Understand Manage and Measure Cyber Risk
Understand Manage and Measure Cyber Risk
Understand Manage and Measure Cyber Risk
Manage,
and Measure
Cyber Risk
Practical Solutions for Creating
a Sustainable Cyber Program
―
Second Edition
―
Ryan Leirvik
Understand, Manage,
and Measure Cyber
Risk
Practical Solutions for Creating
a Sustainable Cyber Program
Second Edition
Ryan Leirvik
Understand, Manage, and Measure Cyber Risk: Practical Solutions for
Creating a Sustainable Cyber Program
Ryan Leirvik
Arlington, VA, USA
Acknowledgments�����������������������������������������������������������������������������xiii
Foreword 1�����������������������������������������������������������������������������������������xv
Foreword 2����������������������������������������������������������������������������������������xix
Introduction�������������������������������������������������������������������������������������xxiii
iii
Table of Contents
iv
Table of Contents
v
Table of Contents
Rules to Follow���������������������������������������������������������������������������������������������������90
Focus on One Framework�����������������������������������������������������������������������������������90
Structure the Program Approach������������������������������������������������������������������������95
How to Structure the Approach���������������������������������������������������������������������������96
Step 1. Set the Structure������������������������������������������������������������������������������������97
Step 2. Align the Risk-Mitigating Activities���������������������������������������������������������99
Step 3. Assign Roles and Responsibilities��������������������������������������������������������100
Step 4. Identify Gaps and the Appropriate Activities to Fill Them���������������������103
Step 5. Look Externally (Third-Party Risk Management)����������������������������������105
How to Build Out the TPRM Questionnaire��������������������������������������������������������107
Step 5a. Split the Questionnaire into Logical Columns�������������������������������������108
Step 5b. Build Each Column Upon the One Before��������������������������������������������108
Step 5c. Directly Relate the Question to the Risk���������������������������������������������108
Keep in Mind�����������������������������������������������������������������������������������������������������110
How to Verify Your External Look����������������������������������������������������������������������113
Step 5d. Link a Software Bill of Materials to the TPRM Program����������������������113
Step 5e. Build a Feedback Mechanism for Vendors������������������������������������������116
Step 5f. Align to Procurement and Purchasing�������������������������������������������������117
Keep in Mind: Third-Party Risk Management����������������������������������������������������119
Step 6. Pick the Right Tools and Avoid Distraction��������������������������������������������120
Set a Program Review Frequency���������������������������������������������������������������������123
Prepare to Respond and Recover����������������������������������������������������������������������125
Managing the Problem, a Recap�����������������������������������������������������������������������125
Recent Examples����������������������������������������������������������������������������������������������126
Example 1. Addressing Too Many Frameworks�������������������������������������������������126
Example 2. Many TPRM Tools���������������������������������������������������������������������������130
Example 3. From Controls Focus to a Risk Strategy�����������������������������������������133
vi
Table of Contents
vii
Table of Contents
Appendix: Illustration�����������������������������������������������������������������������209
Index�������������������������������������������������������������������������������������������������217
viii
About the Author
Ryan Leirvik is a cybersecurity professional who has spent the better part
of two decades enhancing information security programs at the world’s
largest institutions. With considerable US government and commercial
sector experience, Ryan has employed his professional passion for
cybersecurity at almost every level within an organization.
A frequent speaker on the topic of information security, Ryan fields
questions such as “How do I make sure I have a sustainable cyber
program?” This book was written to help answer that question.
Ryan is the founder and CEO of Neuvik. He has been the CEO of a
cybersecurity research and development company, Chief of Staff and
Associate Director of Cyber for the US Department of Defense, and a
cybersecurity strategy consultant with McKinsey&Company. Ryan’s
technology career started at IBM. He has a master’s degree in IT from
Virginia Tech, an MBA from Case Western Reserve University, and a
Bachelor of Science from Purdue University. Ryan is also on the faculty
at IANS.
ix
About the Technical Reviewer
Alex Esposito is an experienced cybersecurity consultant with a
demonstrated history of working in management consulting specifically in
the financial services, technology, and healthcare industries. She managed
a team of technically backed business consultants to run advanced
client delivery of Neuvik’s cybersecurity solutions. She has vast security
experience in business continuity, crisis management, disaster recovery,
board-level reporting, CISO initiative prioritization, and risk framework
implementation.
xi
Acknowledgments
This book benefited considerably from the frequent consultation,
discourse, and debate with Alex Esposito. Thank you for your time,
participation, and sturdy contribution to this work.
Adam Nichols provided invaluable expertise. As always, thank you
for your significant contributions to threat modeling, pushing beyond
secure software, and your persistent demand for security confidence in all
systems.
Also, Christophe Foulon—your interest, enthusiasm, and resolve were
encouraging at just the appropriate times. Many thanks for your insights
and overall enterprise security point of view.
Significant contributions were also made by Michael Mylrea, Rob
Mauck, and Sounil Yu.
The team at Apress was an important part of launching this book.
Thank you, Susan McDermott, for your kind reception and appreciation
for the effort in compiling the material.
And, finally, Ava—your joyful spirit keeps me going every day.
xiii
Foreword 1
Some of us love building from scratch. As children, we gather stones
and sticks and construct little cities where our imaginations can roam.
As apparent grownups, we often must build something from scratch,
except there is no such thing as “scratch.” Everything has a history and a
foundation—sometimes of neatly pointed stone, sometimes of toothpicks
and chewing gum.
Tasked with building/rebuilding a security organization, we are
confronted with a formidable challenge that feels like building from
scratch; however, be assured that the bits and pieces are there—only
strewn about in your organization.
After years as a scientist and research leader, my own security “from
scratch” work ranged from building a product security organization and
a privacy organization to twice creating world-class information security
organizations within Fortune 500 corporations. There was never a truly
blank sheet. The foundations were there but ranged from sticks and stones
to a few solid pillars.
In my story, I was three years into my team’s great work in creating the
first Philips information security organization when I began to appreciate
how much I enjoyed the build phase and not so much the operational
phase. So, after a change in CIO, I retired from Philips to start my own
consulting company. My brief sojourn into private practice ended when I
joined Becton Dickinson (BD) to create another new CISO office—seeing a
chance to build yet again and learn from a whole new set of mistakes. The
new program at BD was firmly in place after four years, and I left to return
to consulting, where I remain today.
xv
Foreword 1
Ryan Leirvik and I, for some time, have served as faculty at IANS
Research (IANSResearch.com), a company providing its customers and
the world with security insights from experienced practitioners. We did
not meet there but were introduced by a colleague at McKinsey&Company
and began a conversation about building InfoSec organizations. I quickly
challenged Ryan to define risk. Although he looked a little startled, he
did not hesitate to immediately provide a clear definition along with “By
the way, I have just finished writing a book on building a strong security
program that hinges on first defining risk.” What followed was an exchange
where each of us would make a statement or two about building a program
and the other would pause, wide-eyed, and say, “Exactly!” It seems that
I had found a kindred spirit—a builder who had worked with a wide
variety of client CISOs on their programs, gaining a deep understanding
of how a successful and sustainable program should be constructed. His
cyber work at the US Department of Defense, his McKinsey consulting,
and his advisory and survey work with IANS gave him a unique global
view of our shared passion. My in-the-trenches build work with Fortune
500 multinationals and my CISO advisory work had given me a similar
pragmatic perspective.
I was delighted to read Ryan’s near-final copy of the book, and I
jumped at the chance to provide this foreword. Ryan has assembled
an extremely straightforward guide to building a strong risk-based
cybersecurity program.
The world has significant problems with cybersecurity. We all
appreciate the value provided by an ecosystem of pervasive, connected,
smart things doing what we want and need. The problem is that while the
complexity of hardware and software interconnection grows exponentially,
so do the opportunities to exploit weaknesses. This can be quite rewarding
for criminal and state actors seeking to illicitly profit or grow their power.
On the cyber defense side, the complexity of what we must protect is
astronomical. The landscape and its attack surface constantly grow, fold,
xvi
Foreword 1
and confound. This too often leads us to analysis (and solution) paralysis
in addressing cybersecurity risk. Without due care, we can become
reactive robots.
With an eye toward sustainable organizational success, Ryan begins
his recipe with the development and propagation of shared definitions
of risk, threat, critical, and other essential terms. This is the first of many
step-by-step instructions on assembling the right elements, arranging
them by priority, and establishing activities/projects to meet specific
and measurable goals. Along the way, Ryan provides plenty of examples
and small, simple rules, templates, and checklists to accelerate the first
phases of the journey with emphasis on developing a short, meaningful
list of targeted metrics. He provides a great way to start and grow your
organization’s risk management practice. Further, he emphasizes the
takeaways by pointing out the pitfalls and providing meaningful examples
of how a program might proceed.
I personally like to apply the Rumsfeldian lens to determine the
completeness of a cybersecurity program, and this book hits all the marks.
Ryan’s book addresses the “known knowns” by systematically creating an
asset inventory using a simple top-down practice. The “known unknowns”
materialize as articulated risks assembled into a simple risk registry that is
used to build consensus on the potential for harm, thus driving the priority
of activities and projects. The problematic “unknown unknowns” are
addressed by creating an information security organization that adopts a
framework like the National Institute of Standards and Technology (NIST)
CSF, preparing for the unexpected by using frameworks to ensure we have
skills across all the cyber disciplines. Holistically, the book emphasizes
the need for balance, and Ryan lays out a discipline of regular top-down
reinspection to ensure the completeness of the program.
Not only does this book address the information security internals
of creating and executing the plan, but it also emphasizes how the plan
needs to engage the three levels of the larger organization: the board,
management, and engineering. Ryan helps the CISO by considering
xvii
Foreword 1
what each level needs to do in the program and what the board member,
manager, and engineer need to understand. His treatment of board
reporting is particularly useful.
During my own journey to build security programs in the early days of
the integrated IT enterprise, the road was often bumpy. This book enables
a newly empowered CISO to proceed smoothly to construct a practical,
connected, and accepted cybersecurity program where none existed
before. It charts a clear path for the first two to four years of the program.
There are many other treatments more in depth and quantitative
on aspects of cybersecurity and risk. They are easily folded in once the
foundational cybersecurity program is up and running. This is the rare
book that rapidly designs the first-version engine, builds it piece by piece
(from near-scratch if necessary), gets it started, and brings the entire
organization up to speed. You, the leader of a nascent cybersecurity
program, can find herein a straightforward way to tackle cybersecurity
complexity, organize the risks, and focus on the right problems and
solutions in an ever-changing threat landscape. To you, the best of luck.
xviii
Foreword 2
They say that to understand someone, you ought to walk a mile in their
shoes. As a leader of a corporate security program for a global Fortune 500
company with tens of thousands of employees, I think about this adage
every time we engage with a contractor, auditor, or another third party.
Consultants work with us to assess our capabilities, and they often have a
mindset oriented toward “showing value.” Inevitably though, our budget is
tight, and so we can only engage for as short a time as possible.
These constraints usually mean that contractors do not have the time
or scope to really walk in our shoes. Our complex operations might also
mean that they need more than just a mile to really understand what we
are up to. Out of a desire to help as best they can, consultants fall back to
generic one-size-fits-all recommendations and security platitudes. Despite
the good intent to show value, I frequently end up with something that
looks pretty but lacks substance. Worst of all, some recommendations are
merely distractions that would pull my team off higher priorities because
the outside perspective lacked context.
This gap in understanding grows much larger when applied to a book
full of advice about how to run a better program. Books are inherently
generic, and it is entirely up to the reader to search for nuggets that
may apply to their situation. Many books try to compensate for this by
describing the Platonic ideal in great detail and as comprehensively as
possible. Unfortunately, this may lead to unreadability and inapplicability
because none of us lives in the ideal universe.
Companies, programs, and teams have a rhythm, like seasons. What
was once fully mature and effective can decay over time and fall into
disrepair. The people with a vision for an effective program find new
xix
Foreword 2
xx
Foreword 2
clear, straightforward, and actually achievable. Will this book have all the
answers? It will not. And that is the beauty of it! It contains core concepts
and directional guidelines that allow you to adapt the content and dance
with the needs of your unique organization. The holes in the guidance
here are not actually things missing—they are windows, opened to let in
the breeze.
The cover promises practical solutions for creating a sustainable
cyber program. The fresh air and space between the core concepts are
what deliver the practicality. A practical solution is almost always simple
and achievable. Those qualities are what allow you to put it into practice.
Ryan may not have walked a mile in your shoes, but he has done enough
walking of his own to know what lies ahead for your journey. Rather than
describe every step in excruciating detail, he offers the lay of the land and a
map to help you navigate it. He also offers numerous stories and examples
from his own travels that offer insight into how he and others traversed the
same challenges that you may now be facing.
