ChannelLife Australia logo
Industry insider news for Australia's technology resellers
Story image

Hard numbers: Why ambiguity in cybersecurity no longer adds up

By Contributor
Tue 17 May 2022

Article by MetricStream APAC managing director, Michel Feijen.

There are places where ambiguity and subjectivity work well – but measuring your cyber risk exposure isn’t one. 

One place where clarity is required is in the C-suite. As both cybersecurity costs and risks continue to escalate, CEOs continue to struggle with what their investment in cyber protection buys. 

When trying to gauge the effectiveness of their company’s cybersecurity, one survey found that 72% of CEOs receive metrics that “lack meaning or context,” and 87% “need a better way to measure the effectiveness of their cybersecurity investments.”

As MIT Sloan Management Review notes, “Often, executives as well as directors spend too much time studying technical reports on such things as the numbers of intrusion detection system alerts, antivirus signatures identified, and software patches implemented.” These things often get delegated and limited to the IT department but ideally, dealing with and addressing cyber security risks should be strategically managed by the top management so that risk management is not just incidence-based. 

Cybersecurity increasingly needs to learn to speak a different language. Current reforms in multiple countries - notably, Australia and the United States - would expose individual directors and executives to personal liability for cybersecurity risks. The proposals also seek to record the “substance of how a company manages its cybersecurity risk.”

That’s a profoundly different position on risk - and not one that is conducive to qualitative or ambiguous ‘traffic light system’ type representations.

The traditional approach has been to rank risks as high, medium, and low, or assess them in terms such as “probably likely to occur” or “somewhat likely to impact the business.” 

These categorisations are too vague in the modern world. Security teams might think a medium risk needs to be mitigated, but the management team might argue that it can be accepted. Defending your point of view can be tough because the term ‘medium risk’ sounds quite ambiguous.

It gets more challenging when teams have multiple risks that are all ranked medium. Which one do you focus on first? Do you spend the same amount of time and resources managing all three risks? It’s difficult to know for sure with non-quantitative metrics.

Organisations face thousands of IT and cyber risks a year. The challenge is to determine which risks should be dealt with first. Likewise, there may be hundreds of possible security controls; which one will yield the greatest benefits for the least cost? 

These are questions that CISOs must have an answer to. And to do that, they need quantitative data. Ambiguous terms must be converted into hard numbers.

Do the math

Enter cyber risk quantification - a process for measuring IT and cyber risk exposure in monetary terms. 

It’s intended to help practitioners and their employers determine which risks to prioritise and where to allocate cybersecurity resources for maximum impact.

Typically, cyber risk quantification uses sophisticated modelling techniques like Monte Carlo simulations to estimate the value at risk (VaR) or expected loss from risk exposure.

By quantifying the monetary impact of a risk event, questions like “How much should we invest in cybersecurity?”, “What will be the return on investment?” and “Do we have enough cyber insurance coverage?” can be more confidently answered.

Uncertainty is minimised when cyber risk exposure is expressed in clear and precise terms. It becomes easier to direct security investments when it’s known how much the risk will cost and how much a particular control can help lower that cost. There’s much less debate and confusion about the top three cyber risks, why they’ve been ranked that way, or which controls are most relevant to mitigate those risks. The data is already there for everyone to see.

Multiple stakeholders benefit from such clarity. CISOs gain a deeper understanding of risk impact, which helps them make data-driven decisions. Boards have more visibility into what’s at stake for the business in terms of dollar value. And executives can effectively prioritise cybersecurity investments, driving alignment between cyber programs and business goals.

Six things to keep in mind 

To quantify cybersecurity risk, organisations should consider six important points.

First, establish a common risk language. If everyone in the organisation has a different definition for each IT asset, threat, or vulnerability, it will be difficult to communicate and defend risk decisions. Standardise the risk nomenclature as much as possible.

Second, cyber risk quantification is a collaborative exercise that goes beyond the IT security department. Engage other divisions in identifying critical risk scenarios. The more perspectives that are brought to the table, the more comprehensive your risk data will be.

Third, cyber risks and threats are constantly evolving. A risk that was critical a year ago may not be as important or relevant anymore. The only way to know is to re-quantify risks at regular intervals – maybe once or twice annually.

Fourth, it’s neither efficient nor effective to cover all possible threats and risk scenarios at once. Pick one important use case and work on that before moving forward.

Fifth, automate wherever possible. Manual cyber risk quantification processes can be both complex and time-consuming. Automating those workflows can help measure a large number of risk exposures faster.

