Risk reduction and cybersecurity

Issue 3 2022 Security Services & Risk Management, Information Security

Risk management is critical to a business. We can find examples as far back as recorded history allows with ship and cargo owners routinely taking up insurance to cover risky voyages. Risk grew as companies became more complex, and today’s risk manager must juggle many physical and esoteric risk considerations.

It’s tempting to mitigate risks by nailing everything down, but that isn’t a practical reaction for certain parts of an organisation. Today’s business risks are not just about preventing the negative, but also supporting the positive.

Cyber risks are a perfect example. In an ideal world, a company would make its IT and data systems impenetrable. But employees, partners and customers need continual access to those resources. This tug-of-war between productivity and security is tricky to manage, and many risk managers find themselves outmanoeuvred by operational demands. Yet they are also at the forefront of helping make digital safe and practical for their businesses.

“Risk and IT professionals are converging around cyber risk,” says Lior Arbel, head of pre- and post-sales at cybersecurity audit service, Encore. “The IT guys understand the technical and process challenges of technology while risk managers translate much of that context for the business. For example, if a CFO weighs technology purchase decisions, they often take in the views of risk managers and as new technology regulations prompt more involvement from company leaders and boards, they also rely more on risk managers to add a business context.”

Risk is one of the ways a business strategically understands its technology. Yet grasping those risks is more often about complexity, Arbel explains.

“Companies are becoming very complex in how they operate and the environments they operate in. Risk management naturally rises to handle that complexity. Since digitisation introduces many new complicated relationships in a company, risk managers cannot avoid the topic. They have to be in the thick of it.”

The topic of cyber risk is complex and will occupy business theorists for decades to come. This article aims to answer a more straightforward question: how should risk managers think about cyber risk? What are the main considerations and red herrings? How would you know you’re mitigating cyber risk?

Six areas that help define cyber risk theory and practices

1. The types of risk: Cybercrime is the most visible cyber risk. Hackers attempting to breach company systems and steal sensitive information require serious responses. But there are also other cyber risks, such as employee negligence, abuse of systems, infrastructure failure, and poor legal compliance. Though some of these have straightforward mitigation strategies, it’s important to understand that all cyber risk interrelates. Just taking care of one area, such as regulation, won’t be sufficient.

2. The types of damage: To create an overarching picture of how to rank cyber risks, start with the potential damage – how an organisation could be harmed most. Stolen data is often the biggest problem. It varies based on the type of data, customer, personal, operational, company IP, etc. Business continuity is another big concern: will a cyber incident stop employees, partners and customers from transacting, and for how long? System downtime is often the costliest part of cyber breaches or negligence. Regulations are the third primary consideration: what are the legal implications and fines resulting from non-compliance?

3. Who owns the risk: Many organisations are still uncertain about who owns cyber risk or are unwilling to accept it’s no longer solely IT’s problem. Numerous laws, such as the Protection of Personal Information Act (PoPIA) and governance frameworks, such as King IV, place the responsibility on business leaders, the executives, C-suite and board. It’s not just a question of compliance. Technology is so intrinsic to modern business that leaders must accept technology as a strategic responsibility. It influences their costs, current performance, future investments, and the full gamut of strategic requirements: strengths, weaknesses, opportunities and threats.

4. Identifying risks: There is no single or large act that will sweep across cyber risk. Instead, most risks exist in specific areas of the business. For example, the storage, flow and access of personal identifiable data (PID) creates a number of risks related to compliance, employee behaviour, access rights, infrastructure performance, and operational efficiencies. Yet there will be many overlaps, PID might transact on collaboration systems that also work with company IP data.

5. Mitigating cyber risks: You might be shaking your head: cyber risk is holistic and all-encompassing but also specific. Where do you start? The good news is that you can exploit overlaps in cyber risk. For example, focusing on PID risks will reveal risks in other areas that often benefit from the same mitigation strategies. Stricter access management of user accounts around PID can help reduce risks, as can meeting ISO/IEC 27001 compliance. Improving PID database infrastructure can also improve productivity for other types of data.

6. Create a cyber risk culture: A collaborative culture is essential to mitigate cyber risks. Risk managers and technology managers should work together to understand different dimensions of the problems and opportunities at hand. Employees must receive training to help avoid negligence. Companies should employ senior security managers, and if they can afford it, a chief information security officer (CISO). Crucially, the C-suite and board must have access to someone with security knowledge.

These considerations are broad and demanding, shortcuts are few. But risk managers can still generate a few quick wins. Foremost, support the security teams. Good digital security is a complex and layered discipline, and security professionals can spend a lot of time finding gaps, poor configurations or over-powerful user accounts.

Invest in security and user account monitoring/audit software. Also look at enhancing security monitoring with service partners to provide security orchestration, automation, and response (SOAR), security information and event management (SIEM) and a security operations centre (SOC) as services (often under the banner of managed security services).

Above all, build closer ties to technology and security leaders. Don’t just rely on blunt mitigation strategies such as cyber insurance. Reducing cyber risk is a culture and strategy. Embrace that concept and you'll take control of cyber risk.

Find out more at www.encore.io




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Fire protection for a solvent extraction plant in Africa
FS Systems Fire & Safety Security Services & Risk Management Mining (Industry)
A prominent mining site operates a state-of-the-art solvent extraction (SX) plant, integral to separating and purifying metals from ores, which pose significant fire risks, as SX processes involve highly flammable organic solvents and elevated operating temperatures.

Read more...
Taking fire safety seriously
G2 Fire Editor's Choice Fire & Safety Security Services & Risk Management
To gain insights into how fire systems must be designed, installed and maintained, SMART Security Solutions asked Nichola Allan, MD of G2 Fire, for some insights into the local fire market.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Unlocking new efficiencies in private security
Security Services & Risk Management Transport (Industry) Smart Home Automation Logistics (Industry)
Justin Manson, Sales Director at Webfleet, discusses how the urgent need to protect life, and to do so more efficiently, is driving continuous innovation in holistic home and residential security services in South Africa.

Read more...
Innovation and security go hand in hand
Technews Publishing Facilities & Building Management Security Services & Risk Management
In a world where the demand for tech innovation is matched only by the acceleration of cybersecurity threats, businesses face the challenge of balancing new product development and robust security measures.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...