SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Journal of Physical Security 12(1), 25-28 (2019)
25
Viewpoint Paper
Making the Business Case for Security Investment*
Roger G. Johnston, Ph.D., CPP
Right Brain Security
Traditionally, the case for spending more money on additional security resources is made
by security managers with a Return on Investment (ROI) argument, or by using closely
related Net Present Value (NPR) or Internal Rate of Return (IRR) methods.[1-7] In overly
simplified terms, these economic methods involve estimating the probability of a given
successful security attack. This is multiplied by the estimated cost of the consequences if
the attack should succeed. The total security expenditures over the time period in question
for purposes of countering that attack should equal this product.
The main problem with these economic approaches is that they often don’t work. In
many organizations, the senior manger(s) or executive(s) who make the ultimate approvals
for security funding may be clueless about security and technology. They may be living and
breathing examples of the Peter Principle [8]: the skills that get a senior manager or
executive into their position may be unrelated to the skills needed to do a good job once
there. Even more dangerous is the common situation where senior people in the
organization can’t or won’t envision security failures, so they are rarely going to buy the
economic arguments for dealing with “theoretical” security risks.
When senior executives do envision failure, they often decide the risk of a bad security
incident occurring during their short tenure is low; better to save the money and look
more profitable now, letting the security failure occur on somebody else’s watch. Besides,
scapegoats can always be found if their luck runs out and security does fail during their
time in office. Moreover, in our court system, it is often better to be able to plead
ignorance, rather than instituting some security measure that isn’t 100% effective;
installing a security measure is a tacit admission that the organization knew there were
security risks, and juries don’t like that.
ROI and related methods also suffer from the problem that estimating the probability of a
successful attack is difficult, especially since vulnerabilities are often poorly understood
due to a lack of adequate vulnerability assessments [9-12]. Moreover, the estimated total
costs of a security incident are often underestimated; long-term damage to the
organization’s reputation and good will is often not factored in, or only partially factored in.
___________
* This paper was not peer reviewed.
Journal of Physical Security 12(1), 25-28 (2019)
26
The fact that ROI-type approaches alone often don’t work very well is, I believe, fairly
well recognized by security professionals. Nowadays, many security managers and
CSOs/CISOs use a hybrid approach: A little ROI/NPV/IRR, a little invoking regulations and
standards, some discussion of the threats, and a little (timid) warning of consequences
(including Public Relations and market-share damage) of bad security incidents.
In my view, an ideal hybrid approach should involve the following steps:
(1) Invoke “best security” practices, which rarely are captured by standards and
regulations. Best practices are what a first-class organization strives for.
(2) Enlist the legal department to help explain why meeting regulations and standards, but
falling short of best practices, puts the organization at enormous legal, governmental, and
Public Relations risk when (not if!) a serious security incident occurs.
(3) Discuss what your competitors or similar organizations do for security.
(4) Paint a very vivid picture of what multiple bad security failures look like for your
organization.
(5) Scare high-level executives with stories of the short- and long-term consequences of
security failures in other organizations AND THE PERSONAL HARM THAT CAME TO THEIR
EXECUTIVES AND SENIOR MANAGERS.
(6) Bring in outside vulnerability assessors to help point out security problems and help
with (4) and (5).
(7) Bring in outside threat assessment experts to highlight the threats and to help with (4)
and (5).
(8) Finish up with a ROI/NPV/IRR argument based on (realistic) scare tactics, and with a
SIMPLE explanation of why the new security measures can (at least partially) counter the
organization’s security threats and weaknesses. But be sure to pitch multiple options, not
just one. What is my best option?” for security investment is a much better question that
“Should I do this thing?” and biases the decision-making process towards making some
kind of security investment. According to research by Paul Nutt, organizations that
consider options have more success than those that vote a proposal up or down.[13]
Some comments on this 8-step approach.
• This 8-step approach can be even more effective for government organizations than
