SlideShare a Scribd company logo
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
Why is risk the bridge between
business & security worlds?
I s a i a h M c G o w a n # A T L S e c C o n 2 0 1 7
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
It’s ‘medium-high’ because it
highly effects operations!
The risk is ‘high’ because it’s
easy to conduct the attack!
It’s ‘medium’ because we have
compensating controls!
The Goal of Cybersecurity
Symptoms of Failure
Treating Root Causes
The Way Forward
The Goal of Cybersecurity
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
•All business functions dealing with adverse events share our goal:
•To cost-effectively manage to an acceptable level of risk.
•We are not here to make the business ‘secure’!
“The value of information security is our ability to affect exposure to loss.”
-Jack Jones, Inventor of FAIR
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
The Board of Directors
Responsible for all opportunities and risks
Executive Management
Responsible for executing priorities set by the board
CISO
Responsible for managing cybersecurity risk to an
acceptable level
Cybersecurity Operations
Responsible for executing security initiatives to affect
the frequency and/or magnitude of adverse events
Symptoms of Failure
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
•Unicorn syndrom
•Failing to address underlying assumptions
•Leveraging poor models of the problem space
•Expecting the business to speak our language
•Mixing cybersecurity jargon with business terms
Common symptoms affecting our ability to manage risk:
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
What’s the risk of this bald tire?
•What were your assumptions?
•How did you define ‘risk’?
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
f a i r i n s t i t u t e . o r g / b l o g / f i x i n g - n i s t - 8 0 0 - 3 0
Broken models are broken
Would you go to the moon if…
The Risk Register!!
It’s out of control!!
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
A disease resulting in a Denial of Service attack on an organization attempting to
prioritize cybersecurity issues.
Risk-register-itis
/risk/ˈrejəstər/itis
noun
•Putting any possible issue into a risk register
•A signal-to-noise ratio too great to overcome
Common conditions include:
Treating Root Causes
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
Risk is the probable frequency &
probable magnitude of future loss.
erm…
How likely will adverse events occur and
how unfavorable are they likely to be.
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
Cloud Computing
Unexpired passwords
Privileged Insiders
SQLi
Mobile Devices
Ransomware
Weak VPN encryption
Asset
Control condition
Threat
Attack technique
Asset
Threat
Control condition
Can you spot the risks?
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
Vulns
Findings Exceptions
Control
Gaps
Missing
Policies
Please
Stop!
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
“Treat risk as a science, not a dark art.
Use scenario analysis. Think things through all the way to the
end. Then come back to the beginning and ask yourself "what
if?". While predicting the future is hard, formal risk models like
FAIR and bow-tie can help tremendously.”
-Dr. Ramzan, CTO, RSA
Risk
Loss Event
Frequency (LEF)
Loss Magnitude
(LM)
Threat Event
Frequency (TEF)
Vulnerability
Contact
Frequency
Probability of
Action (PoA)
Threat Capability
(TCap)
Resistance
Strength (RS)
Random
Regular
Intentional
Value
Level of Effort
Risk
Skills
-- Knowledge
-- Experience
Resources
-- Time
-- Materials
Primary Loss Secondary Risk
Secondary Loss
Event Frequency
Secondary Loss
Magnitude
Factor Analysis of Information Risk (FAIR)
Analysis Scoping
1. Identify the asset(s)
2. Identify relevant threat(s)
3. Define Loss Type: C - I - A
Productivity Loss - Loss that results from an operational inability to
deliver products or services
Response Costs - Loss associated with the costs of managing an
event
Risk - The probable frequency and probable magnitude of
future loss
Loss Event Frequency - The frequency, within a given
timeframe, that loss is expected to occur
Data-driven risk analysis
Risk-oriented Cybersecurity Operations
Formal risk models
Incorporating terms that aligns
to the business
•Classification patterns
•VDBIR
•Attack trends
•Threat profiles
•Threat modeling
•STRIDE
Threat Intelligence
•Incident classification alignment
•VERIS
•MITRE
•Reusable data
Incident Management
•Security posture
•Vulnerabilities
•Configuration flaws
•Variance in compliance
Auditing & Scanning
Node Telemetry
•Asset inventory
•Data at risk
•Automated
•Manual
•Outsourced
•Red Team
Testing
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
Risk management is an analytical discipline
Enterprise risk
Uncover key risk drivers
Systematic analysis
Analyses become
repeatable and
operationalized
Scientific analysis results drive
better recommendations to the
business, resulting in cost-
effectively managing risk to an
acceptable level.
Risk Management Goal
Data (telemetry)
Feeds analysis to drive
objective results
The Way Forward
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
•The FAIR Institute
•fairinstitute.org (membership is free)
•Measuring & Managing Information Risk: A FAIR Approach
•Amazon
•‘Getting Started’ reading list
•fairinstitute.org/blog/5-must-read-books-to-jumpstart-your-career-in-risk-
management
Resources:
Risk bridges business and security
C o p y r i g h t 2 0 1 7
R i s k L e n s , I n c .
Questions?!

