Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Journal of Physical Security 12(1), 25-28 (2019)
25
Viewpoint Paper
Making the Business Case for Security Investment*
Roger G. Johnston, Ph.D., CPP
Right Brain Security
Traditionally, the case for spending more money on additional security resources is made
by security managers with a Return on Investment (ROI) argument, or by using closely
related Net Present Value (NPR) or Internal Rate of Return (IRR) methods.[1-7] In overly
simplified terms, these economic methods involve estimating the probability of a given
successful security attack. This is multiplied by the estimated cost of the consequences if
the attack should succeed. The total security expenditures over the time period in question
for purposes of countering that attack should equal this product.
The main problem with these economic approaches is that they often don’t work. In
many organizations, the senior manger(s) or executive(s) who make the ultimate approvals
for security funding may be clueless about security and technology. They may be living and
breathing examples of the Peter Principle [8]: the skills that get a senior manager or
executive into their position may be unrelated to the skills needed to do a good job once
there. Even more dangerous is the common situation where senior people in the
organization can’t or won’t envision security failures, so they are rarely going to buy the
economic arguments for dealing with “theoretical” security risks.
When senior executives do envision failure, they often decide the risk of a bad security
incident occurring during their short tenure is low; better to save the money and look
more profitable now, letting the security failure occur on somebody else’s watch. Besides,
scapegoats can always be found if their luck runs out and security does fail during their
time in office. Moreover, in our court system, it is often better to be able to plead
ignorance, rather than instituting some security measure that isn’t 100% effective;
installing a security measure is a tacit admission that the organization knew there were
security risks, and juries don’t like that.
ROI and related methods also suffer from the problem that estimating the probability of a
successful attack is difficult, especially since vulnerabilities are often poorly understood
due to a lack of adequate vulnerability assessments [9-12]. Moreover, the estimated total
costs of a security incident are often underestimated; long-term damage to the
organization’s reputation and good will is often not factored in, or only partially factored in.
___________
* This paper was not peer reviewed.
Journal of Physical Security 12(1), 25-28 (2019)
26
The fact that ROI-type approaches alone often don’t work very well is, I believe, fairly
well recognized by security professionals. Nowadays, many security managers and
CSOs/CISOs use a hybrid approach: A little ROI/NPV/IRR, a little invoking regulations and
standards, some discussion of the threats, and a little (timid) warning of consequences
(including Public Relations and market-share damage) of bad security incidents.
In my view, an ideal hybrid approach should involve the following steps:
(1) Invoke “best security” practices, which rarely are captured by standards and
regulations. Best practices are what a first-class organization strives for.
(2) Enlist the legal department to help explain why meeting regulations and standards, but
falling short of best practices, puts the organization at enormous legal, governmental, and
Public Relations risk when (not if!) a serious security incident occurs.
(3) Discuss what your competitors or similar organizations do for security.
(4) Paint a very vivid picture of what multiple bad security failures look like for your
organization.
(5) Scare high-level executives with stories of the short- and long-term consequences of
security failures in other organizations AND THE PERSONAL HARM THAT CAME TO THEIR
EXECUTIVES AND SENIOR MANAGERS.
(6) Bring in outside vulnerability assessors to help point out security problems and help
with (4) and (5).
(7) Bring in outside threat assessment experts to highlight the threats and to help with (4)
and (5).
(8) Finish up with a ROI/NPV/IRR argument based on (realistic) scare tactics, and with a
SIMPLE explanation of why the new security measures can (at least partially) counter the
organization’s security threats and weaknesses. But be sure to pitch multiple options, not
just one. What is my best option?” for security investment is a much better question that
“Should I do this thing?” and biases the decision-making process towards making some
kind of security investment. According to research by Paul Nutt, organizations that
consider options have more success than those that vote a proposal up or down.[13]
Some comments on this 8-step approach.
• This 8-step approach can be even more effective for government organizations than
businesses, because government bureaucrats are especially easy to scare.
• Economic methods alone rarely work for government organizations, because (as I know
from personal experience) saving money is not a priority, and people who propose cost-
Journal of Physical Security 12(1), 25-28 (2019)
27
saving measures are viewed with enormous suspicion by bureaucrats who don’t want to
lose financial turf.
