cso.online.com.au, Australia 09-28-06 Hoping the House Burns Down

advertisement
cso.online.com.au, Australia
09-28-06
Hoping the House Burns Down
Sue Bushell, CSO Online
Security strategy is as important as corporate strategy. Getting it right is critical.
Learn how detailed cost/benefit information can lead to more effective security
management decisions
Real-life stories abound about hapless CIOs and CSOs who breeze through the
task of convincing their ambitious but spending-averse boards and CEOs of the
value of CRM, ERP or wireless initiatives but struggle to get funding for the
infrastructure and technology to secure them.
Of course when the inevitable happens - the major system is breached, the
regulations are seriously, if accidentally, violated, the corporate reputation goes
down the toilet or revenues start to plummet - it's often tmhe hapless CSO who
wears the blame. Small wonder security executives stew when the message they
hear loud and clear is that if they want the resources to manage security risks,
they will have to somehow demonstrate a healthy return on investment (ROI).
No point telling the execs they should count reduced legal liabilities, fewer thefts
and better employee morale as ROI savings - they're just not equipped to think
that way. To many executives, ROI ain't ROI unless it delivers awesome cost
savings or new business returning more to the organization than the original
investment.
So convincing executive management of the merits of a stable and secure
network infrastructure is tough enough. Selling them on network security
initiatives can sometimes seem almost impossible.
"The business case issue around security is still a very real one in Australia, and
part of this is because of the lack of ability to translate the impact, or potential
impact, of a security issue to the business," says KPMG Australia associate
director Rob Goldberg. "And so there is, unfortunately, a number of organizations
- from the large end of town all the way down to the SMEs - who haven't been hit
who are kind of sitting there thinking: 'Well it hasn't happened to us, so why
should I make this investment?'"
In fact it currently seems like there are two types of organizations in this world:
the ones who resist spending on security because they have yet to be hit, and
those who see security investments as so inevitable they never even bother to
consider an ROI case. Still, in many organizations how to justify security
investments throughout the development cycle is becoming such a thorny issue
that a new group - the Application Security Industry Consortium - formed last
year just to tackle it.
Comprising representatives from Microsoft, SAP, Oracle, Red Hat, Gartner, the
Florida Institute of Technology and others, the group is mapping security
measures to business needs, and tracking other issues dear to the hearts of
CEOs and CIOs. Manufacturing Business Technology reports APPSIC hopes to
move the debate well beyond the use of scare tactics traditionally used to justify
security investments.
"We have two specific goals: to provide metric guidance, and deliver a
methodology for evaluating platform and application security," says APPSIC
chairman Herbert Thompson, who is chief security strategist for technology and
services provider and consortium member Security Innovation.
"Among the challenges are to show value for security activities when we're
building software, and to show customers how to determine value when they're
buying."
"We're trying to get people to understand security associated with software
applications" says IDC research director Charles Kolodgy, a fellow APPSIC
member. "Perimeter security has improved, and as people deploy more defences
in different areas, hackers have decided to attack applications much more than
they used to. We're attempting to assess the risk of applications and find
meaningful metrics for security."
Doug Jacobson, Director of the IOWA State University Information
Assurance Center, concurs. "Security is like insurance: it's hard to justify," he
says. "APPSIC is bringing that to the forefront by seeking models that people can
use to demonstrate potential ROI. This would go a long way toward making
applications more secure."
That "security-as-insurance policy" is a metaphor Cutter Consortium contributing
writer John Berry is entirely comfortable with. Any value from security measures
stems mostly from the costs and negative impacts the buyer manages to avoid
by warding off catastrophe, Berry notes in a paper called ROI Analysis of
Enterprise Risk Management and Governance.
"Attempting to quantify the economic value of security-related information
technology is a lot like understanding the value of an insurance policy. Value
stems less from what's delivered to the buyer and more from what costs and
negative impacts the buyer avoids should a catastrophic event occur. Avoiding
costs can be more powerful than saving or making money. The problem is that
quantifying avoided costs is only truly possible after disaster strikes. This reality
can lead to some twisted thinking: a desire to capture value from a security-
related technology is like hoping that your house will burn down so you can take
advantage of your homeowners' policy," he wrote.
