...Risk Prioritization and Mitigation Project Plan Definition White Hat Inc will develop a risk prioritization and mitigation plan per instructions in the RFP. White Hat Inc will define risks as their priority to the company in terms of their impact on the company. White Hat will also help to define mitigation plans to resolve these risks. We will use several factors to prioritize risk and place each risk into one of three categories High, Medium and Low. To determine what category each risk will be placed we will use the following set of questions and definitions: • Define the Risk • Impact of the Risk on Physical or network aspect of the business • Cost of the Risk • Impact on Compliance • Recovery time and cost of lost business Throughout our audit we will generate several reports on the current status of IT security for The State. To Prioritize Risks for The State faces we will review these reports that include: • IT Security Compliance and Governance Gap Analysis • Data Privacy Legal Requirements and Compliance Requirements • Security Assessment • Data Privacy Security Gap • Security Assessment and Risk Identification • Qualitative Risk Assessment Definition of Risk Categories: • High- exploit of vulnerability that has a high cost to the organization's mission and reputation. This could also entail a risk of death or injury to humans. • Medium- exploit of a vulnerability where the cost of a resource would cause notable loss to the organization's mission...
Words: 590 - Pages: 3
...Contents Introduction 1 Legal risks 1 Evaluation 1 Children/Members 2 Children 2 Camp Activities 2 Peer Assault 3 Staff / Operations 3 Workplace Violence and Harassment 3 Procurement and Operations 4 Privacy Breach 5 Injuries 5 Slips and falls 5 Equipment Injuries 6 Swimming Pools 6 Vandalism and Theft 7 Disease and Contraction of Illness 8 Financial Coverage 8 Conclusion 8 Appendix 9 Exhibit 1: Cooper Koo Family YMCA Under Construction 9 Exhibit 2: YMCA’s Purpose 10 Exhibit 3: 10 Exhibit 4: 11 Bibliography 13 Introduction The Greater Toronto Area (GTA) YMCA has approved plans to convert the Pan Am Athletes’ Village located on Front and Cherry Street into the largest YMCA centre following the games in 2015.The 82,000 square feet “Cooper Koo Family YMCA” is expected to attract a diverse neighbourhood with an expected population increase of 13.5% by 2020.The green facility currently under construction will be equipped with a full gymnasium including exercise and fitness studios, as well as a swimming pool (Exhibit 1).Cooper Koo is to continue to promote the YMCA’s vision to build healthier communities and commit to the association’s guiding principles to remain ethical, accountable and proactive (Exhibit 2). As Risk Management Consultants in reviewing this project, we are taking the proactive approach to identify and assess the facility’s operational legal risks and to mitigate the major risk areas prior to a breach (Exhibit 3)...
Words: 4397 - Pages: 18
...various sources of supply risks in an organisation and identify possible mitigation measures [20] Demand risk relates to potential or actual disturbances to the flow of product, information and cash, originating from within the network, between the focal firm and its market. It is interesting to note that during the current downturn disruptions in the cash resource within the supply chain has had a major impact on the operating capability of organisations.sc Supply risk is the upstream equivalent of demand risk; it relates to potential or actual disturbances to the flow of product or information emanating within the network, upstream of the focal firm. In a similar way to demand risk the disruption of key resources coming into the organisation can have a significant impact on the organisation’s ability to perform Environmental risk is the risk associated with external and, from the firm’s perspective, uncontrollable events. The risks can impact the firm directly or through its suppliers and customers. Environmental risk is broader than just natural events like earthquakes or storms. It also includes, for example, changes created by governing bodies such as changes in legislation or customs procedures. Risks internal to the corporation relate both to how the firm addresses the external risks and its competences to plan and execute its own business: Processes are the sequences of value-adding and managerial activities undertaken by the firm. Process risk relates to disruptions...
