
How to Measure Security ROI? 64
UM_Maverick asks: "Does anybody out there have any experience measuring Return on Investment for security-related expenditures? For example, if management says that there's $1 million left in the budget, and you can either implement a new customer tracking system that is projected to save $300k per year, or implement a new security technology or process, how do you measure the return on the security spend, and convince them that it's at least worth considering? Googling for 'Measuring Security ROI' seems to just produce a list of articles that say 'Measuring security ROI is difficult.' Does anybody have some more direct experience or information?"
Instead of a lump sum... (Score:2, Insightful)
If you buy a "1 million$" security infrastructure, you WILL miss something. Instead, build the security from the ground up, paired with each node.
If you have to "pay for it now", you're already too late.
Re: (Score:2)
My optometrist told me a lesson he once learned as a brand new army lieutenant, from a seasoned seargent: If you do not spend your budget, it will get cut. If you do not ask for more next year, you will likely not get last year's level of funding.
Basically, submitter has to make do with the resources they a
Re: (Score:2)
Re: (Score:2)
When you infrastructure already exists (and might date back 10 or more years in parts), building from the ground up is not an option. And I'd bet the poster isn't planning on going out and buying the "Securalizer 5000", but rather talking about an investment in updated firewalls, spam filters, SSL gateways, network infrastructure, etc. In some shops $1 million might buy port level authentication in a new chassis Gigabit infrastructure w
Potential Damage (Score:3, Insightful)
Then you can at least put a price on not being secure, and let management make a somewhat informed decision.
Re:Potential Damage, aka Risk Management (Score:2)
I would start with figuring out what it would cost to fix broken systems, downtime, etc.
Right on!
This is not a situation that can be analyzed in terms of ROI; ROI is the wrong tool for this work. Writer of TFA should check out "Risk Management" [wikipedia.org] for a start. That is what you want to be doing: providing the corporate officers with a report that says "Here are the risks measured in dollars of potential loss; here are the odds we face on each of the risks; here are some strategies we could use to mitigate these risks; and here are the costs of adopting each of the strategies".
If I was thinki
Proving a negative (Score:4, Insightful)
Your benchmarks are what type of security issues you do encounter and how they are handled. For example, if a security package catches would-be intruders, that can be shown as a sort of ROI (as the package prevented X dollars of loss.) Another example is the cost of whole disk encryption. Having a laptop that is protected by WDE get lost, one could state that the encryption software (assuming its properly deployed, proper password and/or security token policies set, etc.) saved the company the loss of the data on the laptop.
Probably the best bet in proving ROI is how many, what type of, and the cost of, the breaches and incidents one had before a policy/software/infrastructure went into place versus afterwards.
Re: (Score:2)
I'd take a lazy approach to security. As fun as it is being paranoid about my own server security, it's my time and money that gets spent on that project. If you're in an industry that has specific security requirements (e.g. VISA, SOX), then there's an obvious cost: the ongoing cost of paying the fines of non-compliance. In the case of VISA, you may even be forced to stop accepting credit cards if you were to fail an audit.
Is security an ongoing problem or a theoret
Risk math (Score:5, Informative)
The cost of a security breach is measured as the probability of an incident multiplied by the cost of the incident. Both numbers can be calculated surprisingly well, or at least made to sound plausible. Security software will reduce the probability of an incident. Calculate the difference. If it exceeds the cost implementing security, it's a good thing.
This is a basic formula used for all types of data security, including backup and disaster planning.
Re: (Score:2)
Re:Risk math: Not Math (Score:4, Insightful)
Re: (Score:2, Informative)
Shortcut - just reach behind (Score:3, Insightful)
There is no security ROI. It is loss-av
Re: (Score:2)
This man should be modded up.
His last line says it all : IT IS INSURANCE!
One way of doing things (Score:1, Interesting)
equipment for forensics evidence, then pipe up and say that THIS WAS A DRILL...and let everyone go back on about their business. Once you are faced by the boss to explain your actions....just say that had this
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
muahahahahaha!
Actualy, the idea the gpp put up is a horrible one. An imporptu 'drill' (espcialy one that gets the cops involved) will get you fired, and possibly in legal problems.
The better way of doing this is to write up a GOOD report, and explain the probability of such things happening.
