Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Create a Rick Assessment report for the following risk scenario: The RMA group is an organization of risk managers. Members work for some of the

image text in transcribed
Create a Rick Assessment report for the following risk scenario: The RMA group is an organization of risk managers. Members work for some of the most prestigious companies. including Bank of America Merrill Lynch, Barclays, Blackrock, BNP Paribas, Crecit Suisse, and many more recognizable names. During RMAs 2022 Carolinas Virgirias Spring Conference which took place in April 2022. the conference posted the list of attendees including first names, last names, and the compary they worked for. Atternate possibility: you could instead decide to base your work on the 36th Annual Risk Managers' Meeting of the Iilinois Health and Hospital Association which alse posted a list of atrendees. Additional details/background This release of information caused an upeoar. Risk managers do not like to be in the spotight as they routinely explore the most sensitive areas of their respective organizations. They know all the secrets. Thoy have to, that's their role. Since R.MA is a risk, management onganization, the board that oversees the orgarization fand thus the conference) has asked for a risk assessiment of the impact of this release on the pecple Whose names hawe been exposed. Pick two companies (call them Ct b. C2) frem the set of companies named in the list and use background information about those comparies to inform the Threat Event Frequency and the Vulnerability aspects. Decide on the threat agent and their gools and level of determination. In terms of loss magnitude, you can assume that a successfull attack would in 610 milion dollars" worth of reputational damage with high confidence, centered around \$38M (but you may also choose to deviate from those values, and document wimy). A secondary loss may also happen in 2-8\% of cases since sensitive information might be exposed that leads to a larger attack (e.g. attacicers get their handis on risk assessments that point to Where the crown jewels are stored and how poorly protected they are) on the organization itself or some of its business partiners. The potential magnitude of this type of secondary Iosses are in the 50100 million dollar range. Pequired elements/activities 1. Use the FAlRu tool (Whw.fairu net) to visualize a tree diagram for each of the cases and run an analysis. In each case, save a screenshot of the tree diagram, the Loss Exceedance Curve, and the Summary of Simulation Results. 2. For each of cases (C1 8 C.2). document all your assumptions about the Assef and the Threat being risk assessed. Document your rationale for each of the data points you used in your analysis, including links to sources (e.g. a memo from the CEO or a recent news report about the organization's new security awareness efforts). Create a Rick Assessment report for the following risk scenario: The RMA group is an organization of risk managers. Members work for some of the most prestigious companies. including Bank of America Merrill Lynch, Barclays, Blackrock, BNP Paribas, Crecit Suisse, and many more recognizable names. During RMAs 2022 Carolinas Virgirias Spring Conference which took place in April 2022. the conference posted the list of attendees including first names, last names, and the compary they worked for. Atternate possibility: you could instead decide to base your work on the 36th Annual Risk Managers' Meeting of the Iilinois Health and Hospital Association which alse posted a list of atrendees. Additional details/background This release of information caused an upeoar. Risk managers do not like to be in the spotight as they routinely explore the most sensitive areas of their respective organizations. They know all the secrets. Thoy have to, that's their role. Since R.MA is a risk, management onganization, the board that oversees the orgarization fand thus the conference) has asked for a risk assessiment of the impact of this release on the pecple Whose names hawe been exposed. Pick two companies (call them Ct b. C2) frem the set of companies named in the list and use background information about those comparies to inform the Threat Event Frequency and the Vulnerability aspects. Decide on the threat agent and their gools and level of determination. In terms of loss magnitude, you can assume that a successfull attack would in 610 milion dollars" worth of reputational damage with high confidence, centered around \$38M (but you may also choose to deviate from those values, and document wimy). A secondary loss may also happen in 2-8\% of cases since sensitive information might be exposed that leads to a larger attack (e.g. attacicers get their handis on risk assessments that point to Where the crown jewels are stored and how poorly protected they are) on the organization itself or some of its business partiners. The potential magnitude of this type of secondary Iosses are in the 50100 million dollar range. Pequired elements/activities 1. Use the FAlRu tool (Whw.fairu net) to visualize a tree diagram for each of the cases and run an analysis. In each case, save a screenshot of the tree diagram, the Loss Exceedance Curve, and the Summary of Simulation Results. 2. For each of cases (C1 8 C.2). document all your assumptions about the Assef and the Threat being risk assessed. Document your rationale for each of the data points you used in your analysis, including links to sources (e.g. a memo from the CEO or a recent news report about the organization's new security awareness efforts)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Principles

Authors: Jerry J. Weygandt, Paul D. Kimmel, Donald E. Kieso

10th Edition

1119491630, 978-1119491637, 978-0470534793

More Books

Students also viewed these Accounting questions