Comparison of Risk Analysis Methodologies



Similar documents
Comparison of Risk Analysis Methodologies in an Electrical Grid. Svana Helen Björnsdóttir STAMP Workshop in Amsterdam October 4-6, 2015

Risk Management Studio:

IA Metrics Why And How To Measure Goodness Of Information Assurance

Competency Unit: Exemplar Global SCY Security Management Systems Auditing

-Blue Print- The Quality Approach towards IT Service Management

A Risk Management Standard

Linking Risk Management to Business Strategy, Processes, Operations and Reporting

Table of Contents. 1. Organisation and Management (5 ECTS) 1.1. Management

BUSINESS CONTINUITY PLANNING

Client information note Assessment process Management systems service outline

Infrastructure Asset Management Report

Jonathan Wilson. Sector Manager (Health & Safety)

DOCTOR OF PHILOSOPHY DEGREE. Educational Leadership Doctor of Philosophy Degree Major Course Requirements. EDU721 (3.

EASPI EASPI. The Integrated CMMI-based Improvement Framework for Test and Evaluation. Jeffrey L. Dutton Principal Consultant

ISO 27001: Information Security and the Road to Certification

Quality Management System ( QMS ) Kinyun Australia Pty Ltd

Key Trends, Issues and Best Practices in Compliance 2014

ENTERPRISE RISK MANAGEMENT FRAMEWORK

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices

Audit of the Test of Design of Entity-Level Controls

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview

Bureau of Standards Jamaica Quarterly Training Schedule July - September 2015

VENDOR PREQUALIFICATION QUESTIONNAIRE

POL ENTERPRISE RISK MANAGEMENT SC51. Executive Services Department BUSINESS UNIT: Executive Support Services SERVICE UNIT:

Analyzing Risks in Healthcare. February 12, 2014

Benefits of an Integrated Management System for SME s

Global framework. Safety, health and security for work-related international travel and assignments

BS BUSINESS CONTINUITY MANAGEMENT

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, PARIS

IT Service Desk Health Check & Action Plan

LET S RENEW WWF dismantles the myths of renewable energies in Spain

Business Continuity Management Framework

RISK MANAGEMENT FOR INFRASTRUCTURE

The following paragraphs, identified to coincide with the OHSAS 18001:2007 numbering system, provide a clause-by-clause summary of the standard.

FSSC Q. Certification module for food quality in compliance with ISO 9001:2008. Quality module REQUIREMENTS

PMI Risk Management Professional (PMI-RMP) Exam Content Outline

How To Understand And Implement Pas 55

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

Introducing the Responsible Down Standard Media Kit

Controlling Leadership Talent Risk: An Enterprise Imperative. By Seymour Adler, Senior Vice President and Amy Mills, Vice President

CABLE COMMUNICATIONS POLICY ACT OF as amended by the CABLE TELEVISION CONSUMER PROTECTION AND COMPETITION ACT OF 1992

Audit Report AS/NZS ISO 9001:2008. RRW and Co Pty Ltd trading as National On Site Training

Clinical Risk Management: Agile Development Implementation Guidance

pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS

Correspondence between ISO 9001:2008 and 14001:2004, OHSAS 18001:2007, ISM and the SeaBird Management System

The ITIL Story White Paper

BCS Certificate in Business Analysis Extended Syllabus. Version 2.4 March 2015

Innovation in Work Health and Safety Solutions

Policy : Enterprise Risk Management Policy

Project Risk Management

Business Improvement Solutions

Performance Management in relation to Fire Safety

Health, safety, environmental, quality & risk management software that moulds to your needs...

Role of Software Quality Assurance in Capability Maturity Model Integration

The ITIL Story. Pink Elephant. The contents of this document are protected by copyright and cannot be reproduced in any manner.

Integrated Management System Software

How are companies currently changing their facilities management delivery model...?

Motivation and Efficiency of Quality Management Systems Implementation: a Study of Lithuanian Organizations

Appendix 3 (normative) High level structure, identical core text, common terms and core definitions

COMBINE. Part B. Manual for Marine Monitoring in the. Programme of HELCOM. General guidelines on quality assurance for monitoring in the Baltic Sea

HKCAS Supplementary Criteria No. 8

Holistic Development of Knowledge Management with KMMM

CBEST FAQ February 2015

Enterprise Security Risk Assessments What are we trying to protect and why?

1 Past AOL reports and reviews are available at

Enterprise Risk Management: Concepts & Issues

The Asset Management Landscape

Cyber Security Incident Response High-level Maturity Assessment Tool

Pursuant to Convention No. 108 of the Council of Europe for the protection of persons with regard to the automated processing of personal data;

Information Security Risk Management

Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504

Improving Residual Risk Management Through the Use of Security Metrics

For Articulation Purpose Only.