Ofcourse, as the PP pointed out, when most techies talk about security, they are not reffering to physical security, they are reffering to every
Re: (Score:1)
Re:One way of doing things (Score:4, Insightful)
In any case, if you worked for me and pulled a stunt like that I'd be starting to look for your replacement asap: I pay you to do your job, not to prevent other people from doing theirs.
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
A determined D
Re: (Score:1)
I just don't have the time to respond to each reader that doesn't grasp the concept laid here.
Please don't take this as a post directly to your post, although some of it might hold true
to answer some daunting comments.
I am guessing that with the many posts I got concerning my job, as it is what I do for a living,
I am stupefied as to how many people can't read in todays society. Someone even accused me of being in high school.....yet he finish
time to reset passwords (Score:2)
Audit (Score:2)
Simple (Score:2, Informative)
(([Total Cost of Intrustion] * [Percentage Chance of Intrustion]) / [Costs of Security Measures]) - 1 = [ROI]
(($5,000,000 * .10) / $100,000) - 1 = 4
Re: (Score:1)
Re: (Score:3, Informative)
That's where the problem is in this whole issue. How much will it cost if we get owned, and how likely is it that we will get owned? If you can calculate those two data points accurately, then yes, it's easy as pie to figure out your ROI, but the problem is that figuring out the former, requires the services of a mind reader, and the latter requires the knowled
Actuarial data (Score:2)
Insurance companies can tell you how likely a fire is and how much it costs to clean up and rebuild after one. They have the numbers to justify "loss prevention programs" and to justify giving you discounts for alarm systems. Finance people know all about this.
For security incidents those numbers simply aren't available. It's hard to cover up a fire, but lots of places hush up security events. The costs are partly intangible (how do you put a
Re: (Score:2)
ROI is a badly broken way to look at security.
Re: (Score:3, Interesting)
There is a way to get a concept of the chance of a successful intrusion. There are actuaries that do create this data. Garner may be able provide a good benchmark, as can some industry associations. Heck, insurance companies probably are collecting good data to get a predictor.
I paid garner for a research paper to justify the purchase of one SAN solution over another. The second solution went TU a year later. I have met the guys who write the reports. They are pretty smart guys.
Security is a Vague Term (Score:4, Informative)
Spending money on "security" can mean a whole lot of different things. What type of security? What are you trying to prevent? I work at a company that produces certain security products, some of which have other applications as well. When you hand the CEO a nice graph of the DDoS attack that you got your ISP to filter for you when you subscribed to their service, show how many hours of downtime it prevented, and how much money went through the online store during that time, proving ROI is fairly easy. Other kinds of security are fuzzier. Stopping worms within your network saved IT X hours of rebuilding PCs and prevented those machines from being down this many hours times the average worker's hourly rate would have been unable to work during that time etc. and you can provide some estimates.
Before you get to that stage, however, you need to have specific security measures in mind designed to address specific security threats to your business. Some of these measures are easy to justify (need certification to do business with government agency Foo) and some are hard (better passwords make it harder for insiders to steal our customer database and sell it to Russian hackers who then use it causing a publicity problem and resulting lost customers).
Nuke it from orbit.... (Score:2, Funny)
Potential cost of breech (Score:3, Interesting)
i.e. If you are running a business that keeps SSNs, bank data or some other sensitive data you would factor in the cost of how many customers times how much it would cost if thier personal information were compromised. If you are in design/manufacturing, you could factor in R&D/loss of contract costs if designs were taken, etc. (not to mention press coverage and effects on future customers and the stock market for public companies.)
Also get any stories of breeches to a similar IT installation to show example that there is an issue.
It's not really an 'investment' as much as a reduction of liability, if the potential liability is less than the cost of the security it is a hard sell. But most likely it will be a fraction of the potential liability without it and even if you do get a breech after the security update it looks a whole lot better to clinets, the public and the press if you show a track record for keeping your security up to date.
Re: (Score:2)
FYI: you seem to be alternating your spelling of "breach" and "breech." You want the former. The latter applies to the rear-end of your pants. Note, I'm not normally a spelling Nazi and feel free to ignore this comment as it is certainly off topic.
Re: (Score:2)
I guess it's "no mod points for me!"
