SlideShare a Scribd company logo
1 of 34
ISO 31000:The Benchmark
for
Risk Management in Uncertain
Times
Presenter: Jacob A. McLean, MS, CSP, QEP, MBA,
B.Sc.
PECB ISO 31000 Lead Risk Manager
1
v
Webinar Objectives
• Participants will:
Understand the concept of risk as the effect of uncertainty on
objectives
Understand risk management principles, framework and process
in the context of a Risk Management System
Appreciate the value of ISO 31000 as the benchmark for best
practice in managing risk
2
Introduction
• ISO 31000 defines risk as “effect of uncertainty on objectives”.
• It implies threats as well as opportunities, which is the essence of
risk-based thinking.
• ISO 9001:2015, ISO 14001:2015; ISO 22301:2012 and OHAS 18001:
2007 are all risk-based Standards.
3
Introduction
• The principles, processes and framework of ISO 31000, the
benchmark for managing risks related to tasks, processes, functions
and enterprises, will be discussed.
• A risk management system based on this Standard reduces
uncertainty, enables the organization to seize opportunities, while
treating risks appropriately, to enable continual improvement and
chart the way to business success in uncertain times.
4
ISO 31000 Family of Standards
• ISO 31000:2009 Risk management -- Principles and guidelines
• Risk Management Principles
• Risk Management Framework
• Risk Management Process
• ISO Guide 73
• Global vocabulary of risk management terms
• ISO_IEC 31010:2009 - Risk Assessment Techniques
• Reflects current good practices in selection and utilization of risk assessment
techniques
5
ISO 31000 Users
• Stakeholders include:
 those responsible for implementing risk management;
 those who need to ensure sound risk management;
 those who manage risk for the organisation or a
specific area or activity;
 those needing to evaluate an organisation’s practices
in managing risk.
6
Scope of ISO 31000
• Provides principles and generic guidelines on implementation of risk
management, focusing on managing uncertainty in the meeting of
objectives, and the importance of risk communication.
• Applicable to any kind of organization, is not certifiable (third party)
but outlines general principles and guidelines.
• It harmonizes risk management processes by providing a common
approach in support of standards dealing with specific risks and/or
sectors but does not replace those standards.
7
Key Emphases
 ISO 31000:
 stresses commitment to diligent risk management
 encourages priority setting
 explains that risk management should itself create value
 stresses the importance of context
 addresses the sometimes confusing issue of risk terminology
 Adopts the viewpoint that risk management is integral to the
organization’s structures, responsibilities, and objectives.
8
ISO 31000 Risk Management Architecture:
Principles, Framework, Process
9
Principles
Risk management:
a) creates value.
b) is an integral part of organizational processes.
c) is part of decision making.
d) explicitly addresses uncertainty.
e) is systematic, structured and timely.
f) is based on the best available information.
g) is tailored.
h) takes human and cultural factors into account.
i) is transparent and inclusive.
j) is dynamic, iterative and responsive to change.
k) facilitates continual improvement and enhancement of the organization.
10
Principles
•Principles provide the foundation for the rest
of the standard.
• The organization’s approach to risk management:
Should be an integral part of its processes (especially
decision making process);
Should be tailored to its environment;
Should create and protect value;
Should support and encourage continual improvement.
11
Risk Management Process
• Includes five activities:
Establishing the Context;
Communicating and Consulting;
Risk Assessment;
Risk Treatment; and
Monitoring And Review.
12
Establishing the Context
Consider the following:
Objectives and operating environment
Relevant Legislation
Stakeholder identification & analysis
Government Policy
Corporate Policy
Management Structures
Community Expectations
General criteria
Consequence criteria
13
Communication and Consultation
• Seeks to improve performance based on informed,
mutual decisions about risk
• Aim is not to avoid all conflict or to diffuse all concerns
14
COMMUNICATION AND CONSULTATION
MONITOR AND REVIEW
Establish the
Context
Objectives
Stakeholders
Criteria
Define Key
Elements
Analyze the
Risks
Review
controls
Likelihoods
Consequence
Level of risks
Evaluate
Risks
Rank risks
Treat Risks
Identify
options
Select
Select best
responses
treatment
plans
Implement
6
Identify the
Risks
What can
happen
How it can
happen
2 3
4 5
7
15
Risk Assessment
• Comprises three sub-processes:
