PSP FLASHCARDS

1
Q

A management process that ties an organization’s security practice to its overall protection strategy using globally established risk management principles to manage risk where asset owners own decisions for the risks to assets they manage. (POA PS, page 1).

A

Enterprise security risk management (ESRM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who in ESRM is responsible for identifying, prioritizing, and developing remediation efforts for assets at risk? (POA PS, page 2).

A

Asset owners in partnership with the security professional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An enterprise risk program that typically focuses on all aspects of organizational risk such as financial, operational, and strategic. (POA PS, page 2).

A

Enterprise risk management (ERM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three components of ESRM?
(POA PS, page 5).

A
  1. The context.
  2. The Foundation.
  3. The ESRM cycle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What component of the ESRM is critical for the security professional to not only understand the various threats that may impact the organization but to also understand the organization itself? (POA PS, page 5).

A

Context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A critical requirement for the successful ESRM adoption strategy in the risk management process of an organization. (POA PS, page 5).

A

Align the security strategy and the organization’s overall strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two elements that are considered to be the pinnacle of organizational strategy? (POA PS, page 5).

A
  1. Mission
  2. Vision
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five core values of an organization? (POA PS, page 6).

A
  1. Environmental stewardship
  2. The community
  3. Employee safety and security
  4. Product quality; &
  5. Brand and image protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What often defines and organization’s culture? (POA PS, page 7).

A

Core values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

For the security professional to effectively assess risk and build relationships, he/she must understand the operating environment in which the organization functions. What are the three elements that form the operating environment?

A
  1. Physical.
  2. Non-physical.
  3. Logical.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the physical environment key factors a security professional should understand to effectively evaluate and prioritize risk and partner with asset owners?

A
  1. Type of location.
  2. Building and surrounding environment.
  3. Pedestrian/ vehicle traffic in the area.
  4. Non-employees who require access.
  5. Industrial control systems.
  6. Criticality and sensitivity of processes and assets on site.
  7. Products on hand and warehoused.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some of the nonphysical key factors that asset owners and security professionals must understand to effectively evaluate and prioritize risks and develop risk mitigation measures for an organization? (POA PS, page 7).

A
  1. Geo-political environment.
  2. External pressures on the industry.
  3. Legal/regulatory/compliance requirements.
  4. Intensity of the competition.
  5. Growth mode of the organization.
  6. Speed required for decision-making.
  7. Impact of technology.
  8. Ongoing change including leadership
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some of the logical factors that asset owners and security professionals must understand to effectively evaluate and prioritize risks and develop mitigation measures for an organization? (POA PS, page 8).

A

Digital assets and networks that connect them to each other and other stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Businesses and industries heavily rely on digital connections and data for all phases of their operations. Provide examples of these logical factors. (POA PS, page 8).

A
  1. Servers.
  2. Workstations.
  3. Network infrastructure.
  4. Connectivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why do stakeholders matter in the ESRM risk management process and what role does the security professional play? (POA PS, page 8).

A
  1. They are essentially the risk decision-makers.
  2. The security professional must know what is important to the stakeholders and assist them in formulating mitigation strategies for security-related risks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Under the ESRM concept, give examples of intangible asset owners who should partner with the security professional in identifying and mitigating risk in an organization. (POA PS, page 9).

A
  1. Events
  2. Procurement.
  3. Human resources.
  4. Legal.
  5. Marketing
17
Q

Under the ESRM concept, provide a list of stakeholders who may contribute knowledge to the organization on specific risks to assets or resources for mitigation plans. (POA PS, page 9).

A
  1. Suppliers.
  2. Distributors.
  3. Consultants.
  4. Audit firms
18
Q

Identify four important parts of the ESRM approach that describes how security risks are mitigated. (POA PS, page 10).

A
  1. Identify & prioritize risk.
  2. Identify and prioritize risks.
  3. Mitigate and prioritized risks.
  4. Continuous process
19
Q

Who plays the role of a security risk subject matter expert and a trusted advisor to top management, asset owners, and other stakeholders in the ESRM process? (POA PS, page 10).

A

The security professional

20
Q

In the ESRM approach, who is the risk owner? (POA PS, page 10).

A

Asset owner

21
Q

Name some of the types of risks to be considered in the ESRM approach. (POA PS, page 11).

A
  1. Physical assets.
  2. Information security risks.
  3. Cybersecurity risks.
  4. Personnel security risks.
22
Q

In the ESRM approach, how are risks mitigated and how? (POA PS, page 11).

A
  1. In order of priority.
  2. Using security controls recommended by the security professional and approved by the asset owner.