Workshop 1: Identifying risks

The Workshop Facilitator gives a brief introduction about the project’s purpose and the discipline of information security. The following points are covered:

  • Information security is constantly evolving

  • Information security as a process (PDCA cycle)

  • Availability, Confidentiality, and Integrity as pillars

  • Risk = Probability x Impact

  • The iterative nature of the Canvas Method: it doesn’t have to be complete or correct right away; we will expand, deepen, and correct in the next cycle

Below is an example of a presentation that can help convey the topics above to the participants.

After the introduction, the facilitator initiates the interactive part of the workshop.

The following topics are addressed using the Canvas.

Context

Participants are invited to name all the factors inside and outside the organization that influence their work (and more specifically, their work with information). A DESTEP framework can be helpful here. The mentioned factors are written on Post-Its and placed on the Canvas. Participants are asked to briefly explain how the various factors affect their work.

Process

Participants identify the different processes in their department/team. The processes are written on Post-Its and placed on the Canvas. There is space for naming sub-processes or process steps that participants feel deserve special attention in this context.

The Workshop Facilitator specifically asks about:

  • Where information comes from and through which medium

  • How they use the information in their process / for what purpose

  • To whom they deliver information, and through which medium

  • What tools they use (software, paper, etc.)

If desired, the process can be visualized as a diagram.

Note: The goal of this exercise is not to create a complete or correct specification of the mentioned items. Mapping out the processes is merely a tool to make participants aware of potential risks.

Risks

The Workshop Facilitator asks participants to note down risks related to information processing relevant to their team or department on Post-Its. He/she may remind them of the aspects of Availability, Confidentiality, and Integrity of information.

Ask participants to use a new Post-It for each risk (one risk per Post-It). Have them also write their initials on the Post-It, as it is useful for reporting and for asking for clarification later.

Give participants space to express their concerns in their own way: what they write often doesn’t fit neatly into the formal definition of a risk (a possible event with negative consequences). In practice, you’ll receive a mix of risks (“stolen laptop”), vulnerabilities (“no encryption on laptop”), and consequences (“data breach”).

The Workshop Facilitator then discusses the noted risks with the participants: what is the (negative) event, what vulnerability causes the risk, and what are the possible consequences if it happens.

After the discussion, the Workshop Facilitator places each Post-It on the Canvas.

Often, the same risk will be mentioned by multiple participants; the Workshop Facilitator consolidates these by, for example, stacking the Post-Its.

Next, the Post-Its are arranged by impact: risks with the highest impact are placed at the top of the column, and those with the lowest impact at the bottom.

The Workshop Facilitator explains that the purpose of this is simply to determine priorities. The facilitator then draws two lines, creating three clusters. The first cluster of risks will be addressed in the current iteration, the second cluster possibly as well (partially), and the last cluster will definitely be addressed in the next cycle.

Note: Some risks mentioned may be out of scope for the project, but this isn’t corrected too strictly. It can be pointed out when determining how to handle the risks.

Risk Treatment

The Workshop Facilitator takes the highest-priority risks and discusses with the participants whether a risk should be addressed by the team itself ("mitigate"), whether another team or party should handle it ("transfer"), whether the risk can be avoided ("avoid"), or if the risk is acceptable ("accept"). The respective Post-It is moved to one of the four quadrants. The chosen treatment is noted.

Reporting

After the workshop, the Workshop Facilitator ensures reporting is completed. Below is an example of how this can be done. The Workshop Facilitator shares the report with the workshop participants.

Deep Dive

For a deeper analysis, Risk Cards can be used. These cards include:

Last updated