Evaluation: Designs and Approaches

EPIDEMIOLOGIST SPECIALIST

ISO Laboratory Quality Management. ISO Course Descriptions.

Environmental Management Systems. A brief introduction to the nature and benefits of ISO14001:2015

An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

Exploratory Research Design. Primary vs. Secondary data. Advantages and uses of SD

Quick Reference Guide Interactive PDF Project Management Processes for a Project

Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

Module 13. Software Reliability and Quality Management. Version 2 CSE IIT, Kharagpur

Appendix A. The Business Plan

Transcription:

Comparison of Risk Analysis Methodologies Risk Analysis for Better Design and Decision Making Svana Helen Björnsdóttir STAMP Workshop MIT, March 23-26, 2015

Purpose of Research To study risk analysis methodologies in different fields and examine their effectiveness, compare them, and to seek a general risk analysis methodology that can be used in many different disciplines for integrating security into systems design. Investigate whether the new STAMP causality model can be used as a basis for a general risk analysis methodology. S.H.Bjornsdottir Stiki/Reykjavik University 2

A Typical Risk Management Process Based on ISO 31000 S.H.Bjornsdottir Stiki/Reykjavik University 3

Aim of Research To evaluate and compare different methodologies for risk analysis as an important phase for embedding safety, security and reliability into system design. To examine the effectiveness of risk analysis in various businesses and operations from a holistic system-based approach in order to find absolute methodology for different tasks. S.H.Bjornsdottir Stiki/Reykjavik University 4

Research Questions 1. What are the similarities and what are the differences in the methodologies used in the case studies conducted? 2. To what extent is it possible to formulate a general risk analysis methodology that can be used in many different disciplines? 3. Can a system based risk analysis model be made and successfully applied? S.H.Bjornsdottir Stiki/Reykjavik University 5

Hypothesis It is possible to formulate a general risk analysis methodology that can, to a certain extent, be used in many different disciplines. S.H.Bjornsdottir Stiki/Reykjavik University 6

Research Methodology Both quantitative and qualitative research methods In order to approach the first research question six case studies have been performed in different fields: 1. Pension Fund 2. Electrical Grid 3. Power Company 4. Prosthetics Manufacturer 5. Blood Bank 6. Software Company S.H.Bjornsdottir Stiki/Reykjavik University 7

Pension Fund All employees and self-employed persons in Iceland must be members of an approved pension fund. The minimum contribution to the pension fund is 12% of total earnings. Employer pays 8% and employee pays 4%. In 2013 the assets of the Icelandic pension funds were approximately 150% of GDP in Iceland. The main risk Pension Funds are facing is not being able to pay their future pension obligations. S.H.Bjornsdottir Stiki/Reykjavik University 8

Electrical Grid The Electrical Grid s role is to operate the electricity transmission system and administer its system operations. The E-Grid operates under a concession arrangement. All the company s activities are subject to regulation by the National Energy Authority, which determines the revenue framework on which the energy tariff is based. The risk E-Grid faces is not being able to deliver electricity to users. S.H.Bjornsdottir Stiki/Reykjavik University 9

Electrical Grid Iceland Electrical Grid Landsnet S.H.Bjornsdottir Stiki/Reykjavik University 10

Power Company The Power Company operates 15 power stations. Emphasis is placed on a holistic vision, where prudence, reliability and harmony of the operations with the environment and society are the guiding principles. One of the largest producers of renewable energy in Europe. Case Study: Latest Hydropower Station, 2014. Risk of life losses during project. S.H.Bjornsdottir Stiki/Reykjavik University 11

Prosthetics Manufacturer Company has wide-ranging expertise in the development, production, and sale of non-invasive orthopedics. Smart knee adapts automatically to individual moving styles and improves its response over time. Must be fast enough to respond to all life s little hurdles. One of the risk is life threatening situations for users in case of failure. Risk analysis is vital for product development. S.H.Bjornsdottir Stiki/Reykjavik University 12

Blood Bank The Blood Bank is an independent business unit of a University Hospital. Its services are designed to ensure an adequate amount of blood products at any time and meet the requirements of security and safety. The Blood Bank performs testing and monitoring to ensure consistency between the components administered and blood recipients. Research for diseases of immunological origin. Risk of blood infection and wrong blood transfusion. S.H.Bjornsdottir Stiki/Reykjavik University 13

Software Company The Software Company develops software solutions, provides IT consulting and hosts sensitive information systems for customers. Two types of software solutions, to manage risk and to assess quality of health services. Much emphasis is put on R&D and collaborative innovation with universities and partners. Customers world wide. Risk of software bugs and service failures. S.H.Bjornsdottir Stiki/Reykjavik University 14

Written Contracts Separate meetings with all parties. Written contracts made. Compliance with requirements of ISO/IEC 27001. Questionnaire with 49 questions for gathering basic information (quantitative). S.H.Bjornsdottir Stiki/Reykjavik University 15

