Cyber Risk Modeling

Track: Misc
When: Thu PM-3
Where: Montague
Organizers Phil Huggins, Ben Schofield
Participants Ben Schofield Ben Schofield , Chris Allen Chris Allen , Daniel Kefer Daniel Kefer , Dave Snowden Dave Snowden , Tony Richards Tony Richards
Remote Participants Senen Garcia Senen Garcia

Why

Phil brings his extensive experience to a discussion on modelling (general) risk and comparing security risk modelling maturity to other markets (finance, insurance, medical..). This also involves attribution of $ value to risk and how security teams can talk the language of the business

What

Current Security Risk Management is Broken

There is a lot of complexity and uncertainty in cyber risk. Current practice tends to hide uncertainty and present certainty.

We use Ordinal Scales (Red, Amber, Green / High, Medium, Low / 1,2,3,4,5 etc) rather than Cardinal measures (£ or %). Is a red x red risk a really red risk? Twice as bad? Three times as bad? We then assign numerical values to support ‘risk arithmetic’ (5 x 5 = 25 /2.5 = risk score) OWASP Risk Rating Methodology (Risk Factors / Ordinal Scales)

We then use risk matrices that arbitrarily identify an ordinal boundary as the ‘risk appetite’. (Amber =Good, red = Bad).

By assigning a single value to probability and impact we are communicating a level of certainty about the outcome we don’t really have.

People are individually poor at prediction Hedgehogs / Foxes / Superpredictors

We are awash with data about cyber events but few documented robust statistical methods deployed.

The solutions are well known by other risk professions

Quantitative Risk Approaches

Probability of event Range of outcomes (lognormal distribution) Monte Carlo Simulation Loss Exceedance Curves <- Business understands these FAIR / OpenFAIR

Prediction Approaches Risk Panels Averaged predictions Feedback !!!!!!!!! Brier Scores Base Rate Data Calibration

References: Dan Geer Doug Hubbard Philip Tetlock Jack Jones Ryan Huber

Outcomes

Who

References

Register as participant

To register as participant add Cyber Risk Modeling to either:

  1. the sessions metadata field from your participant's page (find your participant page and look for the edit link).
  2. or the participants metadata field from this git session page


Back to list of all Working Sessions