Academia.eduAcademia.edu

Cybersecurity risk management

2023, Introduction to Cybersecurity Governance for Business Technology Management

This chapter presents cybersecurity risk management, a vital aspect of cybersecurity governance. As mentioned previously, cybersecurity governance is a continuum of three activities, called GRC, Governance, Risk Management and Compliance. Cybersecurity governance sets the framework, risk management helps support the decision-making process, and compliance is used to demonstrate that obligations are met, and that controls and risk mitigation activities are working. This chapter investigates the second activity, or the R in GRC, more specifically, risk management and risk assessments. The next chapter presents a scenario-based approach to implement was is discussed in this chapter.

Introduction to Cybersecurity Governance for Business Technology Management Chapter 4: Cybersecurity risk management This chapter presents cybersecurity risk management, a vital aspect of cybersecurity governance. As mentioned previously, cybersecurity governance is a continuum of three activities, called GRC, Governance, Risk Management and Compliance. Cybersecurity governance sets the framework, risk management helps support the decision-making process, and compliance is used to demonstrate that obligations are met, and that controls and risk mitigation activities are working. This chapter investigates the second activity, or the R in GRC, more specifically, risk management and risk assessments. The next chapter presents a scenario-based approach to implement was is discussed in this chapter. As mentioned in chapter 1, risk is created through the exploitation of vulnerabilities by a threat agent. This is illustrated in the risk triangle (Figure 4), showing risk components. Risk occurs when the threat exploits, or takes advantage of, a vulnerability, this resulting in a potential risk exposure becoming an actual damage, loss, or negative outcome in some way. This is when an exposure to risk becomes a materialized, negative outcome, such as financial losses or material damages. It happens when all the risk components meet in time and space. The risk triangle also illustrates that risk can be managed by reducing any of the components, such as the vulnerability or the threat agent. This highlights the need for organizations to identify and address potential vulnerabilities to reduce the risk of an attack. As well, the organizations must identify and understand potential threats and threat agents, such as malicious actors. Finally, it must seek to determine realistic scenarios of exploitation of vulnerabilities by threats with the potential damages that could occur. These four activities, vulnerabilities identification, threats identification, determination of scenarios of exploitation, and potential negative outcomes, constitute risk assessment. While this can apply to many categories of risks, cybersecurity risk management analyzes negative outcomes in relation to the organization's cybersecurity objectives and its cybersecurity governance framework. In addition to minimizing financial losses and complying to the governance framework, cybersecurity objectives are expressed in relation to the CIA triangle, or the requirements for confidentiality, integrity, and availability, presented in figure 1, in chapter 1. This helps organizations create a comprehensive risk management strategy that will protect their data, systems, and processes from malicious actors. The strategy should also include measures to mitigate any potential risks, such as implementing appropriate access control measures, updating software regularly, and conducting regular vulnerability scans. Marc-André Léger, Ph.D. 69 May 2023 Introduction to Cybersecurity Governance for Business Technology Management As risk is achieved through this exploitation process, where something bad happens. Risk management is concerned with preventing risks or implementing protections measures to minimize negative outcomes. The fraud triangle, it is linked to criminal intent, or Mens Rea, displayed by mischievous individuals. It is therefore imperative that organizations take appropriate measures to protect their data and systems from these malicious actors. Criminal intent must play a role in taking advantage of a vulnerability to make it a cybercrime, otherwise it could be accidental. When the threat agent exploits the vulnerability, risk results, as illustrated in figures 3 and 4. Negative impacts, regardless of whether they are accidental or voluntary, must still be managed by organizations. Organizations must understand and be aware of the vulnerabilities to manage the risks and prevent any potential cybercrimes. It is important to recognize and protect against the malicious intent of individuals to ensure cyber security. In this chapter we discuss how organizations should assess and manage cybersecurity risks. Another aspect of cybersecurity risk management is providing guidance to help organizations allocate human and financial resources to appropriately protects data, information systems and all business technologies that support an organization’s mission. This risk management important to help support cybersecurity operations and the selection of solutions. Cybersecurity risk management fundamentals When thinking about risks, organizations need to investigate impacts to the organizations and its stakeholders. The business impacts of cybersecurity are what most organizations would be looking at. These can be of many types. The impacts can be physical, tangible, and measurable, such as the destruction of equipment. But the impacts may also be intangible, difficult to estimate and subjective, such as the reduced performance of equipment, individuals getting hurt, or event individuals dying. Business impacts may be financial losses. Often organizations tend to focus on financial losses. These can be expressed and measured in many ways, such as loss of clientele, loss of market share, loss of reputation, loss of market capitalization, a reduction of the value of stocks, or loss of value of the business in general. Although, there has been many studies that have shown that there there's really no evidence of long-term financial loss, most financial losses tend to be generally more. Short term, we look at examples of major cybersecurity issues. That have happened. And we look at it. You know, in the in a year later, then yes. But you look at it 2-3 years or more down the line, then things generally get back to normal at that point. the financial losses in many cases tend to be more. More short term than long term. And then finally psychological aspects or loss of confidence in the organization, psychological distress, perhaps social unrest as well. Marc-André Léger, Ph.D. 70 May 2023 Introduction to Cybersecurity Governance for Business Technology Management When we look at the different types of cyber-harms that may occur, or bad things towards the organization in the connected world, we can categorize them using a taxonomy or an ontology. These are tools that we can use to catalogue them to help us better understand them. When trying to identify threats, these tools are going to be useful. Taxonomies, ontologies, and other systematic classification schemes of how different components of risk can be organized, will save time and effort. As well, it will be useful to identify risk mitigation opportunities. There are many examples of these that are available online, so we will not cover them at length here, as this topic should be covered in a more advanced level. What risk management is NOT A fundamental aspect of risk is the potentiality for an undesirable outcome. Risk can only exist if the is possibility for some kind of loss, reduction of some future expected benefit, or loss of utility. If an outcome is certain, or let’s say 99% to 100% sure, then there is no risk. This level of certainty will not be manageable with risk management. In such a scenario it is an operational problem. It must be managed through a normal business activity. This is not just true for cybersecurity risks but all categories of risk. For example, in the cybersecurity domain, if there is a 100% chance that you will get a virus on your computers, then installing, managing, and supporting an enterprise anti-virus system should be a default function of your IT department. There is no need for risk management if the outcome is certain in the virus scenario that was presented. Similarly, is the probably of an outcome is so infinitely small that it can’t be evaluated, then it should not be addressed as a risk management problem as it won’t be manageable. Even if the impacts are incredibly large, considering that organizations have so much to deal with already and limited resources, it would make little business sense to implement specific risk mitigation measures. For this last possibility, what organizations need is an incidents management program (IM), a business continuity plan (BCP) for mission critical and strategic activities and a disaster recovery plan (DRP) for the organization. They will allow organizations to prepare and deal with totally unexpected events, as well as scenarios that have a very small likelihood. For example, the likelihood of an asteroid falling on Earth is pretty much 100%, but the likelihood of an asteroid falling on or near your IT Datacenter in impossible to assess. This trio of IM-BCP-DRP, are discussed in detail in a later chapter of this book. It is important to understand that risk management happens when there is a reasonable possibility to put a probabilistic value on risk, even if this is highly subjective, if it is