Risk reduction and cybersecurity

Issue 3 2022 Security Services & Risk Management, Information Security

Risk management is critical to a business. We can find examples as far back as recorded history allows with ship and cargo owners routinely taking up insurance to cover risky voyages. Risk grew as companies became more complex, and today’s risk manager must juggle many physical and esoteric risk considerations.

It’s tempting to mitigate risks by nailing everything down, but that isn’t a practical reaction for certain parts of an organisation. Today’s business risks are not just about preventing the negative, but also supporting the positive.

Cyber risks are a perfect example. In an ideal world, a company would make its IT and data systems impenetrable. But employees, partners and customers need continual access to those resources. This tug-of-war between productivity and security is tricky to manage, and many risk managers find themselves outmanoeuvred by operational demands. Yet they are also at the forefront of helping make digital safe and practical for their businesses.

“Risk and IT professionals are converging around cyber risk,” says Lior Arbel, head of pre- and post-sales at cybersecurity audit service, Encore. “The IT guys understand the technical and process challenges of technology while risk managers translate much of that context for the business. For example, if a CFO weighs technology purchase decisions, they often take in the views of risk managers and as new technology regulations prompt more involvement from company leaders and boards, they also rely more on risk managers to add a business context.”

Risk is one of the ways a business strategically understands its technology. Yet grasping those risks is more often about complexity, Arbel explains.

“Companies are becoming very complex in how they operate and the environments they operate in. Risk management naturally rises to handle that complexity. Since digitisation introduces many new complicated relationships in a company, risk managers cannot avoid the topic. They have to be in the thick of it.”

The topic of cyber risk is complex and will occupy business theorists for decades to come. This article aims to answer a more straightforward question: how should risk managers think about cyber risk? What are the main considerations and red herrings? How would you know you’re mitigating cyber risk?

Six areas that help define cyber risk theory and practices

1. The types of risk: Cybercrime is the most visible cyber risk. Hackers attempting to breach company systems and steal sensitive information require serious responses. But there are also other cyber risks, such as employee negligence, abuse of systems, infrastructure failure, and poor legal compliance. Though some of these have straightforward mitigation strategies, it’s important to understand that all cyber risk interrelates. Just taking care of one area, such as regulation, won’t be sufficient.

2. The types of damage: To create an overarching picture of how to rank cyber risks, start with the potential damage – how an organisation could be harmed most. Stolen data is often the biggest problem. It varies based on the type of data, customer, personal, operational, company IP, etc. Business continuity is another big concern: will a cyber incident stop employees, partners and customers from transacting, and for how long? System downtime is often the costliest part of cyber breaches or negligence. Regulations are the third primary consideration: what are the legal implications and fines resulting from non-compliance?

3. Who owns the risk: Many organisations are still uncertain about who owns cyber risk or are unwilling to accept it’s no longer solely IT’s problem. Numerous laws, such as the Protection of Personal Information Act (PoPIA) and governance frameworks, such as King IV, place the responsibility on business leaders, the executives, C-suite and board. It’s not just a question of compliance. Technology is so intrinsic to modern business that leaders must accept technology as a strategic responsibility. It influences their costs, current performance, future investments, and the full gamut of strategic requirements: strengths, weaknesses, opportunities and threats.

4. Identifying risks: There is no single or large act that will sweep across cyber risk. Instead, most risks exist in specific areas of the business. For example, the storage, flow and access of personal identifiable data (PID) creates a number of risks related to compliance, employee behaviour, access rights, infrastructure performance, and operational efficiencies. Yet there will be many overlaps, PID might transact on collaboration systems that also work with company IP data.

5. Mitigating cyber risks: You might be shaking your head: cyber risk is holistic and all-encompassing but also specific. Where do you start? The good news is that you can exploit overlaps in cyber risk. For example, focusing on PID risks will reveal risks in other areas that often benefit from the same mitigation strategies. Stricter access management of user accounts around PID can help reduce risks, as can meeting ISO/IEC 27001 compliance. Improving PID database infrastructure can also improve productivity for other types of data.

6. Create a cyber risk culture: A collaborative culture is essential to mitigate cyber risks. Risk managers and technology managers should work together to understand different dimensions of the problems and opportunities at hand. Employees must receive training to help avoid negligence. Companies should employ senior security managers, and if they can afford it, a chief information security officer (CISO). Crucially, the C-suite and board must have access to someone with security knowledge.

These considerations are broad and demanding, shortcuts are few. But risk managers can still generate a few quick wins. Foremost, support the security teams. Good digital security is a complex and layered discipline, and security professionals can spend a lot of time finding gaps, poor configurations or over-powerful user accounts.

Invest in security and user account monitoring/audit software. Also look at enhancing security monitoring with service partners to provide security orchestration, automation, and response (SOAR), security information and event management (SIEM) and a security operations centre (SOC) as services (often under the banner of managed security services).

Above all, build closer ties to technology and security leaders. Don’t just rely on blunt mitigation strategies such as cyber insurance. Reducing cyber risk is a culture and strategy. Embrace that concept and you'll take control of cyber risk.

Find out more at www.encore.io




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
FICA in the era of deepfake and AI-driven fraud
Security Services & Risk Management
A growing fraud strategy involves leveraging AI to produce highly convincing fake images, videos, and audio, commonly referred to as deepfakes, which are used to impersonate real individuals and spread misleading or false information.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.