Security is not an add-on (Score:2)
Security isn't an add-on in this way, and it will (currently) always be bad advice to "invest extra $X in security". Security ROI only really becomes useful when you have decisions like: "We need X security, what is the best ROI solution".
Also consider that there is a large fuzz
Security ROI (Score:2, Informative)
Re: (Score:2)
For every piece of perfect planning, there will be an idiot who opens a hole in your security that you could never have forseen in your preplanning. It's better to have a system that is simple and
Good question (Score:1)
No such thing as Security ROI (Score:1)
AFAIK, you consider security the same way you consider insurance (or as an insurance complement): How much your business continuity's worth? Should you be hacked/DDoSed, ho
Expected value (Score:2)
So in this case the value of the security software is:
(1 - Pb) * 0 + Pb * VA
Where:
Pb = probability that it saves you from getting broken into
0 = value if you don't get broken into
VA = value of your ass
Eleventy-billion dollars... (Score:1)
If you can say "We could buy this system which severely decreases the chances of X happening. When X happened to Bob, Inc. they lost eleventy-billion dollars in re
Try contacting those with prior experience (Score:2)
Re: (Score:2)
Better search term... (Score:3, Interesting)
To a lesser extent "Decision Science" and "Influence Diagram" are also attempts at tackling this type of problem.
Google scholar will turn up many papers in this area and I know that my school (University of Virginia in the Systems and Information Engineering department) has some active research in "Cyber Security" and related security planning.
http://www.sys.virginia.edu/risk/ [virginia.edu]
What kind of security? (Score:2)
Antivirus software attempts to substitute for user education, and sometimes slows down systems, reducing productivity. But some users never learn.
IDS software warns you about threats that should have been blocked by proper configuration. Except that it's nice to find out when an employee brings their virus infected laptop in and connects to your network, maps network shares, etc. I always figured Snort was the best IDS out
Same as for insurances (Score:2)
Unfortunately (or thankfully), a lot of companies don't have experience with a case actually happening, so they can't easily figure out the probability. The threat of viruses/trojans is actually more important for many companies these days than an actual targeted attack (unless they guard some important business secrets in their servers). The chance of this happening can be gotten fairly easily from a security company, they usually have the numbers. The cost pe
Think Risk Management not ROi (Score:2, Insightful)
That puts you into Risk Management analays, not Return on investment.
Think of it like going without insurance, worker injury prevention, or other loss prevention/mitigation.
provide examples relevant to your business (Score:2)
addressed by the new thingum. google around for household names with breaches like so:
http://www.itworldcanada.com/a/Enterprise-Infrastr ucture/33200565-b133-4eed-8c05-c6f35f8f60b6.html [itworldcanada.com]
That article talks about basic things like establishing a perimeter. IF your company does not have a decent DMZ defined,and proper
safeguards wrt Intrusion detection, and properly walling off remote services
The same way the insurance industry does it (Score:2)
Hire an actuary.
(Though I have no idea where you'd find an actuary who would be able to answer your question.)
Methodologies for security risk analysis, etc. (Score:3, Informative)
Information Security budgeting.
Principles of Information Security [amazon.com] is one book that I'm familiar with that has quite a bit of coverage of this topic. We used this for my course in Information Security a couple of years ago, and I found it pretty useful, FWIW.
Additionally, check this OWASP Page [owasp.org] for some good stuff.
And finally, try googling for terms like Security Risk Analysis [google.com], Security Risk Assessment [google.com], and / or Security Threat Modeling [google.com].
Re: (Score:1)
http://www.rcmp-grc.gc.ca/tsb/pubs/it_sec/index_e. htm [rcmp-grc.gc.ca]
This approach is process oriented and not focused on specific technologies. The date on the guide is 1994 and it is still in common use, so it has stood the test of time.
I
ROI inappropriate in this context (Score:2)
ROI. Wonderful buzzword, usually meaning "I don't have a clue what I'm talking about but I want to sound impressive".
Put simply you can't earn a return on a cost, only on an asset. Investment doesn't mean "put money into it", it means capital expenditure to acquire an asset. You invest on the basis of an expected return at a given level of risk associated with the asset. ROI is one of the measures that can be used to assess the attractiveness of the investment.
These are definitions. You can't subst
ROI is a crappy measure, use something else (Score:1)