Posted on Apr 12, 2018
CEOs and CISOs need one another to maintain security postures that lead to growth. Edna Conway, Cisco’s Chief Security Officer for Global Value Chain & Aleksandr Yampolskiy, CEO and Co-Founder of SecurityScorecard, discuss strategies for translating security into the language of business.
The convergence of information technology, operational technology, and the human element require the Chief Risk Officer (CRO) to partner with the Chief Information Security Officer (CISO) to discuss information security impact in dollars, results, and risk. Yampolskiy noted that when CISOs use technical language such as “SSL encryption,” something is lost in translation. Instead, CISOs need to frame the conversation to match the Board of Directors’ D&O perspective. Instead of saying “SSL encryption” and listing several statistics, they should sayt “Encrypting the data may save the organization $2 million and will only cost $100 thousand to implement.” As Yampolskiy notes,”the biggest security risk is going out of business.”
When assessing risk, organizations must factor in likelihood of a potential incident as well as the impact that incident could have. For example, a hedge fund and retail website face different risks. Thus, these businesses must tailor their technical controls to address these unique risks.
When consider what controls are appropriate, Conway advises organizations to ask three core questions:
Information security officers must communicate effectively to become agents of change that can impact business decisions.
A cyber security officer should interact across department lines within the organization and also with other organizations that have access to their data. . This requires mapping internal stakeholder relationships to third party, development, or deployment partners to document relationship ownership. Yampolskiy shares that as CISO, he created a relationship with Chief Counsel who then ensured the security team reviewed vendor contracts, helping to mitigate risk presented by third parties.
As a CISO, Yampolskiy worried that while he possessed the tools to assess organizational infrastructure, third parties from other departments remained oblique. Environments exponentially become more complex with thousands of suppliers and third parties providing critical business services.
Conway states that 80% of businesses feels unprepared to deal with third-party breach impacts. Moreover, most attributable breaches over the last seven years arose from third parties. These statistics alone show that organizations must properly mitigate third-party risks. NIST 1.1 in CSF specifically notes that companies cannot manage risk if they do not know with whom they are operating, what those vendor do for the business, and how those parties handle risk. Yampolskiy says, “‘Partner’ is an important word. It’s not ‘they,’ it’s ‘us.’”
Organizations need to define their risk appetite and make their cybersecurity decisions with this in mind; this is what the industry refers to as “operating around your risk threshold or risk tolerance level.” Yampolskiy illustrates this concept with an analogy: “Pilots need instruments to safely land a plane in a storm, and cybersecurity similarly needs quantification of risk and improvement measurements.”
Another way to measure risk appetite and define an organization’s risk tolerance level is to understand how peers or competitors in the industry operate. . By benchmarking against relevant companies, CISOs can detail metrics that help executives make informed decisions.
Yampolskiy reminds security practitioners that compliance departments can be strong allies when translating security to business language. Both information security and compliance professionals should work together to present their business case for cybersecurity investment to CEOs and the Board.
Vendor management is the process an organization utilizes to assess and manage a third- or fourth-party vendor. Learn how SecurityScorecard can help.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 20 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.