Stop Viewing Cybersecurity in a Silo


Cybersecurity risk assessment should be an integral part of the organization’s enterprise risk management program and decision-making, not a siloed operation.

One of the challenges when it comes to so-called “cybersecurity risk” is in accepting and then applying the idea that cyber is not an IT risk — it’s a business risk.

That makes all the sense in the world, no? Yet people tend to apply it only when talking about the fact that the whole organization, the entire business, has to be involved in preventing and then responding to a breach.

The truth is that cybersecurity MUST be seen within the context of the whole business, not in a silo.

How Would a Breach Impact Your Organization?

What is the potential effect of a breach on the achievement of the enterprise’s objectives? If we are to assess cyber-related business risk, we have to have the answer to that question. That requires the involvement in the assessment process of both business and technical personnel.

Trying to assess cyber-related risk with only technical personnel is highly unlikely to come up with the right answer.

Yet, the most widely accepted cyber risk standards are written by information security personnel, for (in my opinion) other information security practitioners.

If internal auditors want to assess the management of cybersecurity risk, they should take a more holistic approach, starting with the answers to that question: “What is the potential effect of a breach on the achievement of the enterprise’s objectives?”

An audit should probably include the participation of financial and operational auditors, not be limited to the infosec experts.

First Steps for Internal Audit

In fact, the first step in any audit should be to determine whether management knows the answer. Then see whether they continue to know the answer as the business, technology and the environment (including the hackers’ tools, techniques and favorite targets) change.

If management has not completed and then maintained a business risk-oriented risk assessment that is integrated with enterprise risk management and decision-making, the audit team should consider halting the audit.

If management doesn’t know where the risks are, what assurance does it have and what assurance can internal audit provide, that the right controls and security are in place?

The next step, the one I favor, is to determine whether the information security team has the necessary capabilities, position, and authority to address those risks.

Only then would I consider assessing whether the measures in place are sufficient and effective.

IIA’s Good and Not-so-Good Advice for Internal Audit 

The IIA had different ideas when it published its ‘supplemental guidance’ in the 2020 Global Technology Audit Guide (GTAG): Assessing Cybersecurity Risk.

The GTAG has some good and some not-so-good advice for auditors wishing to provide assurance, advice and insight on cyber-related business risks. This GTAG seems to fall into the trap of assessing risks to information assets, rather than risks to the business, IT risks (whatever they are, absent the context of what the business is trying to achieve) vs. risks to the success of the business.

Let’s first look and comment on some excerpts.

Global connectivity and accessibility to information by users outside the organization increase risk beyond what has been historically addressed by IT general and application controls. Organizations’ reliance on information systems and the development of new technologies render traditional evaluations of IT general and application controls insufficient to provide assurance over cybersecurity.

(Later…)

Internal auditors need an updated approach for providing assurance over cybersecurity risks. Although IT general control evaluations are useful, they are insufficient for providing cybersecurity assurance because they are neither timely nor complete,

Comment: I couldn’t disagree more on these two excerpts. ITGC includes information security, which includes cybersecurity. Cyber is no different from what I was responsible for when Information Security reported to me at two financial institutions; what I evaluated as an IT auditor; or what my various Internal Audit teams assessed after I became a CAE.

Cybersecurity risks are notably more dynamic than most traditional risks and necessitate a timely response.

Comment: More dynamic (volatile) than currency or commodity prices? I doubt it.

All risks require more than just a timely response, they require timely identification and assessment.

Cybersecurity is relevant to the systems that support an organization’s objectives related to the effectiveness and efficiency of operations, reliability of internal and external reporting, and compliance with applicable laws and regulations. An organization typically designs and implements cybersecurity controls across the organization to protect the integrity, confidentiality, and availability of information.

Comment: The GTAG has correctly listed all the categories of objectives identified in the COSO Internal Control Framework. Nothing new here. But the controls need to be designed to address risks to the achievement of those objectives, a different dimension to “the integrity, confidentiality and availability of information.”

Because assurance based on traditional, separate evaluations is not sufficient to keep up with the pace of cybersecurity risk, an innovative assurance strategy is required. Increasingly, continuous auditing techniques are needed to evaluate changes to security configurations, emerging risk outliers and trends, response times, and remediation activities.

Comment: 100% disagree, and this is one of my primary problems with the GTAG. I will explain shortly.

Management should consider performing a business impact analysis (BIA).

Comment: If management hasn’t done a BIA that identifies how a cyber incident could affect the achievement of its objectives, Internal Audit should immediately bring that to the attention of senior management and the board as a serious issue. Any risk assessment is likely to be wrong. If they have done one that only helps them prioritize information assets and does not enable multiple sources of risk (i.e., not only cyber but also compliance, human resources, etc.) to be considered together when making a decision, the issue remains serious – but is easier to remedy. See discussion later.

There is a great deal more in the report which I encourage you to review. In the spirit of remaining constructive, I’ll explain my two major issues and suggest what is in my opinion a far better approach.

Cybersecurity Isn’t About Information Assets

One of the problems I have with the NIST, ISO and FAIR standards and guidance is that they focus on ‘information assets’ and not on the business..

While the business cannot be considered absent IT-related risks and opportunities, those IT-related risks and opportunities cannot be considered absent the context of running the business and achieving objectives.

Cyber (and other IT-related risks) should not be considered in a silo.



Source link

We will be happy to hear your thoughts

Leave a reply

DELA DISCOUNT
Logo
Enable registration in settings - general
Shopping cart