Strategic Alliance Magazine Q1 2018 - 29

INVESTING IN SECURITY

What are the potential threats that exist that could lead
to those outcomes; how likely are any of those potential threats to actually occur? Often, it's really hard to
figure most of this out. Organizations have a very hard
time putting a value on their information resources;
it's nearly impossible to know all the potential threats
that might exist, let alone how likely they are to occur.
Because of this, those key decision makers are often
making investment decisions under conditions of uncertainty. Oftentimes, when faced with a very hard
question like this, people don't do all the necessary calculus and, instead, replace the hard question with an
easier one. In behavioral science-speak we call these
"heuristics," simple rules of thumb that people use
when making a judgment about something. In some
cases these heuristics work fine, but in others they can
lead to problems. In the case of cybersecurity investment, the heuristic that C-level decision makers might
use is "If I'm compliant, I'm safe," and focus their investment decisions on ensuring that they've checked
all the boxes of one security framework or another.
However, while compliance might be great for getting
contracts, or proving you've done your due diligence
in court, it doesn't equate to security.

How do some of these behaviors relate to
managing multi-party collaborations?
Consider the additional security concerns that emerge
in multi-party collaborations where information is
shared. It's very easy for us to pay attention to the risks
we face as an individual company. And we may evaluate the security risk of a partner through the lens of
our own security mindset. What you may not be asking, and what you should be asking, going to the table
with a potential partner, is: What are the risks they face?
How are your security systems going to interact with
their risks and vice versa because you are now stewards to each other's security? Take, for example, Target's
breach caused by sharing security permissions with a
third-party vendor. You need to make sure no back door
exists that is going to create a vulnerability.

Why are avoidance and underinvestment such
problems among executives?
The Nobel laureate and behavioral scientist Daniel
Khaneman coined the acronym WYSIATI, or "what you

see is all there is." The idea speaks to the fact that we often really just pay attention to the things that are in front
of us and sometimes neglect other potentially important
information. It has to do with what behavioral science refers to as mental models, which are simple models we all
use to make sense of the complexity of the world around
us. These models help us to make predictions about the
future, but they also have the consequence of directing
our attention toward certain things while we ignore
others. Executives at different organizations likely have
different mental models when thinking about risks and
security for their organization. If, when forming strategic
alliances, or merging organizations together, you don't
address the differences in those mental models appropriately, both parties may miss risks.

How do you circumvent those
potential shortfalls?
One internal risk we have been addressing is how CISOs
responsible for security interact with the senior team.
If I'm a CISO (Chief Information Security Officer)
asking for money from a CEO to secure the servers,
the CEO may say it's not an immediate issue, and
maybe we will address it next year. What the CISO
should communicate is that the entire financial system is sitting on those servers. That would probably
pique their interest. The CISO may not have background in finance or business strategy. They may
come from a tech or cyber policy background, so they
don't have a mental model for thinking about what
broader organizational risks might look like. It's a bit
of a communications challenge. If you have a bunch
of high-level people coming to the table trying to knit
these alliances together, one person should be there
to represent the security risks and communicate how
they may meaningfully affect other risk areas such as
operations, finance, or public relations. We have been
proposing building risk committees that specifically
address risks relevant to each one of those areas. The
CISO can become more aware of the risks of each and
understand the linkages between those risks so they
are more adept at communicating how cybersecurity interacts with those risks. Now imagine expanding
these committees when building alliances to ensure that
all of these things are being considered and the senior
leadership is listening to these needs. n
Q1 * 2018 | STRATEGIC ALLIANCE MAGAZINE