 risk identification;
 risk analysis;
 risk evaluation.
16
Benefits of Risk Assessment
• Provides understanding of risks, causes, impacts and
probabilities
• Provides input to decision-making regarding:
 whether activity should be undertaken;
 how to maximize opportunities;
 whether risks need treatment;
 prioritizing risk treatment options;
 risk treatment strategies that will bring adverse risks to
tolerable level
 choosing between options with different risks.
17
How the Risk Assessment Process Works
Step 1 : Establish the Context
 external context
 internal context
 risk management context
 risk criteria
 define the structure
18
How the Risk Assessment Process Works
•Step 2 : Identify Risks
 What can happen, when, where and how
 Identify key processes, tasks, activities
 Recognise risk areas
 Define risks
 Categorize risk
19
How the Risk Assessment Process Works
 Find, recognize and describe risks that could affect
achievement of objectives
 Identify sources of risk
 Include identification of possible causes and potential
consequences
20
How the Risk Analysis Process Works
•Step 3 : Analyse Risks
Purpose:
 Separate minor from major risks
 Provide data to assist risk evaluation
 Identify controls
 Determine likelihood
 Determine consequence
 Determine level of risk
 Where possible, place confidence limits on estimates
 Use best available information
21
How the Risk Evaluation Process Works
•Step 4 : Evaluate Risks
 Identify tolerable versus unacceptable risks (Compare
risk rating against risk criteria)
 Prioritize risks for treatment
22
How the Risk Evaluation Process Works
Consider:
 Objectives of projects and opportunities
 Tolerability of risks
 Whether risk needs treatment
 Consider if activity should be undertaken
 Priorities for treatment
23
Risk Treatment Options
• Reduce:
 Likelihood
 Consequence
• Contingency Planning
• Sharing in full or part (this creates a new risk)
• Avoid (but not because of aversion)
• Retain residual risk
24
Risk Treatment Plans
Document options for plan implementation:
 Responsibilities
 Schedules
 Expected outcomes
 Budget
 Performance measures
 Review processes
25
The Concept of ALARP
26
The Concept of ALARP
27
Treatment Based on Risk Evaluation
• Low - No additional controls required unless cost is minimal
• Medium – Give consideration to whether risks can be lowered to
tolerable level
• High - Substantial efforts should be made to reduce risk.
Consider suspending/restricting the activity, or apply interim risk control
measures
• Very high - risk are unacceptable.
Effect substantial improvements to reduce to tolerable/acceptable level
28
Monitor and Review
• Risk management is a journey, not a destination
• What may be of minor significance today may be the disaster
of tomorrow
• Review is an integral part of the risk management process
29
Attributes of Enhanced Risk Management
• Comprehensive, fully defined and fully accepted accountability
for risks, controls and treatment tasks.
• Named individuals fully accept, are appropriately skilled and
have adequate resources to check controls, monitor risks,
improve controls and communicate effectively about risks and
their management to interested parties.
30
Attributes of Enhanced Risk Management
• All decision making within the organisation, whatever the level of
importance and significance, involves the explicit consideration of
risks and the application of the risk management process to some
appropriate degree.
• A pronounced emphasis on continuous improvement in risk
management through the setting of organizational performance
goals, measurement, review and the subsequent modification of
processes, systems, resources and capabilities/skills.
31
Attributes of Enhanced Risk Management
• Continual communications and highly visible, comprehensive and
frequent reporting of risk management performance to all
“interested parties” as part of the governance process.
• Risk management is always viewed as a core organizational
process where risks are considered in terms of sources of
uncertainty that can be treated to maximize the chance of gain
while minimizing the chance of loss.
32
Attributes of Enhanced Risk Management
• Critically, effective risk management is regarded by senior
managers as essential for the achievement of the organization’s
objectives.
• The organization’s governance structure and process are
founded on the risk management process.
33
THANK YOU!
Kaizen Training and Management Consultants Limited
22B Old Hope Road,
Kingston 5
Jamaica, West Indies
Phone (land line): (876) 631- 0365
Phone (mobile): (876) 475 – 1963
Fax : (876) 906 – 7423
Email: ktmclimited@gmail.com
Website: www.ktmcltd.com
34

