Security vs. Management -- What is an Acceptable Level of Risk?
Every major data breach should convince business leadership to immediately review security policies and network systems integrity. What many company managers don’t realize is that cyber criminals aren’t the only threat. Ponemon Institute research reveals that only 36 percent of data breaches are attributable to cyber-criminal activity; human error and system glitches are responsible for the remaining 64 percent.
It’s critical for IT security professionals to inform and educate company leadership so they understand the risks associated with operating in a digital world and how threat modeling benefits the organization by defining acceptable risk levels. However, there’s a disconnect, a knowledge gap, between the C-Suite and the IT clubhouse.
When you approach management and start talking about security protocol, it’s important to make sure everyone understands the difference between internal and external actors, accidental versus intentional exposure and damage your company may experience if data is compromised. Enterprise decision-makers don’t necessarily understand the language – threat vectors, perimeters, pain points, exploitable vulnerabilities. Defending the budget is also a challenge for some tech teams. Explaining that IT risk management isn’t an off-the-shelf product or a policy you purchase and forget, but rather a process that involves continual examination as the company grows and security objectives evolve is as critical as toning down the technology jargon.
Using Threat Modeling to Define Acceptable Risk Levels
Security assessments, threat modeling, enables organizations to identify vulnerabilities and deploy strategies via well-defined policies, processes and sound IT architecture that protects your valuable assets. The process examines human capital, workflow and production processes, and technologies across the enterprise to gauge the health of existing security protocol and risk mitigation strategies.
Depending on the nature of the business and security objectives, IT professionals may choose to use one of the standard threat model templates – such as the Common Vulnerability Scoring System (CVSS) or STRIDE – or create a scheme designed specifically for their enterprise operating structure. The goal of the exercise is to help decision-makers understand that high-priority risks demand higher resource investments than low-level risks. It doesn’t make sense to allocate extensive resources toward protecting against point of sale attacks if your firm primarily provides corporate legal services.
Identifying Vulnerabilities
Anything that could harm the enterprise is a potential threat. Most fall into the tech triad – the network architecture, the human capital operating/accessing the systems and the data stored, transported and manipulated. Failure to consider all three components needlessly exposes company assets.
Partnering with a System Integrator
Educating the C-Suite on the importance of implementing a sound security protocol backed up with state-of-the-art technology is critical for securing the data center. Working with ePlus engineers and security architects positions your organization to secure your network with best-available next generation firewall technologies from well-respected companies such as Fortinet as you build a sustainable IT roadmap customized to help you achieve your corporate vision.