SlideShare a Scribd company logo
1 of 21
A new paradigm
for
risk calculation
and
visualization
FrAppSec
Framework for Application Security
https://frappsec.org
risk as a bubble
= risk appetite
Risk
=
Impact x Likelihood
Risk
=
Impact x Likelihood
x Business Factor
Risk 1 = Impact x Likelihood x Business Factor
Risk 2 = Impact x Likelihood x Business Factor
.
.
Risk n = Impact x Likelihood x Business Factor
Risk 1 = Impact x Likelihood x Business Factor
Risk 2 = Impact x Likelihood x Business Factor
.
.
Risk n = Impact x Likelihood x Business Factor
Total Risk = Σ Risk i
Risk 1 = Impact x Likelihood x Business Factor
Risk 2 = Impact x Likelihood x Business Factor
.
.
Risk n = Impact x Likelihood x Business Factor
Total Risk = Σ Risk i
Risk 1 = Impact x Likelihood x Business Factor
Risk 2 = Impact x Likelihood x Business Factor
.
.
Risk n = Impact x Likelihood x Business Factor
Total Risk = Σ Risk i
= risk appetite
Risk appetite = 30 risk points, no high risks
Risk appetite = 30 risk points, no high risks
Case 1
25
Risk appetite = 30 risk points, no high risks
Case 2
20
Risk appetite = 30 risk points, no high risks
Case 3
35
A meaningful risk visualization
A meaningful risk visualization
Sirius
Polaris
Vega
Aldebaran
Rigel
Deneb
Betelgeuse
Arcturus Canopus
Altair
Fomalhaut
Pollux
A meaningful risk visualization
Sirius
Polaris
Vega
Aldebaran
Rigel
Deneb
Betelgeuse
Arcturus Canopus
Altair
Fomalhaut
Pollux
A meaningful risk visualization
Sirius
Polaris
Vega
Aldebaran
Rigel
Deneb
Betelgeuse
Arcturus Canopus
Altair
Fomalhaut
Pollux
20182017
1. Combat risk illiteracy
2. View risk as a bubble
3. Use meaningful visualization
FrAppSec.org
@DanCVasile

More Related Content

Similar to Dan Vasile - Risk Calculation and Visualization

Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
Pankaj K Sinha
 
Risk Analysis in Occupational Health Setting
Risk Analysis in Occupational Health SettingRisk Analysis in Occupational Health Setting
Risk Analysis in Occupational Health Setting
Ahmed-Refat Refat
 
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 BBA 4226, Risk Management 1 Course Learning Outcomes .docx BBA 4226, Risk Management 1 Course Learning Outcomes .docx
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
aryan532920
 

Similar to Dan Vasile - Risk Calculation and Visualization (18)

Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis I
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
PMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_RiskPMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
 
Risk management intruduction part 2
Risk management intruduction part 2Risk management intruduction part 2
Risk management intruduction part 2
 
Deploying Risk Management in SMEs
Deploying Risk Management in SMEsDeploying Risk Management in SMEs
Deploying Risk Management in SMEs
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
 
Managing Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptxManaging Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptx
 
Risk Assessment.pptx
Risk Assessment.pptxRisk Assessment.pptx
Risk Assessment.pptx
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
Risk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersRisk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for Managers
 
Risk Analysis in Occupational Health Setting
Risk Analysis in Occupational Health SettingRisk Analysis in Occupational Health Setting
Risk Analysis in Occupational Health Setting
 
Rsc 05
Rsc 05Rsc 05
Rsc 05
 
COSO VS ERM -
COSO VS ERM - COSO VS ERM -
COSO VS ERM -
 
Sameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk managementSameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk management
 
Risk analysis and risk mgt.
Risk analysis and risk mgt.Risk analysis and risk mgt.
Risk analysis and risk mgt.
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdf
 
Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023
 
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 BBA 4226, Risk Management 1 Course Learning Outcomes .docx BBA 4226, Risk Management 1 Course Learning Outcomes .docx
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 

More from Dan Vasile

SC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT SecuritySC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT Security
Dan Vasile
 

More from Dan Vasile (6)

SC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT SecuritySC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT Security
 
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
 
Bug bounty programs
Bug bounty programsBug bounty programs
Bug bounty programs
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeam
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Dan Vasile - Risk Calculation and Visualization

Editor's Notes

  1. It all started when developing the Framework for Application Security.
  2. Present risk as a bubble. Good analogy: if it’s too big, it’s going to pop.
  3. Size is always a constraint for the risk bubble.
  4. Traditional risk calculation formula.
  5. Challenged and appended formula to allow quantification for executives. The business factor is the importance of the system from a business perspective and can be expressed as percentage. A mission critical system will thus have a business factor equal to one.
  6. Each system has multiple vulnerabilities, each of them carrying an associated risk.
  7. The total risk of the system is the sum of individual risks.
  8. Individual risks have different severities. In this slide, risk 1 is high (red label), risk two is medium (orange label) and risk n is low (yellow label)
  9. The total risk inherits the highest severity of individual risks.
  10. We can now define the risk appetite based on the formula previously presented.
  11. This is the acceptable bubble. It has a size of 30 risk points and the maximum accepted severity is medium.
  12. Scenario 1: compliant. The risk value is within acceptable limits (25<30) and the maximum severity among individual risks is low.
  13. Scenario 2: non-compliant. Even though the numeric value of the total risk is within the risk appetite statement(20<30), the severity of the total risk is high which is unacceptable.
  14. Scenario 3: non-compliant. The numeric value of the total risk is greater than the risk appetite statement (35>30)
  15. Building a meaningful risk visualization. Each bubble represents a system.
  16. Improvement 1: add system names to quickly identify them
  17. Improvement 2: add a visual indicator of non-compliancy
  18. Improvement 3: add a timeline indicator to show the last assessment performed to measure risk.
  19. Take away: Educate people on information security risks and mitigations. Use the risk as a bubble analogy for a more clear message Build a meaningful visualization to provide an overview of the total risk.