More Related Content

What's hot

How to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkHow to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkColleen Beck-Domanico
 
Iso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelinesIso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelinesMohsen Gharakhani
 
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected RisksStrategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected RisksInternational Federation of Accountants
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityJeff B
 
ISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationAlvin Integrated Services [AIS]
 
127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0Rachael Phelan
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management processMuizz Anibire
 
Integrating Risk Appetite With Strategy Feb 14 2011
Integrating Risk Appetite With Strategy   Feb 14 2011Integrating Risk Appetite With Strategy   Feb 14 2011
Integrating Risk Appetite With Strategy Feb 14 2011Andrew Smart
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Richard Swartzbaugh
 
Risk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesRisk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesSlideTeam
 
Governance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskGovernance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskAndrew Smart
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideSlideTeam
 
Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...
Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...
Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...International Federation of Accountants
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Diane Christina
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - IDr. Shiv S Tripathi
 

What's hot (20)

How to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkHow to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management Framework
 
Iso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelinesIso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelines
 
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected RisksStrategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and Sustainability
 
ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
 
ISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and Implementation
 
127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management process
 
Risk Appetite
Risk AppetiteRisk Appetite
Risk Appetite
 
Integrating Risk Appetite With Strategy Feb 14 2011
Integrating Risk Appetite With Strategy   Feb 14 2011Integrating Risk Appetite With Strategy   Feb 14 2011
Integrating Risk Appetite With Strategy Feb 14 2011
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Risk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesRisk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation Slides
 
Governance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskGovernance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational Risk
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation Slide
 
Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...
Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...
Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
 
Risk Management
Risk ManagementRisk Management
Risk Management
 

Similar to PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times

Similar to PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times (20)

Risk management
Risk managementRisk management
Risk management
 
Iso 31000.pdf
Iso 31000.pdfIso 31000.pdf
Iso 31000.pdf
 
Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 
COSO_ERM.ppt
COSO_ERM.pptCOSO_ERM.ppt
COSO_ERM.ppt
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
Coso erm
Coso ermCoso erm
Coso erm
 
Coso erm
Coso ermCoso erm
Coso erm
 
Manajemen Risiko Menurut COSO
Manajemen Risiko Menurut COSOManajemen Risiko Menurut COSO
Manajemen Risiko Menurut COSO
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to finance
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
Rmp
RmpRmp
Rmp
 
COSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORECOSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORE
 
Risk management ppt mimi
Risk management ppt mimiRisk management ppt mimi
Risk management ppt mimi
 
Strategic risks-and-opportunities-powerpoint-flores
Strategic risks-and-opportunities-powerpoint-floresStrategic risks-and-opportunities-powerpoint-flores
Strategic risks-and-opportunities-powerpoint-flores
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
ICH Q9.pptx
ICH Q9.pptxICH Q9.pptx
ICH Q9.pptx
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times

