Journal of Physical Security 12(1), 25-28 (2019)
25
Viewpoint Paper
Making the Business Case for Security Investment*
Roger G. Johnston, Ph.D., CPP
Right Brain Security
Traditionally, the case for spending more money on additional security resources is made
by security managers with a Return on Investment (ROI) argument, or by using closely
related Net Present Value (NPR) or Internal Rate of Return (IRR) methods.[1-7] In overly
simplified terms, these economic methods involve estimating the probability of a given
successful security attack. This is multiplied by the estimated cost of the consequences if
the attack should succeed. The total security expenditures over the time period in question
for purposes of countering that attack should equal this product.
The main problem with these economic approaches is that they often don’t work. In
many organizations, the senior manger(s) or executive(s) who make the ultimate approvals
for security funding may be clueless about security and technology. They may be living and
breathing examples of the Peter Principle [8]: the skills that get a senior manager or
executive into their position may be unrelated to the skills needed to do a good job once
there. Even more dangerous is the common situation where senior people in the
organization can’t or won’t envision security failures, so they are rarely going to buy the
economic arguments for dealing with “theoretical” security risks.
When senior executives do envision failure, they often decide the risk of a bad security
incident occurring during their short tenure is low; better to save the money and look
more profitable now, letting the security failure occur on somebody else’s watch. Besides,
scapegoats can always be found if their luck runs out and security does fail during their
time in office. Moreover, in our court system, it is often better to be able to plead
ignorance, rather than instituting some security measure that isn’t 100% effective;
installing a security measure is a tacit admission that the organization knew there were
security risks, and juries don’t like that.
ROI and related methods also suffer from the problem that estimating the probability of a
successful attack is difficult, especially since vulnerabilities are often poorly understood
due to a lack of adequate vulnerability assessments [9-12]. Moreover, the estimated total
costs of a security incident are often underestimated; long-term damage to the
organization’s reputation and good will is often not factored in, or only partially factored in.
___________
* This paper was not peer reviewed.
Journal of Physical Security 12(1), 25-28 (2019)
26
The fact that ROI-type approaches alone often don’t work very well is, I believe, fairly
well recognized by security professionals. Nowadays, many security managers and
CSOs/CISOs use a hybrid approach: A little ROI/NPV/IRR, a little invoking regulations and
standards, some discussion of the threats, and a little (timid) warning of consequences
(including Public Relations and market-share damage) of bad security incidents.
In my view, an ideal hybrid approach should involve the following steps:
(1) Invoke “best security” practices, which rarely are captured by standards and
regulations. Best practices are what a first-class organization strives for.
(2) Enlist the legal department to help explain why meeting regulations and standards, but
falling short of best practices, puts the organization at enormous legal, governmental, and
Public Relations risk when (not if!) a serious security incident occurs.
(3) Discuss what your competitors or similar organizations do for security.
(4) Paint a very vivid picture of what multiple bad security failures look like for your
organization.
(5) Scare high-level executives with stories of the short- and long-term consequences of
security failures in other organizations AND THE PERSONAL HARM THAT CAME TO THEIR
EXECUTIVES AND SENIOR MANAGERS.
(6) Bring in outside vulnerability assessors to help point out security problems and help
with (4) and (5).
(7) Bring in outside threat assessment experts to highlight the threats and to help with (4)
and (5).
(8) Finish up with a ROI/NPV/IRR argument based on (realistic) scare tactics, and with a
SIMPLE explanation of why the new security measures can (at least partially) counter the
organization’s security threats and weaknesses. But be sure to pitch multiple options, not
just one. What is my best option?” for security investment is a much better question that
“Should I do this thing?” and biases the decision-making process towards making some
kind of security investment. According to research by Paul Nutt, organizations that
consider options have more success than those that vote a proposal up or down.[13]
Some comments on this 8-step approach.
• This 8-step approach can be even more effective for government organizations than
businesses, because government bureaucrats are especially easy to scare.