More Related Content

PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PDF
Threat Hunting 102: Beyond the Basics
PPTX
Machine learning cyphort_malware_most_wanted
PDF
Pitfalls of Cyber Data
PDF
Its time to grow up by Eric C.
PPTX
Security Analytics Beyond Cyber
PPTX
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
PDF
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Threat Hunting 102: Beyond the Basics
Machine learning cyphort_malware_most_wanted
Pitfalls of Cyber Data
Its time to grow up by Eric C.
Security Analytics Beyond Cyber
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...

What's hot (20)

PDF
Collaborated cyber defense in pandemic times
PDF
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
PDF
Make IR Effective with Risk Evaluation and Reporting
PDF
Vendor Cybersecurity Governance: Scaling the risk
PPTX
Modern Security Risk
PDF
The Incident Response Playbook for Android and iOS
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PPTX
Threat modeling the security of the enterprise
PPTX
Cyber Resilience: Managing Cyber Shocks
PPTX
Agentless Patch Management for the Data Center
PDF
Security Testing for Test Professionals
PPTX
The Diamond Model for Intrusion Analysis - Threat Intelligence
PDF
Threat hunting 101 by Sandeep Singh
KEY
Introduction to MicroSolved, Inc.
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
PPT
Anton Chuvakin on What is NOT Working in Security 2004
PDF
ISO 27005 Risk Assessment
PPTX
Resilience is the new cyber security
PPTX
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
PDF
Building a Threat Hunting Practice in the Cloud
Collaborated cyber defense in pandemic times
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
Make IR Effective with Risk Evaluation and Reporting
Vendor Cybersecurity Governance: Scaling the risk
Modern Security Risk
The Incident Response Playbook for Android and iOS
Bridging the Gap Between Threat Intelligence and Risk Management
Threat modeling the security of the enterprise
Cyber Resilience: Managing Cyber Shocks
Agentless Patch Management for the Data Center
Security Testing for Test Professionals
The Diamond Model for Intrusion Analysis - Threat Intelligence
Threat hunting 101 by Sandeep Singh
Introduction to MicroSolved, Inc.
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Anton Chuvakin on What is NOT Working in Security 2004
ISO 27005 Risk Assessment
Resilience is the new cyber security
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Building a Threat Hunting Practice in the Cloud
Ad

Similar to Risk bridges business and security (20)

PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PPTX
Cyber-Security-Presentation for use in office .pptx
PDF
Relating Risk to Vulnerability
PPTX
Risk Management Insights in a World Gone Mad
PDF
OSB50: Operational Security: State of the Union
PDF
Cyber security cyber security cyber security cyber security cyber security cy...
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PPTX
WANTED – People Committed to Solving our Information Security Language Problem
PPTX
Cyber Security # Lec 3
PDF
CYFIRMA_prezo_CyberSecID deck presentation.pdf
PPTX
Allianz Global CISO october-2015-draft
PPTX
BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216
PDF
Scot Secure 2016
PDF
Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014
PDF
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
PDF
Trending it security threats in the public sector
PPTX
Crash Course: Managing Cyber Risk Using Quantitative Analysis
PPTX
WANTED - People Committed to Solving Our Information Security Language Problem
PPTX
Keynote @ ISC2 Cyber Aware Dallas
PPTX
How to Secure America
Outpost24 webinar: Security Analytics: what's in a risk score
Cyber-Security-Presentation for use in office .pptx
Relating Risk to Vulnerability
Risk Management Insights in a World Gone Mad
OSB50: Operational Security: State of the Union
Cyber security cyber security cyber security cyber security cyber security cy...
Bridging the Gap Between Threat Intelligence and Risk Management
WANTED – People Committed to Solving our Information Security Language Problem
Cyber Security # Lec 3
CYFIRMA_prezo_CyberSecID deck presentation.pdf
Allianz Global CISO october-2015-draft
BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216
Scot Secure 2016
Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
Trending it security threats in the public sector
Crash Course: Managing Cyber Risk Using Quantitative Analysis
WANTED - People Committed to Solving Our Information Security Language Problem
Keynote @ ISC2 Cyber Aware Dallas
How to Secure America
Ad

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Modernizing your data center with Dell and AMD
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
MYSQL Presentation for SQL database connectivity
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Monthly Chronicles - July 2025
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Modernizing your data center with Dell and AMD
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx

Risk bridges business and security

  • 1. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . Why is risk the bridge between business & security worlds? I s a i a h M c G o w a n # A T L S e c C o n 2 0 1 7
  • 2. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . It’s ‘medium-high’ because it highly effects operations! The risk is ‘high’ because it’s easy to conduct the attack! It’s ‘medium’ because we have compensating controls!
  • 3. The Goal of Cybersecurity Symptoms of Failure Treating Root Causes The Way Forward
  • 4. The Goal of Cybersecurity
  • 5. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . •All business functions dealing with adverse events share our goal: •To cost-effectively manage to an acceptable level of risk. •We are not here to make the business ‘secure’! “The value of information security is our ability to affect exposure to loss.” -Jack Jones, Inventor of FAIR
  • 6. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . The Board of Directors Responsible for all opportunities and risks Executive Management Responsible for executing priorities set by the board CISO Responsible for managing cybersecurity risk to an acceptable level Cybersecurity Operations Responsible for executing security initiatives to affect the frequency and/or magnitude of adverse events
  • 8. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . •Unicorn syndrom •Failing to address underlying assumptions •Leveraging poor models of the problem space •Expecting the business to speak our language •Mixing cybersecurity jargon with business terms Common symptoms affecting our ability to manage risk:
  • 9. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . What’s the risk of this bald tire? •What were your assumptions? •How did you define ‘risk’?
  • 10. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . f a i r i n s t i t u t e . o r g / b l o g / f i x i n g - n i s t - 8 0 0 - 3 0 Broken models are broken
  • 11. Would you go to the moon if…
  • 12. The Risk Register!! It’s out of control!!
  • 13. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . A disease resulting in a Denial of Service attack on an organization attempting to prioritize cybersecurity issues. Risk-register-itis /risk/ˈrejəstər/itis noun •Putting any possible issue into a risk register •A signal-to-noise ratio too great to overcome Common conditions include:
  • 15. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . Risk is the probable frequency & probable magnitude of future loss. erm… How likely will adverse events occur and how unfavorable are they likely to be.
  • 16. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . Cloud Computing Unexpired passwords Privileged Insiders SQLi Mobile Devices Ransomware Weak VPN encryption Asset Control condition Threat Attack technique Asset Threat Control condition Can you spot the risks?
  • 17. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . Vulns Findings Exceptions Control Gaps Missing Policies Please Stop!
  • 18. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . “Treat risk as a science, not a dark art. Use scenario analysis. Think things through all the way to the end. Then come back to the beginning and ask yourself "what if?". While predicting the future is hard, formal risk models like FAIR and bow-tie can help tremendously.” -Dr. Ramzan, CTO, RSA
  • 19. Risk Loss Event Frequency (LEF) Loss Magnitude (LM) Threat Event Frequency (TEF) Vulnerability Contact Frequency Probability of Action (PoA) Threat Capability (TCap) Resistance Strength (RS) Random Regular Intentional Value Level of Effort Risk Skills -- Knowledge -- Experience Resources -- Time -- Materials Primary Loss Secondary Risk Secondary Loss Event Frequency Secondary Loss Magnitude Factor Analysis of Information Risk (FAIR) Analysis Scoping 1. Identify the asset(s) 2. Identify relevant threat(s) 3. Define Loss Type: C - I - A Productivity Loss - Loss that results from an operational inability to deliver products or services Response Costs - Loss associated with the costs of managing an event Risk - The probable frequency and probable magnitude of future loss Loss Event Frequency - The frequency, within a given timeframe, that loss is expected to occur
  • 20. Data-driven risk analysis Risk-oriented Cybersecurity Operations Formal risk models Incorporating terms that aligns to the business •Classification patterns •VDBIR •Attack trends •Threat profiles •Threat modeling •STRIDE Threat Intelligence •Incident classification alignment •VERIS •MITRE •Reusable data Incident Management
  • 21. •Security posture •Vulnerabilities •Configuration flaws •Variance in compliance Auditing & Scanning Node Telemetry •Asset inventory •Data at risk •Automated •Manual •Outsourced •Red Team Testing
  • 22. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . Risk management is an analytical discipline Enterprise risk Uncover key risk drivers Systematic analysis Analyses become repeatable and operationalized Scientific analysis results drive better recommendations to the business, resulting in cost- effectively managing risk to an acceptable level. Risk Management Goal Data (telemetry) Feeds analysis to drive objective results
  • 24. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . •The FAIR Institute •fairinstitute.org (membership is free) •Measuring & Managing Information Risk: A FAIR Approach •Amazon •‘Getting Started’ reading list •fairinstitute.org/blog/5-must-read-books-to-jumpstart-your-career-in-risk- management Resources:
  • 26. C o p y r i g h t 2 0 1 7 R i s k L e n s , I n c . Questions?!