reasonably justifiable. Should students absolutely need numbers for this, then let’s say that somewhere between 5% and Marc-André Léger, Ph.D. 71 May 2023 Introduction to Cybersecurity Governance for Business Technology Management 95% might be reasonable thresholds for risk management. More than that it is certainty, which is not risk. Less than that is uncertainty, sometimes referred to as epistemological uncertainty in scientific literature, and that too is not risk. Of course, we can have endless discussions on the best minimum and maximum threshold to use in a particular context. An acceptable minimum might be anywhere from 0.01% to 10% and the maximum might be anywhere above 90%. For this introduction we set them arbitrarily at 5% and 95%. The exact cut-off is not that important. The IPM process The risk management process can be defined by the acronym IPM. This stands for identification, prioritization, and mobilization. It is presented on figure 13. In the identification phase, organizations are going to try to identify potential threats, potential vulnerabilities, their potential exposure to risk should these vulnerabilities be exploited, and what would be the business consequences if the risk materialized. This can be difficult to achieve in an organizational setting as individuals in BTM and cybersecurity roles often do not know how to get started. As well, there are many cognitive biases that can interfere with this activity, as discussed later in this chapter. Often, various individuals have different strategies to identify threats and vulnerabilities based on their past-experience, beliefs, or because of their skill sets. One way to do this do this, which is what is proposed in this book, is to use risk scenarios as a tool to facilitate the identification phase. Figure 13: IPM process Marc-André Léger, Ph.D. 72 May 2023 Introduction to Cybersecurity Governance for Business Technology Management Students need to understand that scenarios are stories. They are descriptions of things that could happen when threats exploit vulnerabilities, which would potentially result in a negative outcome. The negative outcomes are in relation to what was included in the cybersecurity governance framework, which was discussed in previous chapters. As well, negative outcomes are in relation to the CIA triangle, or to the cybersecurity objectives expressed in relation to the organizational requirements for confidentiality, integrity, and availability. To create scenarios organizations, create storyboards of ways that this could potentially happen. This is all happening in the identification phase. Once these scenarios are created, and the threats and vulnerabilities are identified, we move on to the next phase, prioritization. In the prioritization phase of risk management, organizations are going to try to prioritize the risk scenarios. This is necessary because resources are always limited and so they want to deal first with the things that are more urgent or where there are more significant impacts. These are the priorities. Of course, priorities are set based on requirements of an organization and the preferences of its leadership. Organizations also need to determine what is acceptable and unacceptable. Coming back to the definition of security and risk in chapter 1, we remember that security is the absence of unacceptable risks. In the prioritization phase of risk management organizations are going to try to identify what is acceptable and what is unacceptable. Based on the results of prioritization the organization will make decisions about risk and then mobilize resources. In the mobilization phase, the organization will allocate resources, such as money and individuals towards making unacceptable risks acceptable. This in a continuous cycle, a never-ending thing, regularly identifying and updating and prioritizing and reviewing priorities, and then mobilizing and implementing solutions, processes and providing training. Through the mobilization effort and then the operations and management of the business technologies used in the organization, risk will be managed appropriately by the organization. Security operations are presented in another chapter. As well, risk management is supported by checks and balances to make sure that the organization is doing a good job. This is the role of internal and external audit, also shown on figure 13. Organizations have two risk management feedback loops through BTM operations, such as the IT department, and through the audit process, such as provided by the Compliance department. These feedback loops are used to ensure that risk management procedures or practices are done correctly. Biases and other factors There are many biases that impact risk management in general and risk assessment in particular. An individuals' risk tolerance influences their decision-making when it comes to risk-related decisions. Marc-André Léger, Ph.D. 73 May 2023 Introduction to Cybersecurity Governance for Business Technology Management People who are risk-averse tend to make decisions that favor safety and security over the potential of reward. Risk-seeking individuals, on the other hand, are more likely to take more risks in pursuit of higher rewards. Both decision-making postures have merits and limitations. In an organizational role however, this will become a significant factor if individual risk postures are not coherent with the organization’s risk management strategy. For some individuals, their risk posture can contribute to irrational decisions when there is an important disconnect with the organization. Other factors can also influence the individual involved in risk decisions. For example, a person's ability to understand risk, their access to resources, and their confidence in their own decisions can all play a role in their risk-taking behavior. Additionally, their understanding of the rewards and consequences of their decision-making will also influence their risk-taking behavior. Because a non-scientific risk management is necessarily based on experience and intuition. As a result, this type of risk management tends to be subjective and emotional, as it is based on an individual's own beliefs, values, and limitations. An individual's experiences and biases, and their own recognitions of risk, play an increasingly important role in risk management because of this approach. There are many factors that can influence the interpretation of risk and its outcomes, and this interpretation can be influenced by both culture and upbringing. Psychology teaches us that this information, while seemingly accurate from the point of view of the individual as a particular actor, is biased. These biases can cause us to overlook certain facts, draw incorrect conclusions, or jump to inaccurate conclusions. To accurately interpret information and make decisions, it is important to be aware of cognitive biases and take steps to mitigate them. Some of the most common cognitive biases include confirmation, optimism, and many others. The biases in risk management can have a significant impact on decision-making processes, potentially leading to sub-optimal or incorrect results. To address these biases effectively, it is important to recognize them. The following are some of the most common types of bias that affect risk management: • In overconfidence bias, individuals or teams overestimate their knowledge, abilities, or prediction accuracy. As a result, they may take inadequate precautions because they believe they understand risks better than they do. • Decision-makers can become overly dependent on the first piece of information they encounter, the anchor, when making decisions. The anchor bias will affect subsequent information may not be weighed appropriately because of this. • A confirmation bias occurs when people favor information that confirms their existing beliefs or values. This can lead to decision-makers selectively seeking out or giving more credence to information that aligns with their preconceptions in risk management. Marc-André Léger, Ph.D. 74 May 2023 Introduction to Cybersecurity Governance for Business Technology Management • The availability bias arises when decisions are based on immediate and easily recalled information rather than comprehensive information. Due to their ease of recall, recent or dramatic events can disproportionately influence risk assessments. • Optimism bias occurs when individuals believe they are less likely to experience negative events than others. Inadequate safeguards or inadequate risk management can result in under-preparation. • A status quo bias is a preference for the current situation. In general, people are resistant to change, which can make it difficult to adopt effective risk management strategies. There are other factors that may also influence risk management. For example, because of groupthink, decisions may be made without thorough consideration or that don't account for all potential risks in a group's desire for harmony and conformity. Risks will also be influenced by the language used. The choice of words influences how individuals perceive risk, and more specifically, how they evaluate the chances of loss and gain. According to Prospect Theory, the framing of the problem, called framing effect, the way it is presented, and the scenario influence the construction of risk, decision-making, and outcomes. People take risks based on the reference point they use when estimating risk situations. Even if the underlying data are the same, presenting them as potential losses instead of potential gains can lead to different risk management decisions. In addition to these elements, cultural aspects, propensity to risk, and