Posted on May 9, 2018
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Everyone knows that there’s some level of risk involved when it comes to a company’s critical and secure data, information assets, and facilities. But how do you quantify and prepare for this cyber security risk? The purpose of an IT security risk assessment is to determine what security risks are posed to your company’s critical assets and to know how much funding and effort should be used in the protection of them.
Learn how to perform a cyber security risk assessment and understand the data obtained from it.
The first step when performing a risk assessment is to identify the assets to be evaluated and to determine the scope of the assessment.
For example, do you want to perform an assessment on every single asset in the company, including your buildings, employees, electronic data, trade secrets, vehicles, office equipment, and so on? (Remember, an asset may not be tangible; information is just as much an asset as the server where it resides.)
To avoid getting overwhelmed, it’s usually best to limit your scope to one type of asset at a time and then conduct risk assessments on other types as time and resources allow. After picking your first target, identify what else it touches.
Let’s assume that you want to assess only the electronic data stored on your information systems. What other assets are responsible for handling and securing the data? These are things like servers, desktop PCs, firewalls, mobile devices, etc. You must include these secondary assets in the assessment, because a risk posed to these devices is also a cyber security risk that’s posed to your data.
Don’t forget to consider both internal and external assets. For example, is your CRM data stored on a local server, or in a cloud service? Are there persistent VPN connections to partners’ IT systems? Keep asking “what’s next in the chain?” until you exhaust the search space.
After identifying and scoping the assets to be assessed, you must next determine their value.
This is often difficult to do because “value” includes more factors than what you paid for the physical item.
Let’s continue using the example of confidential electronic data. There are many questions to ask when determining its value:
All of these questions can give you a general estimate of how much your company’s data is worth.
In addition to using numbers and evidence to determine an asset’s value (called a quantitative risk assessment), you should also consider intangible factors (called a qualitative risk assessment). Consider questions like:
These subjective questions should be considered along with the numbers and estimates from the quantitative portion of the assessment.
The next step is to identify cyber security risks: situations where the asset could be adversely affected, how likely those are to happen, and their impact if they happen. You’ll use these to calculate your Annualized Loss Expectancy – which in turn tells you how much to spend to mitigate your identified risks.
Let’s imagine that you have a warehouse containing your inventory and equipment, and that warehouse is worth $20 million based on your estimates.
If you live in a dry area that is prone to fires, you should consider the likelihood of your facility being damaged or destroyed in a fire. From the data you’ve researched in your area, you make an informed estimate that your building could be affected by a fire once every ten years. You further estimate that, in the event of a fire, half of your warehouse would be lost before the fire could be contained. This results in an estimated loss of $10 million every ten years, or in annual terms, $1 million every year.
This concept translates to every type of asset. If you’re evaluating electronic data, identify various loss scenarios such as an attacker compromising your network and destroying 25% of your data, or a system crash losing the past two weeks of sales records, or server equipment failure preventing you from generating new data for five days.
Determine how likely each scenario would be on a per-year basis (called the Annual Rate of Occurrence, where 1 equals once per year, 0.5 equals once every two years, etc.), calculate the dollar-amount loss of each instance (called the Single Loss Expectancy), and multiply the likelihood by the cost to get the Annualized Loss Expectancy, which is the amount that you can spend per year on protecting against this situation.
You’ve now determined how much your asset is worth and how much it costs to protect it. This step is simple: If it costs more to protect the asset than it’s worth, it doesn’t make sense to use that control or prevention method.
To continue with the warehouse example, there are several ways to mitigate or transfer the risk of losing your asset: You could install fire suppression systems, use fire-resistant building materials, or purchase insurance to recover the cost of the damage. You now know that it doesn’t make financial sense to spend more than $1 million per year on reducing the risk of fire to your warehouse, because any higher than that, and you’d be spending more protecting the asset than it is worth.
After identifying a cost-effective solution for reducing cyber security risk, it’s time to implement and monitor it to ensure that it’s performing according to your expectations.
Has your new email filter reduced the amount of dangerous emails you get? Has your new data backup system allowed you to experience an outage without losing data? Are you monitoring your third-party security with vendor risk management templates?
Implementing security controls is not a set-and-forget process. A strong risk management process requires ongoing monitoring to ensure optimal performance.
Remember, the amount of risk that your assets face is constantly changing. New types of threats emerge all the time. You must routinely conduct a cyber security risk assessment to ensure that you are correctly managing your company’s risk. This ensures that you stay on top of the cyber security needs for your business while correctly managing and assessing the risks posed to your assets.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.