29



Table of Contents for the Digital Edition of Strategic Alliance Magazine Q1 2018

No label
Strategic Alliance Magazine Q1 2018 - No label
Strategic Alliance Magazine Q1 2018 - 2
Strategic Alliance Magazine Q1 2018 - 3
Strategic Alliance Magazine Q1 2018 - 4
Strategic Alliance Magazine Q1 2018 - 5
Strategic Alliance Magazine Q1 2018 - 6
Strategic Alliance Magazine Q1 2018 - 7
Strategic Alliance Magazine Q1 2018 - 8
Strategic Alliance Magazine Q1 2018 - 9
Strategic Alliance Magazine Q1 2018 - 10
Strategic Alliance Magazine Q1 2018 - 11
Strategic Alliance Magazine Q1 2018 - 12
Strategic Alliance Magazine Q1 2018 - 13
Strategic Alliance Magazine Q1 2018 - 14
Strategic Alliance Magazine Q1 2018 - 15
Strategic Alliance Magazine Q1 2018 - 16
Strategic Alliance Magazine Q1 2018 - 17
Strategic Alliance Magazine Q1 2018 - 18
Strategic Alliance Magazine Q1 2018 - 19
Strategic Alliance Magazine Q1 2018 - 20
Strategic Alliance Magazine Q1 2018 - 21
Strategic Alliance Magazine Q1 2018 - 22
Strategic Alliance Magazine Q1 2018 - 23
Strategic Alliance Magazine Q1 2018 - 24
Strategic Alliance Magazine Q1 2018 - 25
Strategic Alliance Magazine Q1 2018 - 26
Strategic Alliance Magazine Q1 2018 - 27
Strategic Alliance Magazine Q1 2018 - 28
Strategic Alliance Magazine Q1 2018 - 29
Strategic Alliance Magazine Q1 2018 - 30
Strategic Alliance Magazine Q1 2018 - 31
Strategic Alliance Magazine Q1 2018 - 32
Strategic Alliance Magazine Q1 2018 - 33
Strategic Alliance Magazine Q1 2018 - 34
Strategic Alliance Magazine Q1 2018 - 35
Strategic Alliance Magazine Q1 2018 - 36
Strategic Alliance Magazine Q1 2018 - 37
Strategic Alliance Magazine Q1 2018 - 38
Strategic Alliance Magazine Q1 2018 - 39
Strategic Alliance Magazine Q1 2018 - 40
Strategic Alliance Magazine Q1 2018 - 41
Strategic Alliance Magazine Q1 2018 - 42
Strategic Alliance Magazine Q1 2018 - 43
Strategic Alliance Magazine Q1 2018 - 44
Strategic Alliance Magazine Q1 2018 - 45
Strategic Alliance Magazine Q1 2018 - 46
Strategic Alliance Magazine Q1 2018 - 47
Strategic Alliance Magazine Q1 2018 - 48
Strategic Alliance Magazine Q1 2018 - 49
Strategic Alliance Magazine Q1 2018 - 50
Strategic Alliance Magazine Q1 2018 - 51
Strategic Alliance Magazine Q1 2018 - 52
Strategic Alliance Magazine Q1 2018 - 53
Strategic Alliance Magazine Q1 2018 - 54
Strategic Alliance Magazine Q1 2018 - 55
Strategic Alliance Magazine Q1 2018 - 56
https://www.nxtbook.com/allen/stam/23-2
https://www.nxtbook.com/allen/stam/23-1
https://www.nxtbook.com/allen/stam/22-4
https://www.nxtbook.com/allen/stam/22-3
https://www.nxtbook.com/allen/stam/22-2
https://www.nxtbook.com/allen/stam/22-1
https://www.nxtbook.com/allen/stam/21-4
http://www.brightcopy.net/allen/stam/21-3
http://www.brightcopy.net/allen/stam/21-2
http://www.brightcopy.net/allen/stam/21-1
http://www.brightcopy.net/allen/stam/20-4
http://www.brightcopy.net/allen/stam/20-3
http://www.brightcopy.net/allen/stam/20-2
http://www.brightcopy.net/allen/stam/20-1
http://www.brightcopy.net/allen/stam/19-4
http://www.brightcopy.net/allen/stam/19-3
http://www.brightcopy.net/allen/stam/19-2
http://www.brightcopy.net/allen/stam/19-1
http://www.brightcopy.net/allen/stam/18-4
http://www.brightcopy.net/allen/stam/18-3
http://www.brightcopy.net/allen/stam/18-2
http://www.brightcopy.net/allen/stam/18-1
http://www.brightcopy.net/allen/stam/17-4
http://www.brightcopy.net/allen/stam/17-3
http://www.brightcopy.net/allen/stam/17-2
http://www.brightcopy.net/allen/stam/17-1
http://www.brightcopy.net/allen/stam/16-3
http://www.brightcopy.net/allen/stam/16-2
http://www.brightcopy.net/allen/stam/16-1
http://www.brightcopy.net/allen/stam/15-4
http://www.brightcopy.net/allen/stam/15-03
http://www.brightcopy.net/allen/stam/15-02
https://www.nxtbook.com/allen/stam/15-1
https://www.nxtbook.com/allen/stam/14-4
https://www.nxtbook.com/allen/stam/14-3
https://www.nxtbook.com/allen/stam/14-2
https://www.nxtbookmedia.com