Ryan also managed to keep life in the book even as he delivers
technical guidance on risk management. The straightforward language,
with some light humor along the way, leads to a book that is accessible,
interesting to read, and best of all useful. In the end, that moment over
lunch when Ryan handed me a book turned out to be a moment of
possibilities, not disappointment. I came away with what I value most in
running a cybersecurity program—workable, relevant ideas shared with
the flexibility to adapt them to my situation. Ryan distilled the concepts to
their elemental ingredients so the book is a quick read, digestible by a busy
professional. The book is as practical in form as it is in content.
Within my program, we use a down-and-dirty measurement to
estimate the value of a thing—it is valuable if people use it. It does not
matter how theoretically perfect your risk management program (in this
case) may be; if people do not use your tools, process, and documentation,
then it is not valuable. For me, Ryan’s book meets the measurement. Not
only did I read the whole book, which is not a foregone conclusion for this
xxi
Foreword 2
—Tim Collyer
xxii
Introduction
When it comes to managing cybersecurity in an organization, many
organizations tussle with some basic foundational components:
understanding, managing, and measuring cybersecurity risk.
Without first understanding cybersecurity risk, many organizations
struggle to effectively deploy and follow a risk-mitigating cybersecurity
program. The supporting functions of program management and
effectiveness measurement begin to fail, as the risk is simply not well
understood across the key areas of management, technology, and
executive oversight. Programs lacking a sharply articulated view of risk lose
out on the benefits an objective-based program provides, for example, a
long-term view of risk, a view of the current risk tolerance, gaps in program
controls that introduce known and unknown risks, and measures that are
appropriate for the board of directors.
One simple way to identify if your organization falls into the “cyber risk
tussle” category is to raise three very basic but fundamental questions: (1)
Is the head of your organization able to articulate cybersecurity risk in one
to two sentences? (2) Are key executives/managers in your organization
able to provide a similar, short-but-on-point answer to this same question?
(3) Could each person in the organization provide a clear answer to
what “cybersecurity” means to their role, including engineers, front-line
employees, contract specialists, recruiters, and sales team members?
If the answer is no, you are not alone. And this book is for you.
This book is a practitioner’s guide to laying down foundational
components of an effective cybersecurity risk management program
for organizational management, technology, and executive oversight,
xxiii
Introduction
ultimately keeping up with the business and reducing business risk. Recent
examples of organizational challenges are provided for practical context,
and pitfalls to avoid are offered as controls.
Overall, this book provides an easy-to-follow categorical approach to
identifying what is “at risk,” applying a suitable approach to managing that
risk, and getting started on simple-but-effective measures on program
effectiveness at both the strategic (board) and tactical (management and
technology) levels.
To date, a plethora of cybersecurity management advice has
been delivered to the public—many with sound advice, management
approaches, and technical solutions. Few have offered a common 1-2-3
theme to help pull it all together. This book attempts to do just that.
xxiv
PART I
The Problem
K
eep in Mind
To best understand the cybersecurity problem, keep three concepts
in mind:
• Technology is an enabler.
1
For the purposes of this discussion, information technology is used to mean the
interoperable and connected technology that is involved in the development,
maintenance, and use of computer systems, software, and networks that
process, store, or transmit data. (Note “data.” For both information security and
information technology, the distinction between “data” and “information” is
important.)
© Ryan Leirvik 2023 3
R. Leirvik, Understand, Manage, and Measure Cyber Risk,
https://doi.org/10.1007/978-1-4842-9319-5_1
Chapter 1 What Is the Problem?
2
FORTUNE is a trademark of Fortune Media IP Limited, registered in the United
States and other countries.
3
For all of those in the technology community working tirelessly to bring out
the best of what is possible and also for those in the legal community working to
clarify definitions for the protection of clients, the word flaw (and each derivative)
is used to imply imperfection as it relates to the pursuit of perfection. This word
is not, in any way, used to imply defective, broken, or damaged as it relates to any
technology’s intended use.
4
Humanity’s potential and expressed capability to be perfect is a subject ripe for
deep exploration and discussion; however, realizing the full human potential is
not the focus of this particular information security discussion.
5
The word bug is a widely adopted term to describe a defect or malfunction. One
first-use story is Grace Hopper’s finding a moth in the Harvard Mark II (a.k.a.
Aiken Relay Calculator). She removed the moth, jammed in the mechanical relay
causing an error, and taped it inside a log book.
4
Chapter 1 What Is the Problem?
6
From a security design point of view, much of the underlying technology of the
Internet itself was built on trust. This is not exactly a design flaw or an oversight,
but rather an interaction consideration in design that would be hard to predict, an
“intentional use” point worth considering when debating the security aspects of
deployed technology.
7
Susceptibility for failure is not addressed for the purposes of this discussion.
(See the preceding flaw.)
8
Leaving for a moment alternative access pathways available to insiders, such as
the insider motivated to wreak havoc on an organization or a socially engineered
employee unwittingly providing secrets to an outsider.
5
Chapter 1 What Is the Problem?
9
Several definitions exist for cybersecurity. The US government formally defines
cybersecurity as the “Prevention of damage to, protection of, and restoration of
computers, electronic communications systems, electronic communications
services, wire communication, and electronic communication, including
information contained therein, to ensure its availability, integrity, authentication,
confidentiality, and nonrepudiation.” The White House, Cybersecurity Policy,
National Security Presidential Directive (NSPD)-54/Homeland Security
Presidential Directive (HSPD)-23.
6
CHAPTER 2
Why Is It
Complicated?
I ntroduction
Technology’s imperfections are where the cybersecurity problem begins,
exposing attractive perforations in its intended functionality. Deploy
imperfect technology imperfectly, and these unintended perforations
multiply in innumerable ways. Layer imperfect technologies into
existing technologies, each with perpetual pursuits to communicate
and interact with interoperable counterparts, and these perforations
spread in orthogonally interconnected and largely unmanageable ways,
introducing vulnerabilities either visible or perfectly hidden for the
malicious individual, or group, to exploit. This is the complication of the
cybersecurity problem.
Appreciating the fact that technology is inherently imperfect opens
the aperture for a wider view into the real complication of cybersecurity:
inherently flawed technology is everywhere. Critical assets and business
functions rely on this technology, and somewhere there is a security team,
with a chief information security officer (CISO) in command, uncovering
the security challenges to protect others against its misuse.
Technology Is Everywhere
Technology is as pervasive in modern organizations as it is in modern
life. Some sort of computer system or sensor exists in many commercial,
industrial, and consumer products today. Consumer vehicles today can
have a tremendous volume of sensors that create over 2,000 signals from
various electronic control units at any given time.1 Farming equipment
can contain an uncountable number of embedded computing sensors
to monitor crops, livestock activity,2 and available resources. Almost no
adult living in a first-world country leaves the house3 without at least one
computing technology device.
But technology’s pervasiveness is simply the boundary of the
problem’s complication. That is, the simple fact that technology is
becoming nearly ubiquitous speaks to where the technology is located
(i.e., the physical location of deployed technology). The real problem in
cybersecurity is not so much that the technology itself is flawed and that it
is nearly everywhere, but rather, technology is flawed, it is everywhere, and
it is increasingly becoming more and more complex.
1
Popular Mechanics, Ben Wojdyla, “How it Works: The Computer Inside Your Car,”
www.popularmechanics.com/cars/how-to/a7386/how-it-works-the-computer-
inside-your-car/, February 21, 2012.
2
Yes, “attaching a sensor and tracking device to a cow will give a farmer the
ability to track the cow’s activity level, health, and other key behaviors.” AgriTech
Tomorrow, Len Calderone, “Smart Sensors in Farming,” www.agritechtomorrow.
com/article/2019/02/smart-sensors-in-farming/11247, December 26, 2019.
3
Admit it. Although a refreshing feeling occasionally, leaving a dwelling without
some sort of IT device is not a normal activity (especially for a reader of a book on
information security). However, you may think about what that device connects to
a bit differently after completing this book.
8
Chapter 2 Why Is It Complicated?
Technology Is Complex
Technology’s ever-evolving complexity exacerbates the cybersecurity
problem in orthogonal ways. Not only is technology heavily relied upon,
but it’s also constantly changing and self-adapting. While changing and
adapting to various environments, this persistently changing technological
construct is also in perpetual pursuit to communicate and connect
with interoperable counterparts (e.g., devices, sensors, networks, other
computing systems).
The Internet of Things (commonly referred to as IoT) represents
this phenomenon. Devices that are not functionally required to provide
connected information delivery are communicating in ways that increase
their overall complexity: for example, a fashionable fall prevention smart
belt that comes with sensors to monitor and alert the belt wearer.4 And
sometimes, this information connectivity works in ways that may directly
counter the device’s intended function, like the Internet-connected
personal safe5 or the human exercise location tracker.6 As manufacturers
are addressing the demand for convenient and relevant information, the
IoT interconnectedness brings about risks in unintended ways: pathways
to the device and a surface area to other networked devices on the same
network or in the same connected ecosphere.
4
Also, the less fashionable but more functional Helite Hip’Air protective belt.
5
OK, quick risk check. This is a book on identifying and reducing cyber risk. At
this point, this concept should raise more than one risk indicator: a consumer
safe, designed to protect critical physical assets (e.g., money, jewels, sensitive
documents) and offered to a consumer who typically has limited understanding
of embedded technology is discoverable by, and connected to, the outside world
riddled with attackers looking for exactly these types of valuables.
6
Uncomfortable subject for certain but also worth considering is the unintended
technology use. Here immediate GPS-based social media postings of exercise
locations exposed military complexes and put exercisers at risk of stalkers.
9
Chapter 2 Why Is It Complicated?
7
For example, infrastructure as code, where certain infrastructure needs may be
virtualized quickly rather than configuring and deploying physical hardware.
8
Likely needing no introduction, Apple Inc. is the multinational consumer
electronics, computer software, and computer services company that brought you,
individual business person, the Lisa well before its time back in 1983.
9
This includes a seamless and cross-functionally controlled supply chain.
10
A kind euphemism for hackers, criminals, and others is used here out of respect
for everyone in this field.
10
Chapter 2 Why Is It Complicated?
11
The word physical means relative to the human body. Arguably electric
transmission and computing is physical; however, in this context it refers to the
proximity to the person (i.e., the target).
11
Chapter 2 Why Is It Complicated?
12
Chapter 2 Why Is It Complicated?
Keep in Mind
The following approaches complicate the understanding of risk in any
organization:
14
Chapter 2 Why Is It Complicated?
12
Seeing as this is neither a book about the Internet nor a historical account of
information technology, the launch of Netscape Navigator in 1994 will serve as a
relative point of time when Internet technology, as part of the broader information
technology, became widely available for commercial use. It also serves as a
convenient example of cybersecurity, as convenience (e.g., online accessibility)
tussled with the need for security protocols (e.g., secure financial transactions).
15
Chapter 2 Why Is It Complicated?
16
Chapter 2 Why Is It Complicated?
The impact of a cyber incident can vary by organization, and with that
variation, so does the relative cybersecurity risk. Operational impacts,
reputational impacts, legal impacts, and even licensing impacts are
typically different between organizations, as they are highly dependent
on the type of business, governance of data/systems, and severity of a
cybersecurity incident.13
Many organizations speak about technical tools, controls, fixes, and
expert people to address this risk. While greatly important, these are
tactical solutions, as they solve particular risk management problems
like detection, monitoring, blocking, and remediation. These solutions,
however, do not solve the strategic oversight problems that are the
concerns of directors or even potential investors.
13
Exact definitions of the words incident and event are not quite standardized for
all cyber circumstances across all business and government activities. Current
policies, laws, and regulations do define these terms within their respective areas.
17
Chapter 2 Why Is It Complicated?
18
Chapter 2 Why Is It Complicated?
14
Definitions of “attack surface” vary. In essence, “attack surface” includes the
external-facing organizational information technology, in its entirety, that is
susceptible to intrusion.
19
CHAPTER 3
1
The term cybersecurity event is used rather than cybersecurity incident, as many
organizations are required to establish a clear and intentional distinction between
an incident and an event for a host of appropriate reasons. (See the section “Know
the Applicable Laws and Regulations.”)
2
Pause for a moment here. You’re in the right place for a book on cybersecurity if
you notice a pesky curiosity to clearly define the obscure. If not, keep reading. At
the end of the book, you should have a visceral reaction to quick answers saddled
with uniformed assumptions. One could argue that true cybersecurity demands
an exploration into the depths of uncertainty and ambiguity, searching for a
way to provide a compendious answer to the unknown. Afterall, it’s within the
unexamined assumption where the attacker flourishes.