• Economic methods alone rarely work for government organizations, because (as I know
from personal experience) saving money is not a priority, and people who propose cost-
Journal of Physical Security 12(1), 25-28 (2019)
27
saving measures are viewed with enormous suspicion by bureaucrats who don’t want to
lose financial turf.
• “Best Practice” is rarely rigorously defined, but security professionals often have a
surprising degree of agreement on what constitutes best practice in any given
environment. Moreover, the courts usually have had little trouble identifying what is best
practice for purposes of civil litigation, based mostly on expert witnesses.
• In presenting a request for security investment, it is essential to understand the
audience, their hot button issues, their risk appetite, and their terminology.
• If requesting spending on technology, the security manager must shun mere techno-envy,
i.e., wanting only to be able to play with the latest overhyped, fad technology. Technology
can be a useful tool for security but it rarely solves any given security problem, much less
guarantees good security overall.
• Most security managers are afraid to do (2), (4), (5), and (6) and rarely do them because
of fear, sustainability concerns, the shoot-the-messenger problem[7, 14] and the cry-wolf
problem [7, 15]. When they do ROI/NPR/IRR, it is rarely based on scare tactics. Security
managers, including CSOs/CISOs almost always avoid scare tactics—foolishly, I believe.
Scare tactics work! And they can be made sustainable with careful management, explaining
how past security attacks may have been averted or mitigated with the security currently
in place, and emphasizing that the threats, vulnerabilities, and the technologies available to
adversaries are constantly evolving. Moreover, security managers need to keep in mind
why they were hired: to tell upper management what they need to know, not to make them
feel warm and comfortable. Good security and comfort are not compatible.
• In an attempt to limit career damage, security managers should be frank: “Look I know
you senior executives are not going to be happy to hear what I have to tell you, and this
isn’t necessarily what is best for my career, but I was hired to help protect this
organization, and I have a professional and moral obligation to speak frankly about what I
believe needs to be done.” Ultimately, there is nothing unhealthy about a security manager
being more security-focused than her corporate line management.
In summary, it is time to move beyond mere ROI/NPR/IRR methods, and time to stop
being scared of “scare tactics” when there is plenty to be scared about.
About the Author
Roger G. Johnston, Ph.D., CPP is the head of Right Brain Sekurity, a company devoted to
security research and consulting.
Journal of Physical Security 12(1), 25-28 (2019)
28
References
1. ASIS Protection of Assets Manual, Sections 2.5.1, 5-1, and 5.3.1. The Manual also
discusses best practices to some extent but in vague terms.
2. WE Palmer, “What’s Security Worth”, Security Management, March 1, 2004
3. MA Davidson, “Managing Risk Across the Enterprise”, Security Management, July 1, 2009
4. T Pisello, “Is There a Business Case for IT Security”, Security Management, Oct 1, 2004
5. CIOReview, “Making the Business Case for Cyber Security”,
https://www.cioreview.com/news/making-the-business-case-for-cyber-security-how-to-
make-the-senior-management-buyin-nid-15196-cid-145.html
6. B. Chaput, “The Right Way to Present a Business Case for Cybersecurity”,
https://www.healthcare-informatics.com/article/cybersecurity/right-way-present-
business-case-cybersecurity
7. K Lewis, “Economic Evaluation of a Company’s Information Security Expenditures”,
https://infosecwriters.com/text_resources/pdf/Economic_Evaluation.pdf
8. Investopedia, “Peter Principle”, https://www.investopedia.com/terms/p/peter-
principle.asp
9. RG Johnston, “Avoiding Shock and Awe”, Journal of Physical Security 9(2), 26-48 (2016).
10. RG Johnston, “Why Security Fails”, Nuclear Security Matters, February 11, 2015,
http://nuclearsecuritymatters.belfercenter.org/blog/why-security-fails
11. RG Johnston and JS Warner, “Vulnerability Assessment Myths”, Journal of Physical
Security 7(1), 31-38 (2014).
12. RG Johnston and JS Warner, "What Vulnerability Assessors Know That You Should,
Too", Asia Pacific Security Magazine 50, 40-42 (2013)
13. Paul Nutt, Why Decisions Fail (Berrett-Koehler Publishers, 2002).
14. Shoot-the-messenger problem: The bearers of bad or frightening news are often
blamed for that news. See Wikipedia,
https://en.wikipedia.org/wiki/Shooting_the_messenger
15. Cry wolf problem: If a security managers warns about a possible security attack, but it
doesn’t occur or succeed, she may look bad and not be believed in the future. See
Cambridge Dictionary, https://dictionary.cambridge.org/us/dictionary/english/cry-wolf

