Lorem ipsum dolor sit amet consectetur adipiscing elit quisque faucibus ex sapien vitae pellentesque sem.

Understanding the cyber risk equation, where Risk = (Threat x Vulnerabilities) x Impact, is crucial. This equation encapsulates the culmination of threats, vulnerabilities, likelihood, and impact. It’s a powerful process that can help you grasp how threat sources exploit vulnerabilities to gain access to an organization, whether for financial gain or to inflict harm. Mastering this understanding puts you in control, enabling you to implement proactive measures that mitigate negative impacts on the organization.

There are many other forms of risk, such as environmental risks like fire, hurricanes, avalanches, floods, and tornados. There are also forms of business risk, such as credit, reputational, financial, and market risks, or the risk of losing customers due to any of these.
You may be thinking at this point, yeah, yeah, I’ve read about all of that studying for my multitude of exams. Well, in simplest terms, the question is, what is the probability that something or someone will exploit a vulnerability through exploit code, a weakness in infrastructure, site location, application code, policy, or business action, and cause harm to the organization?

Although, in today’s environment, the CISO must consider all of these things, we’ll focus on cybersecurity risk.

Threat Sources

1. Individuals

This could be an outsider like a script kiddy, or an insider like someone who just got let go and wants to inflict harm on the organization by stealing intellectual property and releasing it to the public.

2. Groups

Organized crime syndicates are more frequently getting into the cybercrime game, ad-hoc groups meeting on Telegram or Discord.

3. Organizations

This could be a competitor looking to steal your secret sauce.  A supplier with weak cybersecurity practices leading to a 3rd party breach, or a partner that gets breached and a down stream attack occurs.

4. Nation States

State funded organizations focused on espionage, Politically motivated or intellectual property theft.

China
APT41 (Winnti Group), APT10 (Stone Panda).

Russia
APT28 (Fancy Bear), APT29 (Cozy Bear), Sandworm team.

North Korea
Lazarus Group, APT37 (Reaper), Kimsuky.

Iran
APT33 (Elfin), APT34 (OilRig), or Muddy Water.

5. Accidental

A user permanently deleting important data or database records, a processing error returns incorrect values, or a backup gets corrupted.

6. Environmental

Temperature, humidity, or power supply failure can all destroy critical systems.

7. Natural or Man-Made Disasters

Fire, Flood, Tornado, Hurricane, Land Slide, Volcano.

Vulnerabilities

With the multitude of potential vulnerabilities that can exist in the average organization, the need for prioritization becomes paramount. No software, hardware, mobile device, or operating system is immune.  While Microsoft, Adobe, Oracle, Cisco, and Apache were the primary vendors that suffered the most exposure due to vulnerabilities, we now have to include all versions of Linux and Apple in our vulnerability management program.  The challenge lies in prioritizing these vulnerabilities, requiring focus and efficiency.

When prioritizing vulnerabilities, it’s crucial to consider environmental conditions.  You may have a critical vulnerability with an exploit on a box isolated from the rest of the network with no critical data.  Should that be a priority? No. This strategic and forward-thinking approach to vulnerability management can help you allocate resources effectively.

Key Considerations for Prioritization:

If you’re a new CISO or vCISO, consider mapping your attack surface early on and remediating it based on criticality, considering the vulnerability categories above.

One consideration wasn’t discussed above, and many times, it’s not included in the equation regarding risk. Still, it is very prevalent when it comes to exposure and should be added to your risk register for mitigation, acceptance, transference, or ignore.

Predisposing Conditions:

Likelihood

When we calculate risk, we must consider and calculate the likelihood of an attack.  This may be a daunting task for most, but the key is to watch your adversary’s activity through threat intelligence feeds and cybersecurity news articles.  I like to read the Verizon Data Breach Investigation Report (DBIR) to understand the threat landscape.  It provides insights into patterns of target industries and the threat actor behaviors or Tactics, Techniques, and Procedures (TTP) used to infiltrate the target.  Another great resource is the IBM-sponsored Ponemon Institute’s Cost of a Data Breach, which provides quantitative insights into the financial consequences resulting from breaches that occurred the prior year.

Impact

The impact on an organization following a breach can vary and be far-reaching, often lasting for years.  Let’s identify a few, beginning with fines related to non-compliance. If you’re bound by GDPR, the fines that can be imposed are up to 4% of your annual revenue.  PCI-DSS can impose monthly fines between $5,000 and $10,000 per month.  The Department of Health and Human Services may impose fines between $25,000 and a maximum of $100,000 per year if the determination was made for willful neglect.  There may be other fines incurred by the SEC or other governing bodies.  The organization may be subject to legal fees or civil suits because of leaking personally identifiable information (PII).

Calling in a forensics team to investigate, identify, eradicate the threat, and help recover from the breach can be quite costly.  For small businesses, the costs can range from $8,000 to $30,000, while larger organizations might incur costs between $10,000 and $100,000 or more.

Most organizations that are impacted by a data breach resulting in the exfiltration of PII are encouraged to provide credit monitoring services for a period of time, usually one year.  Basic credit monitoring services typically range from $10 to $30 per month per individual, so if you consider a breach affecting 24,000 individuals, the cost of providing credit monitoring services could amount to $240,000.

Some of the long-term effects may be loss of market share or customers transitioning to a competitor and becoming loyal customers.  Losing intellectual property or trade secrets to a competitor or a foreign country will also negatively impact the bottom line.

Conclusion

In the 2024 Cost of a Data Breach report, the average data breach cost was $4.88 million, up 10% from 2023.

No matter how you calculate risk, your job as a CISO is to ensure that the business remains operational and productive, but not only is that the most critical, from a tactical perspective, you must also maintain a positive influence on the business, plan strategically, reduce costs, and help to improve efficiency and ease of use.

If all of this appears overwhelming, start with your most critical, most exposed assets and data. Identify your crown jewels and start there, but always remember that your people are a big part of that equation.

You will never eliminate risk. The goal is to reduce risk to an acceptable level determined by your organization’s risk tolerance.

By: Brett Price – Lead Cybersecurity Consultant – C|CISO, CISSP, CISM, CISA

An Extra Tidbit for Consideration:
Common Tactics, Techniques & Procedures (TTPs)

Familiarize yourself with the MITRE ATT&CK Framework, which outlines adversary behaviors across phases like initial access, persistence, privilege escalation, and impact. Understanding these tactics can help bolster your defenses and better anticipate potential threats.

MITRE ATT&CK Framework

1. Initial Access

2. Execution

3. Persistence

4. Privilege Escalation

5. Defense Evasion

6. Credential Access

7. Discovery

8. Collection

9. Command and Control

10. Exfiltration

11. Impact