Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Stepping Up Security Risk Management Practices

Targeted and highly sophisticated cyber-attacks are compelling security practitioners to change the way they deal with evolving threats. The damages associated with breaches are motivating companies to transition from a check-box mentality to a pro-active, risk-based approach to security. This means that security risk management needs to advance beyond traditional yearly assessments.

Targeted and highly sophisticated cyber-attacks are compelling security practitioners to change the way they deal with evolving threats. The damages associated with breaches are motivating companies to transition from a check-box mentality to a pro-active, risk-based approach to security. This means that security risk management needs to advance beyond traditional yearly assessments.

For decades, security risk management was driven by point-in-time compliance certification that was intended to strengthen an organization’s security posture. Escalating data breaches have proven what practitioners have known for years — being in compliance does not equal being secure. In response to the uptick in cyber-attacks, legislators and industry governing bodies alike have started to revise their guidelines to emphasize the implementation of a pro-active, risk-based approach to security over the traditional check-box mentality.

This approach requires that organizations take real-time information into account when running continuous monitoring and mitigation programs. Technology plays a central role in gathering all the necessary pieces that make up the security risk management puzzle. Many organizations have invested heavily in deploying a technology portfolio that can detect cyber-attacks before they can wrack havoc. This trend has been confirmed by Gartner (“Gartner Says Worldwide Information Security Spending Will Grow Almost…”, Gartner, August 2014), which predicts that worldwide spending on information security will reach $76.9 billion in 2015, an increase of 8.2 percent over 2014.

However, accelerating security incidents are raising doubts about the effectiveness of these investments. A PwC survey (“Managing Cyber Risk in an Interconnected World”, PwC, 2015) of 9,700 companies found that they had detected nearly 43 million security incidents in 2014, a compound annual growth rate of 66 percent since 2009.

So what are companies doing wrong when it comes to their security risk management investments?

First, increasing the frequency of scans and reporting is a step in the right direction. To create situational awareness and expose exploits and threats in a timely manner, organizations need to gather historic trend data and go beyond continuous monitoring. They need to operationalize security risk management by automating data aggregation and normalization from a variety of sources such as security information and event management (SIEM), asset management, threat feeds, and vulnerability scanners.

Unfortunately, relying on manual processes to comb through mountains of logs is one of the main reasons that critical issues are not being addressed in a timely fashion. The Target breach is a good example. The right tools were in place and reported the intrusion, but due to the volume of data that the outsourced security operations team needed to assess on an ongoing basis, the breach was never detected. In fact, Target was alerted to the breach by a third-party, which according to the Verizon Data Breach Investigation Report is not uncommon.

Instead, organizations need to create an orchestration layer that allows them to contextualize security risk management information in an automated fashion. This model allows security experts to focus solely on those issues that pose a risk to the business rather than being distracted by all the noise generated by mountains of security data.

Advertisement. Scroll to continue reading.
Written By

Dr. Torsten George is an internationally recognized IT security expert, author, and speaker with nearly 30 years of experience in the global IT security community. He regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege for Dummies book. Torsten has held executive level positions with Absolute Software, Centrify (now Delinea), RiskSense (acquired by Ivanti), RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global), Digital Link, and Everdream Corporation (acquired by Dell).

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...