|
|
Preparing for Success: Setting Expectations
Proper expectation setting cannot be overemphasized. Setting reasonable
expectations is critical if the risk assessment is to be successful, because the
process requires significant contributions from different groups that possibly
represent the entire organization. Furthermore, participants need to agree and
understand success factors for their role and the larger process. If even one of
these groups does not understand or actively participate, the effectiveness of
the entire program may be compromised.
While you build consensus during the planning step, set expectations up front
on the roles, responsibilities, and participation levels asked of other
stakeholders. You also should share the challenges that the assessment presents.
For example, clearly describe the processes of risk identification and
prioritization to avoid potential misunderstandings.
Embracing Subjectivity
Business Owners are sometimes nervous when an outside group (in this case,
the Information Security Group) predicts possible security risks that may impact
fiscal priorities. You can reduce this natural tension by setting expectations
about the goals of the risk assessment process and to assure stakeholders that
roles and responsibilities will be respected throughout the process.
Specifically, the Information Security Group must recognize that Business Owners
define the value of business assets. This also means that stakeholders must rely
on the Information Security Group's expertise to estimate the probability of
threats impacting the organization. Predicting the future is subjective in
nature. Business Owners must acknowledge and support the fact that the
Information Security Group will use its expertise to estimate probabilities of
risks. Call out these relationships early and showcase the credentials,
experience, and shared goals of the Information Security Group and Business
Owners.
After completing the planning step, articulating roles and responsibilities,
and properly setting expectations, you are ready to begin the field work steps
of the risk assessment process: facilitated data gathering and risk
prioritization. The next two sections detail these steps before moving on in
Chapter 5 to discuss the Conducting Decision Support phase.
Facilitated Data Gathering
The overview section of this chapter provides an introduction to the risk
assessment process, covering the three primary steps: planning, facilitated data
gathering, and risk prioritization. After you complete the planning activities,
next you will gather risk data from stakeholders across the organization. You
use this information to help identify and ultimately prioritize risks.
This section is organized into three parts. The first describes the data
gathering process in detail and focuses on success factors when gathering risk
information. The second part explains the detailed steps of gathering risk data
through facilitated meetings with technical and non – technical stakeholders.
The third part describes the steps to consolidate this compilation of data into
a collection of impact statements as described in Chapter 3. To conclude the
risk assessment process, this list of impact statements provides the inputs into
the prioritization process detailed in the following section.
Data Gathering Keys to Success
You may question the benefit of asking people with no professional experience
in security detailed questions about risks related to information technology.
Experience conducting risk assessments in Microsoft IT shows that there is
tremendous value in asking both technical and non – technical stakeholders for
their thoughts regarding risks to organizational assets that they manage.
Information security professionals must also gain detailed knowledge of
stakeholder concerns to translate information about their environments into
prioritized risks. Meeting collaboratively with stakeholders helps them to
understand risk in terms that they can comprehend and value. Furthermore,
stakeholders either control or influence IT spending. If they do not understand
the potential impacts to the organization, the process of allocating resources
is much more difficult. Business Owners also drive company culture and influence
user behavior. This alone can be a powerful tool when managing risk.
When risks are discovered, the Information Security Group requires
stakeholder support in terms of allocating resources and building consensus
around risk definition and prioritization. Some Information Security Groups
without a proactive risk management program may rely on fear to motivate the
organization. This is a short term strategy at best. The Information Security
Group must learn to seek the support of the organization if the risk management
program is to be sustained over time. The first step to build this support is
meeting face-to-face with stakeholders.
Building Support
Business Owners have explicit roles in the risk assessment process. They are
responsible for identifying their organizational assets and estimating the costs
of potential impacts to those assets. By formalizing this responsibility, the
Information Security Group and Business Owners share equally in the success of
managing risk. Most information security professionals and non – technical
stakeholders do not realize this connection automatically. As the risk
management experts, information security professionals must take the initiative
to bridge knowledge gaps during risk discussions. As mentioned in the previous
chapter, enlisting an executive sponsor who understands the organization makes
building this relationship much easier.
Discussing vs. Interrogating
Many security risk management methods require the Information Security Group
to ask stakeholders explicit questions and catalog their responses. Examples of
this type of questioning are, "Can you please describe your policies to ensure
proper segmentation of duties?", and "What is your process for reviewing
policies and procedures?" Be aware of the tone and direction of the meeting. A
good rule to remember is to focus on open ended questions to help facilitate two
way discussions. This also allows stakeholders to communicate the true spirit of
answers versus simply telling the Risk Assessment Facilitator what they think he
or she wants to hear. The intent of the risk discussion is to understand the
organization and its surrounding security risks; it is not to conduct an audit
of documented policy. Although non – technical stakeholder input is valuable, it
is usually not comprehensive. The Security Risk Management Team — independent of
the Business Owner — still needs to research, investigate, and consider all
risks for each asset.
Building Goodwill
Information security is a difficult business function because the exercise of
reducing risk is often viewed as reducing usability or employee productivity.
Use the facilitated discussions as a tool to build an alliance with
stakeholders. Legislation, privacy concerns, pressure from competitors, and
increased consumer awareness have led executives and Business Decision Makers (BDMs)
to recognize that security is a highly important business component. Help
stakeholders understand the importance of managing risk and their roles within
the larger program. Sometimes relationship building between the Information
Security Group and stakeholders is more productive than the actual data
collected during the meeting. This is still a small but important victory in the
larger risk management effort.
|
Call Now : 800-519-
2267
Testimonials
|
If you're serious about getting certified,
this is the place to go. Definitely worth
their competitive price. Excellent
instructors, making it possible for anyone
to learn no matter what your level of
experience or knowledge.