22
Chapter 3 How to Address This Problem
answers for the inability to detect or manage the event, but they are not
sufficient answers to address, communicate the understanding of, or align
with the actual risk.
Answers that address the actual risk provide insights into the impact
the organization experienced, such as the loss of, or tampering with,
certain organizational assets (as in data, devices, applications, networks,
and users3). Assets are the target for malicious activities. Activities against
critical assets (if stolen, terminated, or changed by an unauthorized actor)
can significantly harm vital operations and/or the financial well-being
of an organization.4 The organizational impact due to data forfeiture or
operational deprivation of critical assets (for which the organization must
provide due care) is the real risk. Therefore, a clear distinction between the
assets affected by unauthorized users and the event that resulted from the
unauthorized activity is very important for understanding the actual risk.
Organizational assets, like data or certain systems, affected during
a cybersecurity event that led directly to a work stoppage or imposed a
significant cost to the organization are part of what is referred to as critical
assets; these are at risk. The trouble for most organizations is that what is
critical, or the business impact of lost or manipulated data or other assets,
is not always well known before the event. Organizations often learn what
assets are targets (a.k.a. items of interest) for outside attackers through
“lessons learned” after the first cybersecurity event. This what-should-
have-been-protected learning moment can be a very expensive and
embarrassing lesson on both organizational cost and impact. At times, this
may become the moment when leadership attention quickly turns inward
to understanding and mitigating the real risk.5
3
See the section “Inventory and Categorize Critical Assets.”
4
The terms confidentiality, integrity, and availability (a.k.a. the CIA triad), as they
relate to impact, are addressed later.
5
In some cases, these lessons and management actions are learned in real time,
a less-than-effective way to learn about what is at risk while simultaneously
mitigating the risks.
23
Chapter 3 How to Address This Problem
Being clear about the real risk means identifying the key critical
data and systems (i.e., critical assets) that endanger organizational
sustainability or threaten the organization’s core business functions.6 This
means having a sharp understanding of the risk through categorizing the
critical assets and determining the causes/consequences/accountability of
an incident.7
But identifying critical assets to understand the real risk is not
easy. The fundamental basis of knowing critical systems means that an
organization has identified all technology assets—a typically undesirable
struggle many do not fully tackle. Identifying and developing risk-
mitigating protections must hinge on the assets themselves, not the other
way around. Developing risk mitigations before understanding the risk
shifts attention to solutions before the problem is even well defined.
This is the reason identifying the actual risk through critical assets is so
imperative. Tackling the view into all assets, including third parties and the
technology supply chain, turns the attention to the actual organizational
assets at risk. Once these assets are defined, defensive controls and
established triggers have a known role to play. Then and only then can the
checks on controls effectiveness truly be measured.
6
This is information security. US Code Title 44 defines information security as
“The protection of information and information systems from unauthorized
access, use, disclosure, disruption, modification, or destruction in order to provide
confidentiality, integrity, and availability.”
7
Now enter a cybersecurity incident—something that raises to the level of realized
risk and achieves recognition status with executives. As the NIST SP 800-160 Vol. 2
defines a cyber incident, “[a]ctions taken through the use of an information
system or network that result in an actual or potentially adverse effect on an
information system, network, and/or the information residing therein.”
24
Chapter 3 How to Address This Problem
Apply a Framework
Cybersecurity risk management frameworks abound, and no one
framework applies perfectly to any one organization. However, an
established framework provides a single integrated approach to
addressing the cybersecurity risk problem. Employing one helps shape
the organizational thinking and the overall enterprise technique around
common areas of cybersecurity risks from a top-down point of view.
Sounds simple? Conceptually, it is. But identifying and sticking with the
“right” top-down, structured framework is not only challenging for the
typically bottom-up security practitioner; it’s also a key source of confusion
and frustration when mapping activities into structured categories.
The structure of a framework, however, is the indispensable
component of a defendable cybersecurity risk program. Applying a known
cybersecurity risk management framework—especially in the absence of
one—immediately brings shape to a security practice around common
25
Chapter 3 How to Address This Problem
8
The National Institute of Standards and Technology (NIST) released the first
version (1.0) of the Framework for Improving Critical Infrastructure Cybersecurity
(CSF) on February 12, 2014. This framework acts as a structured way to help
understand and address cybersecurity risks faced by any organization, not just
critical infrastructure.
26
Chapter 3 How to Address This Problem
27
Chapter 3 How to Address This Problem
Keep in Mind
To best address proper feedback, keep the following in mind:
28
Chapter 3 How to Address This Problem
29
Chapter 3 How to Address This Problem
30
Chapter 3 How to Address This Problem
controls that raise the bar for attackers (e.g., file access control, multifactor
authentication, user access controls) requires very low investment.
Measuring, managing, and communicating risk reduction around these
examples can highlight the real value of high-impact items within a
security program.
Two pitfalls should be avoided to extract the real benefit in security
programs through measures: unclear measures and striving for perfection.
31
Chapter 3 How to Address This Problem
32
PART II
The Solution
K
eep in Mind
To best address cybersecurity risks, keep three questions in mind:
Understanding
the Problem
Introduction
Tying risk to critical assets is the core component of any cybersecurity risk
management program. Understanding what attackers find valuable and
what imperfections exist in the organization will help communicate risk
and drive what safeguards the business is willing to resource.
Knowing which problem you are solving is the most critical part in
solving any problem, and cybersecurity risk is no different. Spending
time exploring the main issues helps ensure a crisp and accurate problem
statement. This typically means asking probing questions within the
organization to identify what others see as the problem, gathering
facts and opinions (and knowing the difference between the two), and
then agreeing upon a problem statement to solve, which categorically
encompasses all the facts you have gathered.
Why spend time discussing problem-solving first? Solving the right
problem (the right set of risks) in cybersecurity early can make all the
difference between a moderate event that may be handled by security staff
internally and a full-blown incident that may become a breach—leading to
breach notification and lost confidence by the public. Solving the wrong
problems leaves the real risks underrepresented and, therefore, openly
exposed.
Solving for the right risks means defining the problem while keeping
up with what the business needs to operate. That is, the risk problem
must be well-defined. This is a common challenge in security. Many
times, immediate problems that surface are not always tied to a well-
understood business risk, and these problems can easily become time-
consuming distractions for problem-solving security teams. While solving
an immediate problem sometimes can seem like a worthwhile endeavor,
it is not always clear how it relates to the business or how it relates to
protecting critical assets. For example, audit teams typically define a
cyber problem as a set of costly fines and resolution-based resources the
organization bears if it falls out of compliance (a.k.a. compliance risk).
Contract teams typically define a cybersecurity problem as the ability
to shift risk to vendors or contractors (a.k.a. third parties). Technology
teams define a cyber problem as open vulnerabilities, bad passwords,
and lack of perfect asset management. That is, each team typically will
view their portion of the cyber risk. Individually, each team is not wrong.
Collectively, however, each team’s problem-solving efforts and association
to the broader organizational problem are not always clear: impact to the
organization due to critical assets at risk.
This is the lesson for truly understanding the risk associated with
cybersecurity in any organization. Knowing what problem is being solved,
and being clear about it, helps each team or contributor see how their part
of the problem-solving (risk reduction or risk mitigation) plays into the
overall solution of protecting what matters to the organization in achieving
its mission. Communicating the risk as a single problem that impacts
the organization as a whole has the power of resource alignment, pulling
everyone together to solve one common goal, like the loss of, or damage to,
critical assets.
Sounds simple? It is. Sounds easy? It’s not. Focusing an entire
organization on a well-defined cybersecurity problem is simple. Managing
the efforts to solve the problem is hard. But following some basic rules
helps make management easier.
36
Chapter 4 Understanding the Problem
Rules to Follow
The problem to solve is the protection of critical assets. After all, on asset
classes, data is the most targeted asset in information security and typically
gains the most attention that drives impact to the organization.1 Most
organizations, however, struggle to identify what is critical. One approach
is to follow five basic rules.
1
Notwithstanding networks and applications as part of critical infrastructure.
37
Chapter 4 Understanding the Problem
2
Sounil Yu uses and advocates strongly for these crisp and mutually
exclusive asset classes. More information may be found at https://
cyberdefensematrix.com.
3
See “Step 5f” later in this chapter on how to make the link to enterprise risk
management.
38
Chapter 4 Understanding the Problem
4
This definition, quoted text, and corresponding diagram (displaying the
relationship between threats, vulnerabilities, impact, and likelihood) is
published in NISTIR 7621 Revision 1 “Small Business Information Security: The
Fundamentals”.
39
Chapter 4 Understanding the Problem
5
Risk could impact “organizational operations (including mission, functions,
image, or reputation), organizational assets, or individuals,” according to NIST SP
800-37 Revision 2.
40
Chapter 4 Understanding the Problem
assets, rather than the protection of assets that attackers might consider
targeting and that may create a crisis in the organization if maliciously
manipulated. When organizations fall into this trap, the clear prioritization
of programs and activities becomes overwhelming. This trap distracts from
what is critical, pointing this important effort toward a major pitfall: trying
to protect everything. Organizations that fall into this trap are at risk of
manifesting the proclamation “to protect everything is to protect nothing.”6
How to avoid this trap? One way is to “flip the problem” and take the
perspective away from inside the organization and view it from outside
the organization; view the problem from the attacker’s perspective, not the
organization’s perspective.
Attackers have an objective or a goal and look for ways to achieve that
objective.7 One overused but effective tool is the Cyber Kill Chain model,8
providing a high-level model to understand how adversaries plan attacks
for a particular target, like an organization. An alternative view is the
MITRE ATT&CK framework. Looking at critical assets through this lens
may help focus resources based on a hypothesis of certain attacker skills.
Figure 4-2 is an applied example of the Cyber Kill Chain in how an attacker
plans an attack.
6
Who originally said, “He who defends everything, defends nothing”? Frederick
the Great? Napoleon? Sun Tzu (changed in translation to English)? None of this
book’s contributors were there at the time; however, the meaning is understood
for sure: focusing on protecting everything distracts from focusing on the items
that matter.
7
At this point the divine manifestation of the threat as the key player in the risk
should strike like a lightning bolt, forming in the mind a powerful line from threat
to vulnerability to risk. You’re welcome.
8
Originally known as the “intrusion kill chain”, the Cyber Kill Chain model is
attributed to Lockheed-Martin Corporation and illustrates how computer attacks
may occur in stages.
41
Chapter 4 Understanding the Problem
Intruder selects target, researches it, Malware weapon's program code Intruder takes action to achieve their
and attempts to identify vulnerabilities triggers, which takes action on target goals (e.g., data exfiltration, data
in the target network network to exploit vulnerability destruction, encryption for ransom)
42
Chapter 4 Understanding the Problem
It is important for the business The ability to identify critical Identify the data that is truly
to identify what data the data at risk is a challenge in critical to the business:
business has and uses, and many organizations: What - PII
then determine what is critical ‘insiders’ and ‘outsiders’ see - Credit Card
and what is not. as critical is not always the - HIPPA-protected
same: - Privileged
- Insiders mainly see what the Define critical data with a tie
organization requires in order back to the highest business
to get work done (e.g., impact (e.g., a High rating
algorithms, data for relative to other data)
processing)
Determine how to protect the
- Outsiders mainly see what is data (e.g., proper data storage,
valuable (e.g., data to sell for authorized data access)
profit, data to use for slander,
data to destroy for business
disruption)
9
Other assets notwithstanding, this is information security. Again, US Code Title
44 defines information security as “The protection of information and information
systems from unauthorized access, use, disclosure, disruption, modification, or
destruction in order to provide confidentiality, integrity, and availability.”
43
Chapter 4 Understanding the Problem
feature steps that walk through the seemingly arduous process. In a pinch,
or for smaller organizations, you can jump directly to Step 5c to identify
what is most valuable to the organization.
44
Chapter 4 Understanding the Problem
and properly manage all the assets in the organization.10 Layer in the
ability to distinguish between what is vital from what is not. The request for
supporting resources begins to climb as the challenges of identifying the
authoritative asset owner and managing updates begin to take hold.
Buckling under the weight of asset management is a risk worthy of
executive consideration before tackling the effort. Time is best spent
considering the costs and implications, which, in turn, should settle on
the value of the effort. One of the clear value propositions is the ability to
manage and protect any critical asset.
Where to begin to execute the simplest, but arguably the most difficult,
process of asset inventory? At a high level, the following basic steps may
serve as a guideline in the asset definition journey.
