Question
Asked 15th Jul, 2019

How do security capability maturity and risk level correlate?

Intuitively one would be inclined to think that improving organizational security capabilities would increase overall organizational security maturity. As maturity increases, better controls/risk mitigations would be designed and implemented, leading to lower residual risk levels. This would suggest a negative correlation between maturity and risk.
Assume there is a maturity scale of 1 to 5 and a risk scale of 0 to 100.
Does anybody know how risk and maturity would relate and/or how much correlation would be reasonable to expect?

Most recent answer

18th Jul, 2019
Michael Ahern
Worcester Polytechnic Institute
You're welcome Pieter! I'll be curious about your findings.

All Answers (8)

15th Jul, 2019
Mark Sitkowski
Design Simulation Systems Ltd
I think you're confusing theory with the real world.
What happens in practice, is that a company will never upgrade its security systems unless they have a bad scare, or an actual breach. When this happens, they spend as little as possible to mitigate the chance of its happening again.
Take as an example, what happened at Target in 2014. A vulnerability in an FTP server allowed hackers to infiltrate the network and plant screen-scraping malware on all the POS terminals.
When the breach finally came to light, did Target make the POS terminals proof against screen scrapers? No, that would cost too much. They improved the security of FTP servers.
You only have to follow the news of data breaches (I do, but I'm in the security business) to see that each one only results in a short-term Band-Aid solution to the immediate problem.
1 Recommendation
16th Jul, 2019
Zeyad Mohammad
Al-Zaytoonah University of Jordan
The security capability maturity evolves with the time and risk level comes from the creative hackers then we need to develop the security capability.
1 Recommendation
17th Jul, 2019
Pieter van de Griend
Philips
Thank you Mark Sitkowski and Zeyad Mohammad for your contributions.
Allow me to add further thought to my, admittedly, theoretical question.
What I am looking for is any support for the shape of the curve that depicts the relationship between maturity and risk level. In the image that I have attached there are two options that I would think plausible, i.e. a linear relationship and a non-linear S-curve shape. In both cases there are differences in correlations.
What I am looking for is any published research to corroborate such a shape.
18th Jul, 2019
Michael Ahern
Worcester Polytechnic Institute
As an organization's security capability matures, it reduces its risk as it masters the basics of cyber hygiene, gains expertise in intrusion detection, and adds capabilities to detect and stop data exfiltration.
That said, the hackers are also maturing their capabilities and increasing operating risk for their potential target organizations. The analogy is that as defenders build higher fences, attackers get longer ladders.
To reduce net security risk, organizations need to mature defensively faster than hackers mature offensively.
1 Recommendation
18th Jul, 2019
Pieter van de Griend
Philips
Thank you for this perspective on defender-attacker interaction.
I agree that there is a kind of maturity contest between defenders and attackers. Driving that view to a conclusion ultimately means that defenders must try to mature faster than their counterpart attackers.
My experience indicates that the interaction behaves more like an arms race during which the cost for the attackers are maximized against a minimization of defender costs. The actual drive, however, is largely information-based, as in: who knows what when.
In that respect agile attackers appear to possess an advantage over large organizations in that they can adapt faster to a changed environment.
Translating your observation would result in an oscillating curve with a, preferably, downward trend - as indicated in the attached figure.
18th Jul, 2019
Michael Ahern
Worcester Polytechnic Institute
Hello Peter,
I like the shape you’be drawn. To quantify it, you might use statistics from the annual Verizon Breach report and/or similar sources (e.g. U.S. FBI). I think you’ll find that basic cyber hygiene will eliminate about 80% of the risk.
Best,
Mike
1 Recommendation
18th Jul, 2019
Pieter van de Griend
Philips
Indeed, as you alluded, basic system hygiene, such as application patching and addressing known database and network components' vulnerabilities, significantly improves security posture. Alas, when it comes to actual implementation, it is a quite different story. The main challenge remains knowing which assets can be found where. Next hurdle is finding somebody with time and a sense of responsibility to implement and test the patch.
Thanks for suggesting mapping statistics from security reports against risk and maturity models.
18th Jul, 2019
Michael Ahern
Worcester Polytechnic Institute
You're welcome Pieter! I'll be curious about your findings.

Similar questions and discussions

Are there currently developed systems for information security risk management gathered in Big Data database systems?
Discussion
21 replies
  • Dariusz ProkopowiczDariusz Prokopowicz
Security of data collected in Big Data database systems is currently a priority issue for the development of this technology of gathering and advanced information processing. Taking into account the dynamic development of Big Data database systems as well as building and developing these systems by various business entities, the importance of information security issues gathered in Big Data database systems is growing. In addition, the analysis of the risk of cybercriminal attacks on Big Data database systems is growing, and therefore information security management systems collected in Big Data database systems should be built and permanently improved. Every business entity that has built its Big Data database system should also have its own information security management system stored in Big Data database systems.
Do you agree with my opinion on this matter?
In view of the above, I am asking you the following question:
Are there currently developed and developed systems for information security risk management gathered in Big Data database systems?
Please reply
I invite you to the discussion
Thank you very much
Dear Colleagues and Friends from RG
The key aspects and determinants of applications of data processing technologies in Big Data database systems are described in the following publications:
I invite you to discussion and cooperation.
Best wishes

Related Publications

Presentation
Full-text available
I accentuate that security risk management comprises a system of people, processes and technology (PPT), which enables an organisation (private or public) to operate in line with shared values and risks. In discussing ways of mitigating the cost of security risk management, I note the need to make it people-oriented by ensuring that persons in an o...
Conference Paper
Full-text available
Little attention has been given so far to the process of security risk management at the early stages of system development. Security has been addressed by isolated security assurance practices, some of which consider risks and mitigations but they do not provide an overview of the overall security state of the system being developed. This paper ta...
Book
This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature review, Q-sorting, expert interviews, and analysis of data collected from 356 organizations. Additionally, the effects of security risks on negative and p...
Got a technical question?
Get high-quality answers from experts.