It’s difficult for organizations of all sizes to navigate information security risks and establish strong programs to address those risks.
Organizations also often fear that establishing an information security program will be costly and time-consuming.
However, many organizations recognize that a cyber incident is inevitable, and that investing in prevention is more effective than simply reacting after an event occurs.
A practical approach is to build a cost-effective information security program using readily available tools and tailored to the threats specific to your organization.
An information security program is the set of processes and mechanisms, including procedural, technical, administrative, and physical safeguards designed to protect the security and functionality of your organization from potential hazards and unauthorized access to its data.
Organizations often invest significant effort and resources into protecting assets that aren’t truly critical.
A risk-based approach focuses on identifying which resources—data, systems, and processes—are critical and applying controls proportional to their importance.
When an IT breach makes headlines, the first response for many businesses is to identify the source of the breach and rush to make sure that particular breach can’t happen to them.
However, this often leads to an ongoing game of whack-a-mole because threat actors continually evolve their techniques, tactics, and processes.
What was once an effective breach technique could morph into a new strain of malware or another technique that wasn’t anticipated or even previously known, which still leaves you vulnerable.
When your organization takes a more risk-based approach to security compliance, it anticipates and projects problems that might occur to prepare its potential responses and solutions ahead of time.
Performing regular assessments, such as a rapid assessment, could take the pulse of the current information security program and identify security gaps that prevent breaches instead of reacting to them.
There are six steps to implement this type of strategy:
Once you implement these steps, they could help keep risk at an acceptable level, so key stakeholders can respond quickly and appropriately to future threats.
First, take stock of the resources you have, then assess their value and threats that may impact them.
To build an effective risk-based program, you must first understand your assets, including their:
A surprising number of organizations don’t know what crown jewels or critical resources they have.
For example, if your organization uses a third-party vendor as part of its IT ecosystem, and most organizations do, your critical data could be replicated and backed up in multiple places unknown to you.
Identifying risk encompasses an examination of the people, processes, and systems with which your organization interacts.
Consider the possible objectives of an advanced persistent threat, a formidable threat actor, available attack vectors, and resources available for preventing a security breach. It’s also helpful to look ahead at emerging threats.
Also consider risks that may not originate from external threat actors such as unforced human error, data exposure caused by email or generative AI tools, and risk inherited through third-party services such as SaaS solutions.
After you identify risks, you can implement the foundational security controls and processes mentioned above. These should be operational and tested on a regular basis regardless of business size or complexity.
Your testing schedule will depend on several factors including your business model, information architecture, and risk exposure.
To help you implement effective foundational controls, consider the following essential practices:
Foundational security controls will not be able to reduce risk to a perfect zero. Residual risk is the risk that remains after a control has been implemented. Residual risk may remain in either the likelihood or the potential impact of an attack. It’s important to identify those risks and implement any additional controls that don’t unduly burden the organization and its risk tolerance.
Additional controls may include:
A common pitfall is implementing controls and not revisiting them.
Controls need to be regularly tested and assessed to ensure they still meet the requirements of a changing threat landscape, and no new residual risk has been injected into the environment.
Improvements to controls could involve process changes, incorporating new or updated technology into the organization, or additional staffing. These improvement efforts become the basis for new roadmap projects.
Costs, timelines, and staffing needs are identified for each project, along with estimated risk reduction values. Depending on the information security maturity of the business, the projects can be foundational, advanced, administrative, or technical in nature.
It’s the responsibility of information security leadership to clearly articulate the value of funding these programs and their potential impact to executive leadership.
One of leadership’s most important tasks is to secure appropriate funding and resources, which can be a daunting obstacle, especially if there’s a trend within the organization towards a higher-than-average risk tolerance.
However, information security should be an active boardroom topic.
If it’s not, find a supporter or executive sponsor for the information security program. Inform this sponsor about information security, what the program aims to achieve, and the expectations of executive leaders so they can support security initiatives.
Quantifying risk in terms of dollars spent versus dollars lost is an effective way to get the attention and support of executive leadership.
Understanding what assets you have, identifying which risks matter most, and implementing basic controls help ensure you protect the right things first.
Continuously checking and improving those controls, addressing any leftover risks, and keeping leadership involved helps security become an ongoing, shared responsibility.
To learn more about how you can protect your organization with a cost-effective information security program, contact your firm professional.
Additional Resources
Baker Tilly US, LLP, Baker Tilly Advisory Group, LP and Moss Adams LLP and their affiliated entities operate under an alternative practice structure in accordance with the AICPA Code of Professional Conduct and applicable laws, regulations and professional standards. Baker Tilly Advisory Group, LP and its subsidiaries, and Baker Tilly US, LLP and its affiliated entities, trading as Baker Tilly, are members of the global network of Baker Tilly International Ltd., the members of which are separate and independent legal entities. Baker Tilly US, LLP and Moss Adams LLP are licensed CPA firms that provide assurance services to their clients. Baker Tilly Advisory Group, LP and its subsidiary entities provide tax and consulting services to their clients and are not licensed CPA firms. ISO certification services offered through Baker Tilly Certifications LLC. Investment advisory offered through either Moss Adams Wealth Advisors LLC or Baker Tilly Wealth Management, LLC.