Cyber Tactics

Why You Need Cybersecurity Risk Management

Governments and corporations are facing considerable risk to their data

Risk Management
 

 

Governments and corporations are facing considerable risk to their data, their underlying networks and the reliability of their products because of a confluence of three factors. First, we have adopted vulnerable technologies. Second, we have used these technologies to hold sensitive data and to deliver essential services. Third, we are appealing targets to criminals and spies who have the means, motives and intent to exploit our systems and services. 

 

The Levers of Risk

Interestingly, when we summarize the three above factors, we come up with the classic risk formula, which states that risk is equal to the threat multiplied by the vulnerability multiplied by the consequence (R=TxVxC). These three variables, “threat, vulnerability and consequence,” can be viewed as the levers of risk. By lowering them, individually or in depth, we seek to improve our risk posture. If we can pull any of the three levers to zero, the risk is eliminated entirely.

 

Avenues of Attack

When it comes to determining a threat actor’s capability, it helps to consider that there are four different attack paths, or vectors of compromise. Bad guys are constantly looking to gain supply chain access, remote access, close access (such as rogue wireless access points) or insider access. Because our attack surface is so great, it remains impossible to defend ourselves 100 percent of the time against all targeted cyber attacks. Still, we have significant opportunities to dramatically improve our cybersecurity. 

 

Building a Cyber Risk Program

Addressing the risk requires prioritization. The need to provide focused effort and enhanced resources to some areas above others is a business-specific exercise that cannot be outsourced. Senior leadership should be involved in determining what data and systems require the greatest attention, and also in determining what levels of remaining or “residual” risk the company is prepared to accept. When prioritizing cybersecurity risk, organizations should consider whether they (or their customers) would suffer low, medium or high consequences due to a loss of the confidentiality, integrity or availability of the data they hold, the information systems they operate and the products they may manufacture that contain embedded software. It is often helpful to explore real-world scenarios which, if they happened in your environment, would have a severe adverse effect on operations, assets or individuals.

Armed with an assessment of their high-priority data and systems, organizations then seek to establish cost effective controls in three areas – administrative, technical and physical – to reduce one or more of the cyber risk quadrants shown in this chart.

Consider what efforts you have in place or could implement that would focus on reducing the threat. For example, as an administrative control, you might conduct employee background checks and establish vendor security requirements. As a technical control, you might deploy cutting-edge capabilities that continuously monitor for malicious endpoint activity and that feed into intelligence sources to identify the intruder, reveal their motives and defeat their methods; and as a physical control, you might have security officers in place and work with law enforcement to apprehend intruders. Consider next what efforts are available to reduce the vulnerabilities within a system. Proper patch management is one example. Application white listing is another. Finally, assume that a threat actor will exploit a vulnerability. Risk mitigation then requires consequence management. Encrypting data may help to protect against the specific harm to confidentiality caused by its theft, but encryption does not protect your data from being deleted altogether and impacting its availability. Appropriate back-up or replacement strategies are required.

 

Conclusion

Cybersecurity risk management practices are a necessary tool for your organization. Still, there is no “one-size-fits-all” answer. Business needs differ by organization, and they change over time. Like all of security, cyber risk management is a process, and the path is filled with threats, vulnerabilities and consequences; administrative, technical and physical controls; supply chain access, remote access, close access and insider access; and differing harms to confidentiality, integrity and availability. The good news is that, by learning and applying these principles, there are significant opportunities for you to help your organization achieve its security goals.  

 

About the Columnist:

 Steven Chabinsky is General Counsel and Chief Risk Officer for cybersecurity technology innovator CrowdStrike, which provides incident response services, cyber intelligence feeds, and a next generation, big data platform for continuous threat detection, attribution, and prevention. He previously served as Deputy Assistant Director of the FBI’s Cyber Division. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Steven Chabinsky

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

July 2014

2014 July

In the July issue of Security Magazine, read about how the NFL is balancing security with fan experience to make sure sporting events are running smoothly. If you're doing any traveling this summer, be sure to read the 5 hot spots for business travel security, also, employers can track on-the-go employees with new mobile apps. Also, check out the latest news and industry innovations for the security industry.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+