Which begs the question: if it's "twisted thinking" to expect any monetary reward
for your security efforts, why bother doing ROI calculations at all? As Berry notes,
particularly where the threats seem huge (for example, phishing) and where
investment helps the organization meet regulatory requirements, or where the
law mandates that customer information be protected, the proposed security
technology morphs from a discretionary capital outlay to a must-have capability.
So why bother analyzing potential value? Why not move straight to a feature-set
analysis, determine if its functionality meets the law's requirements, and cut a
cheque?
How about because of the truth of the old adage that "if you can't measure it, you
can't manage it", Goldberg says. Or because security is bedevilled by the fact
there is so much any organization doesn't know that it doesn't know. Or because
while there's rarely a direct correlation to positive bottom line impact in the ROI
equation, organizations are starting to discover that the brand risk and trust risk
to organizations from a security breach is far greater than was once appreciated,
as can be the downstream negative revenue impacts.
"So the ROI then needs to be considered from a broader perspective," Goldberg
says. "Where there are links that you can draw to your balance sheet, by all
means do so that you measure that the technology investments you make are
working. But then you also need the qualitative measurements that show you that
the effectiveness of your technology investments and your procedural
investments are actually working to meet an expected level."
Revealing Exercise
The very act of undergoing an economic value analysis can help show where the
true value of the security technology rests, Berry says. It can also allow clearer
thinking about the costs the technology might help avoid and the likely economic
impact of current threats.
You can typically divide IT spending into an if-to-invest bucket and a when-toinvest bucket, Berry says. "If-to-invest technologies offer high risks and high
rewards: large cost reductions from process efficiencies, profit impacts from
revenue generation, re-engineered business models, and so on. They are also
highly strategic in nature and it takes a thorough cost-benefit analysis to
determine if they should go ahead.
"When-to-invest technologies - like databases, servers, networks, and HR
applications - on the other hand, offer both far fewer risks and lower rewards. But
since they're needed to keep the organizational 'lights on', the question around
investment becomes when, not if."
Security-related technology, Berry notes, falls into both camps. On the one hand,
security technology is a when-to-invest proposition, since managers perceive that
the risk of doing nothing in the face of growing information-asset threats is
enormous. On the other hand, security technology is also an if-to-invest
proposition with the flavour of a strategic technology since the deployment of a
specific kind of security technology can influence an organization's security
strategy.
"So since security technology exists in a kind of value assessment purgatory, is
there managerial benefit in analyzing the economic value of security
technology?" Berry's paper asks. "Certainly, but not because such an exercise
will help the organization decide to invest or not invest - we have already
conceded that most organizations will invest in security technologies regardless
of what the ROI or net present value (NPV) figure is."
Instead, he says companies should analyze the economic value of security
technology as if it were the most complex, risky, and strategic product around
because of what the effort will reveal to them.
Berry says an ROI analysis can illuminate the following ideas for managers:
»Because the value of security-related IT is commonly captured in cost
avoidance, accurate forecasts on the probability of a threat can help the
organization prioritize security technology investment.
»Any rigorous financial modelling should expose the hidden costs lurking under
the price tag for the security technology investment including the cost impact of
various types of organizational or process change introduced into the
organization by virtue of the investment. Exposing hidden costs is critical when
the investment offers no direct economic benefit because the cost side of the
ledger has a bigger influence on the ROI.
»People, process, and organizational change introduced by security technology
can have multiple impacts on the organization; economic analysis heightens an
awareness of these impacts before the investment is made.
»Managers get so caught up in forestalling real security threats to their
information and it infrastructures that project risks can easily be overlooked. An
ROI analysis reminds managers in organizations where project management
skills are limited that security technology implementation faces the same project
risks as any other IT project.
»Perhaps most importantly, economic analysis provokes a larger discussion and
review of the organization's entire security strategy.
"On a very practical level the analysis asks the organization: 'Are we equipped to
use the security related technology optimally?' In other words: 'Are we going to
use all of the functionality to the best of our ability and are the people that are
going to use this technology equipped take full advantage of the functionality of
the software?'" Berry writes.
Take the example of Fraud Detection Software (FDS), used to help organizations
discover potentially suspicious activity from online visitors and forestall an actual
security breach. FDS helps an organization pre-empt the real damage wrought
by phishing, hacking, or other security breaches by proactively flagging
suspicious Web site activity that is an early indicator of these disastrous
outcomes; and automates the investigative process of actually mining this data
for this suspicious activity.
