• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Resources Blogs

What, why and how of cyber risk quantification

allantan by allantan
May 15, 2023

Photo by Skitterphoto: https://www.pexels.com/photo/brown-wooden-mouse-trap-with-cheese-bait-on-top-633881/

Share on FacebookShare on Twitter

A survey of 1,200 large organisations representing US$125.2 billion in annual cybersecurity spending, with US$19 billion spent in Asia Pacific, the ThoughtLab 2022 Cybersecurity Solutions for a Riskier World report revealed that 29% of CEOs and CISOs and 40% of chief security officers admit their organisations are unprepared for a rapidly changing threat landscape.

See risk through quantification

David Ng, area director of Asia at SecurityScorecard defines risk quantification as a mechanism to interpret risk assessments, which are often qualitative, to quantitative metrics that are unilaterally understood by the business.

He adds that in the cybersecurity domain, these risks are often characterised by the type of breaches a company experiences like a data breach, insider threat, or ransomware event.

David Ng

"Risk Assessments are usually control-based assessments that check to see whether certain security measures, like enterprise MFA, are implemented within the organisation. Risk assessments are a baseline input into risk quantification."

David Ng

Triggers for running risk quantification

While risk quantification can help organisations understand the financial impact of risks and make informed decisions as to how much resources to allocate to mitigate scenarios, it does involve costs on its own.

It, therefore, makes sense to know what conditions warrant undertaking risk quantification. Ng says the most common use case is for board reporting and that tends to occur quarterly.

"If you are buying cyber insurance, it might only be performed yearly. If you are using cyber risk quantification to inform security investment decisions, you might be performing this type of analysis on a monthly or more frequent basis.

"However, I think we can all agree that risk, especially cyber risk, continuously evolves and we hope that organisations continue to incorporate cyber risk as a holistic part of their enterprise risk program, where risk quantification will be conducted continuously," explains Ng.

When to know you need risk quantification

Ng says an organisation should ask itself how successful they are at communicating the nature and impact of cyber risk.

Related:  Staying informed about evolving threats

"Do security leaders feel like their voices are heard and requests are adequately prioritised? Suppose a security team is struggling to get sufficient acknowledgement from the rest of their organisation. In that case, they should consider cyber risk quantification as a tool to help them better resonate with their peers," he explains.

For some countries, cyber risk quantification is becoming a regulatory consideration. In the United States, the Security and Exchange Commission (SEC) has proposed that business leaders move away from divorcing the cybersecurity conversation from their business conversations.

"Cyber risk quantification is a tool that helps bridge the gap between security and business teams," posits Ng.

Not all risk quantification approaches are created equal

There are multiple approaches to performing a cyber risk quantification assessment. There is no standard in the market for performing a cyber risk quantification analysis and organisations will have to judge which solutions match their view of cyber risk.

"Traditionally cyber risk quantification has been performed by experts who arrive on-site and gather information about the organisation's assets and security controls. These assessments can take weeks to complete and only provide a snapshot of the presently expected losses," noted Ng.

"Solution providers are now offering software-based cyber risk quantification to automate most of that work. These providers are using statistical modelling or machine learning approaches to create models that perform the calculations – fully automated continuous solutions continue to gain the most market traction."

"Within this category of solution providers, we see a lot of differentiation as well. Some use methodologies like FAIR (Factor Analysis of Information Risk) and others employ proprietary techniques that simulate an attacker's path to dealing damage," says Ng.

What to ask when shopping for the right risk assessment

Ng offers several questions, CISOs and decision-makers may need to ask themselves and service providers to identify what is right for them:

  • How well does the output compare against real-world results?
  • What information must the user provide to perform the analysis?
  • What kind of implementation activities must the user complete before being able to perform cyber risk quantification?
  • Will the cyber risk quantification provide recommendations on where to focus risk reduction efforts?
  • How much time does it take to perform a single analysis? How often can it be performed cost-effectively?
Related:  Arcserve debuts new UDP platform

Final thoughts

Ng says the primary buyer of risk quantification solutions falls in the hands of the CISO. However, he opines that depending on the organisation, the CISO may ask that data science colleagues participate in evaluations to test the rigour of any models being used. 

"Your journey to adopting cyber risk quantification can start small. You can wait to make significant investments in cyber risk quantification once your organisation is bought into the concept and started to incorporate it within decision-making."

David Ng

"For example, you can use industry or publicly available research to do some relatively simple calculations that help you understand the magnitude of your potential losses," he suggests. "As stakeholders welcome a more refined analysis you can start adopting cyber risk quantification solutions that don’t require any implementation investments.

"Once you are ready to fully operationalise the enterprise-level cyber risk quantification solutions, you can increase your investment in this capability," he concludes.

John Chambers

In a blog post, John Chambers, Cisco chairman emeritus and CEO of JC2 Ventures, cybersecurity Risk Management is at a crossroads. "The future needs to be automated proactive cyber risk management. Business leaders first want to understand their threat landscape and how well they compare against the market and their peers. Beyond what the risk is, businesses need to learn how to mitigate and manage cyber risk," said Chambers.

* Editor's recommended: PodChats for FutureCISO: Risk quantification strategies in 2023

Tags: cyber risk quantificationrisk quantificationSecurityScorecard
allantan

allantan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • DDoS attacks surge in Asia Pacific, claims Cloudflare
  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl