This report aims to prepare a risk register for a bank to identify different risks and evaluate the role of a Chief Information Security Officer. It includes the identification of risks, risk assessment matrix, impact of the risks, and recommendations on the appointment of a CISO.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
P a g e|0 Risk Management
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P a g e|1 Executive Summary The aim of this report is to prepare a risk register for a bank to identify different risks which affect the operations of the banks. The first part of this report used a Risk Assessment Matrix in order to identify and prioritise different risks along with an evaluation of policies which can be adopted by the bank to mitigate these risks. In the second part of this report, of the role of a Chief Information Security Officer is evaluated and recommendations are given to for the appointmentof a Chief Information Security Officer in an organisation.
P a g e|2 Table of Contents Part One.....................................................................................................................................3 Identification of Risks.............................................................................................................3 Risk Assessment Matrix..........................................................................................................3 Impact of the Risks.................................................................................................................4 Part Two.....................................................................................................................................6 Recommendations on the Appointment of a CISO................................................................6 References..................................................................................................................................9
P a g e|3 Part One Identification of Risks DateRisk NameRisk Description 13/05/1 9 Unencrypted dataBanks collect confidential data from their customers, and such data is shared with its branches on a global stage due to which unencrypted data increases the risks ofadatabreachofcustomersofthebank.Data encryptionprocessresultedinconvertingthe informationintosecrettextwhichcanonlybe interpreted by the person who has the secret key (Abomhara, 2015). This system protects the data in the transmission process to make sure that cyber criminals are not able to understand the data even if they access the same. 13/05/1 9 MalwareThe malware is referred to any type of software that is intentionally designed in order to cause harm to the computer,server,computernetworkortheclient. Cyber criminals use malware to attack the database systems of Australian banks to make sure that they are able to stop their operations and gain unauthorised access to their private data (Seo, Gupta, Sallam, Bertino & Yim, 2014). 13/05/1 9 Insider ThreatAn insider threat is defined as a security threat which is faced by an organisation that comes from the people of the organisation such as former or current employees, business partners, contractors and others. As per the study of IBM (2019), 60 per cent of all cyber attacks is a result of insider threat. In banking corporation, the insider threat becomes a major issue because current or former employees can leak the confidential data about the customers or the company to cyber criminals which could harm their interest.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P a g e|4 Risk Assessment Matrix Figure1: ANSI B11.0.TR3 Risk Assessment Matrix (Source: Certifico, 2017) Impact of the Risks ImpactLikelihoodImpact Unencrypted data can be easily collected and hacked because it is vulnerable during transmission. It could result in leaking sensitive information of the customers along with details regarding their financial condition (Abomhara, 2015). LikelySerious Malware resulted in stopping the operations of the bankingcorporations,andtheyarelikelytoface challenges in relation to continuing with their operations (Johnson,2016).Cybercriminals’gainsunauthorised access to the database and information system of the company through which they can collect the private data of users and misuse the information to gain an unfair advantage. LikelySerious Itisdifficulttospotinsiderthreatattacksinthe organisation, and these attacks are more dangerous than other cyber attacks. The impact of these threats resulted increatingdifficultiesfortheorganisationsinceit negatively affects its brand reputation and it also affects the interest of the clients of the banks (Jang-Jaccard & Nepal, 2014). Very LikelyCatastrophic Controls to mitigate risks Controls to mitigate risksLikelihood 2Impact 2Due DateCompletio n Date Thebanksshouldrelyon cryptography to create a private key after encrypting its data to Very LikelySerious01/06/19Ongoing
P a g e|5 make sure that it is protected fromunauthorisedassess.The corporationshouldmakeit mandatory for all the information to be encrypted in its database system (Abomhara, 2015). The bank should focus on using firewallsandlimitedaccessto make sure that malware did not enter into its systems. They can also rely on antiviruses to identify uneventrafficandunwanted signal to protect themselves from malware.Robusttechnology should be used to make sure that employees did not clink of emails which contains malware. LikelySerious01/06/1930/06/19 Thebankshouldimplement physical security policies to make sure that the computer system and database is protected from unauthorisedaccessof employees. They should not be allowed to bring their personal gadgets such as smartphones or storagedevicesneartheir computersystems.Surveillance system should be used to identify employees that engage in insider threatactivities(Sokolowski, Banks & Dover, 2016). Very likelyCatastrophic01/06/1930/06/19
