Episode Notes
It’s difficult to quantify risk – some CISOs say it can’t be done – but there is a business case to be made for cybersecurity measures and controls (information sharing helps). Beate Zwijnenberg, ING CISO and member of FS-ISAC’s Global and European Boards, explains her approach to quantifying risk and communicating metrics relevant to senior management priorities. And she explains why DORA’s pillars may increase the sector’s resiliency as it matures the supply chain’s cyber defenses.
Notes from our Discussion with Beate
Quantifying Risk
The possibility of accurately and precisely quantifying risk is a matter of some debate among CISOs. In one sense, such metrics are available, insofar as they apply to the link between cyber risks and financial services organizations’ capital reserves.
But precise quantifications of the impact of cybersecurity strategies, policies, and investments on the business are much more difficult to ascertain. Determining success on those measures requires knowing the likelihood of various attack patterns or threat actors, which is often a matter of professional judgment.
Making a Business Case
CISOs can, however, quantify aspects of risk management by measuring investments and controls against business issues such as financial losses, reputational risk, and operational effectiveness or efficiency. Another potentially useful approach, Beate says, is a comparison to peers on a cybersecurity maturity index.
Moreover, information sharing and incident reporting clarifies the potential for and impact of different kinds of attacks, which helps ICT teams gauge the success of their cybersecurity measures and controls.
Communicating in a Business Context
Communicating risk management within a business context helps executives and board members know what to ask, track, and expect of CIT. One effective approach communicates risk management by emphasizing capability – such as risk management practices, in-depth assessments on outstanding threats, and progress on strategic programs. Another takes a control implementation perspective, covering open front ability management, progress on strategic goals (such as improving capabilities in prevention/detection /response) or on ongoing change initiatives.
DORA Pillars: Prescriptive, but Effective
Financial services CISOs will likely find DORA’s risk management practices familiar, if somewhat prescriptive – such as those regarding front ability scanning. Nonetheless, CISOs may need to adjust internal policies to translate requirements into their own IT risk management framework. Real-life testing is the best way to prove the efficacy of DORA’s mandatory control framework on institutions’ cyber practice and will aid the sector’s resiliency. Incident reporting may advance the cyber maturity of the supply chain as well.
Standardization
A major benefit of DORA is the potential for standardizing risk management practices applying to contracts within the software supply chain. Each firm’s unique contractual clauses regarding IT risk management standards, frameworks, and/or requirements with third parties inhibit automation. Standard contractual clauses centralized within end-to-end connections will improve efficiency and effectiveness across the sector.
FS-ISAC’s European Board
FS-ISAC’s European board focuses on challenges unique to the continent – such as DORA regulations – and helps members share intelligence and connect easily with peers. In-person events, such as the EMEA CISO Congress, facilitate the exchange of knowledge that advances the collective security of the sector.
CISO Skills
Stakeholder management skills make CISOs more effective. Because cyber incidents can be so operationally disruptive, CISOs should connect with various organizational functions – particularly finance, legal, and privacy – to streamline their approaches. However, CISOs and other executives may have very different perspectives on the business, or even how to parse problems. Beate recommends understanding other leaders’ business perspective, and finding the right moments to orchestrate initiatives and develop more productive relationships.
FinCyber Today is a podcast from FS-ISAC that covers the latest developments in cybersecurity, contemporary risks, financial sector resilience and threat intelligence.
Our host Elizabeth Heathfield leads wide-ranging discussions with cybersecurity leaders and experts around the world who bring practical ideas on how to confront cyber challenges in the financial sector, improve incident response protocols, and build operational resilience.
Amid the clutter and noise, FS-ISAC Insights is your go-to destination for clarity and perspectives on the future of finance, data, and cybersecurity from C-level executives worldwide.
© 2024 FS-ISAC, Inc. All rights reserved.
Listen on
B.G. (Beate) Zwijnenberg has been the Global Chief Information Security Officer since 1 April 2018. Prior to her appointment as Global CISO she was Director of Fraud & Cybersecurity for ING Belgium...
Read More& Netherlands and lead the (IT) development and management of both identity and access management and anti-fraud services for ING customers and employees. Before that she was instrumental in building and leading the central fraud management division at ING in the Netherlands. Since joining ING in 1998 she has held various management positions and has worked in product development, as well as project & change management within Retail Banking and Insurance. Before joining ING she worked as a consultant Building Physics at the engineering firm Cauberg Huygen.
Elizabeth is a storyteller at the intersection of technology and money. Layer in geopolitics and the criminal underworld and you get today's issues in cybersecurity for the global financial system. Crypto. Web...
Read More3.0. Quantum. AI. Ransomware. Privacy. Regulation. Zero-days. Supply chain attacks. Developing new and diverse talent. How to protect the future of money. These are the topics Elizabeth asks top executives and experts in the field about on FinCyber Today.
© Copyright 1999 - 2024 FS-ISAC, Inc. All Rights Reserved.