Uncovering the Business Costs of Cyber Risk: Ponemon Study

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

<p>Study finds organizations are not accurately measuring the business costs of cyber risk, and are unable to quantify the damage cyber attacks could have on their businesses, leaving them without the critical information needed to make decisions about resource allocation, technology investments and threat prioritization.</p>

<p>Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks the kind of clear business metrics which can help executives frame decision-making in a language the c-suite and board easily understand. When we commissioned Ponemon Research to study the effects of cyber risk on business operations, our goal was to explore how four common KPIs associated with cyber exposure translate to specific types of business risk. We wanted to go beyond assessing pure dollar impact, exploring how cyber risk influences business strategy, products, supply chain, revenue streams, operations, business technology, customer experience and regulatory compliance.</p>

<p>What we discovered — after surveying 2,410 IT and infosec decision-makers in six countries — is that traditional KPIs or metrics for evaluating business risks cannot be used to understand cyber risks. Organizations are not accurately measuring the business costs of cyber risk, and are unable to quantify the damage cyber attacks could have on their businesses. Thus, decisions about the allocation of resources, investments in technologies and the prioritization of threats are being made without critical intelligence. Moreover, organizations are unable to correlate the cyber risk KPIs they are using to the mitigation of a data breach or security exploit.</p>

<p>At a time when boards of directors are taking more interest in cybersecurity than ever before, the study <a href=”https://www.tenable.com/cyber-exposure/ponemon-cyber-risk-report”>Measuring & Managing the Cyber Risks to Business Operations</a>, conducted by Ponemon Institute on behalf of Tenable, reveals a lack of faith among cybersecurity professionals in the accuracy of their metrics. This makes CISOs and/or other security technology executives reluctant to share critical information about the business costs of cyber risks with their boards.</p>

<h2>Exploring common KPIs</h2>
<p>For the study, we identified four common KPIs used to measure cyber risk:</p>
<ul><li>time to assess;</li>
<li>time to remediate; </li>
<li>effectiveness of prioritizing cyber risk; and </li>
<li>identification of assets vulnerable to cyber risk — including Operational Technology (OT) and Internet of Things (IoT) devices.</li></ul>

<p>In addition, we explored three KPIs most often used to measure the financial consequences of a cyber attack: </p>
<ul><li>loss of revenue; </li>
<li>loss of productivity; and</li>
<li>drop in stock price.</li></ul>

<p>The vast majority of respondents (91%) admitted they’ve experienced at least one business-disrupting cyber incident in the past 24 months; 60% have experienced two or more incidents in the same time frame. These attacks have resulted in data breaches and/or, significant disruption and downtime to business operations, plants and operational equipment.</p>

<p>The majority of respondents (58%) say traditional KPIs or metrics for evaluating business risks cannot be used to understand cyber risks. When it comes to quantifying the damage cyber events could have on their businesses, only 41% of respondents (988) say their organizations make any attempt to do so. Further, only 30% of respondents say their organizations are able to correlate information from cyber risk KPIs to taking action on reducing the risk of a data breach or security exploit. </p>

<p>Of the 988 respondents who said their organizations attempt to quantify the damage security incidents could have on their businesses:</p>
<ul><li>54% say they quantify what the theft of intellectual property would cost;</li>
<li>43% say they calculate the potential financial loss; and </li>
<li>42% consider the impact of the loss of employee productivity following a data breach or security exploit. </li></ul>

<h3>What factors are used to quantify the potential risk of a cyber attack?</h3>
<img src=”/sites/drupal.dmz.tenablesecurity.com/files/images/blog/quantifying%20the%20potential%20risk%20of%20a%20cyber%20attack.png” width=”2266″ height=”1110″ alt=”quantifying the business risk of a cyber attack” />
<p><i>Source: Measuring & Managing the Cyber Risks to Business Operations, Ponemon Institute & Tenable, December 2018.</i></p>

<p>We asked respondents to rate the accuracy of the information gathered using the above KPIs, measured on a scale of 1 = not accurate to 10 = very accurate. Only 38% of respondents believe their measures are very accurate, while 44% believe their measures are not very accurate.</p>

<p>The report also reveals organizations are not using the KPIs they consider most important to assessing and understanding cyber threats. For example, two thirds of respondents (64%) identified “time to assess” as an important KPI for evaluating cyber risk, yet only 49% of respondents are currently using this metric. We see similar gaps when we look at the three other KPIs discussed in the report (see below).</p>

<h3>Gaps in use and importance of KPIs</h3>
<table><tbody>
<tr>
<th>KPI</th>
<th>Used by (% respondents)</th>
<th>Considered essential (% respondents)</th>
</tr>
<tr>
<td>Time to assess cyber risk</td>
<td>49%</td>
<td>64%</td>
</tr>
<tr>
<td>Time to remediate cyber risk</td>
<td>46%</td>
<td>70%</td>
</tr>
<tr>
<td>Identifying OT and IoT assets</td>
<td>34%</td>
<td>62%</td>
</tr>
<tr>
<td>Prioritization effectiveness</td>
<td>38%</td>
<td>57%</td>
</tr>
</table>
<p><i>Source: Measuring & Managing the Cyber Risks to Business Operations, Ponemon Institute & Tenable, December 2018.</i></p>

<h2>Measuring cyber risk: Nobody said it was easy</h2>

<p>Respondents identified seven key reasons why their organizations continue to face cybersecurity challenges, including:</p>
<ul><li>An understaffed IT security function.</li>
<li>Lack of resources to manage vulnerabilities.</li>
<li>The proliferation of IoT devices in the workplace.</li>
<li>The complexity of the IT security infrastructure.</li>
<li>Lack of controls over third-party access to sensitive and confidential data.</li>
<li>Dependency on manual processes to respond to vulnerabilities. </li>
<li>Insufficient visibility into their organization’s attack surface.</li></ul>

<p>While there are no quick-and-easy fixes to any of these issues, we believe focusing on the following five steps will help put your organization on the right path to building a business-first cybersecurity strategy.</p>

<ol><li>Identify and map every asset across any computing environment.</li>
<li>Understand the cyber exposure of all assets, including vulnerabilities, misconfigurations and other security health indicators.</li>
<li>Understand exposures in context, to prioritize remediation based on asset criticality, threat context and vulnerability severity.</li>
<li>Prioritize which exposures to fix first, if at all, and apply the appropriate remediation technique.</li>
<li>Measure and benchmark cyber exposure to make better business and technology decisions.</li></ol>

<p>In addition to the above guidance, the report, <a href=”https://www.tenable.com/cyber-exposure/ponemon-cyber-risk-report”>Measuring & Managing the Cyber Risks to Business Operations</a>, concludes with a five-step process for measuring and managing cyber risk you can put into action in your own organization today. Download your free copy here.</p>

<h2>About this study</h2>

<p>The report Measuring & Managing the Cyber Risks to Business Operations is based on a survey of 2,410 IT and IT security decision-makers in the United States, United Kingdom, Germany, Australia, Mexico and Japan. All respondents have involvement in the evaluation and/or management of investments in cybersecurity solutions within their organizations. The consolidated global findings are presented in this report. Download your free copy <a href=”https://www.tenable.com/cyber-exposure/ponemon-cyber-risk-report”>here</…

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
1602 Followers
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

i2p Networks, Tor and Freenet Features: Pros + Cons
Views: 77 / January 23, 2019
DNS Rebinding – Behind The Enemy Lines
Views: 2437 / January 19, 2019
My IT Learning Journey
Views: 2844 / January 18, 2019
A New Age of Digital Interconnection
Views: 2267 / January 18, 2019
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel