

{"id":286,"date":"2011-03-05T11:49:33","date_gmt":"2011-03-05T16:49:33","guid":{"rendered":"http:\/\/rud.is\/b\/?p=286"},"modified":"2017-03-27T09:39:26","modified_gmt":"2017-03-27T14:39:26","slug":"micropwns-risk-microprobabilities-for-infosec","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/","title":{"rendered":"Micropwns :: Risk Microprobabilities for Infosec?"},"content":{"rendered":"<div style=\"border:1px solid black; padding:5px;margin-bottom:10px;background-color:yellow;black;font-family:Verdana,Tahoma,Helvetica\"><b>NOTE<\/b>: This is a re-post from a topic I started on the <span class=\"removed_link\" title=\"http:\/\/securitymetrics.org\/content\/Wiki.jsp\">SecurityMetrics<\/span> &#038; <span class=\"removed_link\" title=\"http:\/\/societyinforisk.org\/news\">SIRA <\/span>mailing lists. Wanted to broaden the discussion to anyone not on those (and, why <i>aren&#8217;t<\/i> you on them?)<\/div>\n<p>I had not heard the term micromort prior to listening to <span class=\"removed_link\" title=\"http:\/\/www.dolectures.com\/speakers\/speakers-2010\/david-spiegelhalter\">David Spiegelhalter&#8217;s Do Lecture<\/span> and the concept of it really stuck in my (albeit thick) head all week. <\/p>\n<p>I didn&#8217;t grab the paper yet, but the abstract for &#8220;<i><a href=\"https:\/\/www.cambridge.org\/core\/journals\/international-journal-of-technology-assessment-in-health-care\/article\/microrisks-for-medical-decision-analysis\/49AE0C38CD7BDEF7603EC3EB71529DE5\">Microrisks for Medical Decision Analysis<\/a><\/i>&#8221; seems to be able to extrapolate directly to the risks we face in infosec:<\/p>\n<blockquote><p>&#8220;Many would agree on the need to inform patients about the risks of medical conditions or treatments and to consider those risks in making medical decisions. The question is how to describe the risks and how to balance them with other factors in arriving at a decision. In this article, we present the thesis that part of the answer lies in defining an appropriate scale for risks that are often quite small. We propose that a convenient unit in which to measure most medical risks is the microprobability, a probability of 1 in 1 million. When the risk consequence is death, we can define a micromort as one microprobability of death. Medical risks can be placed in perspective by noting that we live in a society where people face about 270 micromorts per year from interactions with motor vehicles.<\/p>\n<p>Continuing risks or hazards, such as are posed by following unhealthful practices or by the side-effects of drugs, can be described in the same micromort framework. If the consequence is not death, but some other serious consequence like blindness or amputation, the microrisk structure can be used to characterize the probability of disability.<\/p>\n<p>Once the risks are described in the microrisk form, they can be evaluated in terms of the patient&#8217;s willingness-to-pay to avoid them. The suggested procedure is illustrated in the case of a woman facing a cranial arteriogram of a suspected arterio-venous malformation. Generic curves allow such analyses to be performed approximately in terms of the patient&#8217;s sex, age, and economic situation. More detailed analyses can be performed if desired.<\/p>\n<p>Microrisk analysis is based on the proposition that precision in language permits the soundness of thought that produces clarity of action and peace of mind.&#8221;<\/p><\/blockquote>\n<p>When my CC is handy and I feel like giving up some privacy I&#8217;ll grab the whole paper, but the correlations seem pretty clear from just that bit.<\/p>\n<p>I must have missed <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2011\/02\/micromorts.html\">Schneier&#8217;s blog post<\/a> about it earlier this month where he links to <a href=\"https:\/\/understandinguncertainty.org\/micromorts\">understandinguncertainty.org\/micromorts<\/a> which links to <a href=\"https:\/\/plus.maths.org\/content\/os\/issue55\/features\/risk\/index\">plus.maths.org\/content\/os\/issue55\/features\/risk\/index<\/a> (apologies for the link leapfrogging, but it provides background context that I did not have prior).<\/p>\n<p>At a risk to my credibility, I&#8217;ll add another <a href=\"https:\/\/en.wikipedia.org\/wiki\/Micromort\">link to a Wikipedia article<\/a> that lists some actual micromorts and include a small sample here: <\/p>\n<blockquote><p>Risks that increase the annual death risk by one micromort, and their associated cause of death:<\/p>\n<ul>\n<li>smoking 1.4 cigarettes (cancer, heart disease)\n<\/li>\n<li>drinking 0.5 liter of wine (cirrhosis of the liver)\n<\/li>\n<li>spending 1 hour in a coal mine (black lung disease)\n<\/li>\n<li>spending 3 hours in a coal mine (accident)\n<\/li>\n<li>living 2 days in New York or Boston (air pollution)<\/li>\n<\/ul>\n<\/blockquote>\n<p>I asked on Twitter if anyone thought we had an equivalent &#8211; a &#8220;<strong>micropwn<\/strong>&#8220;, say &#8211; for our discipline. Do we have enough high level data to produce a generic micropwn for something like:<\/p>\n<ul>\n<li>1 micropwn for every 3 consecutive days of missed DAT updates\n<\/li>\n<li>1 micropwn for every 10 