Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/28/2018
02:00 PM
Vikram Phatak
Vikram Phatak
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

How Measuring Security for Risk & ROI Can Empower CISOs

For the vast majority of business decisions, organizations seek metrics-driven proof. Why is cybersecurity the exception?

Whoever coined the phrase "what you don't know can't hurt you" obviously never held a cybersecurity job. Lack of awareness has resulted in significant compromises of networks, systems, applications, devices, and data. And yet, even after all of those losses, it's still surprising to me that so many organizations remain in the dark about the effectiveness of the products that protect them. According to recent research from NSS Labs only:

  • 43% of enterprises validate the effectiveness of their security products through internal testing (NSS Labs 2017 Security Architecture Study, May 2017);
  • 38% of enterprises always perform a proof of concept prior to selecting a security control (NSS Labs 2017 Security Architecture Study, May 2017);
  • 47% of executives believe that all security products they currently deploy add value (NSS Labs 2016 Advanced Endpoint Protection Study, December 2016).

In 2018, according to Gartner, companies will spend a projected $96 billion on security products and services. But will they have the hard data to know if those investments actually reduce their exposure to threats? In my regular discussions with chief information security officers (CISOs), this lack of information is a recurring topic of concern.

To understand their anxiety, think about your car: All cars are equipped with gauges and warning lights that provide real-time feedback about the health of the vehicle. These gauges include everything from how fast you're going to whether your tires are low or how much further you can drive before you need to fill your tank with gas. Now imagine that these gauges and warning lights were all broken. What if you didn't know how long it was since you'd last filled up your tank or how far had you driven since refueling? How much gas do you have left before you run out? Do you have enough gas to make it to the next gas station? And now imagine your teenage kid borrows the car now and again without warning. As unbelievable as this sounds, CISOs are dealing with the equivalent of this every day.

For the vast majority of business decisions, we seek metrics-driven proof. Why, then, is cybersecurity the exception? Isn't it obvious that continuous measurement and validation of the effectiveness of security controls is critical? Who wouldn't want the visibility to know how effectively their defenses are securing their network, systems, applications, devices, and data?

The CEO Question: "Should I Be Worried?"
Too often, the answer is "I don't know" or even "yes." Although CISOs have a number of key performance indicators to track and measure security activities such as patching, they lack a process or approach that measures the effectiveness of their security solutions. What they need is a continuous measurement approach, with which they can assess their security postures, pinpoint the threats that pose the greatest risk to enterprise operations, and then determine whether existing solutions are delivering sufficient protection.

Supporting this need for ongoing measurement, governments and regulators have produced a number of frameworks — from the National Institute of Standards and Technology (NIST), Federal Financial Institutions Examination Council (FFIEC), and the EU's General Data Protection Regulation (GDPR) — all with mandates for measuring and monitoring security controls. If you have not yet done so, now is the time to think about the resources you will need to implement a successful continuous monitoring program. It's also incumbent upon security professionals to articulate priorities and justification in terms that business leaders can understand.

Let's Talk about ROI
In looking at cybersecurity from a business perspective, a metrics-supported approach goes a long way in justifying investments. Yet few organizations — only 17%, according to NSS Labs research (NSS Labs 2017 Security Architecture Study, May 2017) — perform ROI calculations of their security controls. Moving forward, calculating ROI and providing relevant metrics will be a must-have in the CISO's toolbox. Without them, security executives may find themselves in the difficult position of explaining that the cause of a data breach was a result of "having had a technology solution for the problem in the budget, but it got cut."

As we move to the future, CISOs and their teams will be asked to incorporate more data science, empirical evidence, and metrics to demonstrate the effectiveness of their security programs. CISOs must refocus on the right types of insights and data to drive effective decisions and actions. But perhaps just as important, they must have the ability to measure the effectiveness of cybersecurity in language the business can appreciate and understand.  Introducing metrics that account for risk and ROI will empower security leaders to partner effectively with their business counterparts and pave the way for CISOs to have a stronger voice in their organization.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.

Vikram Phatak is Chief Executive Officer of NSS Labs, Inc. Vik is one of the information security industry's foremost thought leaders on vulnerability management and threat protection. With over 20 years of experience, he brings unique insight to the cybersecurity problems ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
AnnaEverson
100%
0%
AnnaEverson,
User Rank: Strategist
3/29/2018 | 10:15:46 AM
Interesting
 Thanks a lot for such incredible article) I think it is really usefull and suitable as for me 
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19740
PUBLISHED: 2019-12-12
Octeth Oempro 4.7 allows SQL injection. The parameter CampaignID in Campaign.Get is vulnerable.
CVE-2019-19746
PUBLISHED: 2019-12-12
make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.
CVE-2019-19748
PUBLISHED: 2019-12-12
The Work Time Calendar app before 4.7.1 for Jira allows XSS.
CVE-2017-18640
PUBLISHED: 2019-12-12
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
CVE-2019-19726
PUBLISHED: 2019-12-12
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from th...