P a g e|6 Part Two Recommendations on the Appointment of a CISO A Chief Information Security Officer (CISO) is referred to a senior-level executive in a company who is responsible for a number of crucial activities. The CISO is responsible for establishing and maintaining the vision, strategy and program in the organisation to make sure that information assets and technologies of the enterprise are adequately protected. The CISO focuses on identifying, developing, implementing and maintaining a number of processesintheorganisationtomakesurethatrisksassociatedwithinformation technology (IT) are addressed in a timely manner (Dor & Elovici, 2016). Through these policies, it becomes easier for the enterprise to make sure that adequate standards and policies are implemented to manage security technologies and protect the sensitive data of the enterprise. Since there are many major responsibilities which are necessary to be taken into consideration by the CISO, the following are the key factors which should be taking into consideration while appointing the CISO in the organisation. 1.Defining the requirements While hiring the CISO in the organisation, the CIO should focus on defining the needs of the company which leads to increasing the importance of hiring the CISO in the first place. Thecompanyshouldassesthekeyfactorswhicharenecessarytobetakeninto consideration that resulted in increasing the requirements of the appointment of a CISO. In this regards, the company can focus on conducting a risk analysis to find out the key IT risks faced by them. The risk analysis will assist the organisation in highlighting why the company should hire the CISO in the first place. 2.Qualification and experience The candidates who apply for the job of the CISO should be evaluated by the company based on their qualifications and experience. The skill level of the candidates should be judged by the company through a test and an interview in which their qualification should be analysed as well. The company should also ensure that it hires an experienced CISO who has enough information about these areas and who is familiar with these policies (Alexander
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P a g e|7 & Cummings, 2016). A candidate who is not qualified for the job and who did not have adequate experience in this field should not be selected by the company in the recruitment process. 3.Behaviour requirements Along with skill and education requirements, it is important that the candidate who is selected for the post of the CISO should pass the behaviour requirements test. It means that the person should have a friendly behaviour and who is a good leader. The CISO should listen to his/her subordinations while taking decisions regarding the security measures in the organisation (Karanja & Rosso, 2017). The CISO should also be able to work along with others to make sure that they are able to implement policies which allow them to tackle IT- related risks in the organisation. The CISO is required to work with low-level employees along with the senior level executives by giving recommendations to them. These policies should be taken into consideration by the parties while hiring the CISO for the organisation. 4.Communication skills The candidate who is selected for the post of the CISO should be fluent in speaking with his/her subordinates, and he/she should have adequate communication skills. The CISO has to work along with the senior level executives and members of the board to make sure that they have the ability to translate the complex level of IT related issues to them so that they are able to understand them (Alexander & Cummings, 2016). They should be able to communicate their experience and ideas with the top level management which allow them to make effective decisions regarding the IT securities policies in the organisation. 5.Credibility and leadership ability The CISO should have gathered credibility by carrying out the responsibilities in the field of security, compliances and risks. The CISO should be able to demonstrate his/her ability to assess and address the key IT related issues in the workplace which allow them to move forward and sustain the growth of the enterprise. Since the CISO is responsible for managing other low-level employees in the IT department, he/she must have adequate leadership skills (Dor & Elovici, 2016). They should be able to understand the issues faced by the
P a g e|8 subordinates in the IT department, and they should formulate policies which allow them to address these issues through their effective leadership skills.
P a g e|9 References Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks.Journal of Cyber Security and Mobility,4(1), 65-88. Dor, D., & Elovici, Y. (2016). A model of the information security investment decision-making process.Computers & security,63, 1-13. IBM.(2019).InsiderThreatDetection.Retrievedfrom https://www.ibm.com/security/security-intelligence/qradar/insider-threat Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity.Journal of Computer and System Sciences,80(5), 973-993. Johnson, A. L. (2016). Cybersecurity for financial institutions: the integral role of information sharing in cyber attack mitigation.NC Banking Inst.,20, 277. Karanja, E., & Rosso, M. A. (2017). The chief information security officer: An exploratory study.Journal of International Technology and Information Management,26(2), 23- 47. Seo, S. H., Gupta, A., Sallam, A. M., Bertino, E., & Yim, K. (2014). Detecting mobile malware threatstohomelandsecuritythroughstaticanalysis.JournalofNetworkand Computer Applications,38, 43-53. Sokolowski, J. A., Banks, C. M., & Dover, T. J. (2016). An agent-based approach to modeling insider threat.Computational and Mathematical Organization Theory,22(3), 273- 287.