45
Chapter 4 Understanding the Problem
Keep in Mind
One note before jumping in: A good number of factors contribute to
the difficulty of properly managing assets: the aggregation of legacy
documentation around maintaining the current inventory, the manual
or semi-manual process of updating legacy documents, the lack of
appropriate tools/tooling, and the simple lack of a current inventory
altogether. One of the growing complexities is the proliferation of cloud
services; typically, unaffiliated organizations (a.k.a. third parties) are used
to help process or store data. Third parties are often overlooked or not
readily identifiable in traditional on-premise asset management tooling.
The tools are typically programmed to scan only permitted network
locations or rely solely on agents to report findings.
The overwhelming majority of these factors may be overcome and
managed by a thoughtful approach to defining asset classes, collecting
inventory, and defining what is critical. This helps move away from the
46
Chapter 4 Understanding the Problem
11
This includes the problems many seek to solve with a tool or a suite of tools to
display inventory management in a nice dashboard and work tickets.
47
Chapter 4 Understanding the Problem
• Final recommendation
Consider unique business case elements for each dimension that may
help clarify business demands. This may include determining the teams
that are already involved, the data that has been identified, which asset
categories have gone unnoticed, and which resources are needed to assist
in the journey.
ServiceNow, a CMDB provider, offers a thorough approach to IT asset
management (ITAM) and software asset management (SAM). Their ebook,
The Gorilla Guide to Achieving IT Assessment Success,12 provides objectives
for organizations to consider when establishing business cases.
Should the business case demonstrate the possible value of moving
forward with a robust asset management plan, it is time to move on to the
next step: defining asset classes.
servicenow.com/lpebk/gorilla-guide-it-asset-management.html.
48
Chapter 4 Understanding the Problem
13
Barbara Minto created an elegant and effective way to group ideas into separate
pieces that are mutually exclusive of each other and collectively exhaustive of the
whole. Check out “The Minto Pyramid Principle: Logic in Writing, Thinking and
Problem Solving” (www.barbaraminto.com) to find out how you think and solve
problems.
14
Plenty of tools exist to help in this process. But using a simple worksheet first
helps outline and raise the possible complexities of the effort, before moving
towards a more robust management practice supported by a tool or a mature
process.
49
Chapter 4 Understanding the Problem
DEVICES ...
APPLICATIONS ...
NETWORKS ...
DATA ...
USERS ...
50
Chapter 4 Understanding the Problem
asset classes defined at some level, the choice becomes to choose a tool or
continue with an internally developed process. Either way, the important
step is to collect and properly account for each new asset. Figure 4-5
illustrates completing a simple worksheet.
51
Chapter 4 Understanding the Problem
on, individuals or adjacent systems that have access to this data, and the
level of access the systems/individuals have to this critical data. Often
when data is observed as a critical asset, many overlook how it is used and
processed during normal business workflows, affecting what might be
done to mitigate the risks.
With this baseline understanding of “what is critical to the business’s
operations,” clarity is now formed around what needs to be protected for
the business’s operations. Clarity here means that protection mechanisms
may be focused once the risk to these assets is understood.
Identify the type of criticality needed within the organization. Options
range from highly restricted, confidential, internal use only, and public
to risk exposure levels high, medium, and low and to simply critical and
non-critical. Each organization should settle on the appropriate criticality
definition, largely based on industry standards, regulations, or peer-
group use.
Figure 4-6 illustrates a risk register, a simple worksheet to capture asset
fundamentals.
52
Chapter 4 Understanding the Problem
53
Chapter 4 Understanding the Problem
15
This definition is published in NISTIR 7621 Revision 1. The word business is
replaced here with organization to widen the scope to any organization.
54
Chapter 4 Understanding the Problem
To get started, identify the threat model that works best for the
organization and asset classes. Many threat models exist, and the one that
best fits the organization fits the types of systems, or assets, under test—that
is, the data, devices, applications, networks, and users affected by the threats.
One threat model example is Trike,16 which is open source and offers
a threat modeling methodology with two implementation tools (i.e.,
spreadsheet and desktop). A model for potential threats is STRIDE, which
is a mnemonic for remembering the following threat categories:
• Spoofing
• Tampering
• Repudiation
• Information disclosure
• Denial of service
• Elevation of privilege
16
Naturally, since this is a risk book, the first recommendation is a threat model
that offers “a unified conceptual framework for security auditing from a risk
management perspective through the generation of threat models in a reliable,
repeatable manner,” according to Paul Saitta, Brenda Larcom, and Michael
Eddington. More information is at www.octotrike.org.
55
Chapter 4 Understanding the Problem
Other threat modeling options exist for exploration into the best
organizational fit to help think like an attacker. This includes OCTAVE,17
PASTA,18 and many others.
With a proper method of modeling threats, the next steps are to walk
through the threat model using the chosen model process.
17
A “risk-based strategic assessment and planning technique for security”
offered by Christopher Alberts in 2003 in the paper “Introduction to the OCTAVE
Approach” at Carnegie Mellon University, Pittsburg, PA.
18
More information may be found in Risk Centric Threat Modeling: Process for
Attack Simulation and Threat Analysis by Tony UcedaVelez and Marco M. Morana
(Wiley, 2015).
19
According to Adam Nichols, security researcher extraordinaire. Laying out
the components before getting started sets the understanding for creating clear
security objectives based on impact to the organization; which, arguably, is the
main point of this book.
56
Chapter 4 Understanding the Problem
57
Chapter 4 Understanding the Problem
20
OK, somewhat annoying. Details do matter. For illustrative purposes, this
scenario assumes (1) a low-level DoS attack on the IT external network and (2)
legitimate denied access to IT does not affect the OT side during generation.
However, the attack acting as a distraction for something else is another topic.
21
Including Software Bill of Materials. (See ”Step 5d. Link a Software Bill of
Materials to the TPRM Program” in Chapter 5.).
58
Chapter 4 Understanding the Problem
22
The custodian of the CVSS is the Forum of Incident Response and Security
Teams (FIRST). Detailed information on the latest version and changes may be
found at www.first.org/cvss.
23
For most organizations, vulnerability management is one practice that
encompasses discovery, triage, and mitigation. Vulnerability discovery is simply
the beginning of a wider management practice.
59
Chapter 4 Understanding the Problem
• Fines/penalties
• Legal activities
• Incident recovery
First, choose the proper impact categories that best fit the organization
and a repository for the data. Figure 4-7 is a worksheet illustration
containing all five of the impact categories, as borrowed from the NISTIR
7621r1 section on determining the value of your information.24 These
selected impact categories may be helpful as a starting point for almost any
organization and may change or adapt over time, as needed.
24
Impact categories should be customized to best fit the organization and/or the
industry. The impact categories used here are largely borrowed from NISTIR 7621
Revision 1 section on determining the “value of your information”; they may be
used as a starting point for almost any organization.
60
Chapter 4 Understanding the Problem
Lost work
Respond appropriately
Fines / Penalties
Address attacks differently
Legal activities based on their impact
25
Affected, for this example, means stolen/lost/made public, manipulated in any
form, or rendered unavailable.
61
Chapter 4 Understanding the Problem
Lost access
(2) Categorize each data
type using: Lost work
- 0 for “none”
- 1 for “low” Fines / Penalties
- 2 for “moderate”
Legal activities
- 3 for “high”
Incident recovery
(3) Prioritize for
protection by impact Lost business / reputation loss
score
- Highest Score = highest
Data Type _____ Impact Score:
priority
62
Chapter 4 Understanding the Problem
Now that asset classes are defined with owners, the potential risk to
each asset is acknowledged, organizational impact levels are anticipated,
and all the information may be pulled together into a risk register to
manage and track the cybersecurity risks.
Fully understanding the risk is great. Documenting the risk for tracking
and mitigation against core business objectives is even better. Building
and maintaining a risk register to organize and manage risk through action
awareness is even better than that.
63
Chapter 4 Understanding the Problem
64
Chapter 4 Understanding the Problem
26
Discussions and debates endure impacting national security for
a nation state and commercial activity (see www.lawfareblog.com/
responsible-cyber-offense).
65
Chapter 4 Understanding the Problem
66
Chapter 4 Understanding the Problem
department thinking when they think about risk? (Literally, what is your
accounting team thinking about when they think about risk?) Expect
answers to risk questions to come back being department-focused, such
as human resources suggesting “people” are the organization’s biggest
risk and finance suggesting “monetary value loss” as the biggest risk
to the organization. Both are true… but one focuses on impact and the
other something else. Just as a cybersecurity program is a function of the
business—like human resources and finance—the definitions of risk need
to represent the function as well as the whole, so that it may be accurately
measured and mitigated. The overall objective is to have a common
definition and understanding of risk at each functional level. One way
to help gain traction on an overall definition is to focus on impact to the
organization’s overall mission.
Second, map the cybersecurity risk definition to the enterprise risk
definition that fits the organization at each functional level. Then, layer in
the cybersecurity program.
One helpful way to specifically link the cybersecurity program, as
a functional area, to the enterprise27 is to use the chosen cybersecurity
guiding framework.28 Commonly known frameworks serve as a guiding
post to assist organizations in understanding their current maturity, filling
in gaps where they may not have controls, and providing a road map to
how to improve in the future (i.e., how to build your defenses to help
mitigate, understand, or accept the risks for your enterprise). Continuing
with the CSF use, a “crosswalk mapping” may be useful to understand how
multiple frameworks might map together (e.g., NIST CSF, NIST 800-53,
NIST 800-171, ISO 27001).
For example, if an organization follows the CSF as the guiding
cybersecurity risk framework and also uses (or pursues) ISO 27001
27
Recall, this is a book on cybersecurity risk, not enterprise risk management.
Here, cyber risk rolling into your enterprise risk is the main objective.
28
See Chapter 5 “Focus on One Framework”.
67
Chapter 4 Understanding the Problem
68
Chapter 4 Understanding the Problem
Recent Examples
There are many examples of organizations needing to develop a crisp and
accurate definition of critical assets. This chapter provides four examples.
The first example is an organization that aspired to set up and achieve
the fundamental components of an initial program to get started. This
example is carried through each of the sections, from understanding to
measuring. Additional examples highlight successes and challenges.
69
Chapter 4 Understanding the Problem
70
Chapter 4 Understanding the Problem
Figure 4-12. The risk definition does not consider the likelihood of
an event
With the definition of risk, the team quickly crafted a risk management
statement for the organization. They settled on a clear statement of zero
impact on critical assets. Next, the definition of critical was required.
To settle on a definition of critical, the team again borrowed from the
NISTIR 7621r1 impact categories. Figure 4-13 represents the model used to
quickly identify critical definitions.
29
Borrowed from NISTIR 7621 Revision 1.
71
Chapter 4 Understanding the Problem
Since the model requires assets to be identified first, the team moved
back to inventory assets; it became clear that asset management was
unavoidable. After a month of rigorously investigating the documentation,
interviews with potential asset owners, and physical inspections around
offices and facilities (rogue devices, anyone?), the team developed an
inventory worksheet that captured the current understanding of assets
owned and managed by the organization. Figure 4-14 represents the first
take at an asset inventory developing classes of data, devices, applications,
networks, and users.
72
Chapter 4 Understanding the Problem
USERS People who work •Kober •U-1 •Stroget •Sr. Mgr Nok
on, create, •Admin Cop •U-2 •COP-1 •Dir. Nok
administer, and •Admin ML •U-3 •ML-1 •Dir. Nok
manage •Vedlige •U-4 •ML-2 •Dir. Nok
information
systems
With the assets now defined and in inventory, the team returned their
attention to the impact categories. This began the effort of determining
the impact to the business should the confidentiality, availability, or
integrity security objectives for assets be affected by an information
security event. But first, they needed to prioritize what would most impact
the organization. As a SaaS company servicing one industry, damage to
information or information systems, regulatory fines and penalties, loss
of information critical to running the business, and losing trust from
clients were top considerations. After strong debate and analysis on topics,
perfection lost out to “good enough” as the team progressed through all
five asset classes of data, networks, users, applications, and devices. After
the analysis, the team determined three areas—data, applications, and
networks—as their top asset classes since they largely relied on data from
customers for clients. Figure 4-15 represents the NISTIR 7621r1 model
used to determine critical assets by asset category, this one for data.
73
Chapter 4 Understanding the Problem
Lost access
(2) Categorize each data
type using: Lost work
- 0 for “none”
- 1 for “low” Fines / Penalties
- 2 for “moderate”
Legal activities
- 3 for “high”
Incident recovery
(3) Prioritize for
protection by impact Lost business / reputation loss
score
- Highest Score = highest
Data Type _____ Impact Score:
priority
Figure 4-15. Impact priority for one data type (i.e., PII)
With the assets inventoried for better asset management and defined
by value to the organization, the next was to set it up in a risk register.
(Small companies and startups have the advantage of relative ease in
identifying and categorizing assets.)
Figure 4-16 represents a portion of the risk register.
74
Chapter 4 Understanding the Problem
76
Chapter 4 Understanding the Problem
After the teams felt they had a good understanding of the assets in each
class, they went back and assigned the location and owners of each asset.
This step allows for a couple of things to happen: (1) collaboration with
stakeholders to assign ownership (buy-in with the business) and (2) a second
scan through the asset inventory to validate accuracy and completeness.
77
Chapter 4 Understanding the Problem
The second phase took less time because the teams already knew the
individuals who claimed ownership of certain assets, making it easier
to assign similar assets to certain teams. Filling in the inventory looks
something like what is shown in Figure 4-19.
With the end of the year coming quickly, the teams transferred
their now complete and accurate inventory into their chosen tool for a
CMDB. As they were transferring this information, the teams also set up
quick self-service tickets for asset owners to manage their assets quickly
and easily throughout their life cycle. The workflows were completed for
all asset classes to manage them accurately and efficiently throughout
their very different life cycle phases. The last step in the process was
deploying a tool to perform asset discovery and automate their additions
or modifications in the CMDB.
Overall, the company continued to properly use and manage its
CMDB. While reactive to implementing and going through an asset
management program, the company will be proactive in any future
78
Chapter 4 Understanding the Problem
incidents they encounter. And, as a bonus, the team learned a few key
lessons along the way:
• Structure matters. Road maps and implementation
plans are important for any tool integration, especially
with asset management.
• Tools don’t always help. The tool’s first tactic was not
successful. While they eventually were able to use the
tool, it wasn’t until they stopped aiming for perfection
and moved to good enough that they started to become
successful with asset management.
• Ownership requires buy-in. Avoid assigning
ownership without getting buy-in from the individuals
assigned as asset owners.
79
Chapter 4 Understanding the Problem
For ease, clarity, and alignment to the insurance industry, they settled
on the NISTIR 7621r1 definition, keeping likelihood as they found a way to
apply actuarial methods to help inform probability.30 The execution read
something like “Risk is a function of threats, vulnerabilities, the likelihood
of an event, and the potential impact such an event would have on the
company.”31
Next, they walked through the tedious task of identifying what data
they had and then defining the organization’s impact. They used an asset
inventory worksheet to categorize the data asset and assign a data tag.
Next, the team set out to define what was critical and non-critical data.
Eventually, they agreed on the “crown jewels” definition and measures.
They created organizational data definitions and standards as an output
from this process—for example, a US Social Security number formatted
as ######### (as opposed to ###-##-####), which helped ensure no
other number formats used this representation (e.g., account numbers,
customer numbers, invoice numbers).
30
The formula is now proprietary to the company.
31
Borrowed from the NISTIR 7621r1 definition.
80
Chapter 4 Understanding the Problem
81
Chapter 4 Understanding the Problem
82
Chapter 4 Understanding the Problem
Pitfalls to Avoid
Spending time exploring and defining the real risk is not without
challenges. Avoiding pitfalls can help move the organization toward
understanding the real risk.
The following are common pitfalls to avoid:
83
Chapter 4 Understanding the Problem
84
CHAPTER 5
1
Keep in mind that managing the risk provides a clear path for measuring the
successful management of cybersecurity risk as well, since the “what you are
measuring” needs to be clear before measuring. Successful management relies
heavily on feedback metrics, so the next chapter covers the specifics on “how to
measure.”
© Ryan Leirvik 2023 85
R. Leirvik, Understand, Manage, and Measure Cyber Risk,
https://doi.org/10.1007/978-1-4842-9319-5_5
Chapter 5 Manage the Problem
2
Arguably, in faultless organizations, the solution that best solves the problem
is the focus, reducing the need to consider the swaying influence of those who
have achieved power with the organization. Many organizations are not faultless,
so the conduct of politics is a consideration when solving how best to manage
cybersecurity risk.
86
Chapter 5 Manage the Problem
Details and helpful tools around these rules are broadened later in
the chapter. But first, here are some general observations and guidelines
around managing cybersecurity risk in any organization.
Observations
First, every organization organizes itself differently. No one organization
is the same as another.3 Although corporate structure, titles, and
management approaches may be similar within industries, each
organization operates differently. This individual, organizational
uniqueness challenges any standard program structure for cybersecurity
risk management. How an organization is organized extends into how
specific technology deployment management decisions are made to
support the overall organizational mission.
Second, each organization deploys technology differently. No one
deployment matches exactly any other4 deployment. Although service
3
Many factors lead to why technology deployments differ, from mission to
technical fabric to people. From the technical side, almost no organizational tech
stack matches another. But more importantly, technology is typically deployed
by humans, and from the human resources side, each organization has different
people, and each person follows processes slightly differently. And these impact
deployments more than any independent organizational mission.
4
Contrary to some belief, cloud deployments fall well into the category of “no one
deployment is quite the same as another.”
87
Chapter 5 Manage the Problem
Guidelines
Based on the observations, a few general guidelines exist for implementing
a cybersecurity risk management program.
First, a “quick win” may be achieved for any organization by settling on
one known cyber risk management approach (i.e., a common framework
or standard) for a program that best fits the organizational mission. The
chosen approach does not need to be, and should not be, the only way
cybersecurity is managed—no single framework fits any organization’s
risk profile perfectly—but one single known approach can function as a
starting point and be modified as the cyber risk management program
matures. Starting with a published framework to guide the program
provides a structure that is helpful when aligning cybersecurity activities
and outcomes to business objectives, using easy-to-understand-and-
explain cybersecurity concepts that are immediately useful in any
organization.
Second, following a published framework helps create a common
language for an organization around cybersecurity activities and
management. A common vernacular is tremendously helpful in facilitating
dialogue around common themes in cybersecurity risk management, such
as threats, vulnerabilities, impact, and risk.
88
Chapter 5 Manage the Problem
5
The current state as well as the future state and activities are highly customizable
and may be directly aligned to organizational objectives.
6
At least for now. Automation continues to increase, but even automation still
needs a person at some point of the process.
89
Chapter 5 Manage the Problem
others into the problem can help shed light on other relevant factors
within the organization, such as activities, behaviors, opposing incentives,
and individuals who may help during an incident. One method that works
when inviting others into the problem: Cast a wide net and align to one
way of addressing the risk.
Fourth, always be prepared to respond. Preparing for a cyber incident
takes foresight and planning, and responding to a cyber incident takes
internal coordination and efficiency. The lack of either preparation or
execution can quickly increase the incident severity and overall risk to the
organization.
With these general program observations and guidelines established,
diving into the rules has a bit more context.
Rules to Follow
Simplifying how risk is managed is no easy task in any organization,
but some rules exist to help set proper conditions for establishing a
cybersecurity program.
90
Chapter 5 Manage the Problem
cybersecurity program, that is, a scaffolding for ensuring the program itself
is broad enough to address the risks and a prescribed guide for the way
each risk is addressed.
Enter the framework: a structured way to address cyber risk program
management, helping understand and address cybersecurity risks faced by
the organization. With a framework, appropriate cyber risk management
may effortlessly combine the concepts of critical asset management and
organizational preparedness to respond, offering one risk management
approach for mitigating cyber risk. However, the complication with
frameworks is that no one framework fits any one organization’s risk
profile perfectly.7 So frameworks may act best as a starting point but must
be modified over time as organizational cyber risk management matures
within the overall program.
Many well-defined, highly useful frameworks manage risk for an
entire organization or enterprise. Enterprise risk management (ERM) is
a defined market category for organizations to anticipate, estimate, and
address risk to the entire organization. The Enterprise Risk Management—
Integrated Framework8 by COSO adds the ability to define and manage
the uncertainty that may erode enterprise value. ERM, however, is not
the circumscribed focus for this portion of managing cyber risk. It is the
overarching function in which cybersecurity risk management must
fit, requiring consideration when choosing the right cybersecurity risk
management framework.
In general, available cybersecurity management frameworks come in
many shapes and sizes. That is, frameworks available today each address
certain risks at various organizational levels. For example, program
frameworks, like the NIST CSF and ISO 27001, address the overall state
7
Mentioned in the section “Guidelines,” this is worth repeating.
8
The Committee of Sponsoring Organizations of the Treadway Commission,
Enterprise Risk Management—Integrated Framework, 1985–2021. More
information is at www.coso.org.
91
Chapter 5 Manage the Problem
92
Chapter 5 Manage the Problem
9
Check the latest version available at https://csrc.nist.gov/publications/
detail/sp/800-53/rev-5/final/.
10
CIS Critical Security Controls is a registered trademark. Check the latest version
available at www.cisecurity.org/controls/.
11
The Open Worldwide Application Security Project® is a registered trademark.
The OWASP foundation is a nonprofit focused on software security. The latest
information may be found at https://owasp.org.
12
Version 2.0 will include a new “Govern” function to the current five functions, to
“emphasize cybersecurity risk management governance outcomes” according to
the NIST.
93
Chapter 5 Manage the Problem
Framework Overview
13
Note that the use of the CSF is voluntary for the private sector, but is not optional
for the US government.
14
From the NIST, “[t]hough the Cybersecurity Framework is not a one-size-fits-all
approach to managing cybersecurity risk for organizations, it is ultimately aimed
at reducing and better managing these risks.” www.nist.gov/cyberframework/.
94
Chapter 5 Manage the Problem
15
“A problem thoroughly understood is always fairly simple.” Charles Kettering was
quoted as saying in the book Dynamic Work Simplification (1971) by W. Clements
Zinck, p. 122.
16
See the NIST CSF at www.nist.gov/cyberframework/new-framework/.
17
See Chapter 9.
95
Chapter 5 Manage the Problem
18
A well-defined problem is half solved. Some variation of this quote is usually
attributed to Charles Kettering.
96
Chapter 5 Manage the Problem
19
The full CSF and supporting documents are at www.nist.gov/cyberframework.
20
Note the descriptions and activities used to go forward are modified for
simplicity. Turns out this modification has worked as a simplified way to “get
started” in any organization looking to begin quickly and sufficiently using, and
socializing, the CSF.
97
Chapter 5 Manage the Problem
98
Chapter 5 Manage the Problem
99
Chapter 5 Manage the Problem
100
Chapter 5 Manage the Problem
101
Chapter 5 Manage the Problem
Second, assign a due date for each activity. Assigning the due date
provides a sense of planning for the completion of the activity. Due dates
are a helpful data point to provide expected maturity for specific activities
and program dependencies. For example, knowing the asset management
program will be complete in June informs that a dependent program,
like a data loss prevention for identified critical data, may begin in July.
Figure 5-6 presents the worksheet expanded to capture due dates for listed
activities.
102
Chapter 5 Manage the Problem
103
Chapter 5 Manage the Problem
Second, look at the activities separately. Are there gaps in the program?
Is there too much emphasis on vulnerability management but not enough
on insider risk? Did security architecture lose out to threat assessments
with the push to cloud services? A look at the program as it stands may
help identify these types of activity, or initiative, gaps.
Finally, as a bonus, identify if the appropriate part of the organization
owns the program. Building off a program framework can help solidify
ownership of the overall program and responsibilities within the organization.
Many organizations struggle with full ownership of a cybersecurity program.
Whom does it belong to? The CISO? The chief risk officer (CRO)? The chief
information officer (CIO)? These types of organizational structure and the
actual operating model should be determined before moving forward with
the full establishment of the program.
Organizational operating structure varies from organization to
organization. The key is to have a clear information security risk owner
(e.g., CISO, CRO, information security manager), where organizational
incentives are established to maintain risk mitigation solutions. Figure 5-7
illustrates an example where the CISO organization is responsible for the
program.
104
Chapter 5 Manage the Problem
21
Also known as third parties or third-party vendors. These are not the unbiased
observers or mediators between two parties. In cybersecurity, these are
established relationships between the organization and an outside entity, typically
to perform some function the organization wishes to outsource. The 2013 Target
Corporation breach is one of the first most notable examples that introduced
third-party risk management to the broader public, as well as the boards of
directors.
105
Chapter 5 Manage the Problem
22
Ironically, many organizations hire an outside party, like external consultants, to
assist with the TPRM effort. These organizations, as well, must undergo a third-
party assessment process.
106
Chapter 5 Manage the Problem
IDENTIFY Know the most critical information. What systems or data do they have access to?
PROTECT Establish meaningful safeguards and behaviors What privileged access do they have?
around the most critical information.
DETECT Monitor for and discover potential cybersecurity Can they detect anomalous activity?
events.
RESPOND Prepare for and mitigate cybersecurity events. Are they prepared to respond?
RECOVER Reduce the impact and maximize recovery time. Do they have business continuity and disaster recovery
measures in place, if all else fails?
