAAP Sessionp. 18
1.6.1 Overviewp. 18
1.6.2 FRAAP Session Introductionp. 19
1.6.3 FRAAP Session Talking Pointsp. 20
1.6.4 FRAAP Threats Identificationp. 22
1.6.5 Identifying Threats Using a Checklistp. 25
1.6.6 Identifying Existing Controlsp. 26
1.6.7 Establishing Risk Levelsp. 26
1.6.8 Residual Riskp. 30
1.7 Using a Threats Identification Checklistp. 38
1.7.1 FRAAP Session Summaryp. 43
1.8 Post-FRAAP Processp. 47
1.8.1 Complete the Action Planp. 50
1.9 Conclusionp. 54
2 Risk Analysis (Project Impact Analysis)p. 57
2.1 Overviewp. 57
2.2 The Difference between Risk Analysis and Risk Assessmentp. 57
2.3 Risk Analysis and Due Diligencep. 58
2.4 Risk Assessment and Fiduciary Dutyp. 58
2.5 Performing a Risk Analysisp. 59
2.6 Risk Analysis Elementsp. 61
2.7 Other Considerationsp. 62
2.8 When to Conduct a Risk Analysisp. 64
2.9 Final Wordsp. 64
2.10 Sample Risk Analysis Questionnairep. 65
2.11 Sample Risk Analysis Report Outlinep. 65
3 Pre-Screeningp. 67
3.1 Introductionp. 67
3.2 Backgroundp. 71
3.2.1 Pre-Screening Example 1p. 71
3.2.2 Pre-Screening Example 2p. 73
3.2.3 Pre-Screening Example 3p. 75
3.2.4 Pre-Screening Example 4p. 78
3.3 Summaryp. 78
4 Business Impact Analysisp. 81
4.1 Overviewp. 81
4.2 BIA versus Risk Assessmentp. 82
4.3 Creating a BIA Processp. 83
4.4 Creating the Financial Impact Tablep. 84
4.5 Working the BIA Processp. 86
4.6 Additional Examplesp. 88
4.7 Objectives of the BIAp. 93
4.8 Using Questionnaires for a BIAp. 93
4.9 Data Collection and Analysisp. 95
4.10 Prepare Management Presentationp. 96
4.11 Final Thoughtsp. 97
5 Gap Analysisp. 99
5.1 Introductionp. 99
5.2 Backgroundp. 99
5.3 GAP Analysis Processp. 100
5.3.1 Gap Analysis Example 1p. 103
5.3.2 Gap Analysis Example 2p. 106
5.3.3 How to Use the Self-Assessment Checklistp. 107
5.4 Summaryp. 108
Appendix A Facilitator Skillsp. 111
Appendix B FRAAP Team Membersp. 117
Introductionp. 117
The Risk Assessment Teamp. 118
Conclusionp. 123
Appendix C Project Scope Statementp. 125
Overviewp. 125
Summaryp. 128
Appendix D Laws, Standards, and Regulationsp. 129
Appendix E Frequently Asked Questions about Risk Managementp. 131
Introductionp. 131
Is There a Difference between Risk Analysis and Risk Assessment?p. 131
Why Should a Risk Analysis Be Conducted?p. 132
When Should a Risk Assessment Be Conducted?p. 132
Who Should Conduct the Risk Assessment?p. 133
How Long Should a Risk Assessment Take?p. 134
What Can a Risk Analysis or Risk Assessment Analyze?p. 134
Who Should Review the Results of a Risk Analysis and Risk Assessment?p. 134
How Is the Success of the Risk Analysis Measured?p. 135
Summaryp. 135
Appendix F Risk Analysis versus Risk Assessmentp. 137
Overviewp. 137
The Difference between Risk Analysis and Risk Assessmentp. 137
Risk Analysis and Due Diligencep. 138
Risk Assessment and Fiduciary Dutyp. 138
Conducting a Risk Assessmentp. 139
Risk Assessment Timetablep. 140
Risk Assessment and Risk Analysis Resultsp. 140
Risk Management Metricsp. 140
Summaryp. 141
Appendix G Sample Threat Checklistp. 143
Appendix H Sample BIA Questionnairep. 153
Appendix I Sample Risk Assessment Management Summary Reportp. 251
Risk Assessment Scope Summaryp. 252
Assessment Methodology Usedp. 252
Assessment Findings and Action Planp. 253
Full Findings Documentationp. 254
Conclusionp. 254
Appendix J Project Scope Statementp. 259
Introductionp. 259
Project Statementp. 260
Specificationsp. 260
Well-Defined Standards and Metricsp. 262
Summaryp. 263
Appendix K Why Risk Assessments Failp. 265
Scope Creepp. 265
Ineffective Project Teamp. 266
Stating Concerns as How They Impact Securityp. 266
Every Threat Is a Major Concernp. 267
Conclusionp. 267
Appendix L Gap Analysis Examplesp. 269
Overviewp. 269
Gap Analysis Using ISO 17799p. 270
Answer the Following Questionsp. 270
Gap Analysis Using Utility-Specific Standardsp. 298
Gap Analysis Sample 3 Using Combination of Standards and Lawsp. 344
Appendix M Control Listsp. 399
Overviewp. 399
Appendix N Heat Chartsp. 423
Indexp. 431