If you are wondering whether or not you need a Cyber Security Risk Assessment, you probably need one.

Cyber Security Risk

What is a Cyber Security Risk Assessment?

A Cyber Security Risk Assessment is a comparison of the overall strength of your organization’s cyber security program that includes your approach to risk management and oversight, policies, controls, incident response management, etc. against a standard information security framework.

Purpose of Cyber Security Risk Assessment

The purpose of the risk assessment is to systematically identify and assess cyber security risk to the organization’s strategy, operations, brand, reputation, assets, and resources.

The path to improving your cyber security program begins by first determining your current strengths and vulnerabilities.

An effective risk assessment will:

  • Identify your information assets
  • Estimate the value of those information assets based on their importance to the business (not the unit cost of each component)
  • Identify internal and external threats and vulnerabilities to your organization
  • Estimate the likelihood of an attack and business impact if the information asset is no longer available or severely damaged
  • Assign risk ownership
Cyber Security Risk Assessment

Information Security Frameworks

An information security framework is a series of documented processes used to define policies and procedures around the implementation and ongoing management of information security controls. Another way to think about security frameworks is that they describe “what” an organization will do to manage security risks. These frameworks are a blueprint for building an information security program to manage risk and reduce vulnerabilities.

Some frameworks were developed for specific industries or to satisfy individual regulatory compliance goals. Frameworks are often customized to solve particular information security problems. Frameworks vary significantly in complexity and scale, with some requiring extensive documentation, long implementation timelines, and large budgets to obtain and maintain certification.

There is a large amount of overlap among many of these frameworks in terms of general security concepts. These overlaps allow “crosswalks” to be built between frameworks to show compliance across frameworks.

Security Frameworks

Selecting an Information Security Framework 

Given the confusing array of information security frameworks, it’s understandable why many organizations have either not chosen a framework or have developed an ad hoc framework. Gartner research shows that 21% of clients had not selected a security framework.

Selecting a security framework doesn’t have to be a complicated and or time-consuming process. Any of the major information security frameworks will help you organize and manage your information security program. When selecting a framework, keep in mind the unique needs of your industry, regulatory compliance requirements, customer expectations, and the IT and security capabilities of your organization. Selecting a framework that is over-kill for your organization or one that doesn’t address your specific industry or regulatory compliance requirements can result in gaps, wasted time, and money and overload your team with much more than what they can handle.

The decision to use a particular framework is driven by multiple factors, including industry type and compliance requirements. Publicly traded companies may select ISACA’s COBIT[4] framework, given its focus on integrating IT with accounting and financial systems, making it easier to comply with Sarbanes-Oxley. The ISO 27000 [5] series was developed by the International Standards Organization. It provides a broad information security framework that can be applied to businesses of all types and sizes. It can be thought of as the information security equivalent of ISO 9000 quality standards for manufacturing. It is best used when a company needs to market information security capabilities through the ISO 27000 certification. NIST SP 800-53 [6] is the standard required by U.S. federal agencies but can also be used by any company to build a technology-specific information security program.

Why perform a Cyber Security Risk Assessment?

While you cannot control threats or eliminate all vulnerabilities, you can manage your organization’s readiness to respond by understanding your environment, proper planning, strong policies, adequate controls, and training your staff. By evaluating the likelihood and impact of an attack, you are better equipped to ensure that the executive level and functional management are aligned on security risks and priorities.

Key reasons for conducting a Cyber security Risk Assessment:

  • Asset Inventory– Today’s complex digital landscape contains a complex mix of hardware, software, and information assets. Since the primary goal of a cyber security program is to protect information assets, as assessment will force you to identify, document, and estimate the business value of your information assets.
  • Identify Threats and Vulnerabilities– By identifying who and how your information assets can potentially be attacked, you’ll have compiled a list of the cyber security threats and vulnerabilities your organization faces. By understanding these risks, you can reduce the likelihood and minimize the impact of an attacked.
  • Identify Gaps– A risk assessment will identify gaps and deficiencies in your security program by evaluating your controls against information and regulatory security frameworks, providing you with the full range of risk exposure. A gap analysis is critical for regulatory compliance.
  • Risk Response Input – Identifying and assessing risk provides valuable input into the risk response decision-making process. It’s critical to compare the cost and effort required to mitigate the risk against the business value of the information asset.
  • Establish a Baseline– Performing a cyber security risk assessment helps to determine the overall strength of your information security program.

It’s impossible to eliminate all threats and vulnerabilities. Stop focusing on the high-profile threats you hear about in the media and resist the temptation to buy the latest and greatest product claiming to be the cure-all solution and start building an effective Cyber security program. A cyber security risk assessment will arm your leadership team with the knowledge required to build a solid foundation to improve your overall security posture.

Sources:

1. https://cybersecurity.pamten.com/  – PamTen.com

2. https://www.complianceforge.com/faq/nist-800-53-vs-iso-27002.html – Complianceforge.com

3. “Security Program Management 101 — How to Select Your Security Frameworks, Controls and Processes”, Gartner 2019

4. https://cobitonline.isaca.org/

5. https://www.iso.org/isoiec-27001-information-security.html

6. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

Not sure where to start?

Schedule a conversation with one of our experts.

Not ready to speak with us, that’s fine. Try-out our Risk Assessment Tool at no cost or obligation.