More Related Content

PDF
It risk assessment
PDF
Risk Assessment Case Study
PPTX
Emerging Need of a Chief Information Security Officer (CISO)
DOCX
case studies on risk management in IT enabled organisation(vadodara)
PDF
Chief Information Security Officer - A Critical Leadership Role
PDF
The Critical Incident Response Maturity Journey
 
PDF
Information Security Strategic Management
PDF
Putting safety to work the business case for psychology based safety training...
It risk assessment
Risk Assessment Case Study
Emerging Need of a Chief Information Security Officer (CISO)
case studies on risk management in IT enabled organisation(vadodara)
Chief Information Security Officer - A Critical Leadership Role
The Critical Incident Response Maturity Journey
 
Information Security Strategic Management
Putting safety to work the business case for psychology based safety training...

What's hot (20)

PPTX
Technology Risk Management
PDF
Cybersecurity Goverence for Boards of Directors
DOCX
Security Assurance
PDF
From checkboxes to frameworks
DOCX
Generic_Sample_incidentresponseplanIRP_ISS_2016
PPT
2007 CPM West Keynote Presentation
DOC
Adversarial Safety Analysis
PDF
u10a1-Risk Assessment Report-Beji Jacob
PDF
Common Objectives of the CRO and the CAE
PDF
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
PDF
Sensible defence
PPTX
2010; Risk Management Workshop Rev.1.1
PDF
Technology leadership driving business innovation
PDF
2014 Executive Breach Preparedness Research Report
PDF
Coordinating Security Response and Crisis Management Planning
PDF
Information Technology Vendor Risk Management
PDF
when minutes counts
PDF
Prevent & Protect
PDF
rp-esg-tackling-attack-detection-incident-response
Technology Risk Management
Cybersecurity Goverence for Boards of Directors
Security Assurance
From checkboxes to frameworks
Generic_Sample_incidentresponseplanIRP_ISS_2016
2007 CPM West Keynote Presentation
Adversarial Safety Analysis
u10a1-Risk Assessment Report-Beji Jacob
Common Objectives of the CRO and the CAE
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
Sensible defence
2010; Risk Management Workshop Rev.1.1
Technology leadership driving business innovation
2014 Executive Breach Preparedness Research Report
Coordinating Security Response and Crisis Management Planning
Information Technology Vendor Risk Management
when minutes counts
Prevent & Protect
rp-esg-tackling-attack-detection-incident-response
Ad

Similar to Making the Business Case for Security Investment (20)

PPTX
Justifying Security Investment
PDF
The human factor
PDF
vision 2020 testimony
PDF
Defense In Depth Using NIST 800-30
PDF
2006 issa journal-organizingand-managingforsuccess
PPTX
People are the biggest risk
PPT
Accidental Insider
PPTX
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
PDF
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
PDF
Incident Response
PDF
managed-security-for-a-not-so-secure-world-wp090991
PPT
Organizational Security: When People are Involved
PDF
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
PDF
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
PDF
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
PDF
Independent-Fall-2015-Edition
DOCX
An Evaluation of Investment Models within Information Security
PDF
2005 issa journal-risk-management
PDF
Why Traditional Security has Failed
PDF
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
Justifying Security Investment
The human factor
vision 2020 testimony
Defense In Depth Using NIST 800-30
2006 issa journal-organizingand-managingforsuccess
People are the biggest risk
Accidental Insider
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
Incident Response
managed-security-for-a-not-so-secure-world-wp090991
Organizational Security: When People are Involved
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
Independent-Fall-2015-Edition
An Evaluation of Investment Models within Information Security
2005 issa journal-risk-management
Why Traditional Security has Failed
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
Ad