107
Chapter 5 Manage the Problem
108
Chapter 5 Manage the Problem
a yes or no answer, it would not give the TPRM assessor enough information
to determine the vendor’s risk to the organization. When building out
questions for the questionnaire, it is best to avoid yes or no questions. Ask
questions that require the vendor to go into a bit of detail regarding their
process. The requirements of ID.AM-1 and ID.AM-2 ask the following:
How do you maintain asset inventory? Is the inventory maintained? This
provides your TPRM assessors the ability to understand if the vendor has
a handle on their critical assets. Why is this important? If the vendor has
a handle on critical assets in a breach event, they can identify, detect, and
respond, including alerting third parties (i.e., your organization) of the
attack. Figure 5-9 illustrates sample TPRM questions for ID.
IDENTIFY Know your most Asset ID.AM-1 and IDAM-2: Provider 1. How do you maintain asset
critical information. Management shall maintain an inventory of all inventory? Is the inventory
(ID.AM) the material IT assets and maintained within an Excel
automation system assets spreadsheet or within a tool?
supporting the services that are in 2. Do you use a tool for asset
its possession. discovery to maintain a
proper listing of all internal
and external devices
connecting to your network?
Now that the questionnaire has been established, let’s look at more
examples for each of the other NIST functions. The Protect function is next
on the list. The Protect function determines whether a vendor can properly
establish safeguards and behaviors around critical information.
109
Chapter 5 Manage the Problem
Keep in Mind
The definition for the Protect function is important to note here. The
third-party questionnaire asks whether the vendor can establish
safeguards around their most critical information. Therefore, it is
important to ask very direct questions regarding their access management
and their policies to identify risks to their organization. If they know what
is critical, they should have no problem establishing protections. If they
do not, then protecting what is critical is difficult for the vendor.
Figure 5-10 illustrates TPRM questions for PR.
PROTECT Establish Identity and PR.AC-4: Provider shall restrict 1. Do you adhere to the
meaningful Access physical and logical access to principle of least privilege
safeguards and Control confidential information and IT when assigning access to
behaviors around (PR.AC) systems supporting the services roles? If so, is the policy
the most critical being provided to the minimum documented?
information. level of access and privileges 2. Which employees and
required to perform a function or subcontractor roles will
role. have access to
<organization's name>
data?
While there are six activity subcategories for the NIST CSF Protect
function, the two in Figure 5-10 give a good descriptor of what this
function is trying to accomplish. Is the vendor able to properly deploy
controls to limit access to only necessary parties, and is your organization’s
data properly handled when being shared with this vendor? The Protect
function is the largest as it spans across many important categories such as
Identity and Access Management, Data Security, Awareness and Training,
Maintenance, Information Protection, and Protective Technology.
110
Chapter 5 Manage the Problem
Detect is the next function in the NIST CSF framework. In the context
of the TPRM questionnaire, the focus is on a vendor’s ability to monitor
and discover potential cybersecurity events. This section heavily focuses
on the ability of vendors to detect anomalous behavior before it is
considered an incident. This type of capability will help your organization
identify if this vendor will properly detect any data breach in their
environment and subsequently control the risk if detected early enough.
Figure 5-11 illustrates TPRM questions for DE.
DETECT Monitor for and Anomalies DE.AE-2: Provider shall analyze 1. Can the vendor detect
discover potential and Events security events to identify cyber- anomalous activity and
cybersecurity (DE.AE) attacks and possible attack events within the
events. methods. Provider shall promptly environment (i.e., SIEM,
investigate suspected and proper security controls
confirmed attacks and report with alerting)?
confirmed attacks related to the
services provided under the
contractual agreement.
Continuous DE.CM-1: Provider shall collect and 1. How do you log and alert
Monitoring correlate security events from on relevant security
(DE.CM) systems and sensors to identify events?
information security incidents and
cyber-attacks.
RESPOND Prepare for and Response RS.RP-1: Provider shall report any 1. Do you have formally
mitigate Planning confirmed security incidents or data defined criteria for notifying
cybersecurity (RS.RP) breaches affecting systems or data a client during an incident
events. to <insert organization> promptly that might impact the
and without delay. security of their data or
systems? What are your
SLAs for notification?
RECOVER Reduce the impact Recovery RC.RP-1: Provider shall develop 1. What is the cadence for
and maximize Planning and maintain security recovery data recovery and testing
recovery time. (RC.RP) plans that are executed during or for integrity within
after an event and restore systems systems?
affected by cybersecurity events.
112
Chapter 5 Manage the Problem
23
If this is not immediately shocking, please read (or reread) Chapter 1.
Remember, technology is inherently flawed. Compiling components of flawed
code within flawed code not only increases the opportunity for vulnerabilities; it
also hides those vulnerabilities deep within deployed software.
113
Chapter 5 Manage the Problem
24
Ironically, each of the examples used relies heavily on software to do business,
like, say, create and print/communicate a Bill of Materials.
25
Organizations commonly rely on SBOMs for vulnerability discovery (and then
management) in non-native code. So, naturally, the SBOM discussion for risk
management purposes begins with the common source—external parties.
26
The format matters. At the time of this writing, two formats were competing as
possible standards (CycloneDX and SPDX), among a number of others.
114
Chapter 5 Manage the Problem
This also requires creating SBOMs for in-house software components for
27
115
Chapter 5 Manage the Problem
Overall, executing the plan is highly dependent upon a few key items:
format, process, and ability to digest/action the data. Many organizations
get started with a pilot program for one business unit or functional
business line, or one application, when figuring out how best to begin.
Many times this will mean scanning code repos (internal or third parties,
if authorized) for code libraries or software components with known
vulnerabilities (e.g., an out-of-date .npm package for a specific .json file).
Results from scanning should inform appropriate action according to a
remediation plan—forming new insights and revising remediation plans
as appropriate management dictates. One helpful tool for vulnerable
code in third-party software can be the vendor questionnaire regarding
self-described asset inventory processes (see ID.AM-1 and ID.AM-2 in
Figure 5-9). Another tool is the legal contract (see the section “Step 5f.
Align to Procurement and Purchasing”) to determine if a vendor has a
legal obligation to handle known vulnerabilities, as part of the overall
vulnerability management process. The important part is to have a
sufficient approach to managing key dependencies for a risk-informed and
efficient program.
116
Chapter 5 Manage the Problem
to compromise the supply chain that affects systems. The irony is that
TPRM requires a repository of information to accurately run analytics
on, and diagnose any inherent risk from, the third party. However, these
repositories and the processes around their use are not always configured
or protected in ways that optimally reduce risk to the enterprise (e.g.,
insecure applications, insecure file transfer). The key is to have a way to
assess third parties that allows for a check, or a feedback, on how the third
party is actually performing.
The unfortunate reality is that TPRM data is not always protected, not
even by the third party tasked to collect such data. Security researchers
have indicated there are a noteworthy number of vendors providing
third-party risk management services that create an avenue for third-party
attacks. A strong TPRM program considers vulnerabilities in cybersecurity
risk reduction operations and builds a feedback mechanism for legal
and management to communicate with third parties. Also, internally,
a thorough review of vendors that have access to critical assets on a
regular basis helps identify where vendors may be introducing risk to the
organization.
With a feedback mechanism in place and managed properly, it is time
to provide some extra safeguards to continue to validate the organization’s
third-party risk program. To begin aligning third-party risk to contracts,
take the following step.
117
Chapter 5 Manage the Problem
TPRM has a key hook into the actual contract established or executed
by the primary organization and the third party. Several areas are worth
considering. These include the following:
118
Chapter 5 Manage the Problem
119
Chapter 5 Manage the Problem
28
Thank you, President Ronald Regan, for bringing this Russian proverb
to the American public during the early 1980s nuclear disarmament and
nonproliferation.
120
Chapter 5 Manage the Problem
cybersecurity tools exist, and many claim to solve the most crucial security
problem you have. The challenge, however, is picking the right tool for the
right problem. Sounds familiar?
Selection begins with solution prioritization. Of the gaps discovered in
the program, what is the top priority to solve, and by when does it need a
solution? The program worksheet can help. Figure 5-14 illustrates a simple
way to capture activity prioritization within the full context of the security
program.
Here, the activities are prioritized against one another to bring shape to
the program. The rubric for prioritization should be based on the relative
risk profile and acceptance of the organization. Exactly how to prioritize
activities is a matter for both management and executives, based on
understanding the risk and risk tolerance. But a few resources are available
to help with this process.
First, refer back to the risk register. Critical assets and the associated
risks should be the starting point. This means the threat landscape,
possible vulnerabilities, and anticipated impact to the organization are
121
Chapter 5 Manage the Problem
29
The Cyber Defense Matrix helps map vendor capabilities to functions and assets.
Information on it exists at https://cyberdefensematrix.com.
122
Chapter 5 Manage the Problem
123
Chapter 5 Manage the Problem
bona fide action plan. This starts with a frequent review—a planned review
of current progress toward the assigned due dates. This may seem like a
clear and quite obvious point, but taking determined action to review the
program is one that many organizations skip. Be sure to set a reasonable
program review frequency with the management team, engineers, and
executives.
To get started, a few areas may be covered:
–– Is it still accurate?
124
Chapter 5 Manage the Problem
125
Chapter 5 Manage the Problem
Recent Examples
Example 1. Addressing Too
Many Frameworks
Let’s continue to follow the organization in Example 1 of Chapter 4.
After level-setting on risk and clarifying the assets most valued by
the organization, the CISO and team were ready to start assigning
cybersecurity initiatives or activities to protect critical assets. Recall the
checklist illustrated in Figure 5-16.
126
Chapter 5 Manage the Problem
The main challenge was that the activities needed a logical structure.
Choosing the proper activities based solely on the critical asset process
seemed to be a good start but also missing a more holistic view. The CISO
and team needed a structure. They asked stakeholders to be included in
the next steps of assigning cyber program activities that would extend past
the security team.
It turns out each person asked had a different framework they knew
and sometimes would reference. Now, the organization had too many
frameworks and needed to settle on one. To get here, the team took a
combined approach to the steps outlined earlier. They started by inviting
individuals with equity into the process. This included contracts, the legal
team (for risk understanding), IT, and division managers. They debated
what worked well in the industry. The main objective was to balance
reporting to regulators, communicate throughout the organization, and
align what the board needed to hear. The main frameworks from the teams
working the process were the CSF, MITRE ATT&CK, and FAIR. Naturally,
there was a bit of a pointed discussion around each of them.
127
Chapter 5 Manage the Problem
128
Chapter 5 Manage the Problem
129
Chapter 5 Manage the Problem
130
Chapter 5 Manage the Problem
This team formed a cross-practice group to address the risk and get
buy-in. The cross-practice group included one person from each group:
risk management, cybersecurity, purchasing, and legal. With alignment
to the strategic objective, meetings and tasks were set up for engaging,
efficient, and effective decisions. This group even included an internal
feedback mechanism of ten third-party vendors in compliance per week to
keep them on track.
The cross-practice group first developed a sufficient vendor
questionnaire checklist to provide a prioritized response and assessment.
This checklist started with the basic questions needing to be satisfied for
each function aligned to their framework of choice: the CSF. Figure 5-19
lays out the high-level questions.
IDENTIFY Know the most critical information. What systems or data do they have access to?
PROTECT Establish meaningful safeguards and behaviors What privileged access do they have?
around the most critical information.
DETECT Monitor for and discover potential cybersecurity events. Can they detect anomalous activity?
RESPOND Prepare for and mitigate cybersecurity events. Are they prepared to respond?
RECOVER Reduce the impact and maximize recovery time. Do they have business continuity and disaster
recovery measures in place, if all else fails?
Aligning to these questions set the team to begin asking vendors the
right questions. For example, they began to focus on an organization’s
ability to answer the following:
131
Chapter 5 Manage the Problem
132
Chapter 5 Manage the Problem
133
Chapter 5 Manage the Problem
30
The Health Information Trust Alliance (HITRUST) offers a common security
framework. HITRUST is an organization governed by representatives from the
healthcare industry.
134
Chapter 5 Manage the Problem
With this in place, the organization set a risk target based on the top
ten. It began choosing appropriate measures for measuring risk reduction
along the lines of an inherent exposure risk rating, which allowed for
various application risk ratings to fit into an overall operational risk
assessment to include residual risk aligned to the CSF.
The following are lessons learned along the way:
135
Chapter 5 Manage the Problem
136
Chapter 5 Manage the Problem
in a way that posed more risk rather than less. The nested questions were
normally free text fields that required a third-party assessor to manually go
in and verify or follow up with the vendor.
Third and last, at the end of the questionnaire, the vendor would fall
into critical, high, medium, or low risk based on how they filled in the
questionnaire. If a vendor was at a critical or high, they were reassessed
with more frequency (i.e., quarterly) than the medium- and low-risk
vendors (i.e., yearly), and specific contract language was added to manage
the risk. There was also the potential that if the organization decided that
the vendor was not worth the risk, business would not commence. This
meant the risk the vendor could potentially add was too much for the
consulting firm’s diet with their risk exposure. Essentially the question they
were asking themselves was if this risk was too much.
While this seems as though this was a flawless implementation of
a third-party risk management tool and checklist, there were plenty of
roadblocks as the organization went. Remember the high-level question
used to get started on a TPRM questionnaire? (See Figure 5-20.) Well,
believe it or not, the organization struggled the most with finding the right
questions to ask to receive the most accurate picture of the vendor. The
tool automation relied heavily on the correct weight being added to the
risk-based questions.
IDENTIFY Know the most critical information. What systems or data do they have access to?
PROTECT Establish meaningful safeguards and behaviors What privileged access do they have?
around the most critical information.
DETECT Monitor for and discover potential cybersecurity Can they detect anomalous activity?
events.
RESPOND Prepare for and mitigate cybersecurity events. Are they prepared to respond?
RECOVER Reduce the impact and maximize recovery time. Do they have business continuity and disaster
recovery measures in place, if all else fails?
137
Chapter 5 Manage the Problem
Pitfalls to Avoid
Managing cybersecurity risk has its challenges. Avoiding several pitfalls
at the onset of a cybersecurity program can help move the organization
toward insightful risk management.
138
Chapter 5 Manage the Problem
139
CHAPTER 6
Get Ready
for Measures
Introduction
Articulating the risk and establishing a program is a mammoth task in
effectively managing the risk to the business. The final step is determining
the measurements that will provide the most value while avoiding
“distraction” measures.
Overall, a proper cybersecurity management program contains output
values in key areas used for decision support. A proper program runs like
a decision support system, providing an appropriate measurement of the
problem being managed—in this case, cybersecurity risk.
Strategically placed measures within the program, assigned to key
cyber risk areas, support tactical and strategic decisions on where to
apply resources to address the risk that may impact a critical operational
need of the organization. In some cases, values from cyber risk measures
act as a specific gauge for progress toward achieving a specified risk-
acceptable goal, for example, reducing the number of out-of-date
operating systems to zero across the entire organization. In other cases,
values from cyber risk measures act as a conjecture about possible risk-
inducing activities that require investigation, for example, the number of
employees demonstrating poor security behavior. In all cases, values from
142
Chapter 6 Get Ready for Measures
• Actionable
• Addressable
• Insightful
143
Chapter 6 Get Ready for Measures
not be readily available. Some find this a sticking point. However, a lack of
data does not mean the measure is wrong; it just means the value cannot
be calculated or derived immediately. When faced with the absence of
either a clear equation or a required data source, avoid the tendency to
drop the measure altogether for something easier. Instead, develop an
interim measure to act as a surrogate to the harder measure until the data,
or the equation, is available; just because the data simply cannot be pulled
from current sources is no reason to abandon a proper measure.
Once measures are determined, data sources may be identified
or constructed to derive the proper value. This is where the maturity
journey begins—the quest to achieve meaningful results from data
and sources at all levels of the organization. But the maturity journey
is not one-directional downward; it is also upward and outward, as the
understanding of the risk begins to drive more insightful and meaningful
strategic indicators of risk. After a few risk-reporting cycles, real risk-
insightful data is often discovered within an organization—typically
by security engineers at the front lines of the security efforts. Security
engineers typically have the best view of where the tactical risks live. The
management challenge is to balance the overall number of measures with
the vast amount of data engineers can provide on a day-to-day basis. Here,
the overall cybersecurity program or strategy comes into play since the
proper measures are reviewed regularly. The ability to respond to the value
provided by these measures also comes into play.
With this context in mind, the act of measuring the problem begins.
Picking up from Chapter 5’s framework and applied structure with
assigned activities, it’s time to think about the best data to provide proper
risk reduction signals on how well the program addresses identified risks.1
1
Note that risk reduction is the objective to be measured. Program performance
and individual reactions are currently absent.
144
CHAPTER 7
Rules to Follow
Some immediate challenges need to be addressed to start measuring
organizational cybersecurity risk. The first is agreement among executives
and managers on the actual risks to measure. The second is which
measures provide an accurate representation of the risks. And the natural
follow-on challenge to these two revolves around the actual ability to find
and process data available to feed the measure. A sequence of rules exists
to help address these challenges, some of which have embedded steps for
further guidance.
146
Chapter 7 Measure the Problem
147
Chapter 7 Measure the Problem
Before moving into guiding steps for informative measures, there are
some helpful points to consider. First, many managers in organizations
find themselves digesting a “metric ton” of data. Trying to solve all the
available data at once will simply exacerbate the challenge in mind-
bending ways. Starting with the problem to solve is a top-down approach.
Starting with data available is a bottom-up problem. Approaching the
problem from the top down to the bottom helps stay focused on solving
the problem: the security of critical assets. To solve it this way, keep in
mind the fundamental categories of risk, like the CSF functions (i.e.,
identifying, protecting, detecting, responding, and recovering), and
what goes into the risk categories. This helps keep the attention where it
belongs: on the problem being solved.
148
Chapter 7 Measure the Problem
1
Who originally said this? Sir Charles Dilke? Do we know it best because of Mark
Twain/Samuel Langhorne Clemens? It certainly was not someone in cybersecurity
because electronic computer networking did not exist in the 1800s.
149
Chapter 7 Measure the Problem
2
Using only the results from an internal phishing campaign, or set of campaigns,
could be considered a narrow view of this measure. Results from the campaign,
however, could be considered a starting point, with the intent to mature the
measure over time by adding other components of poor behavior; for example,
DLP triggers or insider threat triggers.
150
Chapter 7 Measure the Problem
Pulling this all together might look like the table shown in Figure 7-2,
which adds a Measure column in place of Priority from the worksheet.
151
Chapter 7 Measure the Problem
152
Chapter 7 Measure the Problem
At the program level, measures should be able to tell the risk story for
the organization. Typically, this is told through categorical measures that,
collectively, add up to the whole story. Deeper, more tactical measures
may help inform program measures but should not necessarily provide
whole-of-program insights. Arguably, feedback measures for governance
and standard setting may elevate to the program level, depending on the
nature of the organization and the industry in which the organization
operates.
153
Chapter 7 Measure the Problem
Straight Math
First, let’s discuss asset management by looking at “% of assets classified as
critical” in Figure 7-3. This measure provides a value useful in helping the
organization understand what is at risk. It helps define the organization’s
view of the core cybersecurity problem: the confidentiality, integrity, and
availability of specific assets.
When aligned to an asset management activity (e.g., an asset
management system), this measure may be calculated using the
straightforward arithmetic shown in Figure 7-4.
3
Arguably, math can solve the entire cybersecurity problem for an organization,
providing quite the advantage. An enjoyable and worthwhile discussion, provided
an appropriate budget. However, this is a book on the basics of cybersecurity risk
program creation. The very basics will be covered here.
154
Chapter 7 Measure the Problem
Measure Calculation
155
Chapter 7 Measure the Problem
Less-Than-Straight Math
Awareness and training might be measured by looking at the “number
of employees demonstrating poor security behavior” example from
Figure 7-3. A number of variables may feed this measure, depending on
the level of information available as well as what insights the measure is
intended to provide.
One option is to provide a low, or “beginning,” indication of risk. A
straight math approach may be used for this option. That includes using
the number of employees failing internal phishing campaigns, adding the
count that the same employee triggers a data loss protection (DLP) event or
violates the acceptable use policy (AUP). This type of measure provides a
reasonable starting point for determining possible risky employee behavior.
The other option is to provide a high, or “mature,” indication of risk,
building off the low indicator by adding expected employee behavior.
Measuring expected employee behavior is a challenge since the
measure must map against anomalies. The key is to first identify what the
concern is: is it an insider threat or basic poor behavior? Each has “tells”
(e.g., performance indicators) and motivators (e.g., financial, malicious)
and ultimately boils down to behavior analysis: motive, access, and ability.
One way to calculate this view is to break down metrics relative to the
categories:
156
Chapter 7 Measure the Problem
157
Chapter 7 Measure the Problem
158
Chapter 7 Measure the Problem
159
Chapter 7 Measure the Problem
Overall reporting can start with risk context—arguably, the “why are
we talking about this?” level-setting discussion. Offering a view of the
current threat landscape for a given quarter and how an incident resulting
from these threats could have impacted the organization—based on
current controls and service maturity—may provide a strong context for
program-related activities.
The remaining content of the report can address the concerns of
the audience. Sometimes this means offering a current view of a cyber
program performance based on measures. Other times this means diving
into specific risks and how the organization is addressing them. For
illustrative purposes, Chapter 8 outlines a possible board report structure
to address the risks faced by the organization.
There are three points to keep in mind when developing a
cybersecurity board report:
160
Chapter 7 Measure the Problem
161
Chapter 7 Measure the Problem
162
Chapter 7 Measure the Problem
With insights into the threat landscape and wisdom from working
the cybersecurity program, key insights become support for the decision,
and the ability to think ahead of the risk becomes possible. One way
to test these insights is to investigate the tools that the organization is
considering. After working with a cybersecurity program, it should become
clear that adversaries know the commercial tools. This means attackers
can get around them.
Having this type of insight begins to drive decisions toward investing
in a custom tool that an attacker does not know, and therefore cannot
be tested against for avoidance, for protecting the valuable. The trade-
offs become clearer: investing in a canned solution or building a custom
solution depends on the level of security necessary for the value.
Recent Examples
Example 1. Simple Measures, Anyone?
Let’s continue with the example organization where the CISO and team
had a strong case to move forward with measures. The fundamentals
of a cybersecurity program were in place, and the CEO was happy with
the progress. The CEO asked the CISO to provide risk indicators for
discussions around how risk was being addressed, but not too many.
Recall the checklist in Figure 7-6.
163
Chapter 7 Measure the Problem
164
Chapter 7 Measure the Problem
Figure 7-7. Simple measures for an initial board meeting on the new
cybersecurity program
165
Chapter 7 Measure the Problem
Noticeably ready for the board, the CISO and team were not yet
done. To truly ensure they were ready for any cybersecurity event, two
predetermined activities remained: prepare to respond and know the laws
for the industry. Having prepared for this since the beginning, the team
knew what to do.
Activities for both developing and testing response plans before the
end of the current quarter (Q3) were in place. This meant the security team
had the foresight to discuss a proper response plan with legal counsel
while in discussions about other initiatives. Fortunately, there was time to
develop a working draft from a template when the teams were frequently
meeting on the impact categories, tying in the protection of critical assets
with roles who would need to be contacted in the event of an incident. The
working draft became the final policy and procedure after one approval
discussion with the CISO. The policy included the definition of an incident
and procedures for whom to contact in the event of an incident. As a
bonus, the team set aside a half-day exercise with executive leadership to
166
Chapter 7 Measure the Problem
167
Chapter 7 Measure the Problem
But the board had not been properly exposed to the laws and regulations,
and certainly not in the context of what the organization was prepared
to do to ensure compliance. The result was an overview as part of the
upcoming board discussion. Figure 7-10 illustrates the synthesized version
of two laws used for a board-level discussion.
Figure 7-10. Two of the laws (at the time) applicable to this
organization
Overall, the CISO and team had tenuously run through the
fundamental components for creating a sustainable cybersecurity
program. As the CISO marked off the final checkbox on the checklist in
Figure 7-11, they were now prepared to report up to the board and start the
journey of maturing a functioning cybersecurity risk reduction program.
168
Chapter 7 Measure the Problem
169
Chapter 7 Measure the Problem
With this scope, they set out to quantify uncertainty in a way that
provides decision-makers the appropriate level of risk mitigation and
coverage through measurement. They understood that good measures
mature over time, as the organization better understands its cybersecurity
posture: a large lesson from measuring performance in transportation. So
they began by asking some questions within the organization:
• What is acceptable?
• How does it relate to the health of the enterprise?
170
Chapter 7 Measure the Problem
They next defined where to get the data, which was a less challenging
task now that specific values were sought after. At the end of the effort, they
landed on seven measures that worked for the entire organization that
looked like Figure 7-12.
Figure 7-12. Seven measures of risk that worked for the organization
4
The value for “mean time to patch” was calculated as (1) the date from when
vulnerability is publicly known (+2) to the time when the vulnerability is patched
(/3) all the patches across the enterprise over a rolling 12-month period.
171
Chapter 7 Measure the Problem
Overall, they got comfortable with the one approach and became
focused on what they were not measuring (e.g., the difference between
incident and response), setting the stage for maturing measures over time.
Throughout this process, the team learned a few key lessons:
Pitfalls to Avoid
Choosing the right measures matters. The main pitfall to avoid is the lack
of a strategy behind what is being measured (i.e., the inability to link a
measure to a plan or determine the expected value) to provide insights. It
should always be clear what value is now and where it needs to be in the
future. Overall, following a plan should help avoid other common pitfalls.
172
Chapter 7 Measure the Problem
173
CHAPTER 8
Report Upward
Introduction
Providing information and insights that allow for a sufficient level
of oversight relative to the business’s operations is the main goal of
reporting upward.
“How do I report to the board?” This is a common question in the
cybersecurity community. It should have one simple answer: whatever
the board requests. However, it’s not that simple. Many board members
are unclear about what questions to ask in cybersecurity. It should be
expected that each board member has a different level of cybersecurity
understanding from the next; naturally, each member of a board typically
has deep expertise in functional areas that are not fundamentally
cybersecurity. This means that many board members neither have deep
technical knowledge nor deep information security experience required
to dive deep into relevant technical cybersecurity problems… and this
is usually by design. What board members do have is a reason for being
on the board, relevant to the other board members in support of the
organizational strategy. This role comes with clarity on the duties of the
board—one of which being risk oversight. With this in mind, the question
“How do I report to the board?” might be answered this way: whatever the
board needs to know to provide a sufficient level of oversight.
Rules to Follow
Recall from Chapter 7 the three questions to keep in mind when
developing a cybersecurity board report:
• What are the key risks and trends the board should be
aware of (at a high level), and what risks require deeper
insight?
176
Chapter 8 Report Upward
These three questions should be kept in mind before jumping into the
rules for reporting to the board.
1
Unless, of course, there is a cybersecurity incident in the news. Newsworthy
events typically get a lot of attention by board members to best understand the
fundamental issues of the recent incident as well as how it may apply to the
organization.
177
Chapter 8 Report Upward
Again, board reports are typically shaped by what the CEO or president
needs to communicate, but providing insights that address the business’s
operations also carries significant value.
178
Chapter 8 Report Upward
179
Chapter 8 Report Upward
180
Chapter 8 Report Upward
181
Chapter 8 Report Upward
Pitfalls to Avoid
Reporting upward has its challenges. Avoiding some pitfalls may
make it easier. Similar to measures, the main pitfall to avoid in upward
communication is the lack of a strategy behind reporting. The inability to
link what is being reported to an overall strategic plan provides no insights
to the board. The plan should always be clear.
182
Chapter 8 Report Upward
183
CHAPTER 9
Questions Boards
Should Ask
Introduction
Boards may ask a set of non-technical yet probing questions to ascertain
the maturity level of the way an organization understands and manages
cybersecurity risk.
Boards of directors do not need to be technical experts to oversee
or discover cybersecurity risks in organizations. However, they need to
ask probing questions to ascertain the maturity level and fundamental
challenges in the way the organization understands and manages
cybersecurity risk. There is only one fact they do need to know: the
ability to compromise any organization is possible because nothing is
truly secure.
Executive boards of directors, M&A due diligence analysts, and venture
capital investors all want to know what questions need to be asked to get a
sense of the real cybersecurity risks within an organization.
One answer is relatively straightforward but not always obvious: ask
probing questions about the overall organizational approach to cyber risk,
and seek evidence of measurable facts supporting that approach. This may
sound fundamental and non-technical. Well, it is fundamental and non-
technical.
The impact of a cyber incident can vary by organization, and with that
variation, so does the relative cybersecurity risk. Operational impacts,
reputational impacts, legal impacts, and even licensing impacts are
typically different between organizations. They are highly dependent
on the type of business, governance of data/systems, and severity of a
cybersecurity incident.
Many organizations speak about controls, technical fixes, expert
people, and technical tools to address this risk. These tactical solutions
solve particular risk management problems, like blocking, monitoring,
detection, and remediation. While greatly important, these solutions
do not solve the oversight problems concerning directors or potential
investors.
The problem for directors or investors is to determine the overall
organizational cyber maturity relative to the risk. What is that level of
maturity, and has the enterprise identified its real risk of a cyber incident?
The board (particularly) and investors (generally) have an oversight
problem to solve, not a management problem.
This leads back to the beginning: What questions do I need to ask
to get a sense of the real cybersecurity risk within an organization? In
essence, where do I start?
To quickly examine the organizational thinking and fundamental
management in cybersecurity, here are five questions to get the
discussions going as part of overnight or any due diligence1:
1
Note this is a starting point. Mature organizations will have detailed and well-
defined answers to these simple questions. When that is the case, things are
off to a good start, and you have enough to frame a point of view on the overall
organizational cybersecurity.
186
Chapter 9 Questions Boards Should Ask
187
Chapter 9 Questions Boards Should Ask
2
Any one framework does not match any one organization. Which framework
chosen by an organization is less important than when a framework (or
frameworks) was (were) chosen, from an oversight point of view.
188
Chapter 9 Questions Boards Should Ask
3
Risk appetite is the level of known risk an organization is willing to… err…
stomach.
189
Chapter 9 Questions Boards Should Ask
4
Typically, the organization, or the organization’s chief, has the responsibility of
aptly balancing the risk, where the CISO, CRO, or information security manager
helps the organization understand and manage the risk. True risk “ownership”
typically is an organizational decision.
190
Chapter 9 Questions Boards Should Ask
191
Chapter 9 Questions Boards Should Ask
192
Chapter 9 Questions Boards Should Ask
193
Chapter 9 Questions Boards Should Ask
194
CHAPTER 10
Conclusion
Introduction
Most organizations rely on imperfect information technology (IT) to
enable business and operational functions. These imperfections expose
attractive perforations for some unauthorized users. Understanding
what these users are after and what is critical to the business is vital for
getting a handle on cybersecurity risk management. With that handle, a
management approach may be put into place and supported by proper
measures that quantify uncertainty as uncertainty changes. These
basic foundational components help focus attention and resources for
organizational management: the ability to understand, manage, and
properly measure cybersecurity risk.
Reducing organizational cybersecurity risk while simultaneously
keeping up with the business is a challenge for many organizations. When
addressing cybersecurity, some basic foundational components can help
focus attention and organize around the ability to understand, manage,
and properly measure cybersecurity risk.
1
Designing with security in mind and “security as design” are still relatively new
concepts, as individuals and organizations have taken advantage of an inherent
trust model.
196
Chapter 10 Conclusion
This may help define critical as something akin to “assets that will
significantly impact the core objectives should the assets escape, be
tampered with, or be used in an unauthorized manner.”
198
Chapter 10 Conclusion
The goal is to have visibility into the type of asset, its whereabouts, and
the actual owner so that proper management may be applied to each and
sufficient controls presented around assets deemed critical. The central
concept is to develop and maintain a satisfactory record, with responsible
owners, for each asset discovered in the organization.
With a set inventory, categorizing assets becomes straightforward. For
example, critical assets (e.g., data, devices, applications, networks, users)
may be grouped according to the potential harm a cybersecurity event
could do to organizational data (e.g., PHI data, PII data, FTI, intellectual
property), devices (e.g., web cams, displays, machinery, appliances),
applications (e.g., key services, software), users (e.g., employees), or
199
Chapter 10 Conclusion
With this, it should be clear that the risk is relative to protecting critical
assets. Understanding the risk offers the ability to properly manage the risk.
200
Chapter 10 Conclusion
201
Chapter 10 Conclusion
202
Chapter 10 Conclusion
203
Chapter 10 Conclusion
204
Chapter 10 Conclusion
205
Chapter 10 Conclusion
Management teams often struggle with both the actual math and
the authoritative data sources to formulate a measure that provides an
insightful value. Chances are that the data needed to feed the measure will
not be readily available. Some find this a sticking point. However, a lack of
data does not mean the measure is wrong; it just means the value cannot
be calculated or derived immediately. When faced with the absence of
either a clear equation or a required data source, avoid the tendency to
drop the measure altogether for something easier. Instead, develop an
interim measure to act as a surrogate to the harder measure until the data,
or the equation, is available; because the data simply cannot be pulled
from current sources is no reason to abandon a proper measure.
The critical objective is to choose risk-informative metrics, KRIs, and
KPIs and then apply appropriate resources (e.g., measuring projects,
overseeing initiatives) to act on the measures. Figure 10-6 highlights
examples of proven measures.
206
Chapter 10 Conclusion
207
Chapter 10 Conclusion
top focus areas along the broad functions being measured for risk
(i.e., alongside the chosen framework) and no more than 15 measures to
start to maintain focus on the top risk areas.
208
APPENDIX
Illustration
Solving cybersecurity risks within an organization begins with one
approach. Enterprise cybersecurity risks continue to rise due to everything
from advanced connectivity to the Internet of Things (IoT). They require
more rapid response and persistent monitoring to appropriately identify
and remediate vulnerabilities to protect enterprise assets. However,
achieving overall enterprise cybersecurity is a multistep process that leaves
many organizations uncertain about where to begin. This appendix takes
the concepts from Chapter 5 and illustrates the step-by-step, structured,
top-down approach as a first step in securing the enterprise.
210
Appendix Illustration
211
Appendix Illustration
212
Appendix Illustration
213
Appendix Illustration
214
Appendix Illustration
With the gaps identified, new activities to satisfy the spirit of the
recommended activities may be outlined and planned. This begins to set
the road map for an action plan and, arguably, a long-term cybersecurity
program.
215
Appendix Illustration
One area to be mindful of during this step is the area of third-party risk.
Anticipating areas of organizational cybersecurity risk does stretch beyond
simply internal areas or domains. Individuals and entities outside of the
organization (referred to as third parties) certainly introduce their own
set of risks that can sometimes go overlooked. Take care to place security
attention beyond the primary organizational boundaries for investigating
possible vulnerabilities that may impact the primary organization.
216
Index
A Business leaders, 13, 14
Business risk, 12
Acceptable risk, 66
management, 37
Actionable measures, 149, 150
problem, 37
Actionable reviews, 151, 152, 205
Business’s operations, 52, 175, 178
Actual risk management, 16, 28
Amass information, 58
Artificial intelligence C
continual good-vs.-evil use
California Consumer
cases, 12
Privacy Act, 65
Asset categories, 48, 57
California Privacy Rights Act, 65
Asset class, 73, 76
Chasing perfection, 32
Asset fundamentals, 50, 52
Chief information officer
Asset inventory, 72, 73, 77, 78
(CIO), 104
Asset management, 45, 58, 76, 102
Chief information security officer
Asset management risk
(CISO), 70, 71, 75, 76,
register, 200
103, 203
Asset-relevant vulnerability
Clarity, 52, 80, 182
information, 59
Cloud services, 46, 102
Assets, 23, 198, 199
Common Vulnerabilities and
Attack surface, 19
Exposures (CVE), 59
Common Vulnerability Scoring
B System (CVSS), 59
Computer hack, 22
Board-level metrics, 179
Computer security, 64
Breach notification laws, 64
Confidentiality, integrity, and
Business information security
availability (CIA), 23
officer (BISO), 103
218
INDEX
219
INDEX
D H
Data loss prevention (DLP) Hack, 22
trigger, 31 Human exercise location tracker, 9
Data protection Human resources (HR), 157, 158
strategy, 79–82
DDoS/phishing
I, J
attacks, 176
Denial-of-service (DoS) attack, 58 Identify the risks to critical assets
Deployed technology, 5, 8, 11, 13 business impact analysis, 60–63
Distractors, 19, 20 cybersecurity risk, 66–68
enterprise risk, 66–68
laws and regulations, 64, 65
E risk register, 63, 64
Enterprise security elements, 53
risk, 38, 66–68 threat analysis, 54–56
Enterprise risk management threat model, 56, 57
(ERM), 66, 91 vulnerabilities, 57–59
External risks, 105 Immediate solution approach, 143
Impact categories, 60–63, 71, 72
Individual incentives, 158
F Information security, 37, 39, 43, 64
Factor Analysis of Information Risk Information technology (IT), 3, 82
(FAIR), 93 flaws, 4
Fair Credit Reporting Act, 65 imperfections, 5
Farming equipment, 8 problem, 6
Feedback loop, 132 Informative strategic measures, 148
Feedback mechanism, 117 actionable reviews, 151, 152
choose actionable measures,
149, 150
G clear addressable activities,
General Data Protection 150, 151
Regulation, 167 Initiatives, 102
Global 500 technology, 4 Interim measures, 161, 162
Gramm-Leach-Bliley Act, 65 Internal alignment, 120
220
INDEX
221
INDEX
222
INDEX
223