IDG Contributor Network: How much cybersecurity funding is enough – is it a bottomless pit?

IDG Contributor Network: How much cybersecurity funding is enough – is it a bottomless pit?

I was the corporate technology representative for an information risk committee meeting attended by senior level executives from finance, HR, legal, physical security, internal audit and our external auditors. External audit conveyed that they needed to brief the board on the potential cybersecurity threat. The problem was if this was conveyed before we had some response, all it would do is create concern and a probable fire drill approach that would not be productive.

Questions were raised around how to best convey our overall corporate cybersecurity status as well as across each division. The board awareness needed to happen asap, and I took on the task of leading the effort to define an approach within one quarter, otherwise the Board would need to be briefed by external audit regardless. The pressure was on, but it was both reasonable and necessary.

I interviewed some large well-known, as well as niche, cyber-focused professional services firms that all had established cybersecurity approaches, but all seemed very heavy in terms of both initial effort and ongoing upkeep. None provided the clear dashboard perspective we were looking to convey, and after a few weeks I hadn’t gotten anywhere other than to better understand what I didn’t think would work.  

9 warning signs of bad IT architecture and see why these 10 old-school IT principles still rule. | Sign up for CIO newsletters. ]

A solid cybersecurity perspective needs to be looked at through a time dimensional lens

Fortunately, it was mid-December and I got an idea that hit me while once again watching the timeless “A Christmas Carol.” Now, we all know the best way to convey something is through a clear story, which is what Dickens did so well. And the wisdom of Charles Dickens’ approach with the ghosts of Christmas past, present and yet to come actually resonated with me! My own experiences reinforced that this was the perspective I thought we should convey, which covered:

  • The Past – What have we experienced in terms of significant incidents, and what have we learned and done about them?
  • The Present – What’s our risk relative to threats we’ve heard about in the news and what are we doing about them?
  • The Future – What do we need to worry about in the future based on business plans and evolving threats, and how does that impact our forward planning?

A continuing status update focused on key business impact metrics and initiatives, ideally on a basis that dovetailed into Board meetings, would be necessary to ensure that proper attention was focused based on relevant past, present and future perspectives. That certainly didn’t preclude immediate notifications and actions that could occur based on actual incidents or perceived threats, and those items would be included in the next status update. While this provided the time perspective on how we were doing, it didn’t address a point of reference needed for a methodical cybersecurity posture.

What is being used as the basis for determining cybersecurity risk?

Chenxi Wang, Ph.D., the Managing General Partner of Rain Capital and a Board member, provides guidance that the question to ask isn’t “how secure are we?” as that’s not based on any assessment framework,” and would just an opinion that’s based on individual perspective.  Understanding your security posture requires a combination of understanding both the threat matrix to your company and some basis for assessing your cybersecurity risk.

Leave a comment

Contact Us


    Please use this form to contact us or email us at [email protected]

    Address

    Singapore CBD

    Phone-no

    +65 8714 2780