Cyber Security – Know Your ROI Making the Business Case for Cyber Security By Netta Schmeidler, VP Product at Morphisec ©Morphisec, 2016 | All rights reserved. What’s Inside? It may seem counterintuitive to talk about ROI and cyber security. After all, security doesn’t create earnings. But while security may not contribute revenue, loss prevention certainly impacts a company's bottom line. Cost avoidance is the implicit ROI of cyber security. Table of Contents 1: Costs of Cyberattacks on the Rise 2: The Time-Cost Relationship 3: Phase One: Before the Attack Precautionary Measures How much money can cyber security save your organization? The ultimate answer to this question is “it depends.” 3. 1: Patching: An Infinite Process It depends on how much a cyber attack would have cost your organization, which in turn depends on which system was attacked, what data was leaked, who was affected, and most importantly, how quickly the attack was brought under control. 4: Phase Two: Internal Disruption Analyzing a Suspected Compromise Every cyber attack – whether targeted or non-targeted – costs the attacked organization dearly. In this ebook we describe those costs, and how a majority of the expenses can be avoided. Investments in your organization’s security should stand up to the same scrutiny as all your business goals. This ebook shows how to calculate the implicit ROI of your organization’s cyber security initiatives. Read on! 3. 2: The Costs of Patching 4. 1: The Costs of Internal Disruptions 5: Phase Three: Post Attack - The Highest Price Tag 6: Attack Prevention or: How to Reap the Highest Implicit ROI 7: Take-A-Ways 8: How Morphisec Can Help 9: About the Author 10: About Morphisec 1 1: Costs of Cyberattacks on the Rise To calculate the cost of attacks on your organization, you need to consider both the tangible costs – actual money spent on containment and repair – as well as intangible costs such as operational disruption, brand damage, lost revenue and compromised assets. Oftentimes the intangibles exact a heavier toll on your enterprise than tangible expenses. Cyber criminals are upping both the number and the severity of their attacks. In its Global State of Information Security® Survey 2016, PwC found a 38% increase in incidents detected in 2015 over 2014, with theft of hard intellectual property increasing by an astounding 56%. This is up 13.9 percent (as measured in local currencies) over 2014, according to the Ponemon Institute’s 2015 Cost of Cyber Crime Study. And while the larger the organization, the greater the total breach cost, small organizations actually incur much higher per capita costs at $1,388 per seat vs. $431. Insurance giant Lloyd’s estimates that cyberattacks cost companies $400 billion every year. Finally, Cybersecurity Ventures predicts cybercrime will cost $6 trillion annually by 2021. During 2015, businesses fell victim to an average of 1.9 successful cyber attacks per week, racking up annual costs of $7.7 million. 2 2: The Time Cost Relationship Cyber attacks can be divided into three major phases – before an attack, while under attack and disruptions after the attack. Of course the two later phases may overlap, but for the purpose of this analysis we will treat them separately. The phases roughly correlate with the Cyber kill chain stages , but from the point of view of the organization rather than the attack. As we will show, there is a steeply increasing relationship between the time to contain an attack and organizational cost. Attack Timeline Before the attack – Under attack Internal Disruptions Precautionary Measures Attack starts Attack alert received via detection tools Post attack – External Disruptions Attack confirmed by analyst 3 3: Phase One: Before the Attack Precautionary Measures 3.1: Patching: An Infinite Process The complexity and often time-critical nature of even predictable patching places a significant burden on IT operations. It consigns your IT team to a reactive state, forcing them to continually play catch-up whether or not a vulnerability is actually Organizations employ many precautions and actions in the attempt to block cyber attacks. Such measures can require significant time and resources to implement as well as maintain. This class of tools includes end point security solutions such as anti-virus, protection and detection systems as well as gateway solutions. Every enterprise includes software patching as part of its security system to some extent. Because of its widespread use and marked impact on business processes, we will examine patching as an example of direct and indirect costs to your organization. exploited. Many organizations consider patching resource-intensive and ineffective, yet perform it on some level both for regulatory reasons and to avoid extended risk. Patching consists of the following steps: Obtaining the patch from a trusted party and validating patch and source