More from Roger Johnston (20)

PDF
In Risu Veritas: Humor & Security
PDF
Journal of Physical Security 15(1)
PDF
Security Audits.pdf
PDF
Camera Obscura and Security/Privacy
PDF
Vulnerability Assessment: The Missing Manual for the Missing Link
PDF
Journal of Physical Security 14(1)
PDF
Want seals with that?
PDF
Journal of Physical Security 13(1)
DOCX
Election Security 2020
PDF
A New Approach to Vulnerability Assessment
PDF
Understanding Vulnerability Assessments
PDF
Devil's Dictionary of Security Terms
PDF
Vulnerability Assessments
PDF
Design Reviews Versus Vulnerability Assessments for Physical Security
PDF
Journal of Physical Security 12(3)
PDF
Journal of Physical Security 12(2)
PDF
Unconventional Security Devices
PDF
Journal of Physical Security 11(1)
PDF
Journal of Physical Security 10(1)
PDF
How to Remove Voter's Ink
In Risu Veritas: Humor & Security
Journal of Physical Security 15(1)
Security Audits.pdf
Camera Obscura and Security/Privacy
Vulnerability Assessment: The Missing Manual for the Missing Link
Journal of Physical Security 14(1)
Want seals with that?
Journal of Physical Security 13(1)
Election Security 2020
A New Approach to Vulnerability Assessment
Understanding Vulnerability Assessments
Devil's Dictionary of Security Terms
Vulnerability Assessments
Design Reviews Versus Vulnerability Assessments for Physical Security
Journal of Physical Security 12(3)
Journal of Physical Security 12(2)
Unconventional Security Devices
Journal of Physical Security 11(1)
Journal of Physical Security 10(1)
How to Remove Voter's Ink

Recently uploaded (20)

PDF
Booking.com The Global AI Sentiment Report 2025
DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PDF
income tax laws notes important pakistan
PPTX
chapter 2 entrepreneurship full lecture ppt
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PDF
Introduction to Generative Engine Optimization (GEO)
PDF
ICv2 White Paper - Gen Con Trade Day 2025
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PPTX
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
DOCX
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
PDF
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
DOCX
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
PDF
Chapter 2 - AI chatbots and prompt engineering.pdf
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
Satish NS: Fostering Innovation and Sustainability: Haier India’s Customer-Ce...
Booking.com The Global AI Sentiment Report 2025
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
income tax laws notes important pakistan
chapter 2 entrepreneurship full lecture ppt
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
Introduction to Generative Engine Optimization (GEO)
ICv2 White Paper - Gen Con Trade Day 2025
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
Slide gioi thieu VietinBank Quy 2 - 2025
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
NEW - FEES STRUCTURES (01-july-2024).pdf
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
Chapter 2 - AI chatbots and prompt engineering.pdf
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Satish NS: Fostering Innovation and Sustainability: Haier India’s Customer-Ce...

