Cyber Tactics

Why You Need Cybersecurity Risk Management

Governments and corporations are facing considerable risk to their data

Risk Management


Governments and corporations are facing considerable risk to their data, their underlying networks and the reliability of their products because of a confluence of three factors. First, we have adopted vulnerable technologies. Second, we have used these technologies to hold sensitive data and to deliver essential services. Third, we are appealing targets to criminals and spies who have the means, motives and intent to exploit our systems and services. 


The Levers of Risk

Interestingly, when we summarize the three above factors, we come up with the classic risk formula, which states that risk is equal to the threat multiplied by the vulnerability multiplied by the consequence (R=TxVxC). These three variables, “threat, vulnerability and consequence,” can be viewed as the levers of risk. By lowering them, individually or in depth, we seek to improve our risk posture. If we can pull any of the three levers to zero, the risk is eliminated entirely.


Avenues of Attack

When it comes to determining a threat actor’s capability, it helps to consider that there are four different attack paths, or vectors of compromise. Bad guys are constantly looking to gain supply chain access, remote access, close access (such as rogue wireless access points) or insider access. Because our attack surface is so great, it remains impossible to defend ourselves 100 percent of the time against all targeted cyber attacks. Still, we have significant opportunities to dramatically improve our cybersecurity. 


Building a Cyber Risk Program

Addressing the risk requires prioritization. The need to provide focused effort and enhanced resources to some areas above others is a business-specific exercise that cannot be outsourced. Senior leadership should be involved in determining what data and systems require the greatest attention, and also in determining what levels of remaining or “residual” risk the company is prepared to accept. When prioritizing cybersecurity risk, organizations should consider whether they (or their customers) would suffer low, medium or high consequences due to a loss of the confidentiality, integrity or availability of the data they hold, the information systems they operate and the products they may manufacture that contain embedded software. It is often helpful to explore real-world scenarios which, if they happened in your environment, would have a severe adverse effect on operations, assets or individuals.

Armed with an assessment of their high-priority data and systems, organizations then seek to establish cost effective controls in three areas – administrative, technical and physical – to reduce one or more of the cyber risk quadrants shown in this chart.

Consider what efforts you have in place or could implement that would focus on reducing the threat. For example, as an administrative control, you might conduct employee background checks and establish vendor security requirements. As a technical control, you might deploy cutting-edge capabilities that continuously monitor for malicious endpoint activity and that feed into intelligence sources to identify the intruder, reveal their motives and defeat their methods; and as a physical control, you might have security officers in place and work with law enforcement to apprehend intruders. Consider next what efforts are available to reduce the vulnerabilities within a system. Proper patch management is one example. Application white listing is another. Finally, assume that a threat actor will exploit a vulnerability. Risk mitigation then requires consequence management. Encrypting data may help to protect against the specific harm to confidentiality caused by its theft, but encryption does not protect your data from being deleted altogether and impacting its availability. Appropriate back-up or replacement strategies are required.



Cybersecurity risk management practices are a necessary tool for your organization. Still, there is no “one-size-fits-all” answer. Business needs differ by organization, and they change over time. Like all of security, cyber risk management is a process, and the path is filled with threats, vulnerabilities and consequences; administrative, technical and physical controls; supply chain access, remote access, close access and insider access; and differing harms to confidentiality, integrity and availability. The good news is that, by learning and applying these principles, there are significant opportunities for you to help your organization achieve its security goals.  


About the Columnist:

 Steven Chabinsky is General Counsel and Chief Risk Officer for cybersecurity technology innovator CrowdStrike, which provides incident response services, cyber intelligence feeds, and a next generation, big data platform for continuous threat detection, attribution, and prevention. He previously served as Deputy Assistant Director of the FBI’s Cyber Division. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Steven Chabinsky

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine February 2015 issue cover

2015 February

In the February 2015 issue of Security Magazine, see what other companies have learned from the massive data breach and what they are doing in the now and in the future. Also, what could adding thermal cameras to your operation do for you? and Mohegan Sun at Pocono Downs prepares for the future with security decisions.
Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.