The Achilles' heel of Cybersecurity: You are as Strong as your Weakest Link

The Achilles' heel of Cybersecurity: You are as Strong as your Weakest Link

Many of us grew up with folklore and have heard of the story of Achilles and his vulnerable heel. It was a cautionary tale. Much like Achilles, the world of cybersecurity possesses its own Achilles' heel — a weakness that, despite overall strength, can lead to downfall. While there are various factors that contribute to this vulnerability, it is the unknown unknowns that makes us the most vulnerable. I often refer to the blind spots. Let's take a moment to expore the strategies to bolster our cybersecurity resilience.

The Complexity Conundrum

Cybersecurity controls are designed to protect organizations from evolving threats. However, over time, these controls can become a tangled web of complexity. There are at least two primary reasons contribute to this complexity: reactive enhancements and the pursuit of the best control solutions.

Reactive Enhancements

As risks emerge and technologies advance, risk managers react by enhancing control systems. Although these changes are initially justified and necessary, they can accumulate over time, resulting in a complex patchwork of controls. Sometimes, I refer to these as the "Frankenstein" controls.

The Pursuit of the Best

In the quest for optimal security, organizations seek out the best control solutions available. It's chasing the next shiny thing on Gartner's Magic Quadrant. The allure of cutting-edge technologies and their promised benefits often leads to the integration of current-gen and next-gen systems. While this pursuit is well-intentioned, it can further complicate the cybersecurity landscape.

Simplifying Cybersecurity: A Risk-Based Approach

When I was much younger, one important lesson I learned is that the biggest challenges in implementing security controls is balancing security and usability. Having strong measures in place is important but they should never hinder the usability of the system or application we are protecting. This is where a risk-based approach comes into play, where the level of security controls is determined based on the level of risk associated with the system or application. Here is a suggested step-by-step risk-based approach:

Step 1: Asset Identification

If we do not know what are our precious critical assets and know what to protect, then how do we protect them? What you don't know, you cannot protect. Thorough asset identification will help give you visibility of your assets, allowing you to label or tag those which are considered high-value assets, knows their movement and usage across your organisation. This is the starting point. To be effective, security controls and protection measures should commensurate with the value and classification of the assets.

Step 2: Risk Assessment

Next step in a risk-based approach is to perform a risk assessment to evaluate and identify your organisation's high-risk threat vectors, vulnerabilities, likelihood, risks and potential impact to your high-value assets which you need to protect. Relationships between assets, processes, threats, vulnerabilities and other factors are analyzed in the risk assessment. One method is to conduct a BIA (Business Impact Analysis).

Step 3: Attack Surface

With your asset inventory collected or identified and risks quantified, the next step is to map and undertand your attack surface. You could do a network discovery, focusing on Internet-facing systems, Cloud services, and third-party integrations. The attack surface mapping identifies potential entry points and high-risk areas and is a useful step for any organization that wants to prioritize which are the areas requiring more focus and stronger controls.

Step 4: Scan, Assess & Observe

Next, to find out what are the current security controls or measures in place, review your policies, standards, guidelines, observe processes, perform scans and penetration testing. Leverage on these information sources to create a comprehensive list of controls in place. Those controls that requires significant customization, or integrate with many systems and span organizational silos, or controls which are lengthy with multi-step workflows or procedures to execute, tends to be contribute to the overall complexity. There are also controls that have many upstream or downstream dependencies. This step helps assess and isolate those complex controls. At the same time, this step helps to identify where the gaps are, i.e. the blind spots.

Step 5: Implement, Test, Monitor and Iterate

For each gap identified in the previous step, catalogue these gaps and the missing controls, determine the business impact and prioritize closure of these gaps, guided by their risk scores. It is important to monitor risk factors continually and adapting security priorities and control implementation dynamically driven by the latest threat intelligence and asset valuations.


The Multifaceted Nature of Cyber Risk

Cyber risk encompasses more than just data breaches and privacy concerns. Today, it extends to encompass sophisticated schemes capable of disrupting entire companies, industries, supply chains, and even nations. The economic consequences of such cyberthreats are staggering, amounting to billions of dollars in losses. No organization, regardless of its sector, is immune to cyber risk. However, the key lies in understanding that while cyber risk cannot be escaped, it can be managed, mitigated, and recovered from.

There is concerning disparity between organizations' recognition of cyber-risk as a top priority and their actual response to it. While cyber risk has ascended to the top of corporate risk agendas, many organizations struggle to effectively address it within their broader risk framework. Moreover, while there has been a significant increase in the acknowledgment of cyber risk as a critical concern, confidence in managing cyber-resilience has declined.

