Risk
1/24/2014
07:47 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

How To Get The Most Out Of Risk Management Spend

Get the most bang for your security buck through risk management investments

Even with most security budgets growing or at least staying flat for 2014, no organization ever has unlimited funds for protecting the business. That's where a solid risk management plan can be a lifesaver.

Dark Reading recently spoke with a number of security and risk management experts, who offered practical tips for getting the most out of risk management. They say smart risk management strategies can make it easier to direct security funds to protect what matters most to the business. Organizations that use them typically can base their spending decisions on actual risk factors for their businesses, rather than employing a shotgun strategy that chases after every threat under the sun. Here are a couple of ways to start making that happen.

Establish A Risk And Security Oversight Board
If an organization is going to get more for its IT risk management buck, then the first thing it has to remember is that security risk is only one facet of business risk. That is why it is important to engage with cross-functional teams, says Dwayne Melancon, chief technology officer for Tripwire, who explains doing so makes it easier to look at risk holistically.

Melancon says he has seen many customers establish "Risk and Security Oversight Boards" that are made up with leaders like the CFO, chief legal counsel, and other stakeholders from across the business.

"This board discusses, prioritizes, and champions actions and investments based on a risk registry developed through cross-functional debate and agreement," he says. "This approach ensures that the business ‘puts their money where their mouth is’ and helps align different parts of the business around the short list of risks that have the potential to cause most harm to the business."

Get A Second Opinion
Even if an oversight board may not be practical, getting a second opinion from the business as to where IT risk management should focus stands as a crucial way to set priorities.

"One way we've seen success with this is to engage with legal, finance, and PR instead of the IT executives," says J.J. Thompson, CEO and managing director for Rook Security. "They identify the real issues with simplicity and have not been brainwashed by the IT industry, who still struggles to realize what really matters to business."

For example, in one consulting engagement, Thompson says his CIO contact was caught up in focusing on standard ISO 27000x practices around SOC services Rook would offer his firm. But when his consultants talked to that firm's legal department, they were most concerned about how that SOC outsourcing would affect their largest defense contractor client. That was the No. 1 risk priority.

"The business was simply concerned about the highest area of risk: that which directly pertained to their largest client," Thompson says. "We shifted focus to the controls that directly reduced the risk of such a compromise occurring and tailored custom control monitoring that focused on creating a sensitive data map, and setting custom anomaly detection triggers when the sensitive data is accessed. "

[Are you getting the most out of your security data? See 8 Effective Data Visualization Methods For Security Teams.]

Map Risk To A Business Bloodline
What's the business bloodline for your company? In other words, what are the areas of the business for which security threats could truly disrupt the way in which the organization operates? This is exceedingly important to determine -- and one that second opinion should help deliver. Once you figure that out, start mapping technical elements to it in order to understand what kind of events could do the organization the most harm, says Amichai Shulman, chief technology officer for Imperva.

"For some companies, a POS system or its database full of credit cards may be its most valuable assets; for some it may be Social Security numbers and the personal information attached," he says. "For a company that bases its livelihood on transactions and uptime, the loss of revenue or customer loyalty caused by a DDoS could be devastating."

Communicate Risk Visually
A big part of risk management is communicating identified risks both up to senior management and down to the security managers who will put practices in place to mitigate them. One of the most effective ways to do that is to make those results visual.

"Pursuing risk management purely within security can help you make better decisions, but it can't help you get the right level of funding unless you can show people outside what you're doing," says Mike Lloyd, chief technology officer for RedSeal Networks. "Helping executives outside to understand is hard. Doing this with formulae won't work -- you will need pictures."

For example, Rick Howard, chief security officer for Palo Alto Networks, says that any time he starts a proposal to the executive suite, he begins with a business heat map that shows the top 10 to 15 business risks to the company on a grid. Typically cyber-risk is in that top 15, which makes it easier to get the company to address those risks more fully.

"Once that is done, I like to build a risk heat map just for cyber," he says. "I take the one bullet on the business heat map and blow it up to show all of the cyber-risks that we track. Again, this is not technical -- it is an overview. We are not trying to show the 1,000 potential ways that an adversary can get into the network. We want to show the C-suite who the adversary is."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7877
Published: 2014-10-30
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.

CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.