businesses, because government bureaucrats are especially easy to scare.
• Economic methods alone rarely work for government organizations, because (as I know
from personal experience) saving money is not a priority, and people who propose cost-
Journal of Physical Security 12(1), 25-28 (2019)
27
saving measures are viewed with enormous suspicion by bureaucrats who don’t want to
lose financial turf.
• “Best Practice” is rarely rigorously defined, but security professionals often have a
surprising degree of agreement on what constitutes best practice in any given
environment. Moreover, the courts usually have had little trouble identifying what is best
practice for purposes of civil litigation, based mostly on expert witnesses.
• In presenting a request for security investment, it is essential to understand the
audience, their hot button issues, their risk appetite, and their terminology.
• If requesting spending on technology, the security manager must shun mere techno-envy,
i.e., wanting only to be able to play with the latest overhyped, fad technology. Technology
can be a useful tool for security but it rarely solves any given security problem, much less
guarantees good security overall.
• Most security managers are afraid to do (2), (4), (5), and (6) and rarely do them because
of fear, sustainability concerns, the shoot-the-messenger problem[7, 14] and the cry-wolf
problem [7, 15]. When they do ROI/NPR/IRR, it is rarely based on scare tactics. Security
managers, including CSOs/CISOs almost always avoid scare tactics—foolishly, I believe.
Scare tactics work! And they can be made sustainable with careful management, explaining
how past security attacks may have been averted or mitigated with the security currently
in place, and emphasizing that the threats, vulnerabilities, and the technologies available to
adversaries are constantly evolving. Moreover, security managers need to keep in mind
why they were hired: to tell upper management what they need to know, not to make them
feel warm and comfortable. Good security and comfort are not compatible.
• In an attempt to limit career damage, security managers should be frank: “Look I know
you senior executives are not going to be happy to hear what I have to tell you, and this
isn’t necessarily what is best for my career, but I was hired to help protect this
organization, and I have a professional and moral obligation to speak frankly about what I
believe needs to be done.” Ultimately, there is nothing unhealthy about a security manager
being more security-focused than her corporate line management.
In summary, it is time to move beyond mere ROI/NPR/IRR methods, and time to stop
being scared of “scare tactics” when there is plenty to be scared about.
About the Author
Roger G. Johnston, Ph.D., CPP is the head of Right Brain Sekurity, a company devoted to
security research and consulting.
Journal of Physical Security 12(1), 25-28 (2019)
28
References
1. ASIS Protection of Assets Manual, Sections 2.5.1, 5-1, and 5.3.1. The Manual also
discusses best practices to some extent but in vague terms.
2. WE Palmer, “What’s Security Worth”, Security Management, March 1, 2004
3. MA Davidson, “Managing Risk Across the Enterprise”, Security Management, July 1, 2009
4. T Pisello, “Is There a Business Case for IT Security”, Security Management, Oct 1, 2004
5. CIOReview, “Making the Business Case for Cyber Security”,
https://www.cioreview.com/news/making-the-business-case-for-cyber-security-how-to-
make-the-senior-management-buyin-nid-15196-cid-145.html
6. B. Chaput, “The Right Way to Present a Business Case for Cybersecurity”,
https://www.healthcare-informatics.com/article/cybersecurity/right-way-present-
business-case-cybersecurity
7. K Lewis, “Economic Evaluation of a Company’s Information Security Expenditures”,
https://infosecwriters.com/text_resources/pdf/Economic_Evaluation.pdf
8. Investopedia, “Peter Principle”, https://www.investopedia.com/terms/p/peter-
principle.asp
9. RG Johnston, “Avoiding Shock and Awe”, Journal of Physical Security 9(2), 26-48 (2016).
10. RG Johnston, “Why Security Fails”, Nuclear Security Matters, February 11, 2015,
http://nuclearsecuritymatters.belfercenter.org/blog/why-security-fails
11. RG Johnston and JS Warner, “Vulnerability Assessment Myths”, Journal of Physical
Security 7(1), 31-38 (2014).
12. RG Johnston and JS Warner, "What Vulnerability Assessors Know That You Should,
Too", Asia Pacific Security Magazine 50, 40-42 (2013)
13. Paul Nutt, Why Decisions Fail (Berrett-Koehler Publishers, 2002).
14. Shoot-the-messenger problem: The bearers of bad or frightening news are often
blamed for that news. See Wikipedia,
https://en.wikipedia.org/wiki/Shooting_the_messenger
15. Cry wolf problem: If a security managers warns about a possible security attack, but it
doesn’t occur or succeed, she may look bad and not be believed in the future. See
Cambridge Dictionary, https://dictionary.cambridge.org/us/dictionary/english/cry-wolf