language will affect individual behavior. There will be an underestimation or overestimation of the probability of an element's vulnerability to hazards, damage, and risk. An individual filters subjective, unscientific estimations. In terms of risk management, it cannot meet the needs of organizations. As it is difficult to eliminate the subjective aspect of certain decisions, it cannot be completely ignored. Additionally, it is not always possible to obtain reliable evidence sources that cover all possible risks. Finally, it is difficult to see the situation due to the complexity of the organizational ecosystem. It is almost impossible for organizations to completely rely on a science-based approach to risk management. As a result, it is necessary to implement mechanisms to limit the impact of subjectivity inherent in non-scientific approaches. Other components of the risk management process Best practices and international standards, such as COBIT and ISO 27005, provide additional guidance as to what the cybersecurity risk management process should entail. For example, ISO 27005, presented in figure 14, includes the IPM process in an eight-step business process, providing more specific guidance as to what should be included. In the identification phase of the IPM process, Marc-André Léger, Ph.D. 75 May 2023 Introduction to Cybersecurity Governance for Business Technology Management ISO27005 includes Context establishment and Risk Identification. In the Priorization phase, we find Risk Analysis and Risk Evaluation. Finally in the Mobilization phase, there is Risk treatment, Risk acceptance, Communication and consultation and Monitoring and review. Monitoring and review is also supported by Business Technology Operations and by the Audit process of the IPM model. Using ISO 27005 provides a more detailed description of the cybersecurity risk management process. Formal methodologies will proposed detailed steps that should integrate the IPM process at a high level and ISO 27005 when looking into a more detailed description. Figure 14: ISO27005 risk management process Decisions about risk The priorization phase leads to making decisions about risks. Decisions about risk encompass a range of strategic choices and actions that organizations make to effectively manage and address potential risks. These decisions are critical for creating a comprehensive risk management strategy. Here are some key decisions that organizations need to make about risk. The different risk strategic are used as part of a comprehensive risk management strategy. The organization might mitigate some risks and accept others, while it might choose risk transfer, avoidance, reduction, and other approaches for other risks. There are no one size fits all solutions. Any decision must be supported by a diligent risk assessment. Marc-André Léger, Ph.D. 76 May 2023 Introduction to Cybersecurity Governance for Business Technology Management Risk acceptance Risk acceptance is a strategic decision made by an organization to acknowledge and tolerate a certain level of risk without implementing specific measures to mitigate it. In other words, the organization acknowledges that a particular risk exists, but consciously chooses not to take further actions to reduce its impact or likelihood. This decision needs to be based on a thorough assessment of the risk's potential impact, the cost and feasibility of mitigation measures, and the organization's risk tolerance level. A few key points that organizations need to understand about risk acceptance: • Risk tolerance: Risk acceptance is closely tied to an organization's risk tolerance level, or the amount of risk the organization is willing to tolerate before acting. Some risks may fall within the acceptable range and not warrant immediate or extensive mitigation efforts. • Business Considerations: Organizations may choose to accept certain risks when the cost of implementing controls or mitigation measures outweighs the potential impact of the risk itself. This could be due to budget constraints, technical limitations, or other business priorities. Managers need to be diligent about this, as their will be blamed if they decided based on business considerations that later is shown to be an error. • Informed decision: Risk acceptance is not a passive or negligent approach. It involves a wellinformed decision-making process where the organization understands the risks, potential consequences, and potential benefits of accepting the risk. • Ongoing Monitoring: Even when a risk is accepted, it's important for the organization to continue monitoring the risk's impact and reassessing the decision periodically. Changing circumstances or new information may lead to a re-evaluation of the risk acceptance decision. • Document accepted risks: When an organization decides to accept a certain risk, it should document the decision-making process in a risk registry. This documentation helps maintain transparency and accountability and serves as a reference for future risk assessments. Documentation of accepted risks may often be a compliance and legal requirement. • Communication: Effective communication is crucial when it comes to risk acceptance. Stakeholders, including senior management, the board of directors, and relevant teams, should be aware of the decision to accept a particular risk. It's important to note that risk acceptance should be a deliberate and well-considered choice. It should not be mistaken for negligence or a lack of concern for security. Instead, it reflects a Marc-André Léger, Ph.D. 77 May 2023 Introduction to Cybersecurity Governance for Business Technology Management thoughtful analysis of risks and their alignment with the organization's overall governance framework, compliance obligations, business objectives and risk management strategy. Risk avoidance Risk avoidance is a risk management strategy in which an organization takes deliberate actions to eliminate or minimize exposure to certain risks. In essence, the organization makes decisions and implements measures to completely steer clear of situations or activities that could lead to the identified risks. The goal of risk avoidance is to prevent the occurrence of adverse events or outcomes that could negatively impact the organization. Risk avoidance could include decisions like not entering a specific market due to political instability, not adopting a certain technology that is vulnerable to cyberattacks or discontinuing a product line with significant regulatory compliance challenges. Key points to understand about risk avoidance: • Preventive approach: Risk avoidance focuses on preventing risks from materializing rather than managing their consequences after they occur. Organizations need to be proactive, not reactive. This strategy aims to eliminate the possibility of the risk occurring altogether. • Proactive decision-making: Organizations that adopt risk avoidance assess potential risks and decide not to engage in activities or situations that pose an unacceptable level of risk. This could involve refraining from certain business practices, technologies, or partnerships. • Cost-benefit analysis: Organizations consider the cost of avoiding a risk versus the potential benefits of doing so, or the potential benefits of the opportunities that are linked to this potential risk. If the cost of avoiding the risk is justified by the potential harm it could cause, risk avoidance may be deemed appropriate. • Alternatives and substitutes: In some cases, risk avoidance might involve finding alternative approaches, technologies, or strategies that achieve the organization's objectives without exposing it to the identified risk. • Trade-offs: While risk avoidance can be effective in preventing certain risks, it may also come with trade-offs, such as missed business opportunities or potential innovation. Organizations need to carefully consider these trade-offs when choosing risk avoidance as a strategy. • Transparency: Decisions related to risk avoidance should be communicated clearly within the organization, especially to key stakeholders such as senior management and the board of directors. Transparency helps ensure that everyone understands the rationale behind the decisions. Marc-André Léger, Ph.D. 78 May 2023 Introduction to Cybersecurity Governance for Business Technology Management • Periodic re-evaluation: Over time, the organization should periodically reassess its risk avoidance decisions to determine if circumstances have changed or if new information has emerged that could alter the risk landscape. Risk avoidance is one of several strategies within the broader context of risk management. Risk avoidance is a good decision in situations where the potential negative impact of a risk is deemed too severe or costly, and where the benefits of avoiding the risk outweigh the potential rewards of taking it. It is particularly useful for addressing risks that have high potential for severe impact or where the cost of mitigation outweighs the benefits. However, like any risk management strategy, risk avoidance should be aligned with the organization's overall goals and risk appetite. Here are some scenarios where risk avoidance might be a prudent choice: • Highly severe consequences: If the potential consequences of a risk event are catastrophic and could significantly harm the organization's reputation, financial stability, or ability to operate, risk avoidance may be the best option. This is particularly relevant for risks that could lead to legal liabilities, regulatory penalties, or massive financial losses. • Unacceptable risk tolerance: When an organization's risk tolerance is very low, it may choose to avoid risks that