How Messy Is Your Risk Management?

Share this post

We have company coming over Saturday night โ€“ friends Iโ€™ve known for more than a decade.

To me, that means itโ€™s not such a big deal; not a ton of planning or preparation required.

Maybe that seems about right to you. Of course, maybe thatโ€™s also why you and I are not married to each other.

Because according to Rachel, there is plenty of work to be done. More specifically: โ€œRob, your office has gotten out of control. You need to clean it before they arrive.โ€

That is ridiculous. 

Whatโ€™s the harm in a few (dozen) magazines on the floor, a small (gigantic) pile of unopened junk mail on my desk, and a tidy (tangled mess) of computer wires and connectors sitting on counter?

Okay, I guess when you put it that way, Rachel does have a point: Iโ€™m probably not the worldโ€™s neatest person. And yes, an important document could get lost or, even worse, someone could trip over all this junk and get hurt.

Pay Me Now or Pay Me Later

In cybersecurity, we refer to this kind of thing as risk management: Identifying, assessing, and mitigating potential threats, thereby safeguarding assets, ensuring operational continuity, and supporting long-term profitability and growth.

In other words, taking steps now to avoid problems in the future.

Does it take some time and effort? Absolutely. But not nearly as much time and effort โ€“ not to mention the damage that can result โ€“ by not doing it.

Risk Management Comes in Four Flavors

For each instance of risk, you have four possible options: mitigate, transfer, accept, and avoid.

Consider the example of a Hollywood actress filming a scene in which she needs to ride a motorcycleโ€ฆ

She can mitigate the risk โ€ฆ by wearing a helmet.

She can transfer the risk โ€ฆ by using a stuntwoman.

She can accept the risk โ€ฆ by taking her chances.

She can avoid the risk โ€ฆ by not making action movies in the first place.

Your companyโ€™s cybersecurity works the same way: mitigate (e.g., implement controls), transfer (e.g., purchase insurance), accept (do nothing), or avoid entirely by closing certain business lines or stopping certain behaviors.

When it comes to finance, sales, HR, and many other business functions, most companies are fairly diligent about risk management. 

Physical hazards in particular are well covered. Nobody says, โ€œWe havenโ€™t had a fire yet so we are probably fine.โ€ Rather, they invest in things like fire extinguishers, fire escapes, fire-safety training, and fire inspections.

But cybersecurity? Not so much. Instead, this is often left to wishful thinking and crossed fingers. 

Thereโ€™s a much better way. More specifically, here are three clear-eyed, proactive steps you can take to figure out where you stand and improve your risk managementโ€ฆ

#1. Inventory your assets.

To understand what you need to protect, you first need to know what you have!

Start with your data. What are you storing, and do you actually need all of it? Hanging on to decade-old customer records or background checks from long gone employees adds unnecessary risk.

Next, look at your physical infrastructure. Do you have an accurate count of all company devices? Do you know where every laptop, phone, or tablet is right now?

Then, review your software. Do you have a complete and up-to-date list of every app, platform, or cloud service your team uses (including the ones individuals signed up for without telling IT)?

You canโ€™t secure what you are unaware of. 

#2. Think through your controls.

I bet you thought I was going to mention Multi-Factor Authentication for the thousandth time.

Well, I wasnโ€™t. But now that youโ€™ve brought it up, it is pretty important.

Beyond that, think through your controls on your devices, controls in the cloud, controls on your email, controls for your physical infrastructure, etc.

Iโ€™m sure youโ€™ve got some things in place. But Iโ€™m also willing to bet there are gaps (some significant) within your business (shared passwords, admin level control for too many people, former employees who still have network access, etc.).

Okay, nowโ€ฆ

#3. Figure out your risk tolerance.

You want to draw a line where acceptable risk ends and unacceptable exposure begins. There are few universal truths; every business is different.

How much disruption or downtime could you tolerate?

What level of loss would materially harm your business?

