Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why CISOs Need to Quantify Cybersecurity Risks
Cybersecurity

Why CISOs Need to Quantify Cybersecurity Risks

Chris HughesBy Chris HughesSeptember 28, 2022Updated:October 5, 20224 Mins Read
Facebook Twitter LinkedIn Email
Cybersecurity Data Risk Quantification
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

There’s no way to sugar-coat it: Cybersecurity has a data problem. More precisely, cybersecurity as an industry is abysmal when it comes to quantifying cyber risk.

While there are increased calls for cybersecurity expertise in the boardroom, and even proposed changes from the Securities and Exchange Commission (SEC) to have companies disclose cyber expertise of board members, we simply aren’t speaking the same, data-driven language as many of our peers when it comes to threats facing our business. That’s a problem we need to fix.

Cybersecurity Risk Quantification

Cybersecurity risks can be communicated qualitatively or quantitatively. Historically, as an industry, we overwhelmingly do the former.

As a result, explaining the scale of threats is subjective, open to interpretation, and fails to provide business leaders with data to drive organizational decision-making about our cybersecurity risks. That’s occurring against the backdrop of calls we all hear for security pros to “speak the language of the business.” In this context, that means articulating cyber risks and threats, supported by numbers.

This issue isn’t new; experts including Douglas Hubbard and Richard Seiersen address it in their widely cited “How to Measure Anything in Cybersecurity Risk” book (rumor has it, a new edition is coming as well).

They aren’t the only individuals or organizations who have evangelized quantifying cybersecurity risks. Risk Management Executive Jack Jones and the FAIR Institute have also been advocating a similar position. As an organization, FAIR, which stands for Factor Analysis of Information Risk, boasts more than 13,000 members and is used by over 45% of Fortune 1000 organizations.

From a technology perspective, there are also platforms such as Balbix and RiskLens that strive to automate quantification of cyber risk to empower organizations to address those risks and improve board reporting.

The Enterprise IT Environment

So, despite the push from thought leaders, industry organizations, and vendors, why does do cyber risk practitioners still speak in squishy, subjective terms that are devoid of numbers? The truth is that cyber risk quantification relies on methodological and mathematical modeling approaches that lend themselves to quantifying risk. When performing cyber risk quantification, you’re looking at things such as organizational assets, vulnerabilities, threats, and likelihood of exploitation.

Unfortunately, the enterprise IT environment — which is central to overall risk posture — isn’t quite so cut and dried, and therein lies a major problem. Organizations are generally subpar at maintaining hardware and software asset inventory — despite the fact that category has been a SANS/CIS Critical Security Control for years.

As a result, organizations simply don’t have confidence in their overall asset inventory. Even if they do, it is generally misplaced because years of security incidents have shown that shadow IT is rampant. We all know how hard it is to protect, or even quantify the risk to, assets that we aren’t aware of.

Other challenges exist too. The Common Vulnerability Scoring System (CVSS), which is widely used for vulnerability prioritization and risk assessment, is often misused. At least, that is the argument made by Carnegie Mellon University’s Software Engineering Institute (SEI) in its paper titled “Towards Improving CVSS” or Drew University’s paper titled “CVSS: Ubiquitous and Broken”. Combine misused scoring with internal blind spots and you start to gain an understanding of where today’s approaches are falling short.

Future Coverage of Cybersecurity Risks

In additional upcoming analysis on the Acceleration Economy Cybersecurity channel, I will dive deeper into current cyber risk qualitative and quantitative assessments, technical and platform solutions, and potential gaps in the way vulnerabilities are scored and prioritized.

All of these issues contribute to the challenges for cybersecurity when it comes to speaking the language of the business, providing actionable risk insights, and communicating with executive leaders and board members, despite the urgency to have cybersecurity leadership represented “at the table.”


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

CIO CISO Cybersecurity data featured Featured Post risk
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions

May 22, 2025

SAP Says Reports of Applications’ Death Are Greatly Exaggerated!

May 22, 2025

How SAP Is Redefining Enterprise AI with Unified Data and Strategic Partnerships | Tinder on Customers

May 22, 2025

Cprime’s Strategy for AI-Native Transformation: Operating Models, Agents, and ServiceNow

May 22, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions
  • SAP Says Reports of Applications’ Death Are Greatly Exaggerated!
  • How SAP Is Redefining Enterprise AI with Unified Data and Strategic Partnerships | Tinder on Customers
  • Cprime’s Strategy for AI-Native Transformation: Operating Models, Agents, and ServiceNow
  • SAP: Agents Will Enhance Apps, Not Turn to CRUD

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.