Rethinking Risk Management

  /     /     /  
Publicated : 23/11/2024   Category : security


Rethinking Risk Management


Where most organizations fall short in risk management tools, technologies, and talent, and how they can improve.



Its time for organizations to reevaluate their approach to risk management and consider new, more effective techniques and strategies, Jack Jones, chairman of the FAIR Institute and executive vice president of R&D at RiskLens, told attendees this week at the FAIR Conference.
Modern businesses are increasingly aware of risk managements importance; however, many fail to implement the right approach for their specific needs, Jones explained in an interview with Dark Reading ahead of this years show, taking place this week in Washington, DC.
Over the last several years, the conversation around risk quantification and risk analysis has evolved from can it be done to should we do it, and now, how do we do it, he said. The how is a problem for many risk professionals who try to implement change and are challenged by organizational and industry inertia that pushes back against them, Jones said.
Some of the pushback they normally hear: We already do risk management, What weve been doing works; why change? and What youre proposing is not yet best practice.
Jones focus today is on the value proposition of risk management programs. Part of what we expect to provide to this conference is helping people have those conversations and helping them describe the value proposition for change, he said. There are multiple paths to risk quantification and risk management; Jones wants people to understand which is best for them.
One of the major holes in modern programs is they arent actually managing risk. Whats theyre doing is controls management, said Jones, explaining how this approach is more checklist-based than compliance-based. Thats superficial from a risk perspective because theyre not applying any rigor to measuring how those controlled instances matter, he added.
Compounding the problem are tools and technologies the industry relies on. He pointed to the Common Vulnerability Scoring System (CVSS) as an example. Its great at characterizing certain aspects of technical deficiencies, but its not a risk measurement, Jones explained.
If an organization has two systems with the same deficiency – for example, a SQL injection flaw – CVSS would call that critical. But if one of those systems is Internet-facing, doesnt hold sensitive data, and doesnt provide a path to other systems, it may not be as critical as it seems.
When something like CVSS labels a tremendous number of things critical when they may not be, it can generate a lot of noise for a business. Its a losing battle, said Jones. You have to have better metrics than that to be cost-effective in risk management.
Tips for Better Risk Management
There are four components to determine how well an organization can manage the risk landscape: models, the data applied to those models, skills of people doing the work, and the tools they use. Oftentimes, risk analysis is performed by anyone in the business who happens to be assigned to the work, Jones noted, and many companies lack risk measurement tools.
The first step should be training people assigned to risk analysis. Training accomplishes two things: it normalizes mental models around what risk is and how to measure it, and it also teaches them how to make estimates and use data effectively, he said. Regardless of whether the organization is a Fortune 100 company or smaller, and regardless of the path they want to take or how far they plan to take risk analysis, having that sort of clarity is huge, Jones added.
How to know if a risk management program is actually working? I would argue noise reduction, he said. As an example, he describes the risk register, or one of the biggest sources of noise in most risk management programs. This might be a spreadsheet or governance, risk, and compliance (GRC) tool where a business lists top worries and concerns.
The risk register should not be a dumping ground for things youre worried about, Jones said. It should contain risk factors, and if youre going to measure and manage something you must be sure what youre measuring and managing against. What were actually trying to manage is the frequency and magnitude of loss events, said Jones. If you stuff things into a risk register that arent risks but are measured as risk, it messes with the ability to effectively prioritize.
One of the first things organizations are encouraged to do is reconcile the risk register. Businesses often list hundreds of risks that arent risks, said Jones. Reconciling the risk register can help them cut down on noise and prioritize risks that matter most to the company.
Related Content:
7 Ways VPNs Can Turn from Ally to Threat
How Network Logging Mitigates Legal Risk
A Beginners Guide to Microsegmentation
BSIMM10 Emphasizes DevOps Role in Software Security
Check out 
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story:
The 20 Worst Metrics in Cybersecurity
.

Last News

▸ U.S. Military Secrets Stolen by Chinese Hackers ◂
Discovered: 26/12/2024
Category: security

▸ Essential Security Knowledge for Database Administrators. ◂
Discovered: 26/12/2024
Category: security

▸ Black Hat USA 2013: Full Recap ◂
Discovered: 26/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Rethinking Risk Management