Words: 520 - Pages: 3
...CURRICULUM VITAE OBJECTIVE Looking for dynamic & challenging job in banking sector, where I can make full use of my wide, varied and diversified banking experience that spans over 36-Years in Allied Bank Limited. PERSONAL Name : Syed Muhammad Taqi Shah Father’s Name : Syed Muhammad Rashid Shah Date of Birth : 1st March 1953 CNIC # : 35201-1152097-5 Address : 234-C PIA Housing Society Lahore Cell # : 0300-8645314 Landline : 042-35184323 E-mail : syedtaqishah14@yahoo.com QUALIFICATION Academic : Bachelor of Arts (Punjab University) Professional : D.A.I.B.P (Institute of Bankers) ASSIGNMENTS HANDLED COUNTRY MANAGER – T24 TRAINING & BRANCHES ROLL OUT – BSIGMEMBER OF BUSINESS TRANSFORMATION TEAM (BTT) | : | From March 2010 to October 2011 * T24 Roll Out Teams Selection / hiring / transferring of suitable resources * T24 Roll Out Planning * Preparation of T24 Training Modules * Resource deployment planning & execution | HEAD – T24 USER GUIDES PREPARATION TEAM – OPS GROUP | : | From June 2009 to February 2010Prepared 20 Core Menus User Guides, besides User Guides on Expense Templates, Credits & Treasury. | REGIONAL HEAD – CRBG | : | From July 2005 to May 2009Regional Head-CRBG (Gujranwala & Faisalabad) Promoted as Senior Vice President in 2006 | HEAD, MONITORING, IMPLEMENTAITON & REPORTING WING, AUDIT & INSPECTION DIVISION, C.O.K. | : | From June 2004 to July 2005 | HEAD...
Words: 613 - Pages: 3
.... When the Memphis Municipal Airport opened in the 1920’s, it was seven miles from downtown. Yet, American and Chicago and Southern Airlines operated from grass strips surrounded by farmland. Over the years, the airport grew as Memphis grew. Grass strips gave way to concrete. Farm hangars were replaced with a proper terminal. The radial throb of DC-7’s and Super Connies disappeared and were replaced with the scream of turbojets from 707’s and DC-8’s. The airport, which was once on the outskirts of town, was now surrounded by suburban neighborhoods. People who bought houses near a small airport in the 1950s and '60s had no idea that soon, its largest tenant FedEx, would make the airport the busiest in the world between 10 pm and 3 am. People living near the airport began complaining about a whole range of discordant sounds, from the banshee wail of taxing jets to the ceiling shaking thunder of the engines on takeoff. Noise pollution became an unfortunate side effect of the jet age. The U.S. began enacting legislative controls with the Aircraft Noise Abatement Act in 1968. This authorized the FAA to prescribe standards for the measurement of aircraft noise. This act was later modified by the Noise Control Act of 1972 which now required consultation with the Environmental Protection Agency (EPA). "The Congress declares that it is the policy of the United States to promote an environment for all Americans free from noise that jeopardizes their health or...
Words: 1386 - Pages: 6
...PLANT LOCATION The decision on locating an industrial plant is frequently one that has a vital effect on the success or failure of the operation of that plant. Hence it should be based upon a careful consideration of all factors pertinent to the business of the particular enterprise. Steps in selecting a plant site Selection of the region * Proximity to the market * Proximity to the necessary materials * Availability of transportation facilities * Adequacy of public and private services such as power, water, fuel, and gas * Favorable climatic conditions Selection of the particular community Which of all the communities in the chosen region can best supply the needs of the individual enterprise? * A labor supply that is adequate in numbers and in types of skill required. * Wage scales that competitive with or lower than those paid by other firms in the same industry. * Other enterprises in the community which are complementary or supplementary as regards raw materials, products ,labor demands and skills used. * Moderate taxes and the absence of restricting laws and ordinance. * Favorable living conditions and standards which label the community for both key and rank-file employees as a good place in which to live. Selection of the exact plant site Alternative communities may have to considered it no available or adequate plant site can be found in the first community selected. Trends in Plant Location * First is the...
Words: 1292 - Pages: 6
...The current issue and full text archive of this journal is available at www.emeraldinsight.com/1472-5967.htm Evaluation of environmental noise based upon the percentage of dissatisfied Paul Roelofsen Grontmij Nederland BV, Amersfoort, The Netherlands Abstract Purpose – This article is a proposal and aims to be a first step to develop a method to evaluate and classify environmental noise, according to EN-15251 and CR-1752, in the built environment based on the percentage of dissatisfied related to the equivalent background noise level. Design/methodology/approach – In the European guideline CR-1752 and the standard EN-15251 three categories of the indoor environment in buildings are prescribed (category A, B and C). In the recommendations, the limit whereby the percentage of dissatisfied should remain under varies in each category for both the thermal indoor environment and the air quality. The categories for noise and illumination criteria are not yet explicitly related to a percentage of dissatisfied. Findings – Using the percentage of dissatisfied as the evaluation criterion, when related to the equivalent background noise, produces a more refined evaluation of comfort than an evaluation based on the percentage of seriously disturbed or the effects of sleep deprivation in relation to external noise. Furthermore, this corresponds to the European standards and recommendations concerning quality classification of the indoor environment, based on the percentage of dissatisfied. Originality/value...