Making the Business Case for Security Investment

  • 1. Journal of Physical Security 12(1), 25-28 (2019) 25 Viewpoint Paper Making the Business Case for Security Investment* Roger G. Johnston, Ph.D., CPP Right Brain Security Traditionally, the case for spending more money on additional security resources is made by security managers with a Return on Investment (ROI) argument, or by using closely related Net Present Value (NPR) or Internal Rate of Return (IRR) methods.[1-7] In overly simplified terms, these economic methods involve estimating the probability of a given successful security attack. This is multiplied by the estimated cost of the consequences if the attack should succeed. The total security expenditures over the time period in question for purposes of countering that attack should equal this product. The main problem with these economic approaches is that they often don’t work. In many organizations, the senior manger(s) or executive(s) who make the ultimate approvals for security funding may be clueless about security and technology. They may be living and breathing examples of the Peter Principle [8]: the skills that get a senior manager or executive into their position may be unrelated to the skills needed to do a good job once there. Even more dangerous is the common situation where senior people in the organization can’t or won’t envision security failures, so they are rarely going to buy the economic arguments for dealing with “theoretical” security risks. When senior executives do envision failure, they often decide the risk of a bad security incident occurring during their short tenure is low; better to save the money and look more profitable now, letting the security failure occur on somebody else’s watch. Besides, scapegoats can always be found if their luck runs out and security does fail during their time in office. Moreover, in our court system, it is often better to be able to plead ignorance, rather than instituting some security measure that isn’t 100% effective; installing a security measure is a tacit admission that the organization knew there were security risks, and juries don’t like that. ROI and related methods also suffer from the problem that estimating the probability of a successful attack is difficult, especially since vulnerabilities are often poorly understood due to a lack of adequate vulnerability assessments [9-12]. Moreover, the estimated total costs of a security incident are often underestimated; long-term damage to the organization’s reputation and good will is often not factored in, or only partially factored in. ___________ * This paper was not peer reviewed.
  • 2. Journal of Physical Security 12(1), 25-28 (2019) 26 The fact that ROI-type approaches alone often don’t work very well is, I believe, fairly well recognized by security professionals. Nowadays, many security managers and CSOs/CISOs use a hybrid approach: A little ROI/NPV/IRR, a little invoking regulations and standards, some discussion of the threats, and a little (timid) warning of consequences (including Public Relations and market-share damage) of bad security incidents. In my view, an ideal hybrid approach should involve the following steps: (1) Invoke “best security” practices, which rarely are captured by standards and regulations. Best practices are what a first-class organization strives for. (2) Enlist the legal department to help explain why meeting regulations and standards, but falling short of best practices, puts the organization at enormous legal, governmental, and Public Relations risk when (not if!) a serious security incident occurs. (3) Discuss what your competitors or similar organizations do for security. (4) Paint a very vivid picture of what multiple bad security failures look like for your organization. (5) Scare high-level executives with stories of the short- and long-term consequences of security failures in other organizations AND THE PERSONAL HARM THAT CAME TO THEIR EXECUTIVES AND SENIOR MANAGERS. (6) Bring in outside vulnerability assessors to help point out security problems and help with (4) and (5). (7) Bring in outside threat assessment experts to highlight the threats and to help with (4) and (5). (8) Finish up with a ROI/NPV/IRR argument based on (realistic) scare tactics, and with a SIMPLE explanation of why the new security measures can (at least partially) counter the organization’s security threats and weaknesses. But be sure to pitch multiple options, not just one. What is my best option?” for security investment is a much better question that “Should I do this thing?” and biases the decision-making process towards making some kind of security investment. According to research by Paul Nutt, organizations that consider options have more success than those that vote a proposal up or down.[13] Some comments on this 8-step approach. • This 8-step approach can be even more effective for government organizations than businesses, because government bureaucrats are especially easy to scare. • Economic methods alone rarely work for government organizations, because (as I know from personal experience) saving money is not a priority, and people who propose cost-
