Request Demo

Risk Quantification & Metrics

Contextualize Quantified Cyber Risk With A Risk Appetite Statement

down-arrow

Now more than ever, CISO’s are being tasked with delivering hard metrics around an enterprise’s technology and digital risk. While this is nothing new for seasoned information security professionals, the challenge here lies in providing these metrics in a way that is applicable and meaningful to the rest of the C-suite, the CEO, and the Board. The first step in this process is contextualizing the risk data generated by understanding where it fits in the general enterprise risk profile as a whole. This contextualization begins with a risk appetite statement.

Brief Overview of Risk Appetite Statements

Risk appetite statements are nothing new - as more enterprise organizations have recognized the diversifying forms of risk that their organization faces (financial, operational, etc.) - they have come to realize they need a documented method for the whole organization to understand how to make decisions about new risks. More commonly, risk appetite statements are used in financial institutions but they are starting to be seen in other industries as well. Risk appetite statements define the risk tolerance that the organization as a whole is willing to shoulder to achieve business success.

Cyber Risk Is The Newest Addition

While business leaders are well adjusted to managing risks in the physical realm, cyber risk is a whole new world. While we are still starting to see more data supporting cyber risk, the lack of historical data cannot keep organizations from adding those digital risks into the mix. However, this lack of historical data on cybersecurity risk combined with a more significant lack of understanding of cybersecurity, in general, has left many organizations’ approach to cyber risk siloed within IT.

What organizations are challenged with now, is to embrace cyber risk quantification and embed it into their cyber risk appetite model (and overall risk appetite) or face the same fates as Equifax or Wells Fargo.

Rolling Cyber Risk Into Your Risk Appetite Statement Enhances Risk Quantification

From a management standpoint, directly reporting cyber metrics with no context further distances information security from the business side of the organization. The metrics that technical leaders use to measure the cybersecurity health and posture of an organization just do not transfer to business-side conversations. Gartner states of board members surveyed, 80% value "risk posture" as the most important metric for reporting. Less than 20% of CISOs thought the same.

Technical leaders are often tempted to get lost in the weeds - to spend time on details and deliver information that does not fit into the context of what senior management and the Board are looking for. For business-side leaders and CISOs alike, integrating cyber risk into an enterprise risk appetite statement creates a single source of truth for both parties to know what the other expects of them.

Sample risk appetite statements and why they work for cyber

From Gartner - National Bank

<The Bank> faces a broad range of risks in its responsibilities as a central bank. Acceptance of some risk is often necessary to foster innovation and efficiencies within business practices. The risks arising from our policy responsibilities can be significant. These are managed through processes emphasizing the importance of integrity, maintaining quality staff and public accountability.

<The Bank> is also exposed to some significant financial risks, mainly due to it holding foreign exchange reserves. In terms of operational risks, we have a low appetite for risk and make resources available to control operational risks to acceptable levels. <The Bank> recognizes that it is not possible or necessarily desirable to eliminate some of the risks inherent in its activities.

Why it works

This model risk statement gives insight into the enterprise organization’s risk approach as a whole. Specifically, the statement highlights critical risks that are necessary to accept to participate in the industry. As we all know there are specific risks to specific sectors. Although, cybersecurity risk is the glue that ties many organizations together - all organizations are hitting the point of accepting more cyber risks. For CISO’s a statement like this helps them and their teams understand where resources need to go based both on the priorities of the organization from a high level and specific to cyber risk.

From Gartner: Local Credit Union

The organization has a tolerance for risk, allowing it to achieve its business objectives in a manner that is compliant with the laws and regulations in the jurisdiction in which it operates.

The organization has a low-risk appetite for the loss of its business and customer data. The organization has a medium risk appetite for physical information security assets and will track assets greater than US$2,000. Information assets will be protected per the organization's data classification framework. The organization has a high-risk appetite for access controls. All access to the organization's mission-critical systems will be controlled via biometric authentication.

Why it works

This sample statement further hammers the importance of certain risks over others. It grants insight for the whole organization into what the teams shouldering this risk need to prioritize for the enterprise to function. Statements like these contextualize specific risks within the risk landscape as a whole for any given team - in our case security risk and cyber risk management teams.

CISO’s Must Contribute To An Enterprise Risk Appetite Statement

Turning a blind eye to cyber risk, as we’ve seen, is no longer an option. Whether the organization already has a general risk appetite statement or if it is still undefined, CISO’s need to be actively involved in developing and iterating on that statement - helping shape their own cybersecurity risk appetite statement, and refining their security teams around risk-based thinking.

You may also like

Integrating GRC: Governance, ...
on June 6, 2019

In our Integrating Governance Risk and Compliance series, CyberSaint leadership explores the process through which cybersecurity leaders can reconfigure their organizations to ...

Jerry Layden
Critical Capabilities of Cyber ...
on June 4, 2019

As Boards and CEOs start taking a greater concern with the security posture of their enterprise, CISOs and information security teams are being faced with translating their cyber ...

Integrating Governance, Risk, and ...
on May 30, 2019

When Gartner released the magic quadrant for integrated risk management (IRM) in 2018 rather than for governance risk and compliance (GRC), members of the information security ...

An Integrated Risk Management ...
on May 28, 2019

As cybersecurity is elevated to a Board- and CEO-level issue, the role it plays in overall enterprise risk management is is becoming more apparent. With that comes a need for an ...

Using NIST 800-30 To Implement The ...
on May 23, 2019

The National Institutes of Standard and Technology’s Risk Management Framework (RMF) is a foundational aspect to managing cybersecurity risk. When coupled with the NIST ...

NIST Cybersecurity Framework Tool ...
on May 21, 2019

For almost all organizations large and small the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) represents the gold standard for managing ...