Risk Quantification for Cybersecurity Human Risk Management

Risk Quantification for Cybersecurity Human Risk Management

Dec 13

Lev Lesokhin
Lev Lesokhin Lev Lesokhin is an experienced business technologist, a former software developer, consultant, and tech executive. Having started his career at MITRE, Lev has had many touch-points with cybersecurity thought leaders over the years. In his current role as OutThink's Executive Vice President for Technology and Analytics, he works with customers and industry leaders to build a quantitative framework for evolving security awareness into human risk management.
View Profile
Share
There are many reasons to pursue risk quantification in Cybersecurity Human Risk Management. Part of the purpose of implementing Cybersecurity Human Risk Management is to take a more targeted and tailored approach to human-centric security. This requires metrics around people’s attitudes, behaviors, knowledge and various characteristics that can drive adaptive training and automated interventions. This quantification need not be managed manually and should be part and parcel of a modern Cybersecurity Human Risk Management platform for automated allocation of training content to users and automated employee access controls.

Cybersecurity Human Risk Management Metrics Improve Reporting

Thanks to risk quantification, the head of CHRM in an organization is able to generate much more meaningful reporting and insightful data for the CISO, business leaders, and even the board. Whereas legacy security awareness approaches would enable security teams to only measure completion rates, phishing click rates, and, in some cases, reporting rates, a modern Cybersecurity Human Risk Management platform enables the measurement of human risk exposure in the organization and how that overall level changes over time.

Measuring Cybersecurity Human Risk in an Organization

We caught up with Matt Webster, a CISO at Cyvergence and industry advisor, in a recent episode of the Engage & Secure podcast. Matt shared some of his thoughts around the topic of risk quantification with us, which we thought we could summarize briefly in the remainder of this post.

Business Impact Analysis of Cybersecurity Human Risk Quantification

One of the core practices in quantifying risk is conducting Business Impact Analyses (BIAs). These are studies to determine what would happen in case of disruption in technology capability, or loss of data, or an intrusion into the network. The focus of a BIA on risk assessment and mitigation allows these studies to better identify vulnerabilities and their potential effects, offering insights that extend beyond traditional operational evaluations.

Differentiating Cyber Risk from Operational Risk

While cyber risk and operational risk share some overlap, they remain distinct domains. Cyber risk involves specific threats such as data breaches or ransomware attacks and includes components like legal liabilities and forensic investigations. In contrast, operational risk affects the broader business workstreams and often includes black swan events, which are challenging to quantify. The two share about 50% of overlap, yet require different mitigation strategies.

Disaster Recovery (DR) Planning in Cybersecurity Human Risk Management

Disaster recovery is the organization’s contingency to operational risk. DR planning should primarily reside within IT teams. These plans help organizations map out their current state, identifying areas for improvement. Incorporating tabletop exercises, which simulate real-world scenarios, is critical. These exercises address business continuity problems and ensure effective disaster response.

Defining Incidents in Cybersecurity Human Risk Management

Determining what constitutes a security incident can be nuanced. For example, is an NMAP scan against a website—a common reconnaissance technique—considered an incident? Similarly, distinguishing between a broad scan and a specialized “Christmas scan” can complicate incident filtering for Security Operations Centers (SOCs). Clear criteria for incident classification help SOCs focus on genuine threats. The number of incidents for an organization will depends on what is characterized as an incident.
For anything that gets catalogued as an incident of a sufficiently high urgency, it’s useful to conduct a Root Cause Analysis (RCA), which is typically the domain of IT teams rather than the Security team. Conducting thorough RCAs ensures that the underlying causes of incidents are identified and addressed, preventing recurrence.

The Role of Enterprise Risk Management (ERM) in Cybersecurity Human Risk Management

Enterprise Risk Management integrates cybersecurity into broader risk considerations. Key players include:
Chief Counsel: Handles legal issues, including privacy and regulatory compliance.
Chief Risk Officer (CRO): Focuses on evaluating and managing risk.
Chief Financial Officer (CFO): Assesses financial exposure and value at risk.
Internal Audit: Internal audits often address Environmental, Social, and Governance (ESG) issues alongside cybersecurity. Organizations increasingly recognize the interconnected nature of ESG concerns and cyber risk.

Cybersecurity Human Risk Quantification Teams

Larger organizations and some cyber-insurance companies have dedicated teams for risk quantification. These teams are often involved in BIAs and work with business analyst teams to understand value at risk data, categorizing potential impacts as low, medium, or high. Effective quantification supports strategic decision-making and building business cases for projects where risk is a significant enough consideration.