How big a financial hit would destroy your company?

These are not easy questions to answer. 

But considering them โ€“ as possible future events, not just vague fears โ€“ points you towards determining the steps you should take now to manage risk intelligently.

Speaking of whichโ€ฆ

We have a new product โ€“ a product that provides risk assessments quickly and at an affordable price. (Blane, our Marketing Manager, told me to say it that way.)

Itโ€™s called QuantiShield โ€“ The Rapid Risk Assessment Program. It delivers both a customized risk assessment and a prioritized list of recommendations.

Is it an app? Kind of. You log in and answer questions.

Is it consulting? Kind of. A human cybersecurity expert talks to you and delivers the results.

And, because we have automated a significant portion of the time-consuming, information-gathering steps, we can deliver it to you in just a few weeks.

Youโ€™ll end up with a clear and specific understanding of your cybersecurity risk and a plan to fix your biggest weaknesses โ€“ all with minimal investment. (Blane told me to say that, too.)

Clean It Up โ€ฆ Before It Bites You

Messy offices and messy cybersecurity have a lot in common.

And while only one will get you in trouble at home, both have the potential for causing serious damage if ignored. 

Clean them up now, or be prepared to deal with the consequences later.

Gotta run. I just saw something move under the pile of papers in the corner and I think one of my kids may be under there.


Want to get great cybersecurity content delivered to your inbox? Click here to sign up for our monthly newsletter, Tales from the Click.

Rob Black
Rob founded Fractional CISO in 2017 and has helped dozens of mid-size SaaS and technology companies improve their security posture as a vCISO. He consults, speaks, and writes on IoT and security. Rob has held product security and corporate security leadership positions at PTC ThingWorx, Axeda and RSA Security. He received his MBA from the Kellogg School of Management and holds two Bachelor of Science degrees from Washington University in St. Louis in Computer Science and System Science and Engineering. He is also a Certified Information Systems Security Professional (CISSP).

Tales From The Click

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.

Suceed at SOC 2

Free eBook:
5 Things to Know for your First SOC 2

  • How to scope your SOC 2
  • Estimate the cost and length of your SOC 2
  • Prepare for your SOC 2
  • Manage the SOC 2 audit period
  • Leverage your SOC 2 for growth

Related Posts

Is your Cyber Insurance really going to cover you?

Only 1/3 of cyber insurance policies actually pay out in incidents. Most companies have cyber insurance policies that insure too little, or too much, and have absurdly low caps and silly exclusions.

To learn more about cyber insurance and determine if you have the right coverage for you, join us for a free vCISO Office Hours session on Tuesday, April 18 at 1 p.m. eastern time. Bring your questions!

New Release: Free SOC 2 eBook!

Getting ready for your first SOC 2? This eBook is full of actionable advice to help you prepare for and succeed in your first SOC 2 audit.

Learn:

  • How to scope your SOC 2 project
  • How to estimate the cost and length of your SOC 2 project
  • How to prepare for your SOC 2
  • How to succeed in your SOC 2 audit period
  • How to leverage your SOC 2 report to enable your business and sales
Is your Cyber Insurance really going to cover you?

Only 1/3 of cyber insurance policies actually pay out in incidents. Most companies have cyber insurance policies that insure too little, or too much, and have absurdly low caps and silly exclusions.

To learn more about cyber insurance and determine if you have the right coverage for you, join us for a free vCISO Office Hours session on Tuesday, April 18 at 1 p.m. eastern time. Bring your questions!

New Release: Free SOC 2 eBook!

Getting ready for your first SOC 2? This eBook is full of actionable advice to help you prepare for and succeed in your first SOC 2 audit.

Learn:

  • How to scope your SOC 2 project
  • How to estimate the cost and length of your SOC 2 project
  • How to prepare for your SOC 2
  • How to succeed in your SOC 2 audit period
  • How to leverage your SOC 2 report to enable your business and sales