Despite the enthusiasm surrounding emerging technologies, many organizations fail to adequately assess the risks associated with their adoption.

While progress has been made in terms of involvement from risk management teams in cyber risk agendas, there is still room for improvement. Yes, there have been greater involvement of risk management teams in cyber risk management in recent years. However, the dominance of IT and information security departments as primary owners of cyber risk management suggests that cyber risk is still largely perceived as a technological issue rather than a strategic business concern.

As businesses become increasingly digitized, the consequences of a successful cyber-attack can be catastrophic, impacting brand reputation, customer satisfaction, and financial stability. To effectively combat cyber-threats, organizations must adopt a holistic approach that encompasses risk assessment, measurement, mitigation, transfer, and strategic planning. The specific combination of these elements will vary depending on each organization's unique risk profile and tolerance.

Conclusion

While cyber risk can never be completely eliminated, it can be effectively managed and mitigated through strategic measures. Organizations must recognize the importance of adopting a risk-based approach to cybersecurity. Only by doing so, they promote a much more tightly coupled alignment with the business. With finite resources, but unlimited cyber threats, a risk based approach objectively guides where to apply controls based on criticality and value of your assets and likelihood of impact. Without risk-based methodology, cybersecurity becomes reactive and ineffective. Bridging the gap between perception and action is crucial, as cyber risk continues to evolve in tandem with technological advancements. Companies must prioritize cyber risk management, involve risk management teams, and allocate resources to safeguard their digital assets and maintain their competitive edge in an increasingly interconnected world.

Remember, cybersecurity is a continuous journey, and the quest for resilience is an ongoing process. By embracing the challenge of complexity, organizations can strengthen their defense against cyber-threats and ensure the longevity of their digital existence.


Suresh Nachiappan

Cyber Security | Compliance | Risk Management | Program Management

12 个月

Yes, it is prudent to use risk based approach.?In addition, the policies, processes and procedures must be updated when there are changes.?This comes into play when we balance security and usability. www.dhirubhai.net/company/itproprime

回复
Evan Dumas

Seeking VP/Sales Roles | Singaporean Permanent Resident | Former Area VP at Proofpoint | Experienced Tech Executive | Driving Excellence in Technology, Cybersecurity, and Software

1 年

Invaluable advice, Wai Kit Cheah! A risk-based approach is key to prioritizing cybersecurity efforts effectively amidst evolving threats. Thanks for sharing!

回复

要查看或添加评论,请登录

Wai Kit Cheah的更多文章

  • Beyond ROI: Why Cost of Inaction is the Key Metric for Cybersecurity Investment

    Beyond ROI: Why Cost of Inaction is the Key Metric for Cybersecurity Investment

    In the boardrooms of enterprises worldwide, conversations about cybersecurity investments often revolve around Return…

    2 条评论
  • Beyond the AI Hype: How Digital Innovation is Reshaping Enterprise Security

    Beyond the AI Hype: How Digital Innovation is Reshaping Enterprise Security

    AI has been an abused term for the past couple of years, with companies rushing to slap "AI-powered" labels on basic…

    6 条评论
  • AI & the SOC: Augmentation, Not Replacement

    AI & the SOC: Augmentation, Not Replacement

    Imagine a world where cyber threats are neutralized before they even materialize, where digital fortresses adapt and…

  • Cloudy with a chance of Data Breach

    Cloudy with a chance of Data Breach

    Ever since AWS launched its first public cloud services of EC2 and S3 in 2006, the migration from on-premises…

  • Good & Evil

    Good & Evil

    In Greek mythology, Pandora was the first human woman, created by the gods. The story behind her origin started with a…

  • Encryption: A Double-Edged Sword in the Digital Age

    Encryption: A Double-Edged Sword in the Digital Age

    Julius Caesar's legacy extends beyond his conquests into cryptography. His eponymous cipher, known as the Caesar…

    1 条评论
  • Secrets

    Secrets

    In today's digitized world, especially with increasing use of APIs and Cloud services, there have been many cases of…

    3 条评论
  • Past, Present, Future

    Past, Present, Future

    Recently, our ex-Prime Minister, Lee Hsien Loong, mentioned that he envied the young men and women, because they enjoy…

    6 条评论
  • Traveling Salesman Problem

    Traveling Salesman Problem

    When I was little, my father used to sell pest control products and he would sometimes bring me along on his sales…

    1 条评论
  • Foxtrot Mike Bravo

    Foxtrot Mike Bravo

    For many, the month of March carries the promise of renewal, a seasonal transition where winter's grip gives way to the…

    3 条评论

社区洞察

其他会员也浏览了