Week 7: Leveraging Users to Assess Risks


As much as we would like to be able to defend every part of our information systems environment to the utmost, at the end of the day organizations have limited resources and we need to prioritize our efforts. An important part of risk prioritization is determining the value of our various assets, so we can put a dollar figure on the threat posed by a given risk. As Whitman and Mattord discuss, we could use our sunk costs to determine the value of a given IT asset or determine the potential cost of replacement of the asset—but it is better if we can determine how much value the asset is adding for the organization and use that in our cost-benefit analysis.

Unfortunately, as IT professionals we know a lot about the costs to create or maintain a given asset or system but are not well-positioned to know how useful the system is at the end of the day. However, our users are much better positioned to know the value of a given asset—and we can leverage them to get that information. This could take the form of using formal organizational processes to generate a dollar figure to justify risk mitigation measures or defending the asset. On the other hand, if we are considering divesting an asset to terminate the risks it poses we could just as easily ask our users directly whether they depend on the asset—and in some organizations, that could turn into a request for the budget to replace or defend the asset.

When IT professionals build better relationships with our users, we not only benefit them by making ourselves more approachable and educating them, we can also benefit ourselves by better understanding how they use the assets we build, maintain, and defend.

Comments

Popular posts from this blog

Week 1: What is User-Centered Security?

Week 9: Selling Security Education, Training and Awareness Programs to Users