Corus Information Security Group



Similar documents
Global Superior Energy Performance Partnership (Steel Working Group) ~From APP to GSEP~

Digital Empowerment Foundation

Comparing the UNC System Business Continuity Programs Against Other Universities Both Private and Public BUSINESS CONTINUITY QUESTIONNAIRE

Credit insurance supports companies profitable growth

Industry Report Photonics 2013 Common Market Analysis

Please note that this presentation is given to you for information only. This document remains property of Randstad and should never be used or

Market comparison: sales and distribution of travel insurance and the growth of bancassurance

East Lancashire Chamber of Commerce International Trade Club - 20 July 2010

Governance, Risk and Compliance Assessment

Purchasing Managers Index (PMI ) series are monthly economic surveys of carefully selected companies compiled by Markit.

Plastics Converting in Europe

A complete Information Risk Management solution for ISF Members using IRAM and STREAM

Monthly Mobile Games Data

Steel Industry Executive Summary: July 2016

Handling Online Reviews: Best Practices

Cyber Security - What Would a Breach Really Mean for your Business?

SAS CLOUD ANALYTICS MAY 2015

Information Security and Risk Management

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution

The Elefants a Selection of some very special Top Indian Companies and their Backgrounds

MDEP Generic Common Position No DICWG 02

STATISTICS FOR THE FURNITURE INDUSTRY AND TRADE

IT OUTSOURCING STUDY EUROPE 2015/2016 MANAGEMENT SUMMARY

Economic and Market Outlook. EU Automobile Industry

BEFESA BEFESA. Overview of the company

Deloitte Millennial Innovation survey

Compensation Reports: Eight Standards Every Nonprofit Should Know Before Selecting A Survey

UK Television Exports FY 2014/2015

International Purchasing Office (IPO) and Global Sourcing. Marco Sartor University of Udine

Cargo Flows & Hot Spots

VMware Cloud Adoption Study

Quantum View SM Manage Administration Guide

Global Disaster Recovery Market Insights, Opportunity Analysis, Market Shares and Forecast

January 2013 Summary of global findings. Millennial Innovation survey

2010 Expatriate, Returnee and China Hired Foreigner, Compensation and Benefits Survey

2016 Edenred-Ipsos Barometer Understand and improve Wellbeing At Work. May 2016

INCREASING THE VALUE of portfolio companies by improving their operational performance

Overview TECHIS Carry out security testing activities

The Global Outlook for Aluminium in Transportation

Apollo and ThyssenKrupp create. ThyssenKrupp Aerospace. ThyssenKrupp Aerospace

FUTURE DEVELOPMENTS IN STRATEGIC COMMUNICATION

Twelve compelling reasons why you should choose MCS and our hire management solutions

WP9 D9.5 Risk Analysis and Countermeasures

Academic Ranking of World Universities And the Performance of Asia Pacific Universities

Figure 1: Global Aggregates: Industrial Production (% MoM Ann., 3M moving average)

Global Learning Management System Market Analysis - Forecast ( )

Holland Image POSitive and negative Aspects. Top 3 associations with Holland. NBTC Holland Marketing. 1. japan 47% 1. germany 56% 2.

The automotive components industry.

Graduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation

Global Online Gambling and Betting Market 2015

Fujitsu World Tour Human Centric Innovation. The Future of the Datacenter. Ayman Abouseif VP Product Marketing. 0 Copyright 2015 FUJITSU

RACK AND CONTAINER TRACKING SOLUTION

2015 Russian Nanotechnology Investment Enabling Technology Leadership Award

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Internet, Smartphone & Social Media Usage Statistics

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Global Hadoop Market (Hardware, Software, Services) applications, Geography, Haas, Global Trends,Opportunities, Segmentation and Forecast

A blueprint for an Enterprise Information Security Assurance System. Acuity Risk Management LLP

DOMINION GLOBALIZATION WORKSHOP

CASE STUDY. Automotive Components. Bosch Drancy, France Brake NVH Testing. Braking Systems. France. Automotive. PULSE, Transducers

Information Technology Security Review April 16, 2012

The Determinants of Profitability of large Steel Companies. Laplace Conseil 2013

How does a venture capitalist appraise investment opportunities?

IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD

Cloud Based Security Services - Global Strategic Business Report

MERCER. TOTAL REMUNERATION SURVEYS 2012 A closer look at regional, industry-specific and gender pay differences in Switzerland

Western Intergovernmental Audit Forum

Integrating the Healthcare Enterprise (IHE): Enable Seamless and Secure Access to Health Information. IHE Europe Peter Mildenberger (User Co Chair)

Global Cellular Machine to Machine (M2M) modules Market ( ): Market Forecast

DRAFT BUSINESS CONTINUITY MANAGEMENT POLICY

Benchmarking Travel & Tourism Global Summary

Core Fittings C-Core and CD-Core Fittings

REGULATIONS ON OPERATIONAL RISK MANAGEMENT OF THE BUDAPEST STOCK EXCHANGE LTD.

