🔐 Simply Cyber Course Materials - Community Access Welcome! This content is shared with enrolled students as part of our commitment to inclusion and value delivery in cybersecurity education. We believe in supporting each other's learning journey through ethical collaboration. Please help us maintain this open educational environment by keeping this URL within our course community. Sharing this link publicly undermines our ability to freely provide these materials. Questions? Reach out to your instructor—we're here to support your success!

Table of Contents

13.22-23 📈 Step 2: Business value analysis

Even up to a couple years ago everyone always looked at cyber as a cost center: it was something that cost our business money it wasn't something that enabled business functionality that made us money.

Jason Dion

Speed of Trust Key Principles

Trust leads to speed and lower costs

In a high-trust environment, people collaborate more effectively, and decisions are made faster, with less bureaucracy. Conversely, in a low-trust environment, processes slow down, and costs increase due to inefficiencies, misunderstandings, and undue friction (e.g. from the cybersecurity team).

The economics of trust

Covey emphasizes the "trust tax" and "trust dividend" concepts. A low-trust environment incurs a "tax" in the form of inefficiencies, whereas a high-trust environment yields a "dividend" through improved relationships, reduced friction, and faster execution.

13 specific ways you can build and sustain trust

  • Talk straight

  • Demonstrate respect

  • Create transparency

  • Right wrongs

  • Show loyalty

  • Deliver results

  • Get better (continuous improvement)

  • Confront reality

  • Clarify expectations

  • Practice accountability

  • Listen first

  • Keep commitments

  • Extend trust (while balancing with appropriate caution)

13.23 Business Value Model

Financial Returns

1. Cost Savings

  • Prevention of Data Breaches: Implementing strong cybersecurity practices reduces the likelihood of costly data breaches, which can result in significant financial penalties, legal fees, and remediation costs.

  • Example: $75 million ransom paid to Dark Angels gang (2024)

  • Operational Downtime Reduction: Protecting systems from ransomware, malware, and other attacks ensures business continuity, avoiding the downtime that could disrupt operations and lead to revenue loss.

Year

Company

Security Incident

Cost

2020

Cognizant

Ransomware Attack

$50-$70 million

2021

Colonial Pipeline

Ransomware Incident

Undisclosed (Significant Impact)

2017

Maersk

NotPetya Ransomware Attack

$300 million

2013

Target

POS Malware Breach

Undisclosed

  • Insurance Premium Reduction: Businesses with robust cybersecurity measures can often negotiate lower premiums on cyber insurance policies.

2. Competitive Differentiation

  • Trust and Reputation

    • Trust centres

  • Compliance with Industry Standards

    • SOC2 reports, ISO27k certifications

    • Request for Information (RFI), Request for Proposals (RFP)

    • Security questionnaires

Regulatory Compliance Examples:

  • SEC requirements and enforcement actions

  • SolarWinds case precedent

3. Increased Productivity

  • Reduced Downtime: With strong cybersecurity protocols in place, systems are less likely to suffer from disruptions due to attacks, leading to less downtime and higher productivity.

  • Automation and Streamlining: from centralizing processes into secure, modern solutions

Example: Identity and Access Management (IAM) Evolution

Legacy Process Issues:

  • Manually provisioning and de-provisioning user accounts,

  • Manually managing user access to systems, and ensuring that permissions were updated when roles or responsibilities changed

  • Slow, inefficient, and prone to errors, especially with scale

Centralized, Automated IAM Benefits:

  • Automated User Provisioning and De-provisioning: New employee accounts are automatically created when a user joins the organization, and access is terminated immediately when they leave, based on HR system triggers.

  • Single Sign-On (SSO): Centralizes authentication so that users can access multiple applications and services with a single set of credentials, simplifying user experience and enhancing productivity.

  • Self-Service Password Reset (SSPR): Employees can reset their passwords without contacting IT, reducing downtime and freeing IT resources.

  • Role-Based Access Control (RBAC): Automatically assigns access permissions based on the employee's role, ensuring the principle of least privilege.

4. Decision Enhancement

  • Informed Risk Management: A well-structured cybersecurity strategy helps businesses assess and manage risks better, supporting leadership in making informed decisions about investments, partnerships, and new ventures.

  • Data Integrity: Cybersecurity ensures the integrity of critical data, enabling businesses to make decisions based on accurate, unaltered information. Secure data collection and storage practices protect against data corruption or theft, which could lead to poor business decisions.