  • 1. ISO 31000:The Benchmark for Risk Management in Uncertain Times Presenter: Jacob A. McLean, MS, CSP, QEP, MBA, B.Sc. PECB ISO 31000 Lead Risk Manager 1 v
  • 2. Webinar Objectives • Participants will: Understand the concept of risk as the effect of uncertainty on objectives Understand risk management principles, framework and process in the context of a Risk Management System Appreciate the value of ISO 31000 as the benchmark for best practice in managing risk 2
  • 3. Introduction • ISO 31000 defines risk as “effect of uncertainty on objectives”. • It implies threats as well as opportunities, which is the essence of risk-based thinking. • ISO 9001:2015, ISO 14001:2015; ISO 22301:2012 and OHAS 18001: 2007 are all risk-based Standards. 3
  • 4. Introduction • The principles, processes and framework of ISO 31000, the benchmark for managing risks related to tasks, processes, functions and enterprises, will be discussed. • A risk management system based on this Standard reduces uncertainty, enables the organization to seize opportunities, while treating risks appropriately, to enable continual improvement and chart the way to business success in uncertain times. 4
  • 5. ISO 31000 Family of Standards • ISO 31000:2009 Risk management -- Principles and guidelines • Risk Management Principles • Risk Management Framework • Risk Management Process • ISO Guide 73 • Global vocabulary of risk management terms • ISO_IEC 31010:2009 - Risk Assessment Techniques • Reflects current good practices in selection and utilization of risk assessment techniques 5
  • 6. ISO 31000 Users • Stakeholders include:  those responsible for implementing risk management;  those who need to ensure sound risk management;  those who manage risk for the organisation or a specific area or activity;  those needing to evaluate an organisation’s practices in managing risk. 6
  • 7. Scope of ISO 31000 • Provides principles and generic guidelines on implementation of risk management, focusing on managing uncertainty in the meeting of objectives, and the importance of risk communication. • Applicable to any kind of organization, is not certifiable (third party) but outlines general principles and guidelines. • It harmonizes risk management processes by providing a common approach in support of standards dealing with specific risks and/or sectors but does not replace those standards. 7
  • 8. Key Emphases  ISO 31000:  stresses commitment to diligent risk management  encourages priority setting  explains that risk management should itself create value  stresses the importance of context  addresses the sometimes confusing issue of risk terminology  Adopts the viewpoint that risk management is integral to the organization’s structures, responsibilities, and objectives. 8
  • 9. ISO 31000 Risk Management Architecture: Principles, Framework, Process 9
  • 10. Principles Risk management: a) creates value. b) is an integral part of organizational processes. c) is part of decision making. d) explicitly addresses uncertainty. e) is systematic, structured and timely. f) is based on the best available information. g) is tailored. h) takes human and cultural factors into account. i) is transparent and inclusive. j) is dynamic, iterative and responsive to change. k) facilitates continual improvement and enhancement of the organization. 10
  • 11. Principles •Principles provide the foundation for the rest of the standard. • The organization’s approach to risk management: Should be an integral part of its processes (especially decision making process); Should be tailored to its environment; Should create and protect value; Should support and encourage continual improvement. 11
  • 12. Risk Management Process • Includes five activities: Establishing the Context; Communicating and Consulting; Risk Assessment; Risk Treatment; and Monitoring And Review. 12
  • 13. Establishing the Context Consider the following: Objectives and operating environment Relevant Legislation Stakeholder identification & analysis Government Policy Corporate Policy Management Structures Community Expectations General criteria Consequence criteria 13
  • 14. Communication and Consultation • Seeks to improve performance based on informed, mutual decisions about risk • Aim is not to avoid all conflict or to diffuse all concerns 14
  • 15. COMMUNICATION AND CONSULTATION MONITOR AND REVIEW Establish the Context Objectives Stakeholders Criteria Define Key Elements Analyze the Risks Review controls Likelihoods Consequence Level of risks Evaluate Risks Rank risks Treat Risks Identify options Select Select best responses treatment plans Implement 6 Identify the Risks What can happen How it can happen 2 3 4 5 7 15
  • 16. Risk Assessment • Comprises three sub-processes:  risk identification;  risk analysis;  risk evaluation. 16