• “Best Practice” is rarely rigorously defined, but security professionals often have a
surprising degree of agreement on what constitutes best practice in any given
environment. Moreover, the courts usually have had little trouble identifying what is best
practice for purposes of civil litigation, based mostly on expert witnesses.
• In presenting a request for security investment, it is essential to understand the
audience, their hot button issues, their risk appetite, and their terminology.
• If requesting spending on technology, the security manager must shun mere techno-envy,
i.e., wanting only to be able to play with the latest overhyped, fad technology. Technology
can be a useful tool for security but it rarely solves any given security problem, much less
guarantees good security overall.
• Most security managers are afraid to do (2), (4), (5), and (6) and rarely do them because
of fear, sustainability concerns, the shoot-the-messenger problem[7, 14] and the cry-wolf
problem [7, 15]. When they do ROI/NPR/IRR, it is rarely based on scare tactics. Security
managers, including CSOs/CISOs almost always avoid scare tactics—foolishly, I believe.
Scare tactics work! And they can be made sustainable with careful management, explaining
how past security attacks may have been averted or mitigated with the security currently
in place, and emphasizing that the threats, vulnerabilities, and the technologies available to
adversaries are constantly evolving. Moreover, security managers need to keep in mind
why they were hired: to tell upper management what they need to know, not to make them
feel warm and comfortable. Good security and comfort are not compatible.
• In an attempt to limit career damage, security managers should be frank: “Look I know
you senior executives are not going to be happy to hear what I have to tell you, and this
isn’t necessarily what is best for my career, but I was hired to help protect this
organization, and I have a professional and moral obligation to speak frankly about what I
believe needs to be done.” Ultimately, there is nothing unhealthy about a security manager
being more security-focused than her corporate line management.
In summary, it is time to move beyond mere ROI/NPR/IRR methods, and time to stop
being scared of “scare tactics” when there is plenty to be scared about.
About the Author
Roger G. Johnston, Ph.D., CPP is the head of Right Brain Sekurity, a company devoted to
security research and consulting.
Journal of Physical Security 12(1), 25-28 (2019)
28
References
1. ASIS Protection of Assets Manual, Sections 2.5.1, 5-1, and 5.3.1. The Manual also
discusses best practices to some extent but in vague terms.
2. WE Palmer, “What’s Security Worth”, Security Management, March 1, 2004
3. MA Davidson, “Managing Risk Across the Enterprise”, Security Management, July 1, 2009
4. T Pisello, “Is There a Business Case for IT Security”, Security Management, Oct 1, 2004
5. CIOReview, “Making the Business Case for Cyber Security”,
https://www.cioreview.com/news/making-the-business-case-for-cyber-security-how-to-
make-the-senior-management-buyin-nid-15196-cid-145.html
6. B. Chaput, “The Right Way to Present a Business Case for Cybersecurity”,
https://www.healthcare-informatics.com/article/cybersecurity/right-way-present-
business-case-cybersecurity
7. K Lewis, “Economic Evaluation of a Company’s Information Security Expenditures”,
https://infosecwriters.com/text_resources/pdf/Economic_Evaluation.pdf
8. Investopedia, “Peter Principle”, https://www.investopedia.com/terms/p/peter-
principle.asp
9. RG Johnston, “Avoiding Shock and Awe”, Journal of Physical Security 9(2), 26-48 (2016).
10. RG Johnston, “Why Security Fails”, Nuclear Security Matters, February 11, 2015,
http://nuclearsecuritymatters.belfercenter.org/blog/why-security-fails
11. RG Johnston and JS Warner, “Vulnerability Assessment Myths”, Journal of Physical
Security 7(1), 31-38 (2014).
