8 ways to talk security with executive management
Posted on 25 August 2014.
The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive communication.

Gartner vice president and distinguished analyst Paul Proctor said one of the greatest challenges security teams face is not how to reduce risks but how to convey the benefits of risk management to leadership.

The pace of change in the age of digital business and the Internet of Things means risk and security professionals are forced into a state of continuous conflict between the business wanting to drive innovation, and the security team needing to rein in risk.

Executive decision makers want to know the business is adequately protected against risk but need to weigh the risks of yesterday and today against the opportunities of tomorrow.

Having reviewed more than 300 board presentations on risk and security, Gartner found that in the vast majority of cases, the reports contained too much information and fear, were overly complex, lacked alignment with wider business strategies, and had no connection to board-relevant decision making.

The challenge is how to get the two sides to work in harmony. To do that, security teams need to learn to communicate the benefits of security changes as much as they do the risks, says Mr. Proctor.

In his recent report on linking risk and security to corporate performance, Proctor had these eight practical tips for communicating benefits to executive decision makers:

1. Formalise risk and security programs

A formalised program is one that is repeatable and measurable. It contains four key phases: a govern, plan, build and run phase.

2. Measure program maturity

Using a maturity scale to measure your program identifies gaps and opportunities to improve. Maturity is also a good abstraction for executive decision makers who do not always understand technology.

3. Use risk-based approaches

Risk management is an explicit recognition that there is no such thing as perfect protection. Organizations must make conscious decisions about what theyll do, as well as what they wont do to mitigate risk. Stakeholders in non-IT parts of the business must make these decisions, not leave it up to IT professionals alone. But more importantly, risk managers must take a proactive approach to risk assessment and management. They need to manage risk, not be managed by it.

4. Use lead indicators of risk conditions

Risk managers need to define new leading indicators of business performance that includes both key performance indicators (KPIs) and key risk indicators (KRIs). They should not focus exclusively on IT-centric KPIs. Doing so perpetuates the notion that IT risks relate only to IT.

5. Map KRIs to KPIs

Most organizations have a plethora of operation risk and security metrics. While these are extremely valuable for internal operations, they have little value to business decision makers. Good KRIs are simple and measurable and have a direct impact on multiple KPIs.

6. Link risk initiatives to corporate goals

Using fear, uncertainty and doubt to get executive support doesnt work. Executives dont want to hear how bad everything will be if they dont invest in risk management and security. Its equally useless to cite returns on investment because risk does not return a tangible dollar for dollar value. The best way to win executive support is to demonstrate business value.

7. Remove operational metrics from executive communications

Dont use operational metrics to communicate at a business executive level. Executives lack the background and training to understand the meaning in a business context.

8. Clearly communicate what works and what does not

In a risk-based world, a business-oriented audience wants to know: What are our risks? What is our posture? What do we do about it? Communicate that well and youve won half the battle.





Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //