First, if you have not yet read Joel Brenner’s report, “Keeping America Safe: Toward More Secure Networks for Critical Sectors,” written for the MIT Center for International Studies and the MIT Internet Policy Research Initiative, then you should open another tab right now and go do that. Don’t worry. We’ll wait. The report is not so interesting for breaking new ground, but rather for shifting the focus of the cybersecurity conversation in a couple of ways. It also says aloud something many security pros fear to say even to each other: we don’t really know how to measure risk in cybersecurity. If you can’t measure risk, then you can’t really calculate reward. That failure to understand risk comes largely from the lack of visibility we have into some of the most basic parts of the people, process, technology, and environment where our systems operate.
Brenner’s report immediately sets a tone most do not. It recognizes that too often the security person in the room is the “no man” or the one who is yelling at everyone. So this report looks to make constructive suggestions about policy at the highest levels that he feels would alter the fundamental conditions of security work in every organization. Now, we could spend a lot of time at a bar arguing about how many, if any, of the suggestions spelled out would be effective. However, the tone of being constructive and prescriptive is very welcome regardless. If all the security pros in the US were to adopt this change in tone immediately, the whole industry might experience a move up in effectiveness overnight. Goodness knows I’ve been the “eat right and exercise” nagger in too many meetings myself.
The recognition that we do not have the tools to see things clearly enough to quantify risk is also a breath of fresh air. In the Second Challenge of eight, the report clearly lays out how our collective understanding and conversation about cyber-risk is lacking:
Quantifying risk in either absolute or relative terms is a difficult challenge that impedes cybersecurity investment in all sectors examined except certain financial institutions. The asserted inability to measure the rate of return on cybersecurity investment is a closely related problem that affects overall investment levels and makes it difficult to target investment. Fragility of systems is a salient aspect of risk that concerned participants in all sectors. Absent assurances of confidentiality, candid participation by the private sector will not occur. However, the public should be informed of the general state of security of critical infrastructure.
There is only one thing I would modify in this statement. The focus here is on inter-organizational conversations. I believe even intra-organizational conversations suffer from this. Our collective lack of ability to quantify risk inside our organizations isn’t something we say enough even to our colleagues. But everyone knows it. Everyone knows the first step to a solution is admitting there is a problem. This report points to the problem clearly and lays it out thoroughly. One can only hope it can start the conversation we need to have about cyber-risk, security, and the ways we can dig into our systems to expose everything needed – within our own organizations and to others outside as well – in order to define, quantify, and then make steps to truly control our risks.
Jonathan Sander is STEALTHbits’ Chief Technology Officer (CTO). As CTO, he is responsible for driving technical innovation, ensuring that STEALTHbits is well positioned in their current and emerging markets, and he will also lead corporate development efforts. Jonathan also plays the role of evangelist at STEALTHbits venues large and small. Prior to STEALTHbits, Jonathan was VP of Product Strategy for Lieberman Software.
As part of Quest Software from 1999 through 2013, he worked with the security and ITSM portfolios. He helped launch Quest’s IAM solutions, directing all business development and product strategy efforts. Previous to that, Mr. Sander was a consultant at Platinum Technology focusing on the security, access control and SSO solutions. He graduated from Fordham University with a degree in Philosophy.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.Read more
Start a Free Stealthbits Trial!
No risk. No obligation.