Words: 2388 - Pages: 10
...programs of any type on the computers. • Damaging, disabling, or otherwise harming the operation of computers, or intentionally wasting resources puts your work at risk, and will cut short your time with the ICT equipment. • Only use the computers for educational purposes. Activities such as buying or selling goods are inappropriate. • Always check files brought in on removable media (such as floppy disks, CDs, flash drives etc.) with antivirus software and only use them if they are found to be clean of viruses. • Always check mobile equipment (e.g. laptops, tablet PCs, PDAs etc.) with antivirus software, and ensure they have been found to be clean of viruses, before connecting them to the network. • Protect the computers from spillages by eating or drinking well away from the ICT equipment. Security and Privacy • Protect your work by keeping your password to yourself; never use someone else’s logon name or password. • Always get permission before revealing your home address, telephone number, school name, or picture to people you meet on the Internet. • Other computer users should be respected and should not be harassed, harmed, offended or insulted. • To protect yourself and the systems, you should respect the security on the computers; attempting to bypass or alter the settings may put you or your work at risk. • Computer storage areas and floppy disks will be treated like school lockers. Staff may review your files and communications to ensure that you are using the...
Words: 512 - Pages: 3
...Legal Issues in Information Security 14 Executive Summery on Risk Mitigation Unit 9 ASSIGNMENT 1 ASSIGNMENT The protection of records that pertain to students is crucial in ensuring that their safety is not compromised. In doing so the following three things must be addressed in a very detailed and stringent manner. Confidentiality, Integrity, and Availability. These three facets of security are detrimental in the handling of information, whether it is student records or bank transaction records. C-I-A is a good practice when maintaining information and insuring the proper handling of said information. We will discuss here how C-I-A combined with FERPA will help to reduce mishandling and misuse of information, and how to deal with breach and loss as well. The confidentiality of information is vital to keep your students anonymity on line. Confidentiality means that only people with the right permissions can access and use the information. To ensure the confidentiality of the information, the location that it is stored will be secured by password protection. The principle of least privilege will be used as well in determining who has access to the information as well. Physically there will be endpoint encryption as well. All data that is stored in the servers will be encrypted as well. The integrity of the information is vital to ensure that any tampering of the information can be readily detected if it should occur. The integrity of the information is defined...
Words: 578 - Pages: 3
...Security Plan User Domain Risk, Threat, or Vulnerability: Lack of awareness, Apathy toward policies, Security policy violations, Personal CD’s and USB drives with photos, music and videos, Download photos, music and videos, Destruction of systems, applications, or data, Employee blackmail or extortion. Mitigation: Conduct annual security awareness training, Place employee on probation, Disable internal CD drives and USB ports, Enable content filtering. Restrict user access, Track and monitor abnormal employee behavior, Enable Intrusion detection system/Intrusion prevention system (IDS/IPS). Workstation Domain Risk, Threat, or Vulnerability: Unauthorized access to workstation, Unauthorized access to systems, applications, and data, Desktop or Laptop computer operating system software vulnerabilities, Viruses, malicious code or malware infects a workstation or laptop. Mitigation: Enable password protection, Define strict access control policies, standards, procedures and guidelines, Use workstation antivirus and malicious code policies, LAN Domain Risk, Threat, or Vulnerability: Unauthorized access to LAN, Unauthorized access to system, applications, and data, LAN server operating system/application software vulnerabilities, Rogue users on WLANs gain unauthorized access. Mitigation: Define strict access control policies, standards, procedures and guidelines, Make sure wiring closets, data centers, and computer rooms are secure. LAN to WAN Domain Risk, Threat, or Vulnerability:...
