Risk

3/28/2018
02:00 PM
Vikram Phatak
Vikram Phatak
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

How Measuring Security for Risk & ROI Can Empower CISOs

For the vast majority of business decisions, organizations seek metrics-driven proof. Why is cybersecurity the exception?

Whoever coined the phrase "what you don't know can't hurt you" obviously never held a cybersecurity job. Lack of awareness has resulted in significant compromises of networks, systems, applications, devices, and data. And yet, even after all of those losses, it's still surprising to me that so many organizations remain in the dark about the effectiveness of the products that protect them. According to recent research from NSS Labs only:

  • 43% of enterprises validate the effectiveness of their security products through internal testing (NSS Labs 2017 Security Architecture Study, May 2017);
  • 38% of enterprises always perform a proof of concept prior to selecting a security control (NSS Labs 2017 Security Architecture Study, May 2017);
  • 47% of executives believe that all security products they currently deploy add value (NSS Labs 2016 Advanced Endpoint Protection Study, December 2016).

In 2018, according to Gartner, companies will spend a projected $96 billion on security products and services. But will they have the hard data to know if those investments actually reduce their exposure to threats? In my regular discussions with chief information security officers (CISOs), this lack of information is a recurring topic of concern.

To understand their anxiety, think about your car: All cars are equipped with gauges and warning lights that provide real-time feedback about the health of the vehicle. These gauges include everything from how fast you're going to whether your tires are low or how much further you can drive before you need to fill your tank with gas. Now imagine that these gauges and warning lights were all broken. What if you didn't know how long it was since you'd last filled up your tank or how far had you driven since refueling? How much gas do you have left before you run out? Do you have enough gas to make it to the next gas station? And now imagine your teenage kid borrows the car now and again without warning. As unbelievable as this sounds, CISOs are dealing with the equivalent of this every day.

For the vast majority of business decisions, we seek metrics-driven proof. Why, then, is cybersecurity the exception? Isn't it obvious that continuous measurement and validation of the effectiveness of security controls is critical? Who wouldn't want the visibility to know how effectively their defenses are securing their network, systems, applications, devices, and data?

The CEO Question: "Should I Be Worried?"
Too often, the answer is "I don't know" or even "yes." Although CISOs have a number of key performance indicators to track and measure security activities such as patching, they lack a process or approach that measures the effectiveness of their security solutions. What they need is a continuous measurement approach, with which they can assess their security postures, pinpoint the threats that pose the greatest risk to enterprise operations, and then determine whether existing solutions are delivering sufficient protection.

Supporting this need for ongoing measurement, governments and regulators have produced a number of frameworks — from the National Institute of Standards and Technology (NIST), Federal Financial Institutions Examination Council (FFIEC), and the EU's General Data Protection Regulation (GDPR) — all with mandates for measuring and monitoring security controls. If you have not yet done so, now is the time to think about the resources you will need to implement a successful continuous monitoring program. It's also incumbent upon security professionals to articulate priorities and justification in terms that business leaders can understand.

Let's Talk about ROI
In looking at cybersecurity from a business perspective, a metrics-supported approach goes a long way in justifying investments. Yet few organizations — only 17%, according to NSS Labs research (NSS Labs 2017 Security Architecture Study, May 2017) — perform ROI calculations of their security controls. Moving forward, calculating ROI and providing relevant metrics will be a must-have in the CISO's toolbox. Without them, security executives may find themselves in the difficult position of explaining that the cause of a data breach was a result of "having had a technology solution for the problem in the budget, but it got cut."

As we move to the future, CISOs and their teams will be asked to incorporate more data science, empirical evidence, and metrics to demonstrate the effectiveness of their security programs. CISOs must refocus on the right types of insights and data to drive effective decisions and actions. But perhaps just as important, they must have the ability to measure the effectiveness of cybersecurity in language the business can appreciate and understand.  Introducing metrics that account for risk and ROI will empower security leaders to partner effectively with their business counterparts and pave the way for CISOs to have a stronger voice in their organization.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.

Vikram Phatak is Chief Executive Officer of NSS Labs, Inc. Vik is one of the information security industry's foremost thought leaders on vulnerability management and threat protection. With over 20 years of experience, he brings unique insight to the cybersecurity problems ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AnnaEverson
50%
50%
AnnaEverson,
User Rank: Apprentice
3/29/2018 | 10:15:46 AM
Interesting
 Thanks a lot for such incredible article) I think it is really usefull and suitable as for me 
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.