--
Don’t just say hello on chat, please also state how can I help you: see nohello.net
Konrads Klints, KPMG Singapore | Cyber Serenity is possible
📱 Mobile +65 9759 9470
We have access to interesting problems, work for us: careers.kpmg.com.sg
KPMG in Singapore operates through locally registered entities (click for details) which are member firms of the KPMG global organization of independent member firms affiliated with KPMG International Limited ("KPMG International"), a private English company limited by guarantee.
This email and all attachments are confidential and may be privileged. Any opinion or advice in here is subject to the terms and conditions in the relevant engagement letter. If you are not the intended recipient, kindly notify us and delete this message. Further, you should not copy or disclose the contents of this email, or rely on the contents, as KPMG accepts no responsibility or liability to you. KPMG may use and disclose information in emails, including personal data, for the provision of services or to comply with the law or professional standards.
Emails are not encrypted and are therefore susceptible to tampering, including viruses. Anyone who communicates with us by email is taken to have accepted these risks.
In my opinion, the problem with the "likelihood of a data breach per year is N%" is that it blurs the distinction between frequencies and probabilities, and what we need is a way to clearly distinguish scenarios where we might expect multiple incidents per year (example: successful phishing attacks) from rarer events which might happen at most once per year. While it is a little bit more complicated, I think the best way to accommodate this is to think in terms of a frequency distribution (where N might be once a decade, once every 5 years, once a year, 10 times a year, 100 times a year, etc.) and for each value in the frequency distribution have a probability value. Example: 1% chance every 10 years, 2% chance of every 5 years, 5% chance of once a year, 20% chance of 10 times per year, etc.The likelihood of a data breach per year is N%, the impact on company will be X and the downstream impact on customers will be Y per customer, to a total of X+Y. If we spend Z to improve our controls, we will bring the overall likelihood of incident to less than M% which is the most we can reasonably do and if there is a data breach, here is how we will help our stakeholders mitigate the costs. This would bring the total Annual Loss Expectancy to $K
--
What's new, SIRAnaut? Check us out at http://societyinforisk.org & on twitter [@societyinforisk]
---
You received this message because you are subscribed to the Google Groups "SiRA-public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to sira-public...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/sira-public/AM7P138MB0145D6A9998AB7D5F7F670F5F2239%40AM7P138MB0145.EURP138.PROD.OUTLOOK.COM.
To view this discussion on the web visit https://groups.google.com/d/msgid/sira-public/CAL2XqunLS1zKm%2BTQrLJy2sEuQFAwJW%2BPfgvwFgYqcAg-1Jg0FQ%40mail.gmail.com.
--
What's new, SIRAnaut? Check us out at http://societyinforisk.org & on twitter [@societyinforisk]
---
You received this message because you are subscribed to the Google Groups "SiRA-public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to sira-public...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/sira-public/AM7P138MB0145D6A9998AB7D5F7F670F5F2239%40AM7P138MB0145.EURP138.PROD.OUTLOOK.COM.
To view this discussion on the web visit https://groups.google.com/d/msgid/sira-public/CAL2XqunLS1zKm%2BTQrLJy2sEuQFAwJW%2BPfgvwFgYqcAg-1Jg0FQ%40mail.gmail.com.
Kovrr is a Microsoft partner and a preferred solution on the Microsoft Azure Marketplace.
To view this discussion on the web visit https://groups.google.com/d/msgid/sira-public/CAPeDMC2TqJRLH_Fpetd97SE0stiBkS_mEmrHsPwj_1pyzy1b%3Dw%40mail.gmail.com.