And finally, quantification isn’t a cure-all: Cyber risk quantification should enhance, not replace, other IT and cyber risk management processes. Its value is best realised when complemented with risk monitoring, qualitative assessments, internal audits, and issue management processes.

While no organisation can ever be fully immune to threats and risk, smart and calculable risk quantification, management, and measurement can help organisations get better at mitigating risks. 

Related stories
Top stories
Story image
Microsoft
TO THE NEW unveils A/NZ Managed Services for Microsoft Azure
TO THE NEW has released Managed Services for Microsoft Azure to meet the growing demand in the A/NZ market and globally.
Story image
Sustainability
Honeywell launches new carbon energy management software for buildings
The new Carbon & Energy Management service allows building owners to track and optimise energy performance against carbon reduction goals, down to a device or asset level.
Story image
Infrastructure
Global investment in data centers more than doubled in 2021
DLA Piper's latest global survey finds the total investment in data center infrastructure worldwide rose from USD $24.4 billion in 2020 to USD $53.8 billion in 2021.
Story image
Tech job moves
Tech job moves - ActiveCampaign, Arcserve, LogRhythm & Qlik
We round up all job appointments from June 17-22, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Cybersecurity
Australia worst in the world for mobile app threats
Australia is the country with the highest percentage of mobile app threats detected, according to new research.
Story image
Cybersecurity
Aqua Security, CIS create software supply chain security guide
Aqua Securityand the Center for Internet Security have together released the industry’s first formal guidelines for software supply chain security.
Story image
Cybersecurity
Ingram Micro launches vendor-backed security program
Ingram Micro has unveiled a new program intended to give resellers the effective offerings their customers need to stay safe in the evolving threat landscape.
Story image
Identity and Access Management
Ping Identity launches corporate venture capital fund
Ping Identity has launched a corporate venture capital fund to foster innovative offerings for the identity security market.
Story image
trust
Consumers want personalisation, but don't trust brands with their data
Customers expect personalisation during every brand interaction but they don't trust brands to keep their personal data secure and to use it responsibly. 
Story image
Cloud
Cloudera harnesses the power of cloud and data management for digital transformation
The data management landscape has changed significantly in recent years, with customer demands shifting and evolving in light of new technology and work processes.
Story image
Talend
Forrester names Talend Leader in enterprise data fabric
Forrester has named Talend a leader among enterprise data fabric providers in the Forrester Wave: Enterprise Data Fabric, Q2 2022 report.
Story image
DDoS
Flashpoint unveils security offering for school boards
Flashpoint has released its K-12 risk management and security offering to provide school boards and education security practitioners with tools to recognise, prevent and manage cyber and physical threats.
Story image
CRM
Microsoft launches app for modern selling experience
The new release is designed to enhance CRM systems with customer engagement data from Microsoft 365 and Microsoft Teams.
Story image
FAQ
Techday's new Quickfire interview process explained
Techday is introducing a fantastic new streamlined editorial interview process. We explain the process and thoughts behind it.
Wiise
What are the 5 critical impacts of outdated systems? As the landscape continues to shift, having the right ERP will make or break Australian businesses. Discover 5 ways your current ERP might be letting you down.
Link image
Story image
Ransomware
Rapid7 report examines use of double extortion ransomware attacks
New insight into how attackers think when carrying out cyber attacks, along with further analysis of the disclosure layer of double extortion ransomware attacks, has come to light.
Story image
3D Printing
Fleet Space, Konica Minolta partner for 3D printer offering
Fleet Space has partnered with Konica Minolta to implement 3D printers from 3D Systems to support the commercial small satellite manufacturer’s offerings.
Story image
Artificial Intelligence
Abnormal Security finds financial supply chain under threat
New research by Abnormal Security has found a rising trend in financial supply chain compromise as threat actors increasingly impersonate vendors.
Story image
Healthcare
Helping Western Sydney Local Health District provide a new model of care in the fight against COVID
Western Sydney Local Health District (WSLHD) and PwC’s Consulting Business came together to solve through the challenges of COVID-19.
Wiise
3 success factors for your distribution business in FY23. With growing challenges facing Australia’s supply chain, understanding your key priorities as a wholesale distribution business is crucial. Discover the 3 success factors for your distribution business in FY23.
Link image
Story image
Yubico
New research shows global drive for passwordless authentication
A new study has shown there has been a significant shift towards wanting a passwordless future, but adoption is still in its infancy.
