Why are security threat, vulnerability and risk assessments important, Jeffrey A Slotnick, President, Setracon ESRMS asks.
Article Chapters
ToggleOver the past 26 years, I have encountered numerous security risk, threat and vulnerability assessments – some exemplary and others lacking.
Many organizations approach risk assessments primarily to fulfill compliance requirements, often relying on checklists, Excel spreadsheets or questionnaires.
While these methods are effective for compliance, they fall short of providing a comprehensive qualitative or quantitative analysis.
A qualitative risk assessment evaluates risks based on their characteristics and potential impact on a project or organization.
It uses descriptive terms and subjective judgments to prioritize risks, often through methods like expert opinions, interviews and risk matrices.
The focus is on understanding the nature of risks and their relative significance to the enterprise.
A quantitative risk assessment involves numerical analysis to measure the probability and impact of risks.
It quantifies risks using statistical methods and data, often resulting in specific values or ranges.
Techniques like Monte Carlo simulations, sensitivity analysis and decision tree analysis are commonly used to better evaluate risks.
Monte Carlo simulations, for instance, are particularly suited to engineering risk, evaluating the reliability and performance of systems under uncertain conditions.
They also have applications in determining security risk.
Threat, vulnerability and risk assessments are often misunderstood and misapplied.
Risk assessment is not merely about identifying risks and calculating a risk level.
It serves as the entry point for identifying and quantifying all enterprise risks, facilitating compliance and making informed business decisions for physical security investments.
Moreover, a continuous improvement process ensures alignment with enterprise strategy.
Consider this: many enterprises invest significantly in physical security systems, security forces and security programs, often amounting to millions of dollars.
However, budgets are frequently cut because executive leadership does not fully understand the value of these investments.
How do we demonstrate the value of the security function? How do we position ourselves as a revenue center rather than a cost center?
The security threat, vulnerability and risk assessment is the first step in understanding our enterprise and the value the security function brings to the table.
A comprehensive and in-depth assessment aligned with the enterprise’s strategic risk goes a long way in demonstrating the value of investments in mitigations.
Aligning security and strategic risks helps prioritize investments in security measures that support the organization’s overall goals.
This ensures that resources are allocated efficiently to areas with the highest impact on the business.
By aligning strategic risk and security risk, we can rapidly demonstrate the value of the investment.
Here is a sampling of strategic risks from a global corporation extracted from their Form 10-K, a comprehensive annual report filed by publicly traded companies with the US Securities and Exchange Commission (SEC).
One of the elements of a Form 10-K is strategic risk factors.
Please read the strategic risk factors below and, with a security lens, imagine what actions the security department can take to eliminate or mitigate these risks:
When we can tie the investments in security risk to the elimination or mitigation of strategic risk, we have a business methodology that demonstrates the value of the security function and its overall impact on the enterprise.
A checklist cannot accomplish the type of security threat, vulnerability and risk assessment required to make decisions of this magnitude.
A comprehensive security risk, threat and vulnerability assessment grounded in quality management processes should include several key attributes to ensure accurate and actionable information for mitigating security and strategic risks.
Here are the essential attributes:
After engaging in the above process, we can now prioritize and rank risk based on its potential impacts on the enterprise’s strategic objectives.
Understanding risk based on its potential impacts enables us to justify resource allocations well, first addressing the most critical risks.
This leads us to actionable recommendations, mitigation strategies and an implementation roadmap.
Throughout this article, we have aimed to highlight the importance of detailed risk assessments.
When evaluating strategic risk and its impact on the enterprise, there are no shortcuts.
Inadequate baseline information results in poor decisions, whereas exceptional information empowers organizations to conduct thorough security risk, threat and vulnerability assessments.
This, in turn, provides accurate and actionable insights, ultimately enhancing their ability to mitigate security and strategic risks.
Jeffrey A Slotnick, CPP, PSP is President of Setracon ESRMS. Jeffrey is a trusted advisor, leader, risk consultant and security management professional.
This article was originally published in the April edition of Security Journal Americas. To read your FREE digital edition, click here.