In a sea of security threats, ransomware attacks and cyberwarfare across industries and borders, determining how to spend the budget and what actions to prioritize when it comes to cybersecurity can be overwhelming.
The Center for Cybersecurity, part of the Swedish Armed Forces Intelligence Service, constantly monitors the threat picture against Denmark and the conclusion is clear; it looks bleak. Annually they publish a report on the subject and in latest edition do they consider that:
“The threat from cybercrime is very high. The most serious cybercrime threat to Denmark comes from ransomware attacks. Cybercriminals' opportunities for collaboration, division of labor and specialization support the threat and help maintain the very high threat posed by cybercrime.”
In addition, 78% of private and financial sector companies surveyed have been exposed to phishing attacks in 2022. It establishes PwC's Cybercrime Survey, in which 518 business leaders, IT managers and specialists from Danish companies participated in the survey.
As an IT security manager, your primary task is to protect the security of your company's digital ecosystem. That's why it's important to be aware of potential vulnerabilities so you can address the three main pillars of cybersecurity; confidentiality, integrity & accessibility.
Confidentiality
Integrity
Accessibility
Cybersecurity can be seen as a chain of links that together make up the company's degree of resilience against cybercrime threats, but a chain, as you know, is no stronger than its weakest link.
An example of this is that while advanced technology is in place to protect systems and data, it's no use if your users haven't received awareness training that dresses them to avoid phishing attacks. The same applies if your backup solution is both located online on disk and offline on tape in a safe. This is also of little use if no restore tests are performed that can validate that the data can actually be restored.
It is this identification of the weak links in the chain that can ultimately avert a potential disaster in the form of hacker attacks or ransomware. Therefore, holistic understanding is essential in your work with cybersecurity, as you get all the way around and get the weakest links lifted.
So, how best to go about it? For sure, an effective tool is needed that makes it possible to find the weak links in the chain. In this way, you ensure the best basis for deciding which initiatives to launch.
A clear and effective way to reach the goal can be found at the US Agency for Standardization and Technology; NIST. They have developed a cybersecurity framework that offers a structured and complete approach to implementing cybersecurity measures in all kinds of organizations. The framework is now recognized as an industry standard and consists of five areas that companies and their IT managers need to master.
The five areas are:
Identificar: Identify which assets and processes need to be protected and optimized.
Protects: Implement the necessary measures to protect infrastructure and data.
Detect: Monitor, detect and crack down on the sites where incidents and cyberattacks occur.
Respond: Have the skills and preparedness ready to respond to incidents and cyber attacks.
Recover: Be able to restore data and systems with a complete backup strategy and restore plan.
To avoid shooting sprees when the task of selecting measures to strengthen cybersecurity, we recommend conducting a complete risk assessment. It gives you a complete overview of the security situation in your digital ecosystem. A risk assessment aims to delve into the NIST framework and assess how well you are prepared in each of the 5 areas.
We recommend the following general approach:
1. Identification of critical assets
Assets such as business-critical systems and valuable data must be identified. Then they must be assigned a value and prioritized according to how critical the asset is.
2. Vulnerability assessment
Map simmering cyber threats and let them form the basis for evaluating any vulnerabilities that could lead to the realization of the threats.
3. Calculation of risk
Calculate your risk based on the assessment of the identified vulnerabilities. These are assessed in relation to the likelihood of the threat being realised as well as the consequence of the attack.
4. Report + Recommendations
Once the situation is mapped out, the results must be presented to the company's decision makers. Prepare a report with conclusions and recommendations that can be presented to management and decision makers for risk management and budgeting.
Are you ready to take a risk assessment? Download our guide and get inspired on how to work practically using our format, approach and visual scorecard.
Now that you know how a risk assessment can streamline your cybersecurity, we've created a guide on how to get started yourself.