Story image
Attack
Phishing attacks are making a comeback
No matter what approach or tool cybercriminals use to breach a network, they all have one thing in common: access.
Story image
Network Security
Netskope announces zero trust network access updates
Customers can now apply zero trust principles across a range of hybrid work security needs, including SaaS, IaaS, private applications, and endpoint devices.
Story image
Apple
Jamf updates healthcare IT to protect data on Apple devices
Jamf has rolled out new functionality to help healthcare and IT teams protect patient data and streamline clinical access for their Apple fleet.
Story image
Manhattan Associates
New late-stage order cancellation to improve customer service
Manhattan Associates launches new service allowing orders to be cancelled up to the point of manifested/loaded status, preventing unwanted shipments and costly returns.
Story image
Digital Transformation
Cybersecurity priorities for digital leaders navigating digital transformation
In recent years, Asia-Pacific has especially been a hotspot for cyberattacks, and as we continue into 2022, it’s evident that the problem is becoming more significant.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - An update from Rimini Street
Today we welcome back Daniel Benad, who is the GVP & regional GM for Oceania at Rimini Street.
Wiise
Is your on-premise ERP holding you back? Many Australian businesses are moving from on-premise to the cloud so they can streamline processes and access up-to-date business data on the go. Here’s 5 signs that you’re equipped to migrate from on-premise to the cloud.
Link image
Story image
inDriver
New ride service inDriver arrives in Melbourne - pick your own fares
inDriver has launched in Melbourne, Australia and says it's set to disrupt the ride-hailing industry by allowing passengers and drivers to set and pick their own fares.
Wiise
Project accounting not adding up? Successful job-based businesses all have one thing in common, it's the way they manage their job and project accounting. Discover the 4 success factors now.
Link image
Story image
B2B
Corpay partners with supply chain platform PracBiz Exchange
Corpay's new partnership with PracBiz’s allows more than 4000 B2B suppliers on the latter's platform to use Corpay's global payments services.
Story image
Partnerships
Microsoft expands APAC Enabler Mentorship Program
"Mentors are the key to success for every professional. A good mentor is a coach, a guide, as well as a vocal advocate."
Story image
Amazon Web Services / AWS
Zscaler, AWS accelerate onramp to the cloud with zero trust
Zscaler has announced an extension to its relationship with Amazon Web Services, as well as innovations built on Zscaler's Zero Trust architecture.
Story image
Internet of Things
Domino's Pizza: A blueprint for secure enterprise IoT deployment
Increasingly, organisations are embracing smart technologies to underpin innovations that can enhance safety and productivity in every part of our lives, from industrial systems, utilities, and building management to various forms of business enablement.
Story image
Digital Transformation
Apptio adds portfolio enhancements to promote digital strategy
"While digitalisation creates opportunities, it also makes budgeting far more complex, leading many companies to waste substantial funds."
Story image
SaaS
Varonis strengthens security capabilities for AWS and S3
Varonis has strengthened and expanded its cloud and security capabilities, with a critical aim of improving safety and boosting data visibility in Amazon Simple Storage Service (S3).
Story image
Consumer
Adobe survey reveals link between brand trust and consumer buy-in
Adobe has announced results from a study, which finds a strong correlation between brand trust and consumer behaviour.
Story image
Gaming
Intel Arc A380 graphics units launched in China, global release imminent
New Intel Arc A380 graphics units are set to bring next-generation technologies to gamers and content creators in the coming months. 
Story image
Cloud
Cloudflare outage in 19 data centers worldwide due to own error
Cloudflare says its outage for 19 of its data centers yesterday was because of a change in a long-running project to increase resilience in its busiest locations.
Story image
INTERPOL
Hundreds arrested, millions seized in global INTERPOL investigation
A two-month-long investigation by INTERPOL this year involved 76 countries and clamped down on organised crime groups behind telecommunications and social engineering scams.
Story image
Hybrid workforce
Why hybrid working is here to stay and how to ace it
Citrix's new report reveals hybrid workers are more productive and engaged at work than their office and completely remote counterparts.
Story image
Citrix
The best ways to attract young talent during labour shortages
New research from Citrix reveals hybrid working and ventures into the metaverse are top of mind for Gen Z workers.
Story image
NaaS
Survey finds 94% of Australian IT leaders looking at NaaS
Aruba’s latest survey reveals a rising interest in NaaS among Australian technology leaders as they re-evaluate their current infrastructure and network setup.
Story image
Cybersecurity
Threat actors ramp up their social engineering attacks
As people get better at identifying potential threats in their inbox, threat actors must evolve their methods. Their new M.O? Social engineering.