We are constantly talking about cyber security threats and breaches. Hundreds of companies, large and small, experienced attacks last year, while many more experienced threats and worked to prevent attacks. Part of a strong cybersecurity protection plan is monitoring systems for outside threats in order to shut them down before they become a problem. Because there is no way of knowing how many attacks have been prevented, it begs the question: Are all threats created equal?
When you’re monitoring a system, it’s nearly impossible to know if what you’re seeing is a threat on a grand scale or just a small blip. Cybercrime has evolved into multifaceted, sophisticated attacks. Criminals are working in large teams, carrying out long-lasting operations that follow a specific “business model.” Cyber security is more important now than ever. Here’s what you need to know about threat management and monitoring.
Today’s digital world functions under the reality that it is constantly at risk. Business and individuals alike must manage those risks to effectively limit their exposure to threats. The first step to risk management is properly assessing it. While every risk assessment is different depending upon respective business goals and the systems in place, all assessments include the following basic types of threats:
Once risks have been identified, subsequent steps of the assessment include determining risk impact, assessing your control environment, determining a likelihood rating such as high, medium, and low, and finally, calculating your risk rating. The entire assessment is meant to be considered an ongoing, continual process, one that should be revisited regularly in order to maintain the highest level of cybersecurity. Once you understand your company’s resiliency, you can effectively quantify your risk management data.
Many businesses don’t even realize they’re under attack until it’s too late. Experts have found this is due to lack of preparation, and also a little bit of “playing ostrich.” Sticking your proverbial head in the cyber sand won’t mitigate risk—only proper preparation will.
Preparation begins with identifying and addressing potential gaps in your security to improve your business’s continuity. Data sets quantify these gaps, then put them in order of importance so companies can better prioritize and manage risks. Ensuring your company is working with quality data is the first and most important step to effective quantifying. Industry analyst Fran Howarth addresses the challenge of poor-quality data, noting, “Information needs to be aggregated across functional areas so risk management strategies can be set at an organizational level.” She encourages companies to report all risks, no matter how big or small, as increased sharing means better informed risk management strategies in the future.
Data must also be up to industry standards as to improve risk management practices. Companies are advised to follow the standards set by The National Institute of Standards and Technology, which also includes guidelines and practices for protecting infrastructure. Specifically, NIST offers a hybrid cloud risk management model that “groups activities into three categories based on the level at which they address risk-related concerns.” In keeping with Howarth’s suggestion for organizing threat responses, the NIST uses the following categories to sort activities and concerns:
Kevin Jackson, CEO/Founder of the GovCloud Network, lauds an effective approach to hybrid risk management: “Addressing these activities in reverse order, the NIST Risk Management Framework (RMF) provides a disciplined and structured process for integrating tier 3 enterprise information security with risk management activities.” Though it is understood this framework is but a professional recommendation and not an exact science, adhering to it helps companies improve their security programs.
We must invest in quantifying cyber risk if we hope to manage it. This is not only true for companies, but for every individual’s cybersecurity. Sharing insights is an important part of gathering information to make the right decisions and keep cyber space safe. The best way to ensure an informed outcome is always through high-quality data.
This post was brought to you by IBM Global Technology Services. For more content like this, visit IT Biz Advisor.
In this guest contribution from Steve Vonder Haar, Senior Analyst with Wainhouse, a Futurum Group…
In this guest contribution from Craig Durr, Senior Analyst with Wainhouse, a Futurum Group Company,…
Futurum's Daniel Newman dives into the recent announcement coming out of Micron, that they will…
Futurum analyst Michael Diamond recaps the Amazon Devices and Services event and reviews some of…
Futurum senior analyst Steven Dickens provides his take on the latest announcements coming out of…
Futurum’s Ron Westfall and Daniel Newman examine Micron’s financial results for the fourth quarter 2022…