12. RG Johnston and JS Warner, "What Vulnerability Assessors Know That You Should,
Too", Asia Pacific Security Magazine 50, 40-42 (2013)
13. Paul Nutt, Why Decisions Fail (Berrett-Koehler Publishers, 2002).
14. Shoot-the-messenger problem: The bearers of bad or frightening news are often
blamed for that news. See Wikipedia,
https://en.wikipedia.org/wiki/Shooting_the_messenger
15. Cry wolf problem: If a security managers warns about a possible security attack, but it
doesn’t occur or succeed, she may look bad and not be believed in the future. See
Cambridge Dictionary, https://dictionary.cambridge.org/us/dictionary/english/cry-wolf

More Related Content

Making the Business Case for Security Investment

  • 1. Journal of Physical Security 12(1), 25-28 (2019) 25 Viewpoint Paper Making the Business Case for Security Investment* Roger G. Johnston, Ph.D., CPP Right Brain Security Traditionally, the case for spending more money on additional security resources is made by security managers with a Return on Investment (ROI) argument, or by using closely related Net Present Value (NPR) or Internal Rate of Return (IRR) methods.[1-7] In overly simplified terms, these economic methods involve estimating the probability of a given successful security attack. This is multiplied by the estimated cost of the consequences if the attack should succeed. The total security expenditures over the time period in question for purposes of countering that attack should equal this product. The main problem with these economic approaches is that they often don’t work. In many organizations, the senior manger(s) or executive(s) who make the ultimate approvals for security funding may be clueless about security and technology. They may be living and breathing examples of the Peter Principle [8]: the skills that get a senior manager or executive into their position may be unrelated to the skills needed to do a good job once there. Even more dangerous is the common situation where senior people in the organization can’t or won’t envision security failures, so they are rarely going to buy the economic arguments for dealing with “theoretical” security risks. When senior executives do envision failure, they often decide the risk of a bad security incident occurring during their short tenure is low; better to save the money and look more profitable now, letting the security failure occur on somebody else’s watch. Besides, scapegoats can always be found if their luck runs out and security does fail during their time in office. Moreover, in our court system, it is often better to be able to plead ignorance, rather than instituting some security measure that isn’t 100% effective; installing a security measure is a tacit admission that the organization knew there were security risks, and juries don’t like that. ROI and related methods also suffer from the problem that estimating the probability of a successful attack is difficult, especially since vulnerabilities are often poorly understood due to a lack of adequate vulnerability assessments [9-12]. Moreover, the estimated total costs of a security incident are often underestimated; long-term damage to the organization’s reputation and good will is often not factored in, or only partially factored in. ___________ * This paper was not peer reviewed.
  • 2. Journal of Physical Security 12(1), 25-28 (2019) 26 The fact that ROI-type approaches alone often don’t work very well is, I believe, fairly well recognized by security professionals. Nowadays, many security managers and CSOs/CISOs use a hybrid approach: A little ROI/NPV/IRR, a little invoking regulations and standards, some discussion of the threats, and a little (timid) warning of consequences (including Public Relations and market-share damage) of bad security incidents. In my view, an ideal hybrid approach should involve the following steps: (1) Invoke “best security” practices, which rarely are captured by standards and regulations. Best practices are what a first-class organization strives for. (2) Enlist the legal department to help explain why meeting regulations and standards, but falling short of best practices, puts the organization at enormous legal, governmental, and Public Relations risk when (not if!) a serious security incident occurs. (3) Discuss what your competitors or similar organizations do for security. (4) Paint a very vivid picture of what multiple bad security failures look like for your organization. (5) Scare high-level executives with stories of the short- and long-term consequences of security failures in other organizations AND THE PERSONAL HARM THAT CAME TO THEIR EXECUTIVES AND SENIOR MANAGERS. (6) Bring in outside vulnerability assessors to help point out security problems and help with (4) and (5). (7) Bring in outside threat assessment experts to highlight the threats and to help with (4) and (5). (8) Finish up with a ROI/NPV/IRR argument based on (realistic) scare tactics, and with a SIMPLE explanation of why the new security measures can (at least partially) counter the organization’s security threats and weaknesses. But be sure to pitch multiple options, not just one. What is my best option?” for security investment is a much better question that “Should I do this thing?” and biases the decision-making process towards making some kind of security investment. According to research by Paul Nutt, organizations that consider options have more success than those that vote a proposal up or down.[13] Some comments on this 8-step approach. • This 8-step approach can be even more effective for government organizations than businesses, because government bureaucrats are especially easy to scare. • Economic methods alone rarely work for government organizations, because (as I know from personal experience) saving money is not a priority, and people who propose cost-
  • 3. Journal of Physical Security 12(1), 25-28 (2019) 27 saving measures are viewed with enormous suspicion by bureaucrats who don’t want to lose financial turf. • “Best Practice” is rarely rigorously defined, but security professionals often have a surprising degree of agreement on what constitutes best practice in any given environment. Moreover, the courts usually have had little trouble identifying what is best practice for purposes of civil litigation, based mostly on expert witnesses. • In presenting a request for security investment, it is essential to understand the audience, their hot button issues, their risk appetite, and their terminology. • If requesting spending on technology, the security manager must shun mere techno-envy, i.e., wanting only to be able to play with the latest overhyped, fad technology. Technology can be a useful tool for security but it rarely solves any given security problem, much less guarantees good security overall. • Most security managers are afraid to do (2), (4), (5), and (6) and rarely do them because of fear, sustainability concerns, the shoot-the-messenger problem[7, 14] and the cry-wolf problem [7, 15]. When they do ROI/NPR/IRR, it is rarely based on scare tactics. Security managers, including CSOs/CISOs almost always avoid scare tactics—foolishly, I believe. Scare tactics work! And they can be made sustainable with careful management, explaining how past security attacks may have been averted or mitigated with the security currently in place, and emphasizing that the threats, vulnerabilities, and the technologies available to adversaries are constantly evolving. Moreover, security managers need to keep in mind why they were hired: to tell upper management what they need to know, not to make them feel warm and comfortable. Good security and comfort are not compatible. • In an attempt to limit career damage, security managers should be frank: “Look I know you senior executives are not going to be happy to hear what I have to tell you, and this isn’t necessarily what is best for my career, but I was hired to help protect this organization, and I have a professional and moral obligation to speak frankly about what I believe needs to be done.” Ultimately, there is nothing unhealthy about a security manager being more security-focused than her corporate line management. In summary, it is time to move beyond mere ROI/NPR/IRR methods, and time to stop being scared of “scare tactics” when there is plenty to be scared about. About the Author Roger G. Johnston, Ph.D., CPP is the head of Right Brain Sekurity, a company devoted to security research and consulting.
  • 4. Journal of Physical Security 12(1), 25-28 (2019) 28 References 1. ASIS Protection of Assets Manual, Sections 2.5.1, 5-1, and 5.3.1. The Manual also discusses best practices to some extent but in vague terms. 2. WE Palmer, “What’s Security Worth”, Security Management, March 1, 2004 3. MA Davidson, “Managing Risk Across the Enterprise”, Security Management, July 1, 2009 4. T Pisello, “Is There a Business Case for IT Security”, Security Management, Oct 1, 2004 5. CIOReview, “Making the Business Case for Cyber Security”, https://www.cioreview.com/news/making-the-business-case-for-cyber-security-how-to- make-the-senior-management-buyin-nid-15196-cid-145.html 6. B. Chaput, “The Right Way to Present a Business Case for Cybersecurity”, https://www.healthcare-informatics.com/article/cybersecurity/right-way-present- business-case-cybersecurity 7. K Lewis, “Economic Evaluation of a Company’s Information Security Expenditures”, https://infosecwriters.com/text_resources/pdf/Economic_Evaluation.pdf 8. Investopedia, “Peter Principle”, https://www.investopedia.com/terms/p/peter- principle.asp 9. RG Johnston, “Avoiding Shock and Awe”, Journal of Physical Security 9(2), 26-48 (2016). 10. RG Johnston, “Why Security Fails”, Nuclear Security Matters, February 11, 2015, http://nuclearsecuritymatters.belfercenter.org/blog/why-security-fails 11. RG Johnston and JS Warner, “Vulnerability Assessment Myths”, Journal of Physical Security 7(1), 31-38 (2014). 12. RG Johnston and JS Warner, "What Vulnerability Assessors Know That You Should, Too", Asia Pacific Security Magazine 50, 40-42 (2013) 13. Paul Nutt, Why Decisions Fail (Berrett-Koehler Publishers, 2002). 14. Shoot-the-messenger problem: The bearers of bad or frightening news are often blamed for that news. See Wikipedia, https://en.wikipedia.org/wiki/Shooting_the_messenger 15. Cry wolf problem: If a security managers warns about a possible security attack, but it doesn’t occur or succeed, she may look bad and not be believed in the future. See Cambridge Dictionary, https://dictionary.cambridge.org/us/dictionary/english/cry-wolf