5. Brand Enhancement

  • Customer Confidence: A strong cybersecurity posture demonstrates to customers that their data is safe, which enhances brand loyalty and customer retention.

  • Positive Public Perception: Being known for robust cybersecurity practices can enhance the overall image of the company, positioning it as responsible and forward-thinking, which is especially valuable in industries prone to data breaches.

  • Avoidance of Negative Publicity: By avoiding high-profile security breaches, companies maintain a positive brand image, preventing the negative media attention and loss of customer trust that often follows a breach.

Technical Risk Mitigation

1. Data Confidentiality

  • Encryption of data at rest and in transit

  • Access controls to restrict data exposure

  • Data masking or tokenization for sensitive information

  • Network segmentation to isolate critical data

  • Multi-factor authentication (MFA) for data access

2. Trustworthiness

  • Digital certificates for secure communication

  • Secure software development practices (e.g., code signing)

  • Regular vulnerability assessments to ensure systems are trustworthy

  • Data integrity checks (e.g., hashing algorithms)

3. Authorization

  • Role-Based Access Control (RBAC) or Attribute-Based Access Control (ABAC)

  • Least privilege enforcement to limit permissions

  • Privileged Access Management (PAM) for critical system access

  • Session timeout and automatic logouts for inactive users

  • Audit trails for monitoring and validating access rights

4. Business Continuity

  • Disaster recovery plans (DRP) for system and data recovery

  • Redundancy in critical systems (e.g., failover servers)

  • Regular backups and backup integrity checks

  • Business impact analysis (BIA) to prioritize recovery

  • Cloud failover solutions for rapid scalability and recovery

Increased Reliability of Operations

Key Focus Areas:

  • Increased availability

  • Preservation of data integrity

  • Disaster recovery capabilities

  • Preservation of current capabilities

  • Due Diligence and Due Care

Due diligence is establishing a plan, policy, and processes to protect the interests of the organization.

Due care is practising the individual activities that maintain the due diligence effort.

For example, due diligence is developing a formalized security structure containing a security policy, standards, baselines, guidelines, and procedures. Due care is the continued application of this security structure into the IT infrastructure of an organization.

In today’s business environment, prudence is mandatory. Showing due diligence and due care is the only way to disprove negligence and occurrence of loss. Senior management must show due care and due diligence to reduce their culpability and liability when a loss occurs.

CISSP Official Study Guide, 9th Edition
  • Increased Accountability: When accountability is clearly defined and enforced within an organization, individuals are held responsible for their actions, including compliance with legal requirements. This reduces the risk of non-compliance, as employees understand their responsibilities and the consequences of failure. Increased accountability can also improve an organization’s defense if legal action is taken, showing that proper oversight and controls were in place.

  • External and Internal Compliance: Compliance with both internal policies and external regulations ensures that the organization operates within the bounds of the law. This reduces the risk of legal penalties, fines, or lawsuits due to regulatory breaches. Demonstrating compliance through audits and documentation can also help defend against claims of negligence or wrongdoing.

  • Improved Awareness: Raising awareness of legal obligations and risks across an organization ensures that employees are informed and vigilant about potential issues. Training and communication about legal risks help prevent accidental breaches, non-compliance, or misconduct. When employees are more aware of legal expectations, they can avoid actions that might expose the organization to legal consequences.

13.24 🧭 Step 3: Create a dashboard and roadmap

Internal Marketing

Secure buy-in from key internal stakeholders:

  • Clarify the goals and objectives

  • Communicate the costs of mitigations, including financial investment and time commitment

  • Articulate the intended outcomes and purpose behind the chosen approach

  • Establish how you will measure success

  • Define KPIs to create transparency and provide a clear benchmark for evaluating effectiveness of the initiatives

  • Communicate the timeline with milestones

  • Designate responsible leaders or champions

External Marketing

Have a clear and comprehensive cybersecurity narrative, if needed for key external stakeholders:

  • Large customers

  • Investors

  • A state regulator

  • Even a judge or jury

13.25 🏢 Step 4: Conduct internal marketing

Cyber Risk Scorecard v1.0, Q1 2025, Feb 10, 2025

13.26 Internal Marketing Key Success Factors

Secure Buy-In from Key Stakeholders

Force Field Analysis

Strengthen driving forces with:

