Risk
3/28/2013
02:13 PM
50%
50%

5 Steps To Strengthen Information Risk Profiles

Make sure you include the right employees and business processes when developing risk management strategy.

3. You Need The Right People In The Room.

Establishing a risk profile that the business embraces requires involving the right people. Pironti recommended involving business process owners or "data owners." Ultimately, senior leadership will need to buy in as well. If you're unsure of whom the business process owners are in your organization, identify the people with profit-and-loss (P&L) responsibility. In other words: Whose bottom line gets hit if there's an information-related incident?

4. The Goal Is Not To Include Everything.

For businesses with finite resources -- and that's most of them -- trying to account for every shred of data that passes through the organization is not only inadvisable, it's a fast track to failure. Don't forget that the whole point of building an information risk profile is to prioritize based on your company's data and its relative importance for revenue, compliance and other factors.

"Look for the key business processes, the ones that are considered essentially important to the operations or health and safety of the organization," Pironti said. "It wouldn't be realistic to say that we should look at every detail and every thing."

Pironti applies the concept of "due care" here, which asks: Did you do what could be reasonably expected of you to protect your data? "That's your bare minimum starting point, and then you work upwards," Pironti said. "If there were a situation, we can [then] feel comfortable that we are protecting ourselves from legal concerns, from compliance concerns, from the court of public opinion -- as well as ensuring that our business can operate in a way that makes sense for us, versus what everybody else tells us we should do."

5. Avoid Too Many Cooks.

No one wants to be told their data or business process is a lower priority than that of the person sitting two doors down. Few people in a "get ahead" culture will ever willingly admit that their areas of responsibility aren't as important from a risk management standpoint. As a result, there's bit of diplomacy required of information security pros when developing a risk profile.

Pironti offered this tip: If there's already a business continuity or disaster recovery plan in place, start there -- a good one should have, in effect, already "ranked" the company's data priorities, which can help smooth out any ruffled feathers.

"A lot of organizations have already gone through that process, versus doing a real risk profile," Pironti said. "It's an easy starting point."

InformationWeek is conducting a survey on security and risk management. Take the InformationWeek 2013 Strategic Security Survey today. Survey ends March 29.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.