Windows desktops with users with local Administrator privileges\n<\/li>\n<li>1 micropwn for every 5 consecutive days of missed IDS\/IDP signature updates\n<\/li>\n<\/ul>\n<p>Just like with the medical side of things, the micropwn calculation can be increased depending on the level of detail. For example (these are all made up for medicine):<\/p>\n<ul>\n<li>1 micromort for smoking 0.5 cigarettes if you are an overweight man in his 50&#8217;s\n<\/li>\n<li>1 micromort for smoking 0.25 cigarettes if you are an overwight man in his 50&#8217;s with a family genetic history of lung cancer\n<\/li>\n<\/ul>\n<p>(again, I don&#8217;t have the paper, but the abstract seems to suggest this is how medical micromorts work)<\/p>\n<p>Similarly, the micropwn calculation could get more granular by factoring in type of industry, geographic locations, breach histiory, etc.<\/p>\n<p>Also, a micropwn (just like micromort) doesn&#8217;t necessarily mean &#8220;catastrophic&#8221; breach (I dislike that word as I think of it as a broad term when most folks associate it directly with sensitive record loss). Could mean successful malware infection in my view.<\/p>\n<p>So, to further refine the question I originally posed on Twitter: <strong><em>Do we have enough broad data to provide input for micropwn calculations and can we define a starter-list of micropwns that would prove valuable in helping articulate risk within and outside our discipline?<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NOTE: This is a re-post from a topic I started on the SecurityMetrics &#038; SIRA mailing lists. Wanted to broaden the discussion to anyone not on those (and, why aren&#8217;t you on them?) I had not heard the term micromort prior to listening to David Spiegelhalter&#8217;s Do Lecture and the concept of it really stuck [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[3,47,4,26],"tags":[339,335,330,334,326,331,332,336,328,343,333,338,329,340,111,327,735,337,342,341,121],"class_list":["post-286","post","type-post","status-publish","format-standard","hentry","category-information-security","category-metrics","category-risk","category-vulnerabilities","tag-actuarial-science","tag-amputation","tag-black-lung-disease","tag-blindness","tag-boston","tag-cancer","tag-cirrhosis","tag-david-spiegelhalter","tag-environmental-issue","tag-habits","tag-heart-disease","tag-local-administrator","tag-lung-cancer","tag-micromort","tag-microsoft-windows","tag-new-york","tag-risk","tag-schneier","tag-smoking","tag-tobacco","tag-twitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Micropwns :: Risk Microprobabilities for Infosec? - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Micropwns :: Risk Microprobabilities for Infosec? - rud.is\" \/>\n<meta property=\"og:description\" content=\"NOTE: This is a re-post from a topic I started on the SecurityMetrics &#038; SIRA mailing lists. Wanted to broaden the discussion to anyone not on those (and, why aren&#8217;t you on them?) I had not heard the term micromort prior to listening to David Spiegelhalter&#8217;s Do Lecture and the concept of it really stuck [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2011-03-05T16:49:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-27T14:39:26+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Micropwns :: Risk Microprobabilities for Infosec?\",\"datePublished\":\"2011-03-05T16:49:33+00:00\",\"dateModified\":\"2017-03-27T14:39:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/\"},\"wordCount\":793,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"keywords\":[\"Actuarial science\",\"amputation\",\"black lung disease\",\"blindness\",\"Boston\",\"cancer\",\"cirrhosis\",\"David Spiegelhalter\",\"Environmental Issue\",\"Habits\",\"heart disease\",\"local Administrator\",\"lung cancer\",\"Micromort\",\"Microsoft Windows\",\"New York\",\"Risk\",\"Schneier\",\"Smoking\",\"Tobacco\",\"Twitter\"],\"articleSection\":[\"Information Security\",\"Metrics\",\"Risk\",\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/\",\"name\":\"Micropwns :: Risk Microprobabilities for Infosec? - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2011-03-05T16:49:33+00:00\",\"dateModified\":\"2017-03-27T14:39:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/03\\\/05\\\/micropwns-risk-microprobabilities-for-infosec\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Micropwns :: Risk Microprobabilities for Infosec?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Micropwns :: Risk Microprobabilities for Infosec? - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/","og_locale":"en_US","og_type":"article","og_title":"Micropwns :: Risk Microprobabilities for Infosec? - rud.is","og_description":"NOTE: This is a re-post from a topic I started on the SecurityMetrics &#038; SIRA mailing lists. Wanted to broaden the discussion to anyone not on those (and, why aren&#8217;t you on them?) I had not heard the term micromort prior to listening to David Spiegelhalter&#8217;s Do Lecture and the concept of it really stuck [&hellip;]","og_url":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/","og_site_name":"rud.is","article_published_time":"2011-03-05T16:49:33+00:00","article_modified_time":"2017-03-27T14:39:26+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Micropwns :: Risk Microprobabilities for Infosec?","datePublished":"2011-03-05T16:49:33+00:00","dateModified":"2017-03-27T14:39:26+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/"},"wordCount":793,"commentCount":1,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"keywords":["Actuarial science","amputation","black lung disease","blindness","Boston","cancer","cirrhosis","David Spiegelhalter","Environmental Issue","Habits","heart disease","local Administrator","lung cancer","Micromort","Microsoft Windows","New York","Risk","Schneier","Smoking","Tobacco","Twitter"],"articleSection":["Information Security","Metrics","Risk","Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/","url":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/","name":"Micropwns :: Risk Microprobabilities for Infosec? - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2011-03-05T16:49:33+00:00","dateModified":"2017-03-27T14:39:26+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2011\/03\/05\/micropwns-risk-microprobabilities-for-infosec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Micropwns :: Risk Microprobabilities for Infosec?"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-4C","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":523,"url":"https:\/\/rud.is\/b\/2011\/04\/18\/rlraa-real-life-risk-assessment-acronyms\/","url_meta":{"origin":286,"position":0},"title":"RLRAA &#8211; Real Life Risk Assessment Acronyms","author":"hrbrmstr","date":"2011-04-18","format":false,"excerpt":"UPDATE: I have intentionally cross-posted this to my SIRA blog since the combined wit & intelligence of the folks there trumps anything I could do alone here. All the following newly-minted risk assessment types have been inspired by actual situations. Hopefully you get to stick to just the proper OCTAVE\/FAIR\/NIST\/etc.\u2026","rel":"","context":"In &quot;Humor&quot;","block_context":{"text":"Humor","link":"https:\/\/rud.is\/b\/category\/humor\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2425,"url":"https:\/\/rud.is\/b\/2013\/04\/10\/bahrain-egov-conference-risk-reality-slides\/","url_meta":{"origin":286,"position":1},"title":"Bahrain eGov Conference &#8220;Risk Reality&#8221; Slides","author":"hrbrmstr","date":"2013-04-10","format":false,"excerpt":"For those finding this post from the Bahrain eGov conference, I'd like to re-extend a hearty \"Thank you!\" for being one of most engaging, interactive and intelligent audiences I've ever experienced. I truly enjoyed talking with all of you. You can find the slides on my Dropbox [PDF] and please\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1018,"url":"https:\/\/rud.is\/b\/2012\/05\/08\/is-your-organization-ready-for-a-risk-management-program\/","url_meta":{"origin":286,"position":2},"title":"Is Your Organization Ready For a Risk Management Program?","author":"hrbrmstr","date":"2012-05-08","format":false,"excerpt":"While the slides will be officially available from SIRA web site in the not-too-distant future\u2014complete with video (for all the talks)\u2014I figured it wouldn't hurt to put them up here as well. Keynote version PDF version My sincere thanks, again, to @jayjacobs and the SIRA board for allowing me to\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":611,"url":"https:\/\/rud.is\/b\/2011\/06\/29\/your-new-mega-security-program\/","url_meta":{"origin":286,"position":3},"title":"Your New Mega Security Program","author":"hrbrmstr","date":"2011-06-29","format":false,"excerpt":"Everyone who can read this blog should remember the Deepwater Horizon spill that occurred in the Spring of 2010; huge loss of life (any loss is huge from my persective) and still unknown impact to the environment. This event was a wake-up call to BP execs and other companies in\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12630,"url":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/","url_meta":{"origin":286,"position":4},"title":"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes","author":"hrbrmstr","date":"2020-01-21","format":false,"excerpt":"Each year the World Economic Forum releases their Global Risk Report around the time of the annual Davos conference. This year's report is out and below are notes on the \"cyber\" content to help others speed-read through those sections (in the event you don't read the whole thing). Their expert\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":123,"url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-evidence-based-risk-management\/","url_meta":{"origin":286,"position":5},"title":"Metricon: Evidence Based Risk Management","author":"hrbrmstr","date":"2011-02-14","format":false,"excerpt":"Better management through better measurementSpeakers: Wade Baker and Alex Hutton and Chris Porter State of the industry: are we a science or pseudoscience? random fact gathering morass of interesting, trivial, irrelevant obs variety of theories that provide little guidance to data gathering \u00a0 Sources of knowledge under \"risk\" aggregate: asset\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/286\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}