A Report On The Efficiency of Business Kpis For Understanding Cyber Risks

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/368247512

A report on the efficiency of business KPIs for understanding cyber risks

Article · February 2023

CITATIONS READS

0 33

1 author:

Luis Soares
Glyndwr University
3 PUBLICATIONS   0 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Artificial Intelligence and The Singularity View project

Cyber Risk Management View project

All content following this page was uploaded by Luis Soares on 04 February 2023.

The user has requested enhancement of the downloaded file.


A report on the efficiency of business KPIs for
understanding cyber risks
Luis Henrique Soares
North Whales Management School
Wrexham Glyndwr University
Wrexham, United Kingdom
luishsr@outlook.com

Abstract—The objective of this paper is to critically evaluate management frameworks. KPIs within ERM's context are
and report, through its findings, if current business key intended to measure and demonstrate an organisation's
performance indicators (KPIs)are efficient for understanding compliance with risk management objectives and gauge and
cyber risks. Security technologies are considered, along with the improve its effectiveness. Examples of KPIs [3] for managing
problems and issues with information security, their risks, and risks include the number of hazards identified, the level of
the current strategies for management to mitigate them. The severity, incurred costs with incidents, time to response, and
Enterprise Risk Management (ERM) framework is one of the the percentage of risks mitigated.
most prevalent risk management frameworks adopted by
companies and supported by regulators. It proposes an III. RISKS IN INFORMATION SECURITY
organisation-wide strategy towards identifying, assessing,
planning responses, implementing mitigation approaches, and The domain of risks in Information Security revolves around
monitoring performance using KPIs. Cyber risks mainly target safeguarding three critical pillars: confidentiality, integrity,
the three pillars of confidentiality, integrity, and availability. and availability [4]. Confidentiality relates to the capacity of
Security tools at disposal to prevent attacks and threats include an organisation to keep its data accessible only to allowed
user access control and encryption for protecting users. Integrity means securing that data is not manipulated
confidentiality, hashing algorithms for addressing integrity, and or compromised by any means. Finally, availability concerns
fault tolerance and redundancy for ensuring availability. keeping data continuously available to its authorised users.
Despite the benefits of KPIs for measuring performance, setting
clear expectations, and helping with decision-making, their
Any failure or successful attacks against these three pillars
effectiveness in managing cyber risks faces significant results in business losses; therefore, organisations must adopt
challenges in the context of the information security domain. security tools, processes, and response plans to prevent such
The critical evaluation and the findings presented in this study attempts. Examples of security technologies commonly
suggest that the business KPIs typically adopted for managing adopted for that matter include user access control and
business risks only partially allow for understanding cyber encryption [5] for protecting confidentiality, hashing
threats and the challenges that stem from information security algorithms [6] for addressing integrity, and fault tolerance [7]
risks. and [8] redundancy for ensuring availability.
Keywords— enterprise risk management, cyber risks, business IV. CHALLENGES IN APPLYING BUSINESS RISK KPIS FOR
KPIs UNDERSTANDING CYBER RISKS
I. INTRODUCTION Despite the benefits of KPIs for measuring performance,
setting clear expectations, and helping with decision-making,
The pace of technology evolution and the extent to which it
their effectiveness in managing cyber risks needs to be
permeates almost every business domain in the modern world addressed in the context of the information security domain.
has taken security concerns to a higher level. High reliance Three of these challenges are briefly examined in this paper.
on software, the internet, communication infrastructure, and The first challenge is that although EMR takes a holistic
cloud computing increases risk exposure to cyber threats and approach to manage risks and encompasses technology-
information security vulnerabilities. In a 2022 IBM Security related risks, organisations tend to focus more on after-the-
research report [1] titled "Cost of a Data Breach Report fact, historical information. That limits the outreach for
2022", the technology company reports that data breach costs identifying future risks and properly mitigating them. In an
have reached $4.24 million by that year. With such losses, article [9] titled "Six ways companies Mismanage Risk", R.
information security risk management has become a critical M. Stulz highlights the issues with relying on historical data
component of enterprise risk management. This paper to forecast risks, examining how such an approach from
critically evaluates some of the common risk management financial institutions in the United States had a critical
approaches in business and to which extent they may be able influence on the 2008's global financial crisis. The second