  • 3. Journal of Physical Security 12(1), 25-28 (2019) 27 saving measures are viewed with enormous suspicion by bureaucrats who don’t want to lose financial turf. • “Best Practice” is rarely rigorously defined, but security professionals often have a surprising degree of agreement on what constitutes best practice in any given environment. Moreover, the courts usually have had little trouble identifying what is best practice for purposes of civil litigation, based mostly on expert witnesses. • In presenting a request for security investment, it is essential to understand the audience, their hot button issues, their risk appetite, and their terminology. • If requesting spending on technology, the security manager must shun mere techno-envy, i.e., wanting only to be able to play with the latest overhyped, fad technology. Technology can be a useful tool for security but it rarely solves any given security problem, much less guarantees good security overall. • Most security managers are afraid to do (2), (4), (5), and (6) and rarely do them because of fear, sustainability concerns, the shoot-the-messenger problem[7, 14] and the cry-wolf problem [7, 15]. When they do ROI/NPR/IRR, it is rarely based on scare tactics. Security managers, including CSOs/CISOs almost always avoid scare tactics—foolishly, I believe. Scare tactics work! And they can be made sustainable with careful management, explaining how past security attacks may have been averted or mitigated with the security currently in place, and emphasizing that the threats, vulnerabilities, and the technologies available to adversaries are constantly evolving. Moreover, security managers need to keep in mind why they were hired: to tell upper management what they need to know, not to make them feel warm and comfortable. Good security and comfort are not compatible. • In an attempt to limit career damage, security managers should be frank: “Look I know you senior executives are not going to be happy to hear what I have to tell you, and this isn’t necessarily what is best for my career, but I was hired to help protect this organization, and I have a professional and moral obligation to speak frankly about what I believe needs to be done.” Ultimately, there is nothing unhealthy about a security manager being more security-focused than her corporate line management. In summary, it is time to move beyond mere ROI/NPR/IRR methods, and time to stop being scared of “scare tactics” when there is plenty to be scared about. About the Author Roger G. Johnston, Ph.D., CPP is the head of Right Brain Sekurity, a company devoted to security research and consulting.
  • 4. Journal of Physical Security 12(1), 25-28 (2019) 28 References 1. ASIS Protection of Assets Manual, Sections 2.5.1, 5-1, and 5.3.1. The Manual also discusses best practices to some extent but in vague terms. 2. WE Palmer, “What’s Security Worth”, Security Management, March 1, 2004 3. MA Davidson, “Managing Risk Across the Enterprise”, Security Management, July 1, 2009 4. T Pisello, “Is There a Business Case for IT Security”, Security Management, Oct 1, 2004 5. CIOReview, “Making the Business Case for Cyber Security”, https://www.cioreview.com/news/making-the-business-case-for-cyber-security-how-to- make-the-senior-management-buyin-nid-15196-cid-145.html 6. B. Chaput, “The Right Way to Present a Business Case for Cybersecurity”, https://www.healthcare-informatics.com/article/cybersecurity/right-way-present- business-case-cybersecurity 7. K Lewis, “Economic Evaluation of a Company’s Information Security Expenditures”, https://infosecwriters.com/text_resources/pdf/Economic_Evaluation.pdf 8. Investopedia, “Peter Principle”, https://www.investopedia.com/terms/p/peter- principle.asp 9. RG Johnston, “Avoiding Shock and Awe”, Journal of Physical Security 9(2), 26-48 (2016). 10. RG Johnston, “Why Security Fails”, Nuclear Security Matters, February 11, 2015, http://nuclearsecuritymatters.belfercenter.org/blog/why-security-fails 11. RG Johnston and JS Warner, “Vulnerability Assessment Myths”, Journal of Physical Security 7(1), 31-38 (2014). 12. RG Johnston and JS Warner, "What Vulnerability Assessors Know That You Should, Too", Asia Pacific Security Magazine 50, 40-42 (2013) 13. Paul Nutt, Why Decisions Fail (Berrett-Koehler Publishers, 2002). 14. Shoot-the-messenger problem: The bearers of bad or frightening news are often blamed for that news. See Wikipedia, https://en.wikipedia.org/wiki/Shooting_the_messenger 15. Cry wolf problem: If a security managers warns about a possible security attack, but it doesn’t occur or succeed, she may look bad and not be believed in the future. See Cambridge Dictionary, https://dictionary.cambridge.org/us/dictionary/english/cry-wolf