fall outside the acceptable threshold, even if the likelihood of occurrence is low. This is often the case with risks that could lead to irreversible damage or are considered morally or ethically unacceptable. • Limited ability to mitigate: If there are limited or ineffective ways to mitigate a particular risk, avoiding it altogether may be the most feasible approach. This is especially true for risks that cannot be adequately controlled through technical, administrative, or operational measures. • Regulatory compliance: When certain risks are associated with non-compliance with industry regulations or legal requirements, risk avoidance may be necessary to ensure adherence to the law and avoid legal consequences. • High costs of mitigation: If the cost of implementing risk mitigation measures significantly outweighs the potential benefits, risk avoidance may be a more cost-effective choice. This could be the case for risks that require extensive investments in technology, personnel, or infrastructure. • Unpredictable risks: In situations where the likelihood of a risk event occurring cannot be reliably predicted or where the risk landscape is constantly changing, risk avoidance might be preferred over relying on uncertain mitigation strategies. Marc-André Léger, Ph.D. 79 May 2023 Introduction to Cybersecurity Governance for Business Technology Management • Strategic business decisions: Risk avoidance can align with broader strategic decisions. For example, if entering a new market or launching a new product presents significant risks that could harm the organization's core business, avoiding those risks may support overall business objectives. • Preservation of reputation: Risks that could damage an organization's reputation or brand equity are often prime candidates for avoidance, as reputation is a critical intangible asset that can be difficult to repair once damaged. • Public safety: Risks that pose threats to public safety, health, or the environment may necessitate risk avoidance to prevent harm to individuals, communities, or the ecosystem. Risk transfer Risk transfer is a risk management strategy in which an organization externalizes the risk by shifting the financial burden or responsibility to another party. This is done through contractual arrangements, outsourcing, insurance policies, or other financial mechanisms. By transferring risk, the organization aims to reduce its exposure to potential losses or liabilities and ensure that another entity bears the financial consequences if the risk event occurs. Some of the key points to understand about risk transfer: • Benefits and Costs: While risk transfer can provide financial protection, it comes with costs such as insurance premiums or potential limitations in coverage. Organizations must weigh the benefits of risk transfer against the costs. • Risk Distribution: Risk transfer can also distribute risk across multiple parties, reducing the concentration of risk on a single entity. This can enhance overall risk management within an industry or ecosystem. • Risk Sharing: In some cases, risk transfer might involve sharing the financial burden of a risk with another party, rather than fully transferring it. This can be achieved through coinsurance or other arrangements. • Risk Retention: Even when risk is transferred, organizations may retain a portion of the risk. This is known as risk retention. It's common for insurance policies to include deductibles or self-insured portions that the organization must cover. • Legal and Regulatory Considerations: Organizations should be aware of any legal or regulatory requirements related to risk transfer in their industry or jurisdiction. • Insurance Policies: One common method of risk transfer is purchasing insurance coverage, such as a cybersecurity risk insurance, identity theft insurance or ransomware insurance. Marc-André Léger, Ph.D. 80 May 2023 Introduction to Cybersecurity Governance for Business Technology Management Organizations pay insurance premiums to an insurer, which agrees to compensate the organization for covered losses or liabilities in the event of a specified risk occurring. • Contractual Agreements: Organizations can transfer certain risks to vendors, suppliers, or partners through contractual clauses. These clauses might outline the responsibilities of each party in the event of a risk occurrence and specify who is liable for associated costs. • Due Diligence: Organizations should conduct due diligence when selecting insurance policies or entering contractual agreements for risk transfer. It's important to understand the terms, conditions, and coverage limits to ensure they align with the organization's needs. Risk transfer is particularly valuable for risks that are difficult to mitigate or for which the potential financial impact is too significant for the organization to absorb on its own. It allows organizations to leverage the expertise and financial resources of external entities to manage and mitigate specific risks. However, risk transfer decisions should be made carefully, considering the organization's overall risk management goals and financial capabilities. Risk transfer is often considered the best strategy in specific scenarios where it makes practical and financial sense to shift the burden of potential losses or liabilities to another party. Here are other situations where risk transfer can be the most effective strategy: • Limited Risk Appetite: Organizations with a low tolerance for specific risks may choose to transfer those risks to external parties to maintain their desired risk exposure level. • Lack of Expertise: When dealing with complex or specialized risks that the organization lacks the expertise to manage effectively, transferring the risk to a more knowledgeable third party, such as an insurance company, can be a sensible option. • Known and Calculable Risks: For risks that are well-understood and quantifiable, risk transfer through insurance can provide a predictable and manageable way to allocate potential losses. • Pooling of Risks: Insurance mechanisms allow organizations to pool their risks with a larger group of policyholders, spreading the financial burden and reducing the impact of individual risk events. Insured risks can also be re-insured (insurance for the insurance), spreading the risk over multiple insurers, thus adding a level of financial security, and making sure that an eventual coverage would be possible. • Regulatory Compliance: If certain risks are associated with legal or regulatory requirements, transferring the risk through contractual agreements or insurance can help ensure compliance and mitigate potential penalties. Marc-André Léger, Ph.D. 81 May 2023 Introduction to Cybersecurity Governance for Business Technology Management • Resource Constraints: When an organization has limited resources to address certain risks effectively, transferring the risk to a third party with greater resources and capabilities can provide a practical solution. • Strategic Outsourcing: Organizations that engage in strategic outsourcing of specific functions or processes can transfer certain risks to their outsourcing partners through welldefined contractual agreements. • Supply Chain Risks: Transferring risks associated with suppliers, vendors, or business partners can help ensure business continuity and reduce potential disruptions. • Global Operations: For multinational organizations operating in different countries with varying legal and regulatory environments, risk transfer can help navigate complexities and ensure consistent risk management. • Emerging Technologies: In sectors with rapidly evolving technologies or emerging risks, transferring risk through specialized insurance products can provide coverage for unique challenges. • Catastrophic Events: In situations where the consequences of a risk event could be catastrophic, transferring the risk through insurance can provide a safety net to help the organization recover and rebuild. It's important to note that risk transfer should be based on a thorough analysis of the risks, the terms and conditions of insurance policies or contracts, and the financial implications for the organization. Risk transfer is not always a one-size-fits-all solution and should be integrated into an organization's comprehensive risk management strategy. Careful consideration of potential costs, benefits, and any potential limitations of risk transfer is crucial before deciding. Risk mitigation Risk mitigation is a proactive strategy employed by organizations to reduce the potential impact or likelihood of identified risks. These basically correspond to the two red arrows seen in the risk triangle, in figure 4, in chapter 1. Effective risk mitigation starts with a thorough risk assessment to identify potential risks, evaluate their potential impact, and determine their likelihood. Risk mitigation involves implementing measures, technologies, controls, business processes and other actions to minimize the adverse consequences of risks should they occur. Examples of risk mitigation measures include implementing firewalls and intrusion detection systems to prevent cyberattacks, conducting regular equipment maintenance to prevent failures, establishing backup systems and data recovery plans, and providing training to employees to prevent human error. The goal of risk Marc-André Léger, Ph.D. 82 May 2023 Introduction to Cybersecurity Governance for Business Technology Management mitigation is to limit the extent of harm or loss and enhance the organization's ability to effectively manage and recover from unexpected events. Many solutions that can be used for risk mitigation and for controls are presented in