Words: 364 - Pages: 2
...Risk and Financial Impact As with all new ventures, potential risks may have a financial impact* on Boston Beer Company (BBC). In short, the latent risks of BBC’s new hard soda product line may cause revenue loss. Events (e.g. regulatory changes, supply shortages or natural disasters) may have a substantial economic impact to business, based on how business activities are effected (InvestorWords, n.d.). The following three sections address the major potential risks and financial impact, and the mitigation plan which addresses risk. Potential Risks Table 1: Potential Risks Suppler/Vendor Concerns Federal, State and/or Local Regulations Raw Material Prices Access to Capital Ability to Innovate to Meet Customer Needs Distribution Disruption Economic Conditions Competition Less Demand for Products Source: (Toomey, 2014)...
Words: 1625 - Pages: 7
...1. Risk: UCA carries the risk of the cost/price uncertainty because UCA is an action that allows the contractor to start work before prices are agreed upon. Mitigation: The “Price ceiling,” limitation at DFARS 217.7404-2 mitigates this risk by incorporating a not-to-exceed price for the firm fixed price or not-to-exceed ceiling fee for the cost reimbursement type contract in the UCA. 2. Risk: Risk associated with performance exists because all contract terms and specifications are not agreed upon under UCA in which the UCA possesses the potential risk that can increase the risk level of performance. There is only one potential contractor who may be possessed the ability and skills to develop a prototype within 90 days. Thus, the risk would...
Words: 703 - Pages: 3
...Risk Assessment and Mitigation Techniques Any solution will have inherent risk, the key is to identify and explore the consequences of the risks so mitigation can be incorporated into the implementation plan through contingency plans. Lawrence Sports faces several risks in attempting to implement a working capital policy. The first risk is the extension of credit to customers. If Lawrence Sports is too liberal with extending credit they will be faced with the need to borrow money to meet the target cash balance. On the contrary, if Lawrence Sports has a strict credit policy, sales may suffer as a result. The mitigation of this risk is for Lawrence Sports to have a conservative credit policy and consistent implementation with every customer. The second risk is the implementation of the electronic payments. Lawrence Sports can not coerce Mayo Stores, Gartner Products or Murray Leather Works to convert to a new system which Lawrence Sports may implement. In addition, an aggressive attempt to implement the EFT could cause a sever rift in business relations which could cripple the company. To mitigate this risk, Lawrence Sports could communicate early on with customers and vendors about their intention to convert systems and providing explanation of the numerous benefits of implementing an electronic payment system. Lawrence Sports can also offer a higher discount on transactions for a limited period for using the electronic payment process. Cash budgeting may cause shockwaves to...
Words: 681 - Pages: 3
...argument to convince customers or community by their decisions C-List of alternatives 1. Awareness 2. Planning and prevention Measures to eliminate or reduce the incidence or severity of emergencies. Actions taken in anticipation of, during, and immediately after an emergency to ensure that its effects are minimized, and that people affected are given immediate relief and support. 3. Response Process of supporting emergency-affected communities in reconstruction of the physical infrastructure and restoration of emotional, social, economic and physical wellbeing. D-Evaluation of alternatives 1. Awareness With good data, the public understands the need for preparation and risk reducing measures. Governments, the private sector and the media build awareness of risks and risk-mitigation principles at national, regional, and community levels....
Words: 777 - Pages: 4
...Heart Hospital Hazard Mitigation Plan Hazard Vulnerability Mitigation Strategy Plan Version 1 – February 1, 2010 Heart Hospital Hazard Mitigation Plan Table of Contents I. Introduction……………………………………………… 3 A. Purpose of the Plan B. Methodology C. AZHH Background II. Risk Assessment Findings A. Hazard Identification B. Profile of Hazard Events C. Vulnerability of Assessments III. Mitigation Goals, Objectives, and Strategies IV. Implementation and Maintenance Procedures A. Implementation B. Maintenance Appendices A. Glossary of Terms B. Acronyms Version 1 – February 1, 2010 Arizona Heart Hospital Hazard Mitigation Plan Chapter 1 – Introduction A. Purpose of the Plan: This Hazard Mitigation Plan (HMP) establishes the process for implementing proactive risk management as part of the overall Emergency Management Plan. The purpose of a Hazard Mitigation Plan is to identify potential hazards, risks and vulnerabilities as identified by the Hazard Vulnerability Assessment (HVA) before they occur by prioritizing mitigation actions and providing technical support for those efforts. The purpose of this plan is to produce a program of activities through actions that will best deal with the Heart Hospital’s (HH) hazard problems, while meeting the health care needs of the community. This plan will accomplish the following objectives...
Words: 270 - Pages: 2