Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/24/2019
02:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NormShield Enables Organizations to Calculate Potential Financial Impact of Cyberattacks on Suppliers, Partners

VIENNA, VA, September 24, 2019 – No matter how hardened a company’s cyber defenses are, significant risk remains when suppliers and third-party trading partners are attacked and compromised. Today, NormShield, the only provider of a standards-based external cyber risk assessment platform, unveiled the first-ever automated tool to combine and assess both cyber and financial risk.

Calculating the dollar value of the probable loss caused by an attack on a supplier or partner enables Chief Information Security Officers (CISOs), Chief Risk Officers (CROs) and Chief Financial Officers (CFO) to measure and mitigate cyber risk to business performance.

To measure the potential financial impact (risk) to an organization, NormShield uses the Factor Analysis of Information Risk (FAIR) Model, the only international standard Value at Risk (VaR) model for cybersecurity and operational risk.

“Incorporating the FAIR Model into cyber risk assessments enables organizations to effectively quantify the true financial cyber risk to their bottom lines,” said Mohamoud Jibrell, CEO of NormShield. “Companies now can have a three-dimensional view of the technical, compliance and financial impact of a cyberattack to better understand the full risk relationship with a partner or supplier. For some, the business benefits will outweigh the cyber risks but for others it may not.”

In financial services, for example, CISOs and CROs will be able to show the business that the threat of an attack on a vendor is real and gauge whether the odds are rising or falling. Further, CISOs and CROs can now show the business the financial impact of sharing fewer records with a vendor. The business can then determine which is greater, the reduction in probable costs from an attack on that vendor or the increase in revenue from sharing more records with that vendor.

A company’s vendors have different levels of importance. A vendor that does not have access to any systems or confidential data will have lower risk than that of a vendor that has access to PII data of company employees. The FAIR model allows NormShield to give a vendor business impact (Loss Magnitude) in risk calculation – from both the technical and financial perspectives.

“Every dollar spent on cyber risk management is a dollar that can’t be spent growing the business or addressing other organization imperatives,” said Jack Jones, chief risk scientist for RiskLens. “Consequently, cost-effective cyber risk management — knowing what matters most, and getting the best bang for your risk management buck — is a necessary cornerstone of organization success.”

The FAIR methodology was conceived as a way to provide meaningful measurements to satisfy management's desire to make effective comparisons and well-informed decisions. FAIR has become the only international standard Value at Risk (VaR) model for cybersecurity and operational risk.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18214
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...