mode details in other chapters of this book. Some of the key points to understand about risk mitigation: • Proactive approach: Risk mitigation focuses on taking preventative measures before a risk event occurs, rather than solely dealing with its aftermath. It aims to reduce the probability of a risk event happening or minimize its impact. • Control implementation: Organizations develop and implement control measures to address identified risks. These controls can be technical, administrative, or physical in nature and are designed to either prevent or mitigate the risk. • Monitoring and evaluation: Risk mitigation efforts should be continuously monitored and evaluated to ensure their effectiveness. Adjustments may be necessary based on changing circumstances or new information. • Cost-benefit analysis: Organizations assess the costs of implementing mitigation measures against the potential benefits of risk reduction. This analysis helps determine the most appropriate and cost-effective strategies. • Risk reduction: The goal of risk mitigation is to reduce the severity of potential losses. This can involve measures to decrease the likelihood of a risk event (risk reduction) or decrease the potential impact if the event occurs (impact reduction). • Residual Risk: Zero risk does not exist. Even after implementing risk mitigation measures, some level of residual risk will most likely remain. Residual risk is the risk that still exists after all mitigation efforts have been applied. Organizations should determine their level of comfort with residual risk and decide if further actions are needed. • Compliance and Regulations: Organizations must consider industry-specific regulations and compliance requirements when designing and implementing risk mitigation measures. • Integration with overall strategy: Cybersecurity risk mitigation is a key component of an organization's overall risk management strategy. • Communication: Effective communication of risk mitigation measures is important to ensure that all relevant stakeholders, including employees and management, understand their roles and responsibilities in executing these measures. Risk mitigation is an ongoing and dynamic process that requires vigilance and adaptability. It helps organizations enhance their resilience and ability to navigate challenges while safeguarding their assets, reputation, and continuity of operations. Marc-André Léger, Ph.D. 83 May 2023 Introduction to Cybersecurity Governance for Business Technology Management Risk tolerance and risk appetite A key aspect of risk management is going to be the balancing of security needs, the inconvenience of security measures, and the costs. Organizations have a requirement for security, a need for protection and need to protect how legitimate users are accessing data. On the other side, the cost of doing that, because there's always going to be a cost issue, is going to vary depending on the risk appetite of the organization, that is why this whole concept of risk tolerance and risk appetite are so important. Risk tolerance refers to the specific level of risk an organization or individual is willing to accept or tolerate in pursuit of its objectives. It is the degree of uncertainty or potential loss that an entity is comfortable with. Risk tolerance is often expressed numerically or descriptively, and it helps guide decision-making about risk management strategies and actions. For example, if an organization determines that it is willing to tolerate a 10% decrease in annual revenue due to market fluctuations, its risk tolerance for revenue loss is 10%. This guides the organization in making decisions about investments, strategies, and safeguards to manage risks that could lead to such a revenue decline. Risk appetite, on the other hand, is a broader, high-level statement or guideline that articulates the amount and type of risk an organization is willing to take on to achieve its strategic objectives. It is a qualitative statement that helps align the organization's risk management efforts with its overall mission and goals. For instance, a financial institution might have a risk appetite statement that expresses its willingness to take moderate risks in pursuit of growth opportunities but with a strong focus on maintaining the safety and security of customer data. This guides the organization's risk management strategies and provides a framework for decision-making. The main differences between risk tolerance and risk appetite are: • Nature: Risk tolerance is more quantitative, specifying specific levels of risk that are acceptable. Risk appetite is more qualitative, providing a general framework for risk-taking aligned with strategic objectives. • Granularity: Risk tolerance is often expressed in specific numerical terms, such as percentages or monetary amounts, while risk appetite is expressed in broader, qualitative terms. • Role: Risk tolerance guides the implementation of risk management measures and actions based on specific thresholds. Risk appetite provides a broader context for decision-making and helps set the tone for the organization's approach to risk. Marc-André Léger, Ph.D. 84 May 2023 Introduction to Cybersecurity Governance for Business Technology Management • Scope: Risk tolerance is more focused on specific risks and scenarios. Risk appetite encompasses a wider range of risks and is related to the organization's overall risk culture. Both risk tolerance and risk appetite are important tools in risk management, helping organizations strike a balance between pursuing opportunities and protecting against potential negative outcomes. They work together to shape an organization's risk management strategy and actions. Risk averse or risk seeking Risk averse and risk seeking are terms used in economics and decision-making to describe different attitudes or preferences toward taking risks. This can be used to describe individuals and organizations. Risk averse individuals tend to avoid or minimize risks. In other words, they prefer scenarios where the outcome is more certain, even if it means sacrificing potential higher rewards. Risk averse individuals are generally more comfortable with stable and predictable outcomes, and they are willing to give up potential gains to ensure they don't face significant losses. This attitude is often associated with conservative investment strategies and cautious decision-making. For example, let's say you have a choice between receiving $100 or participating in a draw. In this draw, a single ticket is picked from a hat. You have a 50% chance of winning $200 and a 50% chance of winning nothing. A risk-averse person might choose $100 with certainty to avoid uncertainty. On the other hand, a person is considered risk seeking when they prefer taking on risks even when the outcome is uncertain. Risk-seeking individuals are often more interested in high rewards and willing to accept losses. They might find the thrill of uncertainty exciting and are more likely to engage in activities that involve potential gains even if the risks are substantial. Continuing with the same example of the ticket draw, a risk seeking individual might choose to participate for a chance to win $200, even though there's a 50% chance of winning nothing. It's imperative to note that individual’s attitudes toward risk can vary depending on the context, their personal experiences, and their individual circumstances. Additionally, some individuals might fall somewhere in between being purely risk averse or risk seeking, resulting in a more balanced approach to risk. Economists and psychologists often study these preferences to understand how individual make decisions. The concepts of risk aversion and risk seeking can also apply to organizations, especially when it comes to decision-making, strategy development, and risk management. An organization that is risk averse tends to prioritize stability, predictability, and minimizing potential losses. Such organizations are more cautious in their decision-making and may opt for established and proven strategies rather Marc-André Léger, Ph.D. 85 May 2023 Introduction to Cybersecurity Governance for Business Technology Management than venturing into uncharted territories. Risk-averse organizations might be reluctant to pursue high-risk, high-reward opportunities and instead focus on maintaining a steady course of action. Some examples of risk-averse behavior in organizations are: • Choosing conservative investment options over riskier but more lucrative investments. • Opting for incremental improvements to existing products rather than innovations. • Implementing comprehensive risk management practices to mitigate potential threats. Conversely, a risk-seeking organization is more inclined to take calculated risks in pursuit of substantial rewards. These organizations often seek out innovative ideas, explore new markets, and are willing to embrace uncertainty for the chance of achieving a competitive advantage. Risk-seeking organizations might be more adaptable and open to disruptive changes. Examples of risk-seeking behavior in organizations are: • Investing in research and development for ground-breaking products or technologies. • Entering emerging markets with high growth potential despite the associated uncertainties. • Pursuing mergers and acquisitions to expand market share, even if there are risks. Most organizations fall somewhere on a spectrum between risk aversion and risk seeking. The ideal approach often depends on the industry, market conditions, competitive landscape, and the organization's goals and resources. Striking the right balance between risk and caution is crucial. Risk aversion and risk seeking play