Questionnaire RESULTS AND ANSWERS FROM QUESTIONNAIRE - BASIC INFORMATION Q# QUESTIONS 1. GENERAL Date of answers returned 1.1. Name of the person 1.2. Name of company 1.3. Year founded 1.4. Listed 1.5. Business category (ÍSAT 95) 1.6. Number of employees 1.7.1. Turnover 2012 - m.kr. 1.7.2. Turnover 2013 - m.kr. 1.8.1. Number of branches/offices in Iceland 1.8.2. Number of branches/offices abroad 1.9. Export - international business 2. COMPLIANCE 2.1. Most relevant laws and regulations 3. INSURANCE 3.1. Need for insurance 3.2. Types of insurance 3.3. Risk not covered S.H.Bjornsdottir by insurance Stiki/Reykjavik University 16

Questionnaire 4. SAFETY AND SEQURITY 4.1.1. Security / quality policy 4.1.2. Documented policies, doc. ref. 4.1.3. Ref. to law/regulation in policy documents 4.2.1. Other policy documents 4.2.2. Relevant law and regulations 4.3. DOCUMENTED PROCEDURES AND PROCESSES 4.3.1. Risk analysis 4.3.2. Risk assessment 4.3.3. Risk management 4.3.4. Internal control 4.3.5. Audits (internal- external?) 4.3.6. Review 5. CERTIFICATION 5.1. All business certified 5.1.1. If yes - by an accredited certification body 5.1.1.1. If yes - name of certification body 5.1.2. Parts of business certified 5.1.2.1 If yes - which parts 5.1.2.2 S.H.Bjornsdottir Stiki/Reykjavik University If yes - which certification body (accredited) 17

Questionnaire 6. METHODOLOGY OF RISK ANALYSIS 6.1. Formal methodology used 6.2. Use of special software solution for Risk analysis 6.3. Standards, regulations and requrements used 6.4. Tangible assets registered 6.5. Intangible assets registered 6.6. Threats idnetified 6.7. Consequence of risk assessed 6.8. Probability of risk assessed 6.9. Risk assessed or calculated 6.10. Residual risk assessed 6.11. Risk criteria set 7. RISK TREATMENT 7.1. Risk Info used for improvements - somone resp. 7.2. Systematic Risk mitigation with controls 7.3. Risk calculation after selcting controls - effectiveness of controls assessed 7.4. Asessment on effectiveness and usefulness of risk analysis i.t.o. Cost 7.5. Result of risk assessment documented 7.6. Result of risk assessment used to learn from it S.H.Bjornsdottir Stiki/Reykjavik University 18

Interviews All participants formally interviewed. Interviews recorded and meeting minutes written afterwards to ensure traceability. Many documents have been received, including policy documents, quality manuals, written processes and procedures, results from risk assessments, annual reports, etc. S.H.Bjornsdottir Stiki/Reykjavik University 19

Results In General Very different businesses great diversity in business operation. Good knowledge of all relevant laws and regulation also in different countries when matters. Genuine interest in risk analysis and risk management confirmed in all cases as a way to better performance. S.H.Bjornsdottir Stiki/Reykjavik University 20

Results Risk Management Use of ISO management standards together with other relevant standards. Management system is in place at all participants some better functioning than others and some also more mature than others. All except one are certified. Reporting of hazards, incidents and nonconformities is important for seeking root cause. S.H.Bjornsdottir Stiki/Reykjavik University 21

Results Risk Management Written processes and procedures for risk management. Although use of standards and certification provides support in business, this also becomes burden. Governmental authorities lack knowledge and understanding. More difficult to keep focus. S.H.Bjornsdottir Stiki/Reykjavik University 22

Results Risk Analysis Formal methodology for risk analysis is used in most cases. Not always written and not being followed very exactly. Tactics based bottom-up approach. Little awareness of residual risk. Expectation of active risk analysis to achieve better business results and more favorable business environment. S.H.Bjornsdottir Stiki/Reykjavik University 23

Results Risk Analysis Good knowledge of risk treatment and selecting controls to mitigate risk. Little awareness of risk criteria. Lack of help and support, both from internal and external sources. S.H.Bjornsdottir Stiki/Reykjavik University 24

Back to Hypothesis The hypothesis: It s possible to develop one general methodology for risk analysis that can be applied in every field. Many similarities despite different businesses and great diversity in business operation. Standards do not provide much help in risk analysis methodologies therefore company own approach. S.H.Bjornsdottir Stiki/Reykjavik University 25

Conclusion Tactics-based bottom-up approach used for risk analysis and risk management in all cases except one. Focus on avoiding threats and preventing failure. Reverse the process start at the highest level. Apply STPA and STPA-Sec. S.H.Bjornsdottir Stiki/Reykjavik University 26