  • 17. Benefits of Risk Assessment • Provides understanding of risks, causes, impacts and probabilities • Provides input to decision-making regarding:  whether activity should be undertaken;  how to maximize opportunities;  whether risks need treatment;  prioritizing risk treatment options;  risk treatment strategies that will bring adverse risks to tolerable level  choosing between options with different risks. 17
  • 18. How the Risk Assessment Process Works Step 1 : Establish the Context  external context  internal context  risk management context  risk criteria  define the structure 18
  • 19. How the Risk Assessment Process Works •Step 2 : Identify Risks  What can happen, when, where and how  Identify key processes, tasks, activities  Recognise risk areas  Define risks  Categorize risk 19
  • 20. How the Risk Assessment Process Works  Find, recognize and describe risks that could affect achievement of objectives  Identify sources of risk  Include identification of possible causes and potential consequences 20
  • 21. How the Risk Analysis Process Works •Step 3 : Analyse Risks Purpose:  Separate minor from major risks  Provide data to assist risk evaluation  Identify controls  Determine likelihood  Determine consequence  Determine level of risk  Where possible, place confidence limits on estimates  Use best available information 21
  • 22. How the Risk Evaluation Process Works •Step 4 : Evaluate Risks  Identify tolerable versus unacceptable risks (Compare risk rating against risk criteria)  Prioritize risks for treatment 22
  • 23. How the Risk Evaluation Process Works Consider:  Objectives of projects and opportunities  Tolerability of risks  Whether risk needs treatment  Consider if activity should be undertaken  Priorities for treatment 23
  • 24. Risk Treatment Options • Reduce:  Likelihood  Consequence • Contingency Planning • Sharing in full or part (this creates a new risk) • Avoid (but not because of aversion) • Retain residual risk 24
  • 25. Risk Treatment Plans Document options for plan implementation:  Responsibilities  Schedules  Expected outcomes  Budget  Performance measures  Review processes 25
  • 26. The Concept of ALARP 26
  • 27. The Concept of ALARP 27
  • 28. Treatment Based on Risk Evaluation • Low - No additional controls required unless cost is minimal • Medium – Give consideration to whether risks can be lowered to tolerable level • High - Substantial efforts should be made to reduce risk. Consider suspending/restricting the activity, or apply interim risk control measures • Very high - risk are unacceptable. Effect substantial improvements to reduce to tolerable/acceptable level 28
  • 29. Monitor and Review • Risk management is a journey, not a destination • What may be of minor significance today may be the disaster of tomorrow • Review is an integral part of the risk management process 29
  • 30. Attributes of Enhanced Risk Management • Comprehensive, fully defined and fully accepted accountability for risks, controls and treatment tasks. • Named individuals fully accept, are appropriately skilled and have adequate resources to check controls, monitor risks, improve controls and communicate effectively about risks and their management to interested parties. 30
  • 31. Attributes of Enhanced Risk Management • All decision making within the organisation, whatever the level of importance and significance, involves the explicit consideration of risks and the application of the risk management process to some appropriate degree. • A pronounced emphasis on continuous improvement in risk management through the setting of organizational performance goals, measurement, review and the subsequent modification of processes, systems, resources and capabilities/skills. 31
  • 32. Attributes of Enhanced Risk Management • Continual communications and highly visible, comprehensive and frequent reporting of risk management performance to all “interested parties” as part of the governance process. • Risk management is always viewed as a core organizational process where risks are considered in terms of sources of uncertainty that can be treated to maximize the chance of gain while minimizing the chance of loss. 32
  • 33. Attributes of Enhanced Risk Management • Critically, effective risk management is regarded by senior managers as essential for the achievement of the organization’s objectives. • The organization’s governance structure and process are founded on the risk management process. 33
  • 34. THANK YOU! Kaizen Training and Management Consultants Limited 22B Old Hope Road, Kingston 5 Jamaica, West Indies Phone (land line): (876) 631- 0365 Phone (mobile): (876) 475 – 1963 Fax : (876) 906 – 7423 Email: ktmclimited@gmail.com Website: www.ktmcltd.com 34