a significant role in organizational decision-making and strategy formulation. Organizations must assess their risk appetite based on their goals, resources, and the external environment to make informed choices that align with their overall mission and objectives. Looking at the cybersecurity spending data and recommendations from Gartner Research, the larger consulting firms, and cybersecurity industry associations, we observe recommendations that most organizations should spend between 4% and 15% of their total BTM and IT budget for cybersecurity. Looking at existing data puts the spending median value at 7.8%. If you have a risk seeking organization, an organization willing to take more risks, therefore you're going to spend less on risk mitigation. In cybersecurity spending numbers, a risk seeking organization would lean towards the 4% end of the spectrum. If an organization is risk averse, it would move towards the 15% end. A risk averse organization would be seeking to take less risks and willing to spend more money on cybersecurity. A risk neutral organization would be at the median, 7.8%. This is when the balanced approach should become a consideration. The context, the culture, the risk tolerance of the Marc-André Léger, Ph.D. 86 May 2023 Introduction to Cybersecurity Governance for Business Technology Management organization, the industry that they're in, and all the things must be considered in setting the right number for cybersecurity spending. The amount is based on the total IT spending, which should include salaries. For example, a company is spending $100 million everything IT, including cybersecurity, software and data management and salaries. $100 million. If it is risk neutral, it means it should be spending at least $7.8 million directly related to cybersecurity, which is not that much. Assessing an organizations cybersecurity risk appetite Assessing an organization's cybersecurity risk appetite is crucial in identifying and understanding the level of risk tolerance within the organization. By evaluating the organization's risk appetite, stakeholders can make informed decisions regarding cybersecurity investments, resource allocation, and risk management strategies. In this section we provide some guidance on how to assess an organization's cybersecurity risk appetite effectively. The first step in assessing an organization's cybersecurity risk appetite is to establish a clear definition of what risk appetite means for an organization. As mentioned previously, risk appetite refers to the amount and type of risk an organization is willing to accept in pursuit of its objectives. This definition should align with the organization's overall strategic objectives, considering its industry, regulatory requirements, and risk management culture. From there, the organization will need to identify the key stakeholders involved in the assessment process. These stakeholders may include senior management, the board of directors, IT staff, cybersecurity teams, risk management professionals, and legal and compliance teams. Identifying the organization's risk appetite will involve these stakeholders to ensure their perspectives and insights are considered throughout the assessment. Once the organization's key stakeholders have been identified, it is essential to determine the cybersecurity risk landscape. This is done by performing an initial cybersecurity risk assessment if one has not been done already. This will be useful to identify the appropriate tolerance levels for each potential risk in the initial assessment. Risk tolerance refers to an organization's willingness to accept or avoid specific risks. This determination should consider the potential impact, likelihood, and cost of mitigating each risk. Then, the organization can develop risk criteria that align with its risk appetite. These criteria will serve as guidelines for decision-making and risk management activities. Risk criteria should include factors such as acceptable levels of impact, likelihood, and cost for each risk. To facilitate the identification appropriate tolerance levels and criteria, the organization can organize workshops Marc-André Léger, Ph.D. 87 May 2023 Introduction to Cybersecurity Governance for Business Technology Management with key stakeholders to discuss and determine the organization's risk appetite. These workshops should facilitate open and transparent communication to ensure a shared understanding of risk tolerance levels. Document the outcomes and decisions made during these workshops. Finally, the organization will need to document cybersecurity risk appetite. This includes risk tolerance levels, risk criteria, and decisions made during the assessment process. The must ensure that this documentation is widely communicated across the organization to create awareness and alignment regarding cybersecurity risk management. It is this documentation that will be used in the formal cybersecurity risk assessment process, as presented a later in this chapter, to conduct a formal risk assessment. As well, regular reviews and updates to the risk appetite assessment should be conducted to ensure its ongoing relevance and effectiveness in managing cybersecurity risks. Assess cybersecurity risks Cybersecurity metrics are quantitative and qualitative measures used to assess various aspects of an organization's cybersecurity posture, effectiveness, and risk management efforts. Metrics can support the decision-making process. These metrics provide insights into the organization's security performance, help track progress over time, and aid in making informed decisions to enhance cybersecurity strategies. Cybersecurity metrics can cover a wide range of areas within an organization's security program. This book proposes to use cybersecurity risk scenarios supported by Key Risk Indicators (KRI). These are further described in this chapter. Decisions about risk When risk is being mitigated, what is being done is illustrated by the big red arrows that were presented in chapter 1, figure 4. In managing cybersecurity risks, organizations are fundamentally trying to do two things: 1. Reduce the probability that the threat will exploit the vulnerability, or 2. Reduce the impact, should the exploitation happen. Understanding the nature and origin of risk is fundamental for risk management. That should seem like an obvious statement if you read the previous chapters of this book. As risk starts with the exploitation of a vulnerability by a threat, the threats, vulnerabilities, and exploits need to be identified. As well, since the result of the exploitation might be a potential future impact, it remains an exposure to risk until it materializes, which need to be determined. Once a possible scenario has occurred a hazard, potential impacts, damages, or some reduction of an expected future utility Marc-André Léger, Ph.D. 88 May 2023 Introduction to Cybersecurity Governance for Business Technology Management occurs. Another possible outcome is an inability to meet some of the cybersecurity governance objectives, regulatory, legal, or contractual obligations that have been determined in the governance framework, as explained in chapter 2. Key risk indicators One vital component of the risk assessments presented in this book is the use of Key Risk Indicators (KRIs). Key Risk Indicators, commonly referred to as KRIs, are quantifiable metrics used to measure the potential occurrence and impact of risks within an organization. They serve as early warning signals, providing insights into the health of an organization's risk profile. Unlike Key Performance Indicators (KPIs), which focus on measuring achievements, KRIs are forward-looking indicators that help identify and assess potential risks before they escalate. The primary purpose of using KRIs is to enhance an organization's risk management capabilities by proactively identifying and monitoring risks. By establishing a set of predefined KRIs, companies can gain a better understanding of their risk exposure and take necessary actions to prevent or mitigate potential risks. KRIs provide management with timely and relevant information to make informed decisions and allocate resources effectively. KRIs also help organizations to detect early warning signals of potential risks and threats, allowing them to take proactive measures. By monitoring KRIs, organizations can gain a better understanding of their risk profile and adjust their risk management strategies accordingly. KRIs can be categorized into various types depending on the nature of the risks they measure. Some common types of KRIs include: • Financial KRIs, which are used to assess financial risks such as liquidity, credit, market, or operational risks that can impact an organization's financial stability. • Operational KRIs, which focus on risks related to operational processes, including supply chain disruptions, system failures, compliance breaches, or employee safety incidents. • Compliance KRIs are used to monitor compliance with applicable laws, regulations, and internal policies. This ensures adherence to ethical standards and minimizes legal and reputational risks. • Strategic KRIs, which help gauge risks associated with achieving strategic objectives, such as market volatility, competitive threats, or technological disruptions. • Cybersecurity KRIs, which we are using in this book, to help organizations in their cybersecurity risk management activities. Implementing a robust KRI framework provides several benefits to organizations, including: Marc-André Léger, Ph.D. 89 May 2023 Introduction to Cybersecurity Governance for Business Technology Management • Early Risk Detection: KRIs enable organizations to