Historically, organizations that had bothered to monitor Web server logs in
search of potentially compromising behaviour from outsiders relied upon
painstaking and time-consuming line-by-line file reviews from technical staff,
Berry notes. Under these circumstances would an ROI analysis help any
organization contemplating investment in this FDS technology?
Perhaps not, especially if the organization was experiencing the very kind of
information security breach this technology is supposed to help it avoid, Berry
says.
"The company might find itself in the throes of paranoia and panic. Economic
value analysis, meant to illuminate how value is expected to be achieved for the
money invested and the foundation of a decision to implement a particular
technology, is an extraneous data set to the beleaguered manager perceiving an
immediate need for a technological solution to a damaging security breach. If any
laws were broken as a result of the attack that would subject the organization to
fines only heightens the urgency to dispense with value analysis on the way to
procurement. Besides, some of the benefits from FDS are very difficult to
quantify.
"However, even if the organization under these circumstances does see an ROI
analysis as a distraction, the questions such an analysis asks of managers who
take security management seriously are still quite relevant. The exercise has
value as it provokes the kinds of questions that focus attention on how the
investment fits in with the current and future security strategy. Is the strategy
improved? Must it change in some way to accommodate the new security
technology?"
Often, the very act of asking such questions can be highly illuminating.
Here Be Dragons
While both Berry and Goldberg agree there can be much hidden value in
conducting ROI analyses of security technology, they say the landscape is
replete with potential stumbling blocks.
Goldberg says organizations questioning the ROI of security tend to make two
common mistakes. The first to focus on a purely quantitative analysis, which risks
failure to recognize the technology's business impact. For example you can't tell
whether your security risk profile has changed just by knowing the number of
monthly alerts generated by your intrusion detection software. If you received
500 alerts one month and only 300 the next, does that mean that the intrusion
detection is working well, or that it isn't working as it should be, since it may have
not even noticed some intrusions in month two? And an ROI analysis certainly
can't tell you if the one alert you should have responded to in month two, when
your numbers were down, was an extremely dangerous one.
"So there's some problems with trying to pull this stuff out of the technology, and
a lot of organizations go into this monthly reporting cycle trying to show that all of
this stuff is doing something, but not drawing a link between that and actual
impact on the business," he says.
But the other mistake is to not keep the metrics dynamic enough, Goldberg says.
Once you have some software working and you're getting some value add out of
the investment, you need to consider whether you should change the metric
because the risk profile or the business has changed.
And Berry warns that numbers in an ROI analysis can be extremely rubbery. "In
an ROI analysis you can come up with any number that you want to," he says.
"You know, this idea we are going to avoid all these costs, and it's going to mean
a $6 million cost avoidance if we invest in this. You extrapolate or rationalize any
kind of figures that you want; that doesn't mean that they're accurate and that's
one of the pitfalls of all of this.
"Many organizations get into the inherent difficulty in calculating cost avoidance
which is very much more art than science."
The only way to tip the balance in favour of science is to gather as much
independent empirically driven information and data as possible, Berry says. For
instance, the value of a reduction in viruses infiltrating the organization entirely
depends on the potential cost to the organization of the viruses in question. To
get a head start on doing those calculations, you might see what data is available
from the carrier companies that do risk insurance and the analysts houses. It's
true that many of these breaches are so novel that the carriers won't have deep
experience over a number of years to draw upon which would let other
organizations make reasonable extrapolations about the calculations they should
make within their own organizations. Berry concedes. Nonetheless, using
independent third-party information as the basis of your calculations whenever
possible provides you with a powerful analytic tool.
But Berry also cautions organizations against over-enthusiastic use of that tool.
Plenty of organizations suffer "analysis paralysis", he says, getting so bogged
down in such calculations that they never make the investment.
"Given the fact that a lot of companies don't even bother to do ROI analysis it is
not that much of a problem in the organizations, but it can be a risk," he says.
But it is also vital to have the expertise to do the return on the investment
analysis, he says. Without such experience, you can have the greatest third-party
information in the world, but still make a lot of calculation mistakes.
Above all, remember that when it comes to security, value stems less from what's
delivered to the buyer and more from the costs and negative impacts the buyer is
able to avoid in the event of a catastrophe.
"A thorough economic analysis is essential to achieve a complete understanding
of the entire range of costs, risks, rewards, and resource demands," Berry says.
Download