Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Developing a risk-based cybersecurity approach

By Asim Rahal
cyber security
February 5, 2021

Cybersecurity is an important business issue that in theory, every executive wants to prioritize. A great deal of the practical challenges come because so many organizations take an outdated approach to cybersecurity protocols.

Currently, the lion’s share of organizations operates under a maturity-based cybersecurity approach that seeks to monitor everything constantly. A maturity-based model applies the same degree of monitoring and control over every asset an organization has. As a result, costs grow prohibitive as business assets grow.

As the amount of data companies gather continues to increase, this means cybersecurity protocols become bloated and bog down application development teams.

A risk-based approach is the solution to this problem. By adopting a risk-based stance, organizations can classify which of their assets represent the highest risk if compromised, and prioritize resources accordingly. It's a more flexible and smart strategy in an era where attackers are becoming increasingly nimble and sophisticated.

McKinsey & Company reports that most risk managers at large organizations are flying blind when it comes to evaluating their cyber resilience due to bloated reporting processes and overly complicated reporting tools. Here's how organizations can implement a risk-based approach to their cybersecurity controls.

 

Fully embed cybersecurity in the risk management framework

A common mistake organizations make is to inadvertently separate their cyber risk framework from general business risk management. Such a situation occurs due to cyber risk being classified as an IT project or as something that belongs to the technology department.

With data being shared across organizations evenly, technology and cybersecurity cannot be treated as a standalone feature. Cybersecurity and cyber risk assessment have to be embedded in the DNA of the organization.

Many organizations have programs that aim to do this. They conduct security training for their employees and look to build awareness of cyber risks amongst them, but in many cases, such programs don't have lasting effects.

As long as the focus is on increasing awareness, your company's culture will never orient itself towards accepting cybersecurity as a part of everyday operations. Instead of focusing on increasing awareness, focus on changing employee behavior instead. Conduct collaborative workshops and fire drills that emphasize the risks that your organization faces.

Such an approach demystifies cybersecurity and embeds it into everyday risk management protocols.

 

Connect high-value processes to risk assessment

Every business has certain processes that are more valuable than others. For example, in the case of a financial services firm, loan origination is a source of huge value. However, it also poses a significant risk if data is compromised. Data leakages originating from this process could cripple the entire organization.

Your cybersecurity team should regularly talk to business executives to figure out which processes are of the highest value and how vulnerable your organization is to an attack on them. Create an enterprise risk map of the highest value processes and the risk levels they pose. Some high-value processes might not pose much risk, while others might pose an enterprise-level risk.

Work through all of the processes within your business units in this way to figure out which assets pose a high risk and have a high value. Those assets or processes must be prioritized when it comes to threat detection and mitigation. It's also important to map the dependencies of those processes.

For example, which teams are connected to the process? Do these processes depend on third-party input?

Explore the vulnerabilities of those constituent parts since your highest-value assets depend on them. Create a risk priority list to help you understand which threats deserve the highest and swiftest response.

 

Map vulnerabilities and threats

Once the asset priority list has been created in the previous step, it's time to take a deep look at the vulnerabilities each asset has. Explore the known vulnerabilities of every system involved in the process. For example, you might be storing data related to a process on a legacy database and transferring that data to another process.

The legacy DB will have a known set of vulnerabilities that you'll need to guard against. Often, a modern application will draw important data from a legacy system. The legacy system won't show up on your list of priority assets, but a vulnerability scan will reveal the dependency your valuable asset has.

By combining your risk-based asset list with the vulnerability map, you'll be able to design effective security controls and processes. Remember to include business input when detective vulnerabilities. Certain processes might not rank high on a list of technical vulnerabilities, but the business process behind it might expose you to threats. Such an exercise also brings everyone in your organization to the same page.

Security deserves to be communicated in an easily understood, accessible language.

Adopt a philosophy of continuously monitoring your threat landscape instead of relying on one-off tests alone. You should combine both approaches to form a robust security framework that reduces your risk of attack.

 

Monitor and track the right metrics

Many organizations track KPIs that measure the degree of completeness in a project. Instead, you need to measure the degree to which your risk has decreased. Stop relying solely on KPIs and instead start thinking of linking them to key risk indicators or KRIs.

For example, you could implement a data loss prevention program as part of your cyber risk reduction initiatives. A KPI could measure the degree to which the initiative has been implemented across your organization. A KRI could measure the number of most-critical assets that are covered by the program.

Assuming the requirement is 100% and the KRI is 90%, this indicates that your organization is still at risk, even if the KPI indicates a high value.

Brainstorm metrics that measure risk, instead of completeness or coverage, and you'll be thinking in terms of enterprise risk.

 

Reduce risk and build resilience

Given the pace with which malicious activity is increasing, every organization must prepare itself for an eventual attack. Classifying your cybersecurity processes based on risk is the best way to prioritize your response and react quickly when you're under attack.

You'll reduce enterprise bloat and will protect what is most important to your organization.

KEYWORDS: cyber security framework risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

An incurable evangelist of cloud security, data protection and cyber risk awareness, Asim Rahal is a Detroit-based independent IT service provider. You can reach Asim via Twitter: https://twitter.com/asimrahal

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • dell technologies

    Dell Technologies takes a holistic, risk-based approach to build resilience

    See More
  • technology-network-cyber-freepik.jpg

    Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution

    See More
  • 5_minutes_with_Caponera_1021_900px.jpg

    5 minutes with Jerry Caponera - Developing a risk-oriented view into cybersecurity

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!