What is qualitative risk assessment in cyber security?

One of the key responsibilities of risk professionals is to provide actionable risk insights to enable the decision-makers to take strategic business decisions. For a long period of time, risk practitioners have relied on qualitative assessments – red, yellow, green heatmaps, or scale of 1 to 5, or high, medium, low ratings, and so on. And, they’re important too to understand the likelihood, severity, and impact of risks and the overall risk landscape.

However, qualitative risk assessments are greatly affected by the assessor’s bias and level of experience. Also, they are often vague and open to interpretation – if two different risks have been identified as red, does it mean both are equally high risk? How do we prioritize such risks and associated investment decisions? Or, in other words, how red is the red? Furthermore, the lurking modern, interconnected risks require more than qualitative analysis to identify its criticality and impact on business.

The subjectivity and ambiguity associated with qualitative risk assessments can be addressed with quantitative risk assessments. In today’s data-heavy environment, organizations largely rely on historical data and quantitative assessments for making strategic decisions as it helps to estimate the probable outcomes. Financial institutions have been quantifying financial risks, such as credit risk, market risk, liquidity risk etc., for times immemorial. Why not apply the same approach to quantifying non-financial risks, such as operational disruptions, compliance failures, misconduct, or technological challenges, or faced by organizations?

In this eBook, we will discuss risk assessment methodologies, both qualitative and quantitative, how to quantify non-financial risks, and more.
 

Disadvantages

  • It greatly depends on the knowledge and expertise of the assessor.
  • It could be influenced by assessor’s bias and perception.
  • The analysis becomes ambiguous when multiple risks fall into the same category.
  • It is not possible to perform cost benefit analysis and its subjective nature makes it difficult to accurately evaluate the effectiveness of controls.

2. Quantitative Risk Assessment

According to the International Risk Management Institute (IRMI), risk quantification is “forecasting of loss frequency and severity to make risk financing decisions. Dependable estimates of the likelihood and dollar amount of loss-causing events allow an organization to take appropriate steps now and in the future to minimize their financial impact.”

In simple words, risk quantification is associating a monetary value to risk. For example, while performing a risk assessment, an assessor calculates the annual loss expectancy (the potential loss due to risk in a year) of $1 million. This quantitative value brings clarity to risk professionals as to how much could be the loss if a risk becomes an event.

Advantages

  • It helps to accurately understand high risk areas and risk exposure in financial terms.
  • It provides realistic and actionable insights by presenting a range of outcomes compared to a single value.
  • It enables to easily prioritize various risks and related business decisions.
  • Associating a monetary value to risk enables CROs to effectively communicate risk exposure with the top management and board.

Disadvantages

  • The methodology is quite complex and requires advanced tools and experts.
  • The quantitative analysis needs to be backed by qualitative explanation else it could be misinterpreted.
  • It is highly dependent on the availability of reliable data.
  • It depends on the maturity of the risk function and might not be suitable for organizations of all sizes.
     

In the risk assessment process, one common question asked by organizations is whether to go with a quantitative or a qualitative approach. The good news is that by using both approaches cyber security professionals and consultants can, in fact, improve your process efficiency towards achieving desired security levels.

Qualitative Risk Assessment

In qualitative risk assessment, the focus is on interested parties’ perceptions about the probability of a risk occurring and its impact on relevant organizational aspects (e.g., financial, reputational, etc.). This perception is represented in scales such as “low – medium – high” or “1 – 2 – 3,” which are used to define risk’s final value.

Since it has little mathematical dependency (risk may be defined through a simple sum, multiplication, or other form of non-mathematical combination of probability and impact values), qualitative risk assessment is easy and quick to perform, allowing an organization to take advantage of a user’s experience with and knowledge of the process/asset being assessed.

What is qualitative risk assessment in cyber security?

One problem with qualitative assessment is that it is highly biased, both in terms of probability and impact definition, by those who perform it.

Quantitative Risk Assessment

Quantitative risk assessment focuses on factual and measurable data, and highly mathematical and computational bases, to calculate probability and impact values, normally expressing risk values in monetary terms, which makes its results useful outside the context of the assessment (loss of money is understandable for any business unit). To reach a monetary result, quantitative risk assessment often makes use of these concepts:

SLE (Single Loss Expectancy): money expected to be lost if the incident occurs one time.

ARO (Annual Rate of Occurrence): how many times in a one-year interval the incident is expected to occur.

ALE (Annual Loss Expectancy): money expected to be lost in one year considering SLE and ARO (ALE = SLE * ARO). For quantitative risk assessment, this is the risk value.

By relying on factual and measurable data, quantitative risk assessment has as its main benefits the presentation of very precise results about risk value, and the maximum investment that would make risk treatment worthwhile, so that it is profitable for the organization.

The problem with quantitative assessment is that in most cases, there is no sufficient data to be analyzed, or the number of variables involved is too high, making analysis impractical.

Quantitative assessment is the most thorough method of performing a risk analysis. This also makes it the most expensive and time-consuming method – and therefore not the ideal first choice for cash-strapped or enterprises with smaller teams for risk assessment and information security. Organizations requiring legal protection against suits or disclosures, needing to satisfy stringent requirements for regulatory compliance, or having to reconcile budgets with risk analysis findings are most likely to opt for Quantitative approach.

Risk Assessment – Balanced Approach (Pragmatic Approach)

In many cases, an approach combining aspects of qualitative and quantitative analysis is used to reap the benefits of both methodologies.

A qualitative assessment is made to identify the key risks facing an organization. From this list, a high level quantitative assessments are made to determine those risks most liable to cause financial or other losses to the enterprise – and the counter-measures best suited to mitigate their effects.

Once remediation has been done, a further detailed qualitative assessment may be performed, to determine how effective the remedial efforts have been in terms of putting a monitory value for business executives.

Organizations which are in lower spectrum of cyber security maturity model; i.e. in initial, developing or defined stage, the objective of risk assessment should be to identify top 20 percent risks that expose 80 percent of the organization or business, in simpler terms, the objective should be to identify and prioritize list of risks and focus on top risks for remediation. Often at lower stages of maturity the resources available for risk assessment and remediation are few and limited, it is recommended to conduct a quantitative risk assessment to identify top risks and focus on remediation.

As the organizations mature towards managed and optimized phases in their cyber security maturity curve; they have executive mandates to optimize investments and consider cost benefit analysis for further investments in cyber-security. It is to ensure the level of protection needed by an organization or asset or process is proportional to investment made in cyber security controls. Therefore organizations need to employ more scientific and mathematical risk assessment models like qualitative risk assessment, FAIR. 

As cyber security and risk advisory practitioner, I recommend organizations and professionals to at-least get the basic risk assessment and remediation process in place with qualitative approach and then slowly and steadily mature the risk assessment and management process with information and combined methodology. I work closely with critical sector organizations and government agencies to help them identify and develop risk assessment and management process.

Feel free to contact at for any further information or assistance you or your organization may require. I will be glad to collaborate and help information security community.