Access "Break-even analysis: The highs and lows of risk and ROSI"
This article is part of the November 2013 Vol. 15 / No. 9 issue of Virtualization security dynamics get old, changes ahead
In my first column I issued a call to action to help technology risk management professionals make good decisions through the application of economic techniques. While that might seem like a tall order, you're already making those decisions. What you thought were random qualitative choices about running a security program actually reveal a lot about your risk expectations. It's impossible to measure technology-related risk, or that's the commonly held belief. The reason: the challenge of determining both the likelihood of bad things happening and the financial amount that could be lost. It can be very complex (mind-boggling, really) if you attempt to think through all of the details. But those "revealed preferences" (versus stated) are hard at work tattling on you by providing a baseline amount to work with. At the very least, every resource allocation decision involves justification; usually, just deciding to do the "most important" thing on your list, because "it's worth it." Break-even analysis pointers Therefore, we need to understand what "worth it" ... Access >>>
Premium Content for Free.
Virtualization security dynamics get old
by Chris Hoff
Companies have embraced virtualization and cloud computing, but security is still bolted-on. Here's what needs to change.
Eliminating black hat bargains
by Robert Lemos
Enterprises cannot always keep attackers out of their networks. Instead, defense-in-depth strategies aim to raise the cost to black hats -- in terms of time and money.
- Virtualization security dynamics get old by Chris Hoff
Beyond the Page: Virtual security
by Christofer Hoff
In the November 2013 Beyond the Page on virtual security, Chris Hoff examines the challenges infosec pros face in finding the right security strategy for their enterprise network.
Executive viewpoint: Mixed messages on software security
by Robert Richardson, Editorial Director
Software security ranks high among security executives' concerns but low in terms of time spent, according to an (ISC)2 CXO study.
- Beyond the Page: Virtual security by Christofer Hoff
Time for a closer look at software security
by Kathleen Richards, features editor
If software security keeps you up at night -- and it should -- you are in good company.
New measures for security metrics: Ranum Q&A with Jay Jacobs
by Marcus Ranum
Wading into the murky waters of security metrics? Jay Jacobs offers his take on data collection and incident reporting with the VERIS framework.
Break-even analysis: The highs and lows of risk and ROSI
by Pete Lindstrom, Contributor
What's a dollar spent on security worth in terms of risk? Break-even analysis helps you decide.
- Time for a closer look at software security by Kathleen Richards, features editor
More Premium Content Accessible For Free
Does Windows 8.1 meet the demands of the BYOD age?
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Application security policy after Heartbleed
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
Devising a security strategy for the modern network
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...