Weitere ähnliche Inhalte

Was ist angesagt?

Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk ManagementSocial Tables
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksAndréanne Clarke
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Samuel Loomis
 
2007 CPM West Keynote Presentation
2007 CPM West Keynote Presentation2007 CPM West Keynote Presentation
2007 CPM West Keynote Presentationsirjem
 
Adversarial Safety Analysis
Adversarial Safety AnalysisAdversarial Safety Analysis
Adversarial Safety AnalysisRoger Johnston
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Common Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAECommon Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAEWheelhouse Advisors LLC
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTIJNSA Journal
 
Sensible defence
Sensible defenceSensible defence
Sensible defenceKoen Maris
 
Technology leadership driving business innovation
Technology leadership driving business innovationTechnology leadership driving business innovation
Technology leadership driving business innovationJoAnna Cheshire
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCognizant
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk ManagementDeepak Bansal, CPA CISSP
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responseMaciej Buczkowski
 

Was ist angesagt? (20)

Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Security Assurance
Security AssuranceSecurity Assurance
Security Assurance
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 
2007 CPM West Keynote Presentation
2007 CPM West Keynote Presentation2007 CPM West Keynote Presentation
2007 CPM West Keynote Presentation
 
Adversarial Safety Analysis
Adversarial Safety AnalysisAdversarial Safety Analysis
Adversarial Safety Analysis
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Common Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAECommon Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAE
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
Sensible defence
Sensible defenceSensible defence
Sensible defence
 
2010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.12010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.1
 
Technology leadership driving business innovation
Technology leadership driving business innovationTechnology leadership driving business innovation
Technology leadership driving business innovation
 
2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-response
 
Wisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LGWisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LG
 

Ähnlich wie Making the Business Case for Security Investment

4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docxgilbertkpeters11344
 
Insights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentInsights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentIBM Security
 
speaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperspeaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperBilha Diaz
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Armor
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10David X Martin
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentBradley Susser
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Mighty Guides, Inc.
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
DRAFT - FSII appendix z10 draft 2
DRAFT - FSII appendix z10 draft 2DRAFT - FSII appendix z10 draft 2
DRAFT - FSII appendix z10 draft 2Nicole Rosie
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationChris Ross
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTIJNSA Journal
 

Ähnlich wie Making the Business Case for Security Investment (20)

4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx
 
Finding a strategic voice
Finding a strategic voiceFinding a strategic voice
Finding a strategic voice
 
Insights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentInsights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer Assessment
 
speaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperspeaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaper
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
Security risk
Security riskSecurity risk
Security risk
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
 
Sem 001 sem-001
Sem 001 sem-001Sem 001 sem-001
Sem 001 sem-001
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
DRAFT - FSII appendix z10 draft 2
DRAFT - FSII appendix z10 draft 2DRAFT - FSII appendix z10 draft 2
DRAFT - FSII appendix z10 draft 2
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
 
CISSPills #3.06
CISSPills #3.06CISSPills #3.06
CISSPills #3.06
 

Mehr von Roger Johnston

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityRoger Johnston
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Roger Johnston
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyRoger Johnston
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link Roger Johnston
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Roger Johnston
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Roger Johnston
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020Roger Johnston
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentRoger Johnston
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability AssessmentsRoger Johnston
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Roger Johnston
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments Roger Johnston
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityRoger Johnston
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Roger Johnston
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Roger Johnston
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security DevicesRoger Johnston
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Roger Johnston
 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Roger Johnston
 
How to Remove Voter's Ink
How to Remove Voter's Ink How to Remove Voter's Ink
How to Remove Voter's Ink Roger Johnston
 

Mehr von Roger Johnston (20)

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)
 
How to Remove Voter's Ink
How to Remove Voter's Ink How to Remove Voter's Ink
How to Remove Voter's Ink
 

Kürzlich hochgeladen

Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 

Kürzlich hochgeladen (20)

Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 

Making the Business Case for Security Investment

  • 1. Journal of Physical Security 12(1), 25-28 (2019) 25 Viewpoint Paper Making the Business Case for Security Investment* Roger G. Johnston, Ph.D., CPP Right Brain Security Traditionally, the case for spending more money on additional security resources is made by security managers with a Return on Investment (ROI) argument, or by using closely related Net Present Value (NPR) or Internal Rate of Return (IRR) methods.[1-7] In overly simplified terms, these economic methods involve estimating the probability of a given successful security attack. This is multiplied by the estimated cost of the consequences if the attack should succeed. The total security expenditures over the time period in question for purposes of countering that attack should equal this product. The main problem with these economic approaches is that they often don’t work. In many organizations, the senior manger(s) or executive(s) who make the ultimate approvals for security funding may be clueless about security and technology. They may be living and breathing examples of the Peter Principle [8]: the skills that get a senior manager or executive into their position may be unrelated to the skills needed to do a good job once there. Even more dangerous is the common situation where senior people in the organization can’t or won’t envision security failures, so they are rarely going to buy the economic arguments for dealing with “theoretical” security risks. When senior executives do envision failure, they often decide the risk of a bad security incident occurring during their short tenure is low; better to save the money and look more profitable now, letting the security failure occur on somebody else’s watch. Besides, scapegoats can always be found if their luck runs out and security does fail during their time in office. Moreover, in our court system, it is often better to be able to plead ignorance, rather than instituting some security measure that isn’t 100% effective; installing a security measure is a tacit admission that the organization knew there were security risks, and juries don’t like that. ROI and related methods also suffer from the problem that estimating the probability of a successful attack is difficult, especially since vulnerabilities are often poorly understood due to a lack of adequate vulnerability assessments [9-12]. Moreover, the estimated total costs of a security incident are often underestimated; long-term damage to the organization’s reputation and good will is often not factored in, or only partially factored in. ___________ * This paper was not peer reviewed.
  • 2. Journal of Physical Security 12(1), 25-28 (2019) 26 The fact that ROI-type approaches alone often don’t work very well is, I believe, fairly well recognized by security professionals. Nowadays, many security managers and CSOs/CISOs use a hybrid approach: A little ROI/NPV/IRR, a little invoking regulations and standards, some discussion of the threats, and a little (timid) warning of consequences (including Public Relations and market-share damage) of bad security incidents. In my view, an ideal hybrid approach should involve the following steps: (1) Invoke “best security” practices, which rarely are captured by standards and regulations. Best practices are what a first-class organization strives for. (2) Enlist the legal department to help explain why meeting regulations and standards, but falling short of best practices, puts the organization at enormous legal, governmental, and Public Relations risk when (not if!) a serious security incident occurs. (3) Discuss what your competitors or similar organizations do for security. (4) Paint a very vivid picture of what multiple bad security failures look like for your organization. (5) Scare high-level executives with stories of the short- and long-term consequences of security failures in other organizations AND THE PERSONAL HARM THAT CAME TO THEIR EXECUTIVES AND SENIOR MANAGERS. (6) Bring in outside vulnerability assessors to help point out security problems and help with (4) and (5). (7) Bring in outside threat assessment experts to highlight the threats and to help with (4) and (5). (8) Finish up with a ROI/NPV/IRR argument based on (realistic) scare tactics, and with a SIMPLE explanation of why the new security measures can (at least partially) counter the organization’s security threats and weaknesses. But be sure to pitch multiple options, not just one. What is my best option?” for security investment is a much better question that “Should I do this thing?” and biases the decision-making process towards making some kind of security investment. According to research by Paul Nutt, organizations that consider options have more success than those that vote a proposal up or down.[13] Some comments on this 8-step approach. • This 8-step approach can be even more effective for government organizations than businesses, because government bureaucrats are especially easy to scare. • Economic methods alone rarely work for government organizations, because (as I know from personal experience) saving money is not a priority, and people who propose cost-