to understand information security risks. obstacle comprises the dynamics of cyber security risks and
its key domains [10]; namely, the physical field represents
II. BUSINESS RISK MANAGEMENT AND METRICS software, hardware, and network; the information domain
The Enterprise Risk Management (ERM) approach [2] is includes monitoring, storage, and visualisation; the cognitive
one of the most common risk management frameworks part relates to how information is interpreted and used to
adopted by businesses and supported by regulators. ERM support decision-making; finally, the social environment
proposes an organisation-wide strategy towards identifying, comprises organisation preparedness to deal with cyber risks,
assessing, planning responses, implementing mitigation the social influences from governmental policies,
strategies, and monitoring performance. Key Performance macroeconomics, cultural, and international relations areas.
Indicators (KPIs) are essential to ERM and traditional risk That said, mitigating cyber risks requires, at the same time,
real-time monitoring of vulnerabilities and potential threats managing business risks only partially allow for
while investing time into proactively fostering security understanding cyber risks and the challenges that stem from
readiness practices. A final and even more critical challenge information security risks. Correctly understanding and
in applying KPIs for understanding cyber risks relies on risk mitigating cyber risks demand a multi-layered approach that
identification. considers the intricate elements of software, technology
infrastructure, people, and their use of them.
V. THE SUBTLETIES IN IDENTIFYING INFORMATION SECURITY
RISKS REFERENCES
In the paper "Comparing risk identification techniques for [1] “Cost of a data breach 2022,” *IBM*, Jul-2022. [Online]. Available:
https://www.ibm.com/uk-en/reports/data-breach. [Accessed: 02-Feb-
safety and security requirements", C. Raspotnig and A. 2023].
Opdahl [11] present relevant examples of risk identification
[2] P. Bromiley, M. McShane, A. Nair, and E. Rustambekov, ‘Enterprise
techniques in the field of information security, which helps to Risk Management: Review, Critique, and Research Directions’, *Long
illustrate the subtleties of identifying and monitoring such Range Planning*, vol. 48, no. 4, pp. 265–276, 2015.
risks in comparison to risk identification and mitigation in [3] Ekai, “Kpis for Risk Management,” *Risk Publishing*, 02-Jan-2023.
business practices, and are summarised here. The Functional [Online]. Available: https://riskpublishing.com/kpis-for-risk-
Hazard Assessment (FHA), derived from the aerospace management/. [Accessed: 02-Feb-2023].
industry, focuses on recognising the different systems [4] D. Gibson, *Managing risk in information systems*. Sudbury (Mass.):
components, their usual failure model, rate, operational Jones & Bartlett Learning, 2011.
model, causal factors, and effects. The Preliminary Hazard [5] M. E. Smid and D. K. Branstad, ‘Data encryption standard: past and
future, *Proceedings of the IEEE*, vol. 76, no. 5, pp. 550–559, 1988
Analysis (PHA) elicits and documents system development
hazards and lessons learned from failed attempts to identify [6] S. Debnath, A. Chattopadhyay, and S. Dutta, ‘Brief review on a journey
of secured hash algorithms’, in *2017 4th International Conference on
such risks in previous developments. The HAZard and Opto-Electronics and Applied Optics (Optronix)*, 2017, pp. 1–5.
OPerability (HAZOP) model aims to identify operational [7] V. P. Nelson, ‘Fault-tolerant computing: Fundamental
threats in a system. Other risk identification techniques [4] in concepts’, *Computer*, vol. 23, no. 7, pp. 19–25, 1990.
information systems focus on mapping vulnerabilities in the [8] [8] D. J. Taylor, D. E. Morgan, and J. P. Black, ‘Redundancy in data
domain of information technology infrastructure - the user, structures: Improving software fault tolerance’, *IEEE Transactions on
workstation, internal and external networks (e.g., Local Area Software Engineering*, no. 6, pp. 585–594, 1980.
Network, Wide Area Network), remote access, and system [9] R. M. Stulz, “Six ways companies Mismanage Risk”, *Harvard
application domains. Although the techniques mentioned Business Review*, 01-Aug-2014. [Online]. Available:
https://hbr.org/2009/03/six-ways-companies-mismanage-risk.
earlier list are not exhaustive, it brings to the surface the deep [Accessed: 03-Feb-2023].
and, at the same time, broad threats and vulnerabilities [10] Z. A. Collier, I. Linkov, and J. H. Lambert, ‘Four domains of
elements that are specific to information security and how they cybersecurity: a risk-based systems approach to cyber
differ from typical business risks, forming a multi-layered decisions’, *Environment Systems and Decisions*, vol. 33. Springer,
outlook encompassing systems, their internal mechanics, the pp. 469–470, 2013.
threats they might pose to users, and the interconnectivity [11] C. Raspotnig and A. Opdahl, ‘Comparing risk identification techniques
between them. for safety and security requirements’, *Journal of Systems and
Software*, vol. 86, no. 4, pp. 1124–1151, 2013.
VI. CONCLUSION
The critical evaluation and the findings presented in this
study suggest that the business KPIs typically adopted for

View publication stats

You might also like