Michael Doty
|
|
|
|
|
|
MCITP Boot Camp
,
MCSE Boot camp,
CCNA Boot Camp,
Upgrade to MCITP Boot
camp,
MCITP Enterprise admin
Certification
Boot camp Training.
All
rights reserved. ©1998 - 2015, Vibrant Worldwide Inc.
MCITP Boot camp
UK
MCITP Camp
Thailand
MCITP
RHCE Boot Camp India
MCSE Boot Camp - Proven Boot camp for MCSE at Baltimore, Maryland
MCITP, MCSE, CCNA, Certification n training guide, how mcse mcitp
ccna boot camp works
MCSE Boot Camp Proven MCSE Boot camp Training for MCSE
Certification Fast
MCSE Boot Camp Card Payment by Paypal
CCNA 801 Boot Camp by Vibrant boot camps, join MCSE camps
CCNA Boot Camp by Vibrant boot camps, join MCSE camps
CCNP Boot Camp by Vibrant boot camps, join CCNP camps
MCSE MCITP CCNA Boot Camp Card Payment by Paypal
MCSE MCITP Boot Camp location
comaprision between USA, UK, India and Thailand
MCSE Boot Camp compare Vibrant boot camps with other boot camp
provider
Comptia Security+ Boot Camp by Vibrant boot camps, join MCSE
camps
MCSE Boot Camp contact Vibrant boot camps
MCSE Boot Camp course fees Vibrant boot camps, join MCSE camps
MCSE Boot Camp FAQ by Vibrant boot camps, join MCSE camps
MCSE Boot Camp provide your Feedback here
MCSE CCNA CCNP Boot Camp inquire we call back
MCSE Boot Camp location San Francisco and Baltimore
MCITP Boot Camp MCITP 14days
all_incl MCITP Certifiation boot camp
MCITP Boot Camp MCITP Benefits
MCITP Certifiation boot camp
MCITP Boot Camp MCITP curriculum
MCITP Certifiation boot camp
MCITP Boot Camp MCITP bootcamp
details MCITP Certifiation camp
MCITP Boot Camp MCITP exam detail
MCITP Certifiation boot camp
MCSE Boot Camp MCSE Certification Camp also MCSE Training Boot
Camp
MCSE Benefits join MCSE Boot Camp by Vibrant boot camps
MCSE Curriculum join MCSE Boot Camp
MCSE Exam Detials join MCSE Boot Camp
MCSE boot camp details, join MCSE camps
MCSE MCITP Boot Camp MCSE MCITP 18days 8 Certifiation boot camp
MCSE MCITP combo Boot Camp MCITP
MCSE Benefits MCITP Certifiation boot camp
MCITP MCSE Boot Camp MCITP
curriculum MCITP Certifiation boot camp
MCSE MCITP Boot Camp MCITP MCSE
bootcamp details MCITP Certifiation camp
MCSE MCITP Boot Camp MCITP MCSE
exam detail MCITP Certifiation boot camp
MCSE MCITP CCNA Boot Camp MCSE
MCITP CCNA 23days 9 Certifiation boot camp
MCSE Security Boot Camp MCSE
14days all_incl MCSE Certifiation boot camp
MCSE Security certification benefits join boot camp now
MCSE Security Boot Camp Curriculum join MCSE camps
MCSE Security Exam Detail join MCSE boot camps
MCSE Security Boot Camp Details for MCSE Certification
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
MCITP Boot Camp, CCNA Boot Camp
reason to join Vibrant boot camp
MCSE Boot Camp Refunds
MCSE CCNA CCNP Boot Camp Register. Join MCSE CCNA Boot Camp today
MCSE CCNA CCNP thailand bangkok Boot Camp Register. Join Thailand
MCSE CCNA Boot Camp today
MCSE Schedule CCNA Scedule CCNP Boot Camp Schedule
MCITP Boot Camp, MCSE Boot camp, CCNA Boot Camp, Special offer
Vibrant boot camp
MCSE Boot Camp Testimonials by Vibrant boot camps
MCSE Boot Camp location San Francisco and Baltimore
Virbant Boot Camp thank You Trasaction successfull
MCSE Boot Camp upgrade win2008 mcse camps
Microsoft Vista Certification Boot
Camp for Vista training boot camps
MCSE Boot Camp location San Francisco and Baltimore
bootcamp_schedule.php
cardpay.php
CCNA-boot-camp.php
certification-courses.php
certified-ethical-hacker-ceh-certified-EC-council.php
cisco-certification-courses.php
comptia_a+_bootcamp_course.php
comptia_a+_network+_boot_camp.php
comptia-certification-courses.php
compTia-network+.php
compTia-security+.php
contact_us.php
course_fees.php
course_template.php
faq_camp.php
guarantee.php
how-boot-camp-works.php
index.php
join-vibrant-as-trainer.php
locations.php
mcsa_server_2012_r2_boot_camp.php
mcsa-windows-server-2016-training-certification-boot-camp.php
mcse-cloud-platform-infrastructure-azure-track.php
mcse-cloud-platform-infrastructure-security-with-mcsa-windows-server-2016-training-certification-boot-camp.php
mcse-cloud-platform-infrastructure-with-mcsa-windows-server-2012-R2-training-certification-boot-camp.php
mcse-productivity-exchange-server-2016.php
microsoft-certification-courses.php
microsoft-mcse-messaging-certification-training-course.php
msca-windows-2016-upgrade.php
msce-windows-2008-to-2016-upgrade.php
msce-windows-2016-upgrade.php
mta-it-infrastructure-windows-server-training-certification.php
onsite-training.php
our-clients.php
photogallery.php
reason_to_join_vibrant_boot_camp.php
recaptchalib.php
refund.php
register.php