identify potential risks in their early stages, allowing proactive risk mitigation measures to be implemented. • Improved Decision-making: By providing timely and relevant risk information, KRIs help management make informed decisions related to risk appetite, resource allocation, and strategic planning. • Enhanced risk communication: KRIs facilitate effective communication and collaboration among different stakeholders, ensuring a shared understanding of risks across the organization. • Support regulatory compliance: KRIs help organizations comply with regulatory requirements by monitoring and reporting on key risk areas. Key Risk Indicators play a critical role in effective risk management by providing organizations with valuable insights into their risk profile. By using quantifiable metrics to measure potential risks, KRIs enable companies to take proactive measures, mitigate risks, and safeguard their long-term success. Implementing a comprehensive KRI framework can significantly enhance an organization's risk management capabilities and help it navigate the ever-changing business landscape with confidence. Threat identification While there are many ways to categorize threats, the simplest is to organize them as internal and external, as they are presented in the next few paragraphs. Internal threats originate from within an organization itself. These threats can come from employees, contractors, partners, or anyone who has legitimate access to the organization's systems, networks, and data. Internal threats can be intentional (malicious) or unintentional (accidental), and they pose a significant risk to an organization's sensitive information, intellectual property, and overall security posture. Readers should refer to the fraud triangle, presented in chapter 1 and figure 2, to better understand the motivations that make this an important problem. There are two primary categories of internal threats, malicious insider threats and unintentional insider threats. Malicious insiders can be employees, such as disgruntled employees, former employees, or individuals with malicious intent who exploit their access to carry out attacks or steal sensitive data. They can also be contractors and business partners. These include third-party individuals or organizations with authorized access who misuse their privileges for personal gain or to harm the organization. These are using techniques such as privilege abuse. This is when employees or insiders abusing their elevated access privileges to gain unauthorized access to systems or data. However, problems can also arise from negligence. This occurs when employees or Marc-André Léger, Ph.D. 90 May 2023 Introduction to Cybersecurity Governance for Business Technology Management individuals accidentally compromise security by not following established security protocols, such as failing to update software or using weak passwords. Insiders can also become threat by unknowingly fall victim to phishing attacks or social engineering tactics, resulting in data breaches or unauthorized access. Often, this is caused by a lack of awareness, when employees who are not adequately trained in cybersecurity best practices inadvertently contribute to security breaches. Some examples of internal threats include: • Unauthorized access to sensitive data by an employee who abuses their privileges. • An employee sharing login credentials with unauthorized individuals, allowing them to gain unauthorized access. • An employee accidentally clicking on a malicious link in a phishing email, leading to a malware infection, ransomware being installed, or data leak. • A former employee who still has access to the organization's systems exploiting that access to steal valuable intellectual property or disrupt activities to get some form of revenge. • A contractor with network access inadvertently exposing confidential client information. External threats in cybersecurity refer to risks and vulnerabilities that originate from outside an organization. These threats are posed by individuals, groups, or entities that are not part of the organization's internal structure. These can be cybercriminals, nation-states, activists, and even competitors. External threats target an organization's digital assets, systems, networks, and data with the intent to compromise security, steal sensitive information, disrupt operations, or cause other forms of harm. External threats encompass a wide range of actors and attack methods. Cybercriminals are probably the first category that most think of when thinking about external threats. One should keep in mind that the internal threats, even if less discussed in the media or outside specialist circles, are often a much bigger threat. Cybercriminals might use malware attacks to distribute malicious software (viruses, worms, Trojans) to compromise systems and steal data. The principal strategies used are ransomware and phishing. This is often achieved by sending fraudulent emails or messages to trick recipients into revealing sensitive information or clicking on malicious links. Once a link is clicked, the malware would encrypt critical data, allowing the cybercriminal to demand payment for its release. When aiming to disrupt an organization, cybercriminals may elect to operate a Distributed Denial of Service (DDoS) attack, flooding business systems with a tsunami of traffic to render them unavailable. Nation-State actors or activists might use the same techniques as cybercriminals for Marc-André Léger, Ph.D. 91 May 2023 Introduction to Cybersecurity Governance for Business Technology Management cyber-espionage, targeting organizations to steal sensitive data, trade secrets, and intellectual property. In a cyberwar scenario, they may revert to cyber-sabotage to disrupt critical infrastructure, supply chains, services, or operations to cause economic or political harm. When the opportunity arises, external attackers will collaborate with insiders to exploit their knowledge and access, perhaps encouraged with bribes, shared ideology, or blackmail. Assessing cybersecurity threats is a critical process for any organization to protect its digital assets, sensitive information, and overall operations. As well as performing regular risk assessments, there are many strategies for organizations to help them in identifying and assessing cybersecurity threats. A few of them are mentioned here: • Monitor your threat landscape: Stay updated on the latest cybersecurity threats, vulnerabilities, and attack techniques by subscribing to threat intelligence feeds and forums. • Subscribe to cybersecurity news sources: Follow reputable cybersecurity news sources and blogs for insights into emerging threats. • Use an ethical hacking team: Conduct penetration testing (pen testing) to simulate realworld attacks and identify vulnerabilities before malicious actors can exploit them. • Perform regular external and internal testing: Perform both external (outside the organization) and internal (within the network) penetration tests. • Become part of a community: there are many industry associations, user groups and communities that exist where you can share information and learn from your peers. For example, in Montreal we have In-Sec-M and CyberÉco that offer a safe space for the cybersecurity community to meet and collaborate. There are also user groups and associations, such as ASIM, ISACA and many others. The identification of threats can be supported by using different tools, such as taxonomies and ontologies, as mentioned previously. However, these are not covered in this book. One strategy that should be used is to setup a formal cybersecurity threat intelligence activity in your organization, as presented in the next section. This would typically be handled by a group of individuals in a cyberdefence team. It would also be supported by cybersecurity vulnerability identification activities. Using the methodology proposed in this book requires to create a scenario and identify a potential threat for which there is a possibility of exploiting a vulnerability. From there, to contribute to the creation of a risk indicator, it is assigned a severity value between 0.1 and 0.9. This can be done as resultant of a consensus of stakeholders, as described later. Marc-André Léger, Ph.D. 92 May 2023 Introduction to Cybersecurity Governance for Business Technology Management Threat intelligence Threat intelligence is a key component of cybersecurity efforts. As the business technology landscape evolves, so do cyber threats. New vulnerabilities are discovered every day. As well, cybercriminals constantly develop effective methods of exploiting vulnerabilities, stealing information, or disrupting systems. It is therefore essential to stay on top of threats, and that is where threat intelligence comes in. Threat intelligence enables organizations to detect, respond to, and prevent cyber threats in a timely manner. It also provides insights into attackers and their strategies, allowing organizations to stay one step ahead of malicious activity. Threat intelligence is like a detailed briefing in military operations. Just as commanders need intelligence about enemy positions, movements, and strategies, cybersecurity professionals require detailed information about potential or current cyber threats. Organizations that have access to upto-date threat intelligence can quickly and accurately identify malicious actors and their activities, allowing them to take appropriate action to protect their systems. Additionally, threat intelligence can provide organizations with the necessary information to plan and implement effective security measures. Threat intelligence refers to organized, analyzed, and