Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Why CISOs Need to Quantify Cybersecurity Risks
Cybersecurity as a Business Enabler

Why CISOs Need to Quantify Cybersecurity Risks

Chris HughesBy Chris HughesSeptember 28, 2022Updated:October 5, 20224 Mins Read
Facebook Twitter LinkedIn Email
Cybersecurity Data Risk Quantification
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

There’s no way to sugar-coat it: Cybersecurity has a data problem. More precisely, cybersecurity as an industry is abysmal when it comes to quantifying cyber risk.

While there are increased calls for cybersecurity expertise in the boardroom, and even proposed changes from the Securities and Exchange Commission (SEC) to have companies disclose cyber expertise of board members, we simply aren’t speaking the same, data-driven language as many of our peers when it comes to threats facing our business. That’s a problem we need to fix.

Cybersecurity Risk Quantification

Cybersecurity risks can be communicated qualitatively or quantitatively. Historically, as an industry, we overwhelmingly do the former.

As a result, explaining the scale of threats is subjective, open to interpretation, and fails to provide business leaders with data to drive organizational decision-making about our cybersecurity risks. That’s occurring against the backdrop of calls we all hear for security pros to “speak the language of the business.” In this context, that means articulating cyber risks and threats, supported by numbers.

This issue isn’t new; experts including Douglas Hubbard and Richard Seiersen address it in their widely cited “How to Measure Anything in Cybersecurity Risk” book (rumor has it, a new edition is coming as well).

They aren’t the only individuals or organizations who have evangelized quantifying cybersecurity risks. Risk Management Executive Jack Jones and the FAIR Institute have also been advocating a similar position. As an organization, FAIR, which stands for Factor Analysis of Information Risk, boasts more than 13,000 members and is used by over 45% of Fortune 1000 organizations.

From a technology perspective, there are also platforms such as Balbix and RiskLens that strive to automate quantification of cyber risk to empower organizations to address those risks and improve board reporting.

The Enterprise IT Environment

So, despite the push from thought leaders, industry organizations, and vendors, why does do cyber risk practitioners still speak in squishy, subjective terms that are devoid of numbers? The truth is that cyber risk quantification relies on methodological and mathematical modeling approaches that lend themselves to quantifying risk. When performing cyber risk quantification, you’re looking at things such as organizational assets, vulnerabilities, threats, and likelihood of exploitation.

Unfortunately, the enterprise IT environment — which is central to overall risk posture — isn’t quite so cut and dried, and therein lies a major problem. Organizations are generally subpar at maintaining hardware and software asset inventory — despite the fact that category has been a SANS/CIS Critical Security Control for years.

As a result, organizations simply don’t have confidence in their overall asset inventory. Even if they do, it is generally misplaced because years of security incidents have shown that shadow IT is rampant. We all know how hard it is to protect, or even quantify the risk to, assets that we aren’t aware of.

Other challenges exist too. The Common Vulnerability Scoring System (CVSS), which is widely used for vulnerability prioritization and risk assessment, is often misused. At least, that is the argument made by Carnegie Mellon University’s Software Engineering Institute (SEI) in its paper titled “Towards Improving CVSS” or Drew University’s paper titled “CVSS: Ubiquitous and Broken”. Combine misused scoring with internal blind spots and you start to gain an understanding of where today’s approaches are falling short.

Future Coverage of Cybersecurity Risks

In additional upcoming analysis on the Acceleration Economy Cybersecurity channel, I will dive deeper into current cyber risk qualitative and quantitative assessments, technical and platform solutions, and potential gaps in the way vulnerabilities are scored and prioritized.

All of these issues contribute to the challenges for cybersecurity when it comes to speaking the language of the business, providing actionable risk insights, and communicating with executive leaders and board members, despite the urgency to have cybersecurity leadership represented “at the table.”


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

CIO CISO Cybersecurity data featured Featured Post risk
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

Quantum Era Begins: IBM, Cleveland Clinic Attack Deadly Diseases

March 28, 2023

Why CEOs Must Understand Applications, Benefits, and Risks of ChatGPT

March 28, 2023

How to Adapt Cybersecurity Processes to Strengthen Multi-Cloud Incident Response

March 28, 2023

Why Information, or Data With Context, Is More Valuable Than Data Alone

March 28, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Quantum Era Begins: IBM, Cleveland Clinic Attack Deadly Diseases
  • Why CEOs Must Understand Applications, Benefits, and Risks of ChatGPT
  • How to Adapt Cybersecurity Processes to Strengthen Multi-Cloud Incident Response
  • Why Information, or Data With Context, Is More Valuable Than Data Alone
  • How Informatica Is Helping Grocery Giant Kroger Fine-Tune Its Supply Chain

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.