Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/14/2020
05:10 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Security Through an Economics Lens: A Guide for CISOs

An expert in economics and cybersecurity applies opportunity cost and other concepts of the "dismal science" to infosec roles.

Security and IT leaders are familiar with the challenge of making trade-off decisions about how and where to invest resources to best manage risks to the organization. Viewing their problems through the lens of economics may help them reprioritize these tricky investment decisions. 

Tom Scholtz, research vice president at Gartner, took a deep dive into this idea during a talk at Gartner's Security & Risk Management Summit, taking place online this week. Scholtz argued how concepts such as opportunity cost, core to the study of economics, can prove just as useful in cybersecurity, where it's often tough to determine whether resources are spent properly.

Related Content:

Managed IT Providers: The Cyber-Threat Actors' Gateway to SMBs

The Threat from the Internet—and What Your Organization Can Do About It

New on The Edge: Think You're Spending Enough on Security?

Security spending has remained constant over the past five years, Scholtz said, pointing to data from Gartner. Still, the range of investment varies broadly. At the low end, businesses spend as little as 1.7% of their IT budget on security; at the high end, that number reaches 12% or more.

"Almost 80% of security investment is still being done on the conventional hardware, software, and human resource aspects of the security capabilities, and only just over 20% of security investments goes toward security services," he explained, noting that Gartner expects spending on security services will grow as more organizations make the transition to cloud environments. 

According to Gartner, 82% of businesses will only change their investment portfolio when they update their budgets, whether that's on an annual or biannual basis. Only 18% change their investment priorities throughout the year based on major business changes, Scholtz explained.

"We all know that change doesn't sync up with our budget cycles, and we all know that our executives tend to make decisions based on changes in the business environment," he said. "We need to find ways of understanding how the business makes investment decisions and change decisions … so that we can react to that as effectively as possible when those changes occur."

Security investments are historically made based on risk management: protecting intellectual property, ensuring brand preservation, and checking the boxes on legal and regulatory mandates. There is a positive spin, Scholtz added: These investments are also geared toward building trust among stakeholders and customers, which helps an organization generate revenue. Investing effectively can drive value creation so the business can invest in newer and less mature tech.

And when security leaders are making investment decisions, technology is where they browse first. Nearly two-thirds (65%) of respondents to Gartner's study said their security programs and investments only focus on buying tech. Doing so can come at an opportunity cost, Scholtz warned.

"It sounds [like] we are investing in the areas that we are comfortable, in the technology investments, and not necessarily making the investments in some other areas where potentially we can help support more value and better returns to the organization," he explained.

Calculating Opportunity Cost
Every investment decision is a trade-off. In order to understand where resources are best spent, Scholtz advised first looking at major risk areas to the company. Security leaders must consider the risk to intellectual property, the operational risk, and the physical risk. Risk decisions should be made based on the context of a given application or project at any point in time, he added.

He gave an example: Say a business is thinking of investing in security for its research and development (R&D) department, and it has decided that IP risk is comparatively more important than operational or reputational risk. If officials spend more on mitigating operational risk and less on protecting data, the decision doesn't relate back to the organization's needs. There is an opportunity cost in spending more to mitigate a risk that isn't considered as important.

"There's the opportunity cost of spending too much money in a low-value area, and we can reduce the opportunity cost by investing in an area where we have high business value, but the risk is too high," he said.

For instance, say a company has an application, business process, or piece of infrastructure with low business value but strong security posture. It could be helpful to potentially cut investment in that piece of infrastructure and reallocate it toward an application or process with high value but poor risk posture.

Alternatively, security leaders may find themselves with an application or system that has low business value because the associated risk of using it is too high. As a result, the app or process isn't used properly because people are scared to use it – reducing its business value to near-zero. Scholtz suggested this could be an opportunity to take money from an environment with low value but strong risk posture and allocate it toward the low-value, high-risk situation.

"Invest effectively in improving the controls of that system, which will then enable that system to be rolled out into production and to be used a lot more effectively, hence increasing the business value we get out of that system," he explained.

This model allows businesses to assess where and how they make investment decisions that may not be optimal, and where the opportunity cost is too high, and reallocate their resources.

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32682
PUBLISHED: 2021-06-14
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration...
CVE-2021-24360
PUBLISHED: 2021-06-14
The Yes/No Chart WordPress plugin before 1.0.12 did not sanitise its sid shortcode parameter before using it in a SQL statement, allowing medium privilege users (contributor+) to perform Blind SQL Injection attacks
CVE-2021-24382
PUBLISHED: 2021-06-14
The Smart Slider 3 Free and pro WordPress plugins before 3.5.0.9 did not sanitise the Project Name before outputting it back in the page, leading to a Stored Cross-Site Scripting issue. By default, only administrator users could access the affected functionality, limiting the exploitability of the v...
CVE-2021-24341
PUBLISHED: 2021-06-14
When deleting a date in the Xllentech English Islamic Calendar WordPress plugin before 2.6.8, the year_number and month_number POST parameters are not sanitised, escaped or validated before being used in a SQL statement, leading to SQL injection.
CVE-2021-24345
PUBLISHED: 2021-06-14
The page lists-management feature of the Sendit WP Newsletter WordPress plugin through 2.5.1, available to Administrator users does not sanitise, validate or escape the id_lista POST parameter before using it in SQL statement, therefore leading to Blind SQL Injection.