Threat-informed strategy. Is it time to rethink the risk-centric cyber strategy?
"The supreme art of war is to subdue the enemy without fighting." Sun Tzu
Drawing inspiration from Sun Tzu's wisdom, we must reconsider traditional cybersecurity paradigms. For years, the concept of "risk" has been the cornerstone of cybersecurity dialogues, fortified by extensive risk assessments and models. However, as we confront an increasingly unpredictable digital landscape marked by evolving cyber threats, there's a compelling case to shift our focus. Isn't it time for organizations to transition from a risk-centered paradigm to a more proactive and effective threat-informed cybersecurity strategy?
The fallacy of risk assessments
Conventional risk assessment models are woefully inadequate for today's dynamic cybersecurity landscape. For starters, they center on the unrealistic quest for detailed quantification of threats that are, in essence, uncertain. This gives business leaders a false sense of security, implying that threats are known, manageable, and—most misleadingly—quantifiable. Such assessments become outdated almost immediately due to the rapidly evolving nature of cyber threats. Therefore, their effectiveness in aiding in cybersecurity decision-making is highly questionable.
Flawed assumptions and financial risk models
Traditional risk models borrow heavily from the financial sector, treating cyber threats as finite and calculable. This is far from the truth. Cybersecurity is not a static field; it's a rapidly evolving battleground. Using financial risk models assumes a finite set of outcomes, misleadingly encouraging investment in cybersecurity solutions that cannot adequately control or mitigate uncertainty.
The Need for a Shift in Perspective: From Risk to Threat Exposure Management
We must replace this outdated vocabulary and methodology. An effective cybersecurity organisation should manage threat exposure, not risks. In the age of AI-empowered cyber-attacks, the probability of a threat impacting an organisation is nearly 100%. For example, the chance that a ransomware message will appear in a corporate inbox is a certainty, not a probability. It's not about "if" anymore; it's about "when."
Prioritising threat intelligence and exposure management
At the heart of the new approach should be a robust threat intelligence framework and program. In contrast to focusing on yesterday's problems through outdated risk assessments, threat intelligence aims to provide real-time information. This informs immediate action, enabling an organisation to adapt to new threats dynamically. Enterprises should also invest in automated and behavioral capabilities to reduce their exposure to known threats while actively seeking to identify emerging ones.
Dealing with Uncertainty
While defined threats are manageable, there exists a vast cloud of unknown and undefined threats—often termed as 'uncertainty.' Traditional risk models fail miserably in capturing this aspect of cybersecurity. Instead of trying to predict the unpredictable, organisations should adopt foundational cybersecurity practices like "zero trust" and architectural principles relevant to 2023, of which are focused on minimising exposed vulnerabilities and improve resilience to unknown threats.
Tactical and Strategic Threat Intelligence
While tactical intelligence informs immediate decisions about current threats, strategic intelligence helps in long-term planning. Both forms of intelligence are crucial for effectively navigating the uncertainty that characterises the cyber landscape.
Exposure Management
Exposure management revolves around reducing the attack surface—i.e., the sum total of vulnerabilities in a system. By minimising these vulnerabilities, businesses can better manage their exposure to potential threats.
领英推荐
A New Approach to Cybersecurity Strategy
Adopting a threat-informed cybersecurity approach essentially acknowledges the inherently volatile nature of the cyber landscape, conceding that achieving complete security is an unrealistic aim. Rather than attempting to govern "risks," organisations should pivot towards minimising "threat exposure." This requires understanding both current and emergent threats, assessing the degree of vulnerability to these threats, and building the capacity for organisational resilience.
In contrast to traditional risk management that often leans heavily on theoretical constructs, a threat-informed cybersecurity strategy actively concentrates on the identification and management of both existing and potential threats. This avoids the limitations related to uncertainty and probability that characterise conventional risk-based models. Threat-informed methods are anchored in empirical data and translate directly into actionable steps, incorporating several crucial techniques.
Threat Hunting
This proactive approach involves searching for malicious activities that may have evaded traditional security mechanisms. Threat hunting doesn't just wait for alarms to go off; it actively seeks out anomalies that may indicate a security threat, thereby providing an additional layer of protection.
Detection Engineering
An advanced form of threat hunting, detection engineering involves the custom development of threat detection mechanisms. Tailored to the organisation's specific needs, these mechanisms offer far greater sensitivity and specificity in identifying threats.
Asset prioritisation and continuous monitoring
By continuously prioritising assets based on real-world threat data, the organisation could allocate resources more effectively. Continuous monitoring ensured that any anomalies were detected and dealt with in real-time.
Actionable steps for organisations
Expected ROI
Business Outcomes
Conclusion
It's time to break away from traditional risk management models that no longer serve the cybersecurity community effectively. A shift to a threat-informed strategy is not just an upgrade; it's a necessity. By focusing on real threats, actively managing exposures, and making it a priority to build resilience capability, organisations can build more resilient systems. Understanding that we operate in a realm filled with uncertainty is the first step towards creating a cybersecurity strategy that is rooted in the reality of today's complex digital landscape.
Cybersecurity | Managed IT | Process Automation | Cybersecurity Consultant at iT360
1 年A really valuable read. Thanks for taking the time to articulate this. From someone (me) clearly not as deep in the details as yourself: When you speak of “threat exposure”, is that not just another way to say “risk”? Perhaps a better or previously-missing way to measure risk but risk based nonetheless? Are we really moving _away_ from a risk-based approach or simply maturing and refining the approach by using better ways of identifying the level of risk?