integrity Testing the patch to ensure the vulnerability is remediated and the patch will not break other applications – a lengthy and laborious process Notifying affected parties of unscheduled downtime if needed Patch deployment Post-deployment operational efficiency testing Rollback and remediation if needed 4 3.2: The Costs of Patching To calculate how much patching costs your organization per year, use the following formula: Total Annual Patching Cost = [(Cost of Patching Event) * (Number of Patching Events)] + [(Prepare and Detect Costs) * (Number of Reported Vulnerabilities)] + (Total Annual Ongoing Costs) If you want to get to a more precise figure, take the real costs into account: Cost of Patching Event = (Fully Burdened Hourly Rate) * (Hourly Effort) Total Annual Ongoing Costs should include the cost of your Patch Management tools, contained in the above formula as “preparation and detection costs.” Using such tools, the hourly effort of end point patching is estimated at around eight hours per system per year, a total that includes assessment, assembly and testing, deployment, failure resolution and helpdesk. Numbers may vary, but with a total of 10 yearly patches on average, the costs for patching can reach several million dollars for a sizeable organization. And 10 yearly patches is a vast underestimation. Patching comes with a low ROI given its costliness and minimal effectiveness. 5 4: Phase 2 - Internal Disruption: Analyzing a Suspected Compromise The period of internal disruption is defined as the time between the moment your organization is notified of a potential attack and the time the attack is confirmed. The notification of an attack may occur in the following ways: Malware detection software sends multiple alerts to the organizational SIEM and the alerts pass the level defined for a potential attack by your organization. Usually this marks the beginning of a forensic analysis process, which ends as soon as the attack is confirmed. A direct manifestation of an attack, e.g. ransomware locks the machines and a ransom demand is posted. Such an occurrence is usually very close in time to the beginning of the attack – minutes to hours. The time period is then extended until ransom is paid and further on – until the organization believes all remnants of the attack had been take care of. Indirect manifestations of an attack, e.g. proprietary documents get leaked. Occurrences such as these can be seen weeks or even months after the initial attack. In this case the organization goes into security alert mode upon notification of the attack, however quarantine is usually partial, in the understanding that the organization is already compromised. An update to the anti-virus (AV) or similar system enters a new signature or pattern in the system’s repository, and the system discovers the signature in one or more of the organization’s end points. There is no clear indication that an attack was activated, so there is usually no business quarantine, but forensic analysis may be performed to understand internal ramifications, and patching level may be heightened. 6 4.1: The Costs of Internal Disruptions Costs during this phase include forensic efforts as well as the business loss due to quarantine and system downtime. Forensic Analysis Quarantine and Loss of Business Forensic analysis comes into play when there is a suspicion of an attack, through any of the previously described routes. During the attack containment phase, some or all Such analysis helps an organization understand whether an attack occurred, contain it as much as possible, assess its business implications and see how to avoid a similar attack in the future. Associated costs primarily consist of the salaries for internal forensic analysts or fees of external experts. These costs of course are greater the longer the analysis phase takes. Often an analysis concludes that no attack occurred. It is estimated that organizations spend over two thirds of their time and forensic budget on such false positives. levels of the organization may be affected. Any system even suspected of being affected must be quarantined until cleared. In ransomware attacks, data becomes inaccessible. Clearly, the longer the organization remains quarantined, the higher the organizational costs. Impacted are: Employees, who are unable to work when machines are quarantined. C-suite and management, who are unable to conduct business without machines and especially without data. Servers, that are unable to run business applications. Most organizations can quantify the cost of a loss of each business hour per server. 7 5: Phase Three: Post Attack The Highest Price Tag Including both tangible and intangible components, costs at the post-stage are the greatest in the attack lifecycle. If a cyber attack reaches this late stage of breach, the implicit ROI of any security solution is very low, since exceptional internