THREATS AND RISKS COMPENDIUM FOR ENTERPRISE RISK MANAGEMENT - MAP-53

- A Model to Reduce Your Enterprise’s Exposures from All Types of Vulnerabilities  - A multi-volume compendium

By Management Advisory Services & Publications Consulting Group

Background

Business organizations of all types live in a world of threats and risks.  These threats and risks are increasingly changing both in number and in severity.  The recent events of global terrorism, cyber terrorism and critical infrastructure attacks have significantly added to the already large number of conventional Acts of God and nature and accidental sources of exposure.  Management and risk management professionals need to constantly address the risk management issues derived from the world of threats and exposures they live in.

One of the first steps in risk management is to conduct thorough, comprehensive and time-consuming risk assessments to identify both the cadre of threats that are likely to impact your organization and the most  vulnerable assets, information and human resources that can be adversely impacted and cause irreparable damage to your organization.

In this effort, organizations worldwide simultaneously spend millions of person-hours of effort in identifying and cataloguing threats and vulnerabilities that their organization might be subject to and that need to be addressed. 

However, many of these individual threats are quite common to many organizations.  Thus, it is possible to compile the most commonly known threats that can be used by managers, risk managers, business continuity and audit professionals to develop the profile of threats that is of immediate interest to them in their particular organizations' environment.  When this cadre of already identified threats is combined with the set of threats that are uniquely applicable or peculiar to their enterprises, all concerned can greatly simplify the "threat analysis" portion of an aggregate risk management program.

Publication MAP-53 provides a foundation for risk management applicable to identifying threats and risks.  Subsequently, this publication presents, through a series of volumes, compendiums of commonly applicable threats that organizations may extract from to develop their own particular cadre of threats and risks.  In turn, this set of threats can next be used in preparing their organization's response and the development of an effective risk management and control program.

The key contribution of MAP-53 is to reduce the costly effort involved in conducting the "threat identification" phase of the risk management program.

The first of volume of MAP-53 presents the fundamentals of threat and risk management which provides a common foundation for the subsequent volumes that will contain the threat compendiums for a number of risk domain or areas.  In addition, the first volume presents a comprehensive compendium of threats for a select area which is of interest to virtually all enterprises.  Future volumes can be obtained as published.

Who Would Benefit from the Compendium Series

Senior management, line management, risk management professionals, contingency and business continuity professionals, auditors, risk and infrastructure protection managers, and any individual that needs to operate any aspect of business processes and operations.

--------------------------------------------------------------------

THREAT AND RISK COMPENDIUM  FOR ENTERPRISE RISK MANAGEMENT

Volume 1 - TC1 - PHYSICAL ACCESS PERIMETER

ISBN  0-940706-62-8

CONTENTS -

1.       THREATS, RISKS AND EXPOSURES TO ENTERPRISES  FROM THE CURRENT GLOBAL ENVIRONMENT

1.1     The Real World of Threats and Exposures                                 

1.2          Dealing with Adverse Events and Their Exposure Begins with an Identification of Threats and Vulnerabilities                     

1.3          Purpose of this Manual                                                            

1.4          The Need to Economically Conduct Threat and Risk Assessments to Identify Enterprise Vulnerabilities                    

1.5          Using a Threat and Risk Compendium to Save Time and Cost In Risk Assessments                                                           

2.      A GENERALIZED MODEL FOR ENTERPRISE RISK MANAGEMENT AND PROTECTION IN A GLOBAL ENVIRONMENT

2.1     An Overall Risk Analysis and Risk Management Program         

2.2     Hierarchical Nature of the Risk Management Program Structure and Architecture           

2.3          The Need for a Generalized Methodology for Risk Analysis and Assessment                                                                    

2.4          Description of a General Risk Analysis Methodology and Its Relationship to Risk Management                                      

2.5     Description of the Methodology for Risk and Business Impact Analysis        

3.      A COMPENDIUM OF THREATS AND RISKS THAT ORGANIZATIONS ARE VULNERABLE TO

3.1     Threat Classification                                                                

3.2          Controllable vs. Non-controllable Threats                                 

3.3          Dealing with Adverse Events and Their Exposure Begins with an Identification of Threats and Vulnerable Points              