Cybersecurity Human Risk Management Benchmarks

When it comes to incident benchmarks, the Verizon DBIR is a good source of current data. It is the largest and most reputable source in the industry and it is updated each year. Some interesting benchmarks are data points such as the cost of different types of breaches: for example, a BEC breach typically costs organizations $50k. The median loss for ransomware is similar at $46k per breach. Of course, these are broad industry numbers, the actual costs for an organization will depend on their value at risk, number of customers, their business model and revenues.

Cybersecurity Human Risk Management Value at Risk Analysis

Understanding value at risk involves evaluating both the maximum loss scenario and the minimum likely loss. This helps organizations prepare for worst-case scenarios while setting realistic expectations for typical outcomes.
To align on discussions about cyber or operating risk, value at risk metrics like cost per record breached or cost per day of downtime frequently emerge. These numbers illustrate the tangible financial impact of cyber incidents. Unfortunately there are no known repositories of this type of data at the moment. If anywhere, these data exist in reference tables of cyber-insurance actuarial models.

Building the Business Case for Cybersecurity Human Risk Management

Developing a business case for cybersecurity investments involves highlighting benefits gained from these investment. The benefits will fall into several categories, such as:
Time saved for users and security teams
Risk reduction
Operational efficiency
Reduced cybersecurity insurance premiums
All of these categories need to be translated into dollars. A straightforward exercise for staff hours or days, using fully loaded FTE cost. Less straightforward for cybersecurity risk or operational risk, hence the discussion above.
When it comes to cybersecurity, every dollar invested should yield substantial returns. Organizations should seek a minimum return of $3 for every $1 invested, though in some instances that number can be as high as $8-10. Not only does better security enhance organizational resilience, but it also can provide measurable financial benefits.
Enjoyed this blog post? Share it with someone!Share

Quantify Cybersecurity Human Risk with OutThink

Quantify Cybersecurity Human Risk with OutThink

Related Articles
Risk Quantification for Cybersecurity Human Risk Management
Lev Lesokhin
13/12/2024

Risk Quantification for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Empowering Organizations with Adaptive Security Awareness Training
Roberto Ishmael Pennino
07/11/2024

Empowering Organizations with Adaptive Security Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Training for Remote Workforces
Roberto Ishmael Pennino
25/10/2024

Cybersecurity Awareness Training for Remote Workforces

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management Gets Adaptive
Lev Lesokhin
08/10/2024

Human Risk Management Gets Adaptive

Read More about AI-Native Cybersecurity Human Risk Management
What is Cybersecurity Human Risk Management? What You Need to Know
Lev Lesokhin
23/09/2024

What is Cybersecurity Human Risk Management? What You Need to Know

Read More about AI-Native Cybersecurity Human Risk Management
Engagement Strategies for Cybersecurity Human Risk Management
Lev Lesokhin
16/08/2024

Engagement Strategies for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Enhance Your Phishing Training With Outthink
Lavinia Manocha
02/08/2024

Enhance Your Phishing Training With Outthink

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training for Frontline Workers
Lavinia Manocha
26/07/2024

Adaptive Security Awareness Training for Frontline Workers

Read More about AI-Native Cybersecurity Human Risk Management
The Role of Security Awareness Training After IT Outages
Lev Lesokhin
26/07/2024

The Role of Security Awareness Training After IT Outages

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management's Eight Dimensions of Secure Behavior Segmentation
Lev Lesokhin
25/07/2024

Human Risk Management's Eight Dimensions of Secure Behavior Segmentation

Read More about AI-Native Cybersecurity Human Risk Management
State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business
Lev Lesokhin
18/07/2024

State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training: Unlearning and Relearning Routines
Lev Lesokhin
10/07/2024

Adaptive Security Awareness Training: Unlearning and Relearning Routines

Read More about AI-Native Cybersecurity Human Risk Management
Did You Think Your Password Was Secure? Let’s Talk Password Security
Lev Lesokhin
24/05/2024

Did You Think Your Password Was Secure? Let’s Talk Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework
Lev Lesokhin
23/05/2024

Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework

Read More about AI-Native Cybersecurity Human Risk Management
Password Security: Why the UK is Banning Generic Passwords
Lev Lesokhin
17/05/2024

Password Security: Why the UK is Banning Generic Passwords

Read More about AI-Native Cybersecurity Human Risk Management
Instagram Security Awareness Training: A Step-by-Step Guide
Lev Lesokhin
10/05/2024

Instagram Security Awareness Training: A Step-by-Step Guide

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Human Risk Management Forum Kicks Off in London
Lev Lesokhin
18/04/2024

Cybersecurity Human Risk Management Forum Kicks Off in London

Read More about AI-Native Cybersecurity Human Risk Management
Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step
Rory Attwood
31/01/2024

Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step

Read More about AI-Native Cybersecurity Human Risk Management