refined information about possible or current attacks on a system or organization. Data collection and analysis result in actionable information that can be used to minimize or defend against potential and existing security threats. By using threat intelligence, organizations can make informed decisions to protect their systems and data from malicious actors. It also helps organizations identify and respond to potential threats efficiently and timely. However, it's not about collating vast volumes of raw data. Threat intelligence lies in converting raw data into actionable insights, providing organizations with a lucid understanding of the potential risks they face in the digital expanse. This intelligence is meticulously crafted, drawing from diverse sources like public forums, specialized cybersecurity blogs, and even clandestine communications on the dark web. By scrutinizing this data, analysts can discern patterns, identify emerging threats, and uncover malicious actors' modus operandi. The value it offers is proactive; it's about anticipating cyber threats before they strike, preparing for them, and devising strategies to counteract or mitigate potential harm. In a world brimming with advanced defense mechanisms, intrusion detection systems, and state-ofthe-art firewalls, threat intelligence remains a vital function for cybersecurity teams. Traditional cybersecurity tools are indispensable, but they often function based on previously known threat Marc-André Léger, Ph.D. 93 May 2023 Introduction to Cybersecurity Governance for Business Technology Management patterns. Cybercriminals continuously innovate and devise creative methods of intrusion and harm. Threat intelligence operates in this ever-changing landscape, illuminating the path for organizations, allowing them to navigate safely and respond adeptly to emerging threats. Imagine an organization armed with intelligence about a new malware strain targeting its industry. With this information, they can swiftly adapt their defenses, remaining impervious to this new threat. Furthermore, it's not just about technical defenses. Armed with threat intelligence, organizations can engage in extensive staff training, making individuals more alert to sophisticated phishing attempts or potential insider threats. The advantages extend beyond mere defense. Organizational leaders can leverage threat intelligence to make well-informed decisions, be it related to investments in cybersecurity infrastructure, personnel training, or even business strategies that consider cyber risks. In the unfortunate eventuality of a breach, having prior intelligence can significantly expedite response times, possibly curtailing the extent of damage and subsequent financial implications. Threat intelligence is at the forefront of cyberdefense. It is the reconnaissance team, or recon, of the digital world. It ensures that they, and the organizations they protect in the future, are always one step ahead in the intricate dance with cyber adversaries. Table 1 presents a sample of information sources for threat and vulnerability intelligence. Vulnerability identification Vulnerabilities are a fundamental component of risk, as discussed in chapter one. To grasp the full impact of vulnerabilities, it's crucial to delve into their nature, the processes for identifying them, and the immense value organizations derive from understanding and mitigating them. Vulnerabilities can be exploited to gain unauthorized access to critical systems and resources. The exploitation of a vulnerability by a threat agent is where cybersecurity risks materialize. Therefore, it is essential to have a comprehensive vulnerability management plan in place to ensure that any potential risks are identified and addressed promptly. In the business technology management field, cybersecurity vulnerabilities can be likened to weak links in a chain. It represents a flaw or weakness in a system's design, implementation, or operation. This flaw can lead to an unauthorized breach or contravention of system expected behavior. These vulnerabilities can stem from a variety of sources, ranging from errors in code, system misconfigurations, to even lapses in security protocols or practices. Identifying these vulnerabilities is a task that parallels looking for a needle in a haystack but on a magnified scale. The sheer complexity of today's software and systems means that vulnerabilities Marc-André Léger, Ph.D. 94 May 2023 Introduction to Cybersecurity Governance for Business Technology Management can lurk in the shadows, often unnoticed until exploited. Organizations must adopt a proactive stance in this quest. In addition to performing regular risk assessments and strategies to help organizations identify and assess cybersecurity threats, mentioned in the section on threat identification, other strategies can be used. Some of them are mentioned here, such as vulnerability assessments and penetration testing. These systematic evaluations of systems or applications simulate cyberattacks, aiming to discover weaknesses before malicious entities do. Central to these evaluations is a multidisciplinary approach that combines automated tools with human expertise. Cyber-defense teams will use advanced vulnerability identification software to scan applications, networks, and systems for known vulnerabilities. These software tools also analyze patches, configurations, and permissions. However, the human touch remains indispensable. Expert penetration testers, sometimes called ethical hackers, bring creativity and intuition to the table, often discovering complex vulnerabilities that machines might overlook. Addressing and rectifying these vulnerabilities post-identification is equally crucial. This often entails patching software, altering configurations, or even revisiting and overhauling certain aspects of the system design. The speed and effectiveness with which organizations respond to these identified vulnerabilities can often make the difference between a secure environment and a catastrophic breach. While there are challenges and complexities involved, the tangible benefits for organizations justify the time and resources required. First, it comes as no surprise that understanding and mitigating vulnerabilities contributes to risk reduction and cybersecurity maturity levels. By pre-emptively identifying and addressing potential points of exploitation, organizations can prevent data breaches, system downtimes, and unauthorized access to sensitive information. This not only safeguards an organization's assets but also bolsters its reputation in the eyes of stakeholders, clients, and customers. Furthermore, in an era where regulatory landscapes are becoming increasingly stringent, addressing vulnerabilities ensures compliance with various cybersecurity standards and regulations. Non-compliance can result in hefty fines and legal repercussions, adding financial incentive to security concerns. Vulnerabilities present both challenges and opportunities. They represent the chink in digital armor, demanding vigilance, expertise, and swift action. By understanding and addressing them, organizations enhance their security posture. The next chapter builds on what is presented here to create and use cybersecurity risk scenarios to be used in an organization context. Marc-André Léger, Ph.D. 95 May 2023 Introduction to Cybersecurity Governance for Business Technology Management Name URL Description Provides community driven threat intelligence on cyber threats. Extensive threat intelligence feed. Abuse ch https://abuse.ch/ AlienVault https://otx.alienvault.com/ Automated Indicator Sharing Binary Edge https://tinyurl.com/46w4yt5r DorkSearch https://dorksearch.com/ Really fast Google dorking. ExploitDB https://www.exploit-db.com/ Archive of various exploits. Fofa https://en.fofa.info/ Search for various threat intelligence. HoneyDB https://honeydb.io/ Microsoft threat intelligence ONYPHE https://tinyurl.com/mr26w4zp HoneyDB provides real time data of activity from honeypots deployed on the Internet using the HoneyPy honeypot. The blog contains security research and threat intelligence from Microsoft’s network of security experts. OWASP https://owasp.org/www-project-top-ten/ Packet Storm Security PolySwarm https://packetstormsecurity.com/ https://polyswarm.network/ PublicWWW https://publicwww.com/ Pulsedive https://pulsedive.com/ Search for threat intelligence. Spamhaus https://www.spamhaus.org/ Provides threat intelligence, and comprehensive block-lists for known spammers and malware distributors. Splunk top 50 https://tinyurl.com/mr224fh4 Talos intelligence https://www.talosintelligence.com/ Virus Share https://virusshare.com/ Virus Total https://www.virustotal.com/ Annual report of the most significant cybersecurity threats from Splunk. Aimed at Cisco customers. Provides information about known threats, new vulnerabilities, and emerging dangers. Online repository of malware provides millions of malware samples. Used to quickly check incidents. Vulners https://vulners.com/ https://www.binaryedge.io/ A service the Cybersecurity and Infrastructure Security Agency to enable real-time exchange of cyber threat indicators and defensive measures. Scans the internet for threat intelligence. Collects cyber-threat intelligence data. https://www.onyphe.io/ Provides a broad consensus about the most critical security risks to web applications. Browse latest vulnerabilities and exploits. Scan files and URLs for threats. Marketing and affiliate marketing research. Search vulnerabilities in a large database. Table 1: Information sources for threat and vulnerability intelligence. Marc-André Léger, Ph.D. View publication stats 96 May 2023