3.4          The Compendium of Threats                                                   

3.5          A List of Threat Compendiums to Be Developed                        

4.       HOW TO USE THE INFORMATION IN THE THREAT AND RISK COMPENDIUM

4.1          Using The Threat And Risk Compendium As a Basis For Your Risk Analysis Process                                                  

4.2          Identifying The Cadre of Vulnerable Points that Pertain to Your Specific Environment                                                       

4.3     Utilizing Risk Matrices to Document Threats, Risks and   Exposures            

4.4          General Procedure to Use the Threat Compendium Information                                                                         

4.5     Summary                                                                           

5.       DOCUMENTING THREATS, RISK AND VULNERABILITIES TO DEVELOP PROTECTION PLANS

5.1     Importance of Documenting Threats, Risks and Exposures     

5.2     Approaches to Document Threats and Risks                        

1.        Narrative Description Approach                                      

2.        Narrative Scenario Approach                                            

3.        Simple Table Approach                                                     

4.        Threat, Risk and Impact Matrix Approach                          

5.        Risk Assessment and Safeguards Approach                    

5.3     Summary                                                                                  

APPENDIX

A-1.  References

A-2   Glossary of Terms

A-3   Index

PRICE:  First volume:  $125 in North America

- $ 155 overseas, including air postage

Click below for ORDER FORM

PUBLICATIONS ORDER FORM

Return to Home page

wpe5.jpg (99227 bytes)

---------------------------------------------------------------------------------------------------------------------------------------------------------------

VOLUME 2 - TC2 - THREATS AND RISKS TO BUSINESS CONTINUITY

ISBN 0-940706-63-6

Contents

Preface

1.             BACKGROUND AND COMPENDIUM FORMAT

TC2-1.1     The Importance of Threat and Risk assessment Business Continuity Preservation                                       

TC2-1.2     New Compelling Reasons for Conducting Threat and Risk Assessments in Today’s Global Business Environment  

TC2-1.3     An Increasing Array of Threats that Can Cause Business Discontinuities                                                                         

TC2-1.4      A compendium of Threats Related to Contingency and Business Continuity Issues                                                     

TC2-1-5      What the Compendium Covers                                            

2.             THE DOMAIN OF THREATS TO BUSINESS CONTINUITY

TC2-2.1      The Importance of Threat and Risk Assessment for Business Continuity Preservation                                     

TC2-2.2      The Domain of Threats to Business Continuity                 

TC2-2.3      Interpreting the Overall Domain of Business Continuity Issues and Elements                                                             

TC2-2.4      The Composite of Threats Connected with Business Continuity Is Multifaceted                                                         

TC2-2.5      Compendium of Threats Related to Business Continuity 

3.             CLASSES OF THREATS TO BUSINESS CONTINUITY

TC2-3.1      Classes of Threats                                                                  

TC2-3.2      Acts of God and Nature                                                        

TC2-3.3      Accidental Threats                                                          

TC2-3.4      Human source Threats                                                          

TC2-3.5      Dealing With Controllable vs. Uncontrollable Threats   

TC2-3.6      Significance of dealing With Non-Controllable vs. Controllable Threats             

4.             MAJOR AND MINOR BUSINESS DISCONTINUITY EVENTS

TC2-4.1     Distinguishing Between Major and Minor Business Discontinuity Events                                                                

TC2-4.2      Threat that Can Precipitate Major Business Discontinuity Events and Their Impact                                                   

TC2-4.3      Threats that Can Cause Minor Business Disruption Events and Their Implications 

5.                COMPENDIUM OF THREATS TO BUSINESS CONTINUITY                                     

TC2-5.1      Compendium of Threats and Risks that Impact Business Continuity                                                                                  

TC2-5.2      Format for Threat Compendium tables                              

TC2-5-3     Threat Compendium Tables and How to Use The Information                                                                           

APPENDIX

A.     References

B.        Glossary of Terms

C.     Index

PRICE:  Second Volume - TC2: $125 in North America - $ 155 overseas, including air postage

Click below for ORDER FORM

PUBLICATIONS ORDER FORM

Return to Home page

INQUIRE FOR FUTURE VOLUMES FOR OTHER THREAT COMPENDIUMS