  • Involving cross functional teams in the CR MAP process

  • Regularly communicating CR MAP progress

  • Highlighting the business value and emphasis on reasonable cyber resilience

  • Providing support during transitions

Reduce resisting forces with:

  • Prioritize

  • Control the rate of change

  • Keep it simple

  • Adequate training

  • Introducing scalable processes

  • Showing executive team and project champion support

Stakeholder Analysis

Power/Interest

Category

Engagement Strategy

High Power, High Interest

Key players

Fully engage (e.g., cross-functional cyber risk experts, middle managers)

High Power, Low Interest

Keep satisfied

Don't overload with details

Low Power, High Interest

Keep informed

Regular updates

Low Power, Low Interest

Minimal effort

Basic communication only

Data for Decision Making - Essential Elements:

  • What: Top 5 risks from threat and vulnerability perspectives

  • Why: CSF functions and categories analysis

  • When: Timeline with Gantt chart

  • How Much: 3-Year Total Cost of Ownership (3TCO)

  • Who: Roles and responsibilities in action register

Key Performance Indicators (KPIs)

  • Create transparency

  • Provide clear benchmarks

  • Evaluate initiative effectiveness

  • Report quarterly at checkpoints

13.27 🌐 Step 5: Conduct external marketing

Summary Scorecard Best Practices

Security Measures:

  • Exclude organization name and logo

  • Include "Confidential Information – Do Not Distribute" label

  • Add publication date and version number

  • Use anonymous tracking codes (e.g., WHJ-597)

  • Require NDAs for external viewers

  • Apply need-to-know principle for access

Content Elements:

  • Overall Summary chart

  • Top Five Cyber Risks chart

  • Radar diagram showing gaps

  • CSF category scores (actual vs. target)

  • Business value justification

  • 3TCO analysis

  • Use signed Non-Disclosure Agreements (NDAs)

  • Work under attorney-client privilege where appropriate

  • Document all decisions and rationale for future reference

Summary Scorecard

NDA

13.28  Conclusion and Touchpoints

Prioritize Top Cyber Risks and Develop a Plan: By identifying and prioritizing your company’s top cyber risks, and developing a plan to manage them, you’ve taken crucial steps to protect your organization and its stakeholders.

Gain Buy-in: Secure support from decision-makers and employees, while ensuring the necessary budget is allocated for effective implementation.

Consequences of Inaction: Without these proactive changes, your company risks data loss, resource depletion, reputational damage, and even potential physical harm.

Transparent Communication: Learn from companies like AsusTek—many failed to communicate their cybersecurity breaches publicly. Use this plan to reduce breach risks and leverage incidents as opportunities to build trust with your customers.

Build Customer Confidence: By handling breaches transparently and effectively, you show your commitment to cybersecurity, strengthening customer confidence.

Ongoing Process: Cyber risk management isn’t a one-time effort. Continuously executing and improving your plan is key to long-term protection.

More Than Tools: Cybersecurity goes beyond tools and technology; it’s about consistently implementing best practices and staying ahead of risks.

Stay Vigilant: By staying vigilant and proactive, you can safeguard your organization, maintain customer trust, and minimize the impact of cyber threats.

Key Takeaways

Timeline: 60-Day Engagement Structure

  • Month 1: Risk identification through fieldwork

  • Month 2: Action planning and cost analysis

  • Day 60+: Executive approval and implementation begins

4 Change Management Essentials

  1. Force Field Analysis - Balance what drives vs. resists change

  2. Stakeholder Mapping - Engage based on power/interest levels

  3. Clear Vision - Make the compelling business case

  4. Measurable Results - KPIs prove value delivered

External Communication Must-Haves

  • One-page executive scorecard

  • Visual radar diagrams

  • Anonymous coding for security

  • NDAs for sensitive data

  • Version control for audit trails

Smart Implementation Approach

Two-Track System:

  • Track 1: Invisible backend changes

  • Track 2: Employee-facing changes requiring training

Prioritize Based On:

  • Size of security gaps

  • Business impact potential

  • Available resources

  • Organization's change capacity

Critical Success Factors

  1. Executive sponsorship is non-negotiable

  2. Data drives decisions (3TCO, risk scores, business value)

  3. Speak business language, not tech jargon

  4. Transparency builds trust through regular updates

  5. Quarterly checkpoints to measure, adjust, and celebrate wins

  6. Document everything for legal protection and future reference

Keep Reading