Professional Practice Two - Risk Evaluation And Control Flashcards
BCP demonstrates work with management to gain a standardized risk assessment methodology by (a)
Identify risk analysis methodologies and tools using Qualitative, quantitative, advantage and disadvantage, data and content reliability/confidence factors and math formulas.
What is the Professional’s Role in Practice Two?
1)Work with management to gain agreement on standardized risk assessment. 2) Identify, develop and implement information gathering, 3) Identify probabilities and impact of the threat/risks identified, 4) Identify and evaluate the effectiveness of current controls, 5) Identify business resiliency strategies to control, mitigate, accept the impact of the risk or reduce the vulnerabilities, 6) Document and present risk/threat/vulnerability assessment and recommendations to the entity’s leadership for approval.
BCP demonstrates work with management to gain a standardized risk assessment methodology by (b)
Select appropriate methodology and tool for entity-wide implementation which parallel the entity’s risk tolerance level.
BCP demonstrates work with management to gain a standardized risk assessment methodology by (c)
Work with the entity’s leadership to gain an understanding of the entity’s tolerance for risk
BCP demonstrates work with management to gain a standardized risk assessment methodology by (d)
Work with management to select an appropriate cost benefit analysis model.
BCP demonstrates work with management to gain a standardized risk assessment methodology by (e)
Establish the measurement criteria necessary to quantify the risk identified and effectiveness of existing controls.
How would BCP identify, develop and implement information gathering activities (a)
Determine methods of information gathering
How would BCP identify, develop and implement information gathering activities (b)
Collaborate with security, legal counsel, IT security, and other areas to identify risk and vulnerabilities.
How would BCP identify, develop and implement information gathering activities (c)
Determine Information sources to be used to collect data on risk.
How would BCP identify, develop and implement information gathering activities (d)
Determine the credibility of the information source.
How would BCP identify, develop and implement information gathering activities (e)
Develop a strategy to gather information consistent with the entity’s policies.
How would BCP identify, develop and implement information gathering activities (f)
Develop a strategy to gather information that can be managed across all of the divisions and locations.
How would BCP identify, develop and implement information gathering activities (g)
Create entity-wide methods of information gathering (forms, questionnaires, interviews, meetings, or some combination)
How would BCP identify threats/risks and the entity’s vulnerabilities? (a)
Identify threats/risks and vulnerabilities to taking account frequency, probability, speed of development, severity, and reputational impact for a holistic view of risk across the entity.
How would BCP identify threats/risks and the entity’s vulnerabilities? (B)
Identify risk exposure from both internal and external sources. Sources- Natural, technological or acts of man, Industry/business model, Accidental vs. intentional, controllable risk vs. no control risk, prior warning risk vs. no warning.