HWG srl
  • Services
    • Cyber defense
      • Security Awareness
      • File Integrity Monitoring
      • Network Security
      • Browser Isolation
      • Email Security
      • Endpoint Security
    • Machine intelligence
      • SIEM
      • EDR
      • SOAR
      • Anomaly Behavior Analysis
      • Cyber Threat Intelligence
      • Deception
      • Threat Data Feeds
      • Vulnerability Management
      • ICS Security
    • Human expertise
      • Security Assessment
      • Incident Response
      • Security Monitoring
      • Threat Hunting
  • About us
  • Blog
  • Resource Center
  • Contacts
  • Careers
  • en
    • it
HWG Incident Response
HWG srl
  • Services
    • Cyber defense
      • Security Awareness
      • File Integrity Monitoring
      • Network Security
      • Browser Isolation
      • Email Security
      • Endpoint Security
    • Machine intelligence
      • SIEM
      • EDR
      • SOAR
      • Anomaly Behavior Analysis
      • Cyber Threat Intelligence
      • Deception
      • Threat Data Feeds
      • Vulnerability Management
      • ICS Security
    • Human expertise
      • Security Assessment
      • Incident Response
      • Security Monitoring
      • Threat Hunting
  • About us
  • Blog
  • Resource Center
  • Contacts
  • Careers
  • en
    • it
HWG srl
HWG Incident Response
  • Services
  • About us
  • Blog
  • Resource Center
  • Contacts
  • en
    • it

The development of the cyber risk assessment and the areas where it can be performed

Published by HWG on 13 February 2023

All organizations - public and private - deal with cybersecurity on a daily basis, so much so that cybersecurity experts know that the problem is no longer 'if' one will suffer an attack, but 'when'. The health emergency caused by COVID19, the development of technologies and digital transformation have all contributed to a strong shift of business towards the online mode, thus also facilitating the work of cybercriminals.

The below image represents the next years' scenario regarding the most likely cyber threats, according to ENISA (the European Union Cybersecurity Agency). 



Obviously, the landscape is various and wide-ranging. Besides many strategic areas, as the supply chain a the AI, the following critical situations emerge:

  • increased disinformation, digital surveillance and privacy threats;
  • more effective targeted attacks thanks to data collected by smart devices;
  • occurrence of human errors and exploits in legacy systems;
  • shortage of specialized security professionals;
  • misuse of Artificial Intelligence.

Among this volatile landscape, organizations are also required to deal with regulatory changes in Information Technology security management: just think of the definition of the 'national cyber security perimeter' or the transposition of the NIS directive. For this reason, it is crucial for organizations to define a ultimate security objective that satisfies all protection requirements: to be compliant with the regulatory framework of reference and not jeopardize business growth.

This process itself implies the need to define a prompt and precise cyber risk assessment.

 

Areas to work on 

The development path of the cyber risk assessment starts with a daily analysis of the context the organization operates in, to define a framework of actions to be put in place. In this first period of observation and analysis all the priorities are defined now the priorities are defined, in order to improve the current company's cyber security and make the system more efficient with upgrades and new actions.

Once the target has been clarified, we proceed to concrete action: measuring and understanding the distance between the current situation, in which the organization operates, and the condition indicated by the target. The outcome of this phase - which can be conducted with various tools, e.g. surveys about how employees, collaborators or external suppliers behave in certain risky situations - is the creation of the organization’s current security profile.


The cyber risk assessment approach

Generally speaking, an organization can choose whether to adopt a quantitative or qualitative approach in defining its risk assessment. The latter, as is intuitive, emphasizes subjective elements that are difficult to measure, as compared to the former, which instead adopts previously established metrics, aiming for the greatest possible objectivity. The qualitative approach is usually adopted when time and budget are limited, preferring a streamlined process as the primary requirement. The second is instead more analytical and suitable for periodic monitoring of cyber security activities, leading to more detailed and useful results (also to measure security ROI).

In the definition of risk assessment, the first approach does not contradict the second one; on the contrary, they can be integrated.

 

Tags: cyber risk, cyber security, risk assessment
Back to Blog

Subscribe to our blog!

Popular post

  • 11 Apr 2022
    HWG appoints Cyber-Industry veterans to its board ...
  • 01 Mar 2022
    Investcorp acquires Italy’s leading cybersecurity ...
  • 16 Feb 2022
    OT Security: how to reconcile business continuity ...
  • 17 Mar 2022
    Security Operation Center (SOC), is it really esse...
  • 09 Feb 2022
    SOC as a service: how to choose the best one

Topics

  • Automotive (1)
  • CEO Fraud (1)
  • Compromise assessment (1)
  • cyber resilience (1)
  • cyber risk (3)
  • cyber security (2)
  • Dark Web (1)
  • electric mobility (1)
  • Incident Response (3)
  • Industry 4.0 (3)
  • IoT (2)
  • operational technology (1)
  • risk assessment (1)
  • security assessment (1)
  • security operation center (1)
  • SOC (3)
  • Spear Phishing (2)
  • Vulnerability Management (1)
  • Zero Trust (1)
see all topics

Related Articles

Cyber resilience: things to know

In the last year and a half (the year of the pandemic), the word resilience - the ability of a...
Read More

CEO Fraud: what is it and how to defend yourself

In the last three years, according to the FBI, CEO Fraud attacks have caused companies $26 billion...
Read More

SOC as a service: how to choose the best one

Cyber threats are increasingly sophisticated and numerous, and the consequences of a successful...
Read More
HWG
  • ISO certified company
  • ISO
  • clusit
  • Services
  • About us
  • Blog
  • Resource Center
  • Contacts
HWG Incident Response
2021 © HWG Srl

HWG Srl | Via Enrico Fermi, 15/E - 37135 Verona | P.IVA 03820790230

  • 231/2001 Model
  • Privacy Policy