We're Hiring!
Take the next step in your career and work on diverse technology projects with cross-functional teams.
LEARN MORE
Mountain West Farm Bureau Insurance
office workers empowered by business technology solutions
BLOG
11
15
2018

Solving the InfoSec Risk Equation

Last updated:
9.16.2020
No items found.

Daniel Deter is the Manager of Information Security at Green House Data. Follow him on LinkedIn.

With all the talk about cloud security threats, it’s important to remember that no matter where your data and applications reside, you should consider your data insecure.

Fundamentally, security isn’t a hyper-complex enterprise; It’s not, as they say, rocket science. It often feels that way, because the discipline is so broad in scope; encompassing both disparate technologies and governance frameworks. But, the vast majority of risk can be mitigated through adhering to basic foundational security.

More to know: A review of breaches outlined within the Verizon 2017 Data Breach Investigations Report (DBIR) against the Center for Internet Security (CIS) top 20 critical security controls found that:

That basic foundational security can be expressed in one essential formula, which boils down what is under your control as an IT security professional and what is outside your purview. That equation is as follows.

Assets + Threats + Vulnerabilities = Risk

If you have a data center, plus a hurricane, plus your data center is built below sea level, you have the risk of flood.

If you have protected health information (PHI/ePHI), plus hackers, plus immature security implementations, you have a risk of data spill or compromise.

Risk management is analogous to a big balloon that is being slowly filled up by three hoses. Once the balloon gets big enough, it will hit a thumbtack on the ceiling and *POP* — you’ve been breached. Your job, regardless of whether you’re C-level, or call center representative, is to try and manage the three hoses (i.e., assets, threats, and vulnerabilities) as much as you can.

What Can You Remove from the Risk Equation?

We can’t manage away the assets. You need your assets. They’re not only a part of your business, they are your business. We can’t get rid of the threats; they exist outside of our direct control (i.e., we can’t get rid of the hurricane, we can’t get rid of attackers). What we can manage is the vulnerability to threats faced by our assets. When we talk about threats, we should segue that into dialog about vulnerabilities and how we can manage them.

How do you manage vulnerabilities? The top ones represent basic attack vectors. When we look at where major data breaches are occurring, it’s not with complicated Mission Impossible types of attacks. They stem from failures to adhere to basic security principles: prompt updating and patching in response to zero-day vulnerabilities; routine updates and patching; lack of adequate identity and access management or password protocols; and, of critical importance, security awareness training.

More to know: Your personnel are your most vulnerable asset. According to the Verizon 2018 BDIR, on average, 4% of the targets in any given phishing campaign will click it. And incredibly, the more phishing emails someone has clicked, the more likely they are to do so again.

Remote hosted IT systems (e.g., the cloud) do come with their own set of risks. You should know which aspects of security you are responsible for vs. the cloud provider. Though, the essential basics of information security risk management remain the same.

You can manage some aspects of risk from the rest of the equation. For example, asset management comes down to inventory of what’s in your environment, knowing the software and hardware in use and where it is physically. Identity and access management comes down to knowing who has access to what and making sure that you adhere to the least privilege principle. As well as things like security awareness training, to make sure your personnel are aware of risks and how they should respond to them.

But you can never shut off the hoses filling the risk balloon entirely. The easiest and most important category to focus on is vulnerabilities. Layering security throughout your environment by using monitoring, antivirus/antimalware tools, and patch compliance will help minimize vulnerabilities and the risk of data exposure.

Recent Blog Posts

lunavi logo alternate white and yellow
3.13.2025
3
.
12
.
2025
Unlocking the Power of Azure Managed Services with Lunavi

Cloud computing has become the backbone of modern business, offering agility, scalability, and cost efficiency. But managing cloud environments while keeping costs under control and security airtight? That’s a challenge. Azure Managed Services streamline cloud operations, helping businesses optimize spending, enhance security, and future-proof applications. Lunavi provides the expertise and tools to make it happen—so you can focus on growth instead of IT headaches.

Learn more
lunavi logo alternate white and yellow
2.11.2025
2
.
7
.
2025
The Future of Test Automation: Key Trends Shaping 2025 and Beyond

Software testing has gone from a chore to a game-changer, thanks to automation. But in 2025, sticking to old methods means falling behind. Stay ahead by embracing the future of test automation—let’s explore the key trends shaping what’s next.

Learn more
lunavi logo alternate white and yellow
2.11.2025
1
.
23
.
2025
The Importance of Cross Browser Testing

Making sure users have a smooth experience across all these platforms is crucial for businesses to stay competitive. Cross-browser testing is now a key part of modern development. It helps teams find and fix problems like layout issues, broken features, or slow performance before users are affected. Let’s look at why cross-browser testing matters and explore tools that make it easier to get the job done.

Learn more