  • 3. Journal of Physical Security 12(1), 25-28 (2019) 27 saving measures are viewed with enormous suspicion by bureaucrats who don’t want to lose financial turf. • “Best Practice” is rarely rigorously defined, but security professionals often have a surprising degree of agreement on what constitutes best practice in any given environment. Moreover, the courts usually have had little trouble identifying what is best practice for purposes of civil litigation, based mostly on expert witnesses. • In presenting a request for security investment, it is essential to understand the audience, their hot button issues, their risk appetite, and their terminology. • If requesting spending on technology, the security manager must shun mere techno-envy, i.e., wanting only to be able to play with the latest overhyped, fad technology. Technology can be a useful tool for security but it rarely solves any given security problem, much less guarantees good security overall. • Most security managers are afraid to do (2), (4), (5), and (6) and rarely do them because of fear, sustainability concerns, the shoot-the-messenger problem[7, 14] and the cry-wolf problem [7, 15]. When they do ROI/NPR/IRR, it is rarely based on scare tactics. Security managers, including CSOs/CISOs almost always avoid scare tactics—foolishly, I believe. Scare tactics work! And they can be made sustainable with careful management, explaining how past security attacks may have been averted or mitigated with the security currently in place, and emphasizing that the threats, vulnerabilities, and the technologies available to adversaries are constantly evolving. Moreover, security managers need to keep in mind why they were hired: to tell upper management what they need to know, not to make them feel warm and comfortable. Good security and comfort are not compatible. • In an attempt to limit career damage, security managers should be frank: “Look I know you senior executives are not going to be happy to hear what I have to tell you, and this isn’t necessarily what is best for my career, but I was hired to help protect this organization, and I have a professional and moral obligation to speak frankly about what I believe needs to be done.” Ultimately, there is nothing unhealthy about a security manager being more security-focused than her corporate line management. In summary, it is time to move beyond mere ROI/NPR/IRR methods, and time to stop being scared of “scare tactics” when there is plenty to be scared about. About the Author Roger G. Johnston, Ph.D., CPP is the head of Right Brain Sekurity, a company devoted to security research and consulting.
  • 4. Journal of Physical Security 12(1), 25-28 (2019) 28 References 1. ASIS Protection of Assets Manual, Sections 2.5.1, 5-1, and 5.3.1. The Manual also discusses best practices to some extent but in vague terms. 2. WE Palmer, “What’s Security Worth”, Security Management, March 1, 2004 3. MA Davidson, “Managing Risk Across the Enterprise”, Security Management, July 1, 2009 4. T Pisello, “Is There a Business Case for IT Security”, Security Management, Oct 1, 2004 5. CIOReview, “Making the Business Case for Cyber Security”, https://www.cioreview.com/news/making-the-business-case-for-cyber-security-how-to- make-the-senior-management-buyin-nid-15196-cid-145.html 6. B. Chaput, “The Right Way to Present a Business Case for Cybersecurity”, https://www.healthcare-informatics.com/article/cybersecurity/right-way-present- business-case-cybersecurity 7. K Lewis, “Economic Evaluation of a Company’s Information Security Expenditures”, https://infosecwriters.com/text_resources/pdf/Economic_Evaluation.pdf 8. Investopedia, “Peter Principle”, https://www.investopedia.com/terms/p/peter- principle.asp 9. RG Johnston, “Avoiding Shock and Awe”, Journal of Physical Security 9(2), 26-48 (2016). 10. RG Johnston, “Why Security Fails”, Nuclear Security Matters, February 11, 2015, http://nuclearsecuritymatters.belfercenter.org/blog/why-security-fails 11. RG Johnston and JS Warner, “Vulnerability Assessment Myths”, Journal of Physical Security 7(1), 31-38 (2014). 12. RG Johnston and JS Warner, "What Vulnerability Assessors Know That You Should, Too", Asia Pacific Security Magazine 50, 40-42 (2013) 13. Paul Nutt, Why Decisions Fail (Berrett-Koehler Publishers, 2002). 14. Shoot-the-messenger problem: The bearers of bad or frightening news are often blamed for that news. See Wikipedia, https://en.wikipedia.org/wiki/Shooting_the_messenger 15. Cry wolf problem: If a security managers warns about a possible security attack, but it doesn’t occur or succeed, she may look bad and not be believed in the future. See Cambridge Dictionary, https://dictionary.cambridge.org/us/dictionary/english/cry-wolf