Gestion des risques

Nos spécialistes expérimentés en matière de sécurité vous aident à identifier, hiérarchiser et gérer les risques pour vos systèmes, processus, réseaux ou informations.

En gérant vos risques de manière organisée et standardisée, vous pouvez à la fois minimiser les risques de divers incidents, mais aussi minimiser en amont les conséquences potentielles, et être prêt à faire face aux situations inopinées et non désirées qui peuvent survenir.

Service description

The service includes a set of workshops to identify and classify assets, identify and describe threats and vulnerabilities, document the associated risks, and identify and plan measures to mitigate both risk and consequence.

Our experienced cybersecurity consultants can act in different roles for these workshops, to lead or support the process in all steps to the extent required, to ensure that your risk management is adequate.

You can choose to use your own models, risk scales, security level definitions and prioritization systems, or let us help you develop suitable ones, based on industry standards and what suits your particular organization.

General Method

Threats arise continuously, and risk management must therefore be an iterative work, whose methods and results are carefully documented. In general, risks are managed in three steps (which in turn are often broken down into sub-steps):

  • Risk analysis

  • Action planning

  • Decisions and documentation

All steps can and should be carried out as group workshops. It is of great importance for efficiency that these groups include the right people. The group must include individuals with technical and organizational knowledge of the object in question, but at the same time it must be taken into account that a smaller group is often significantly more time-efficient. Too small a group of participants runs the risk of lacking relevant skills or knowledge, and limiting the opportunity for valuable discussion. An excessively large group instead risks leading to a very inefficient assessment process, in which the opinions and views of too many individuals must be taken into account.

Definitions:

  • Threat / Risk - An event with a negative impact (if it occurs)

  • Probability - The probability that a threat is realized

  • Consequence - Result of a realized threat

  • Risk value - A value added to a risk, to enable prioritization

  • Object / Review object - The system, process or amount of information the risks in question concern

Risk assessment

During the risk assessment, risks must be identified and assessed. This involves formally noting the risks and threats that can be observed against the system, assessing their consequences and the probability that they will occur, and then prioritizing them using a calculated risk value. Risk value R = P*C is often used where P & C is the assessed probability and consequence, normally on a scale of 1–4 or 1–5.

It is of great importance that the scale is well defined and understood by all participants, and that it is in consistent between the risk assessment of different objects. The scale should always be anchored in the business as a whole, rather than the system or process being analyzed. A risk that is catastrophic for a specific system does not have to be catastrophic for the business as a whole.

Action Planning, Decisions & Documentation

The management of risks consists of the identification of safety measures that can be implemented to either prevent the occurrence of the risk, or minimize the consequences thereof. Each identified risk can be expected to have several potential actions, with different expected effects, and different expected costs.

An assessment must be made of the cost of the measures against the value of the reduced probability or consequence of the risk.

All decisions must be justified and documented, in particular risks that are not addressed (a so-called "accepted risks")

 Interested in our Risk Management Service?