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

[NUGENESIS SAMPLE MANAGEMENT ] AMPLE IMPROVING LAB EFFICIENCY, ANAGEMENT ACCELERATING BUSINESS DECISIONS. bigstock.com $69

Maintenance and Asset Management

Microsoft Voucher Ordering Processes

Meeting Association of the Dutch Metallurgical Industry (VNMI)

Big Gets Bigger, Smaller Gets Smaller

Global EY FIDS Forensic Data Analytics Survey 2014

Using a Managed File Transfer technology to prepare your customers for the GDPR (whatever is next)

A Guide to the European Standard for Safety Storage Cabinets (BS EN )

Transcription:

Corus Information Security Group Risk Assessment in practice Presentation at the TU-Twente (2007-05-29) Peter van Boxtel

Introduction The situation 40 years ago: Risk assessment was not an issue Only in the chemical labs, regarding explosions The first lecture had to do about explosions Students like to try it out

Introduction Development in the threats: From: Fun Challenge To: Professional use Criminal

Introduction Computer developments: In 1967 The era of computers was approaching Big legacy systems (IBM, salary, banks etc) Process control (design HSM-2, PDP) Computer threats were related to trust, fraud and physical threats To now: Modern use Networks Computer threats are a wide scope of issues, especially regarding networks and access

Company Profile Corus is an international metals group that manufactures, processes and distributes metal products and provides related services in design, technology and consultancy. Corus has manufacturing operations in many countries with major plants located in the UK, the Netherlands, Germany, France, Norway and the USA. Corus also has sales offices and service centres all over the world Corus is organised into four divisions and employs about 45,000 people Corus is part of the TATA steel division.

Company Profile Steel producers (1-10) 17,5 16,5 18,4 109,7 19,3 3,8 28,2 32 29,9 30,5 Mittal (Global) Nippon Stel (Japan) POSCO (South Korea) JFE (Japan) Tata Steel (India) SBGC (China) USS (USA) Nucor (USA) RIVA Group (Europe) ThyssenKrupp (Germany)

Company Profile Key markets Packaging Other 13% 14% 32% Construction Manufactured goods 22% 19% Automotive

Company Profile Turnover North America 14% Other 10% 27% UK 52% Rest of Europe

Company Profile Employees by Region Other: 4% USA: 2% BE: 2% FR: 3% GE: 10% UK: 54% NL: 25%

Fundamentals: Business is leading Business Impact is related to the business processes IT systems and networks are supporting business processes Security controls in balance with impact regarding the supported business processes

Information Security is about: Confidentiality Integrity Availability Of Information Information systems Networks Applications Operational processes

Steps in Risk Assessment: Business Impact assessment Continuation? Threat and vulnerability assessment Control assessment Action plan

Business Impact assessment Evaluate with a questionnaire which impact a breach in security will have regarding: Confidentiality Integrity Availability Questionnaire is based on a general document but sometimes dedicated for a special topic. If no issues are detected the assessment can be stopped and no special measures have to be taken If any security issues is detected next steps are to be performed. The results will be documented.

Threat and vulnerability assessment Evaluate with a questionnaire which threats and vulnerabilities can be detected for the process, application, system etc. regarding: Confidentiality Integrity Availability Questionnaire is based on a general document but often we make it dedicated to a special topic. Dependent on the probability of the threats the controls have to be defined. The results will be documented.

Control assessment Evaluate with a questionnaire which controls are required to mitigate the threats and vulnerabilities. Controls are selected on base of internal and external best practices, general standards (ISO 17799, ISF Standard of Good Practice) The importance of the controls is based on a weighing between the probability and the impact of possible breaches. When evaluating an existing environment the existing controls are evaluated. When evaluating a new environment the defined controls are evaluated. For the control implementation a balance will be made of the risk and the costs of implementation of the controls. The results will be documented.

When to use this (1)? ISRAC For a complete system in a design phase we use an automated tool: ISRAC for the organisation InfoSecure Tool is based on the SPRINT (ISF) structure with a BIA, TVA and a LOC The controls are based on the ISO 17799 Detailing the controls is evaluated in the process. The systems documents and reports. Some screen-prints following:

When to use this (2)? ISF Survey For periodical evaluation of the Corus Security level we participate in the ISF biannual survey This survey that follows the ISF SOGP is done for: Security Management Critical Business Applications Computer Installations Networks Systems Development End User Environment It is a benchmark with other organisations It gives a clear view of the quality of the security status and the related risks. The results are reported by ISF.

When to use this (3)? All kind of specials Evaluate the level of trust with third parties A small business Impact questionnaire A third party questionnaire about required controls for their access Evaluate the need for improvement actions in applications A small business Impact questionnaire Ranking of the urgency for repairs Evaluate the need for business continuity and Disaster recovery requirements A small business Impact questionnaire Ranking of the urgency for DRP measures

Conclusions A very practical approach Adapt the questionnaires if possible Make questionnaires not bigger the necessary: people get bored Give guidance: see if staff is completing it seriously and does not stick in details Give feedback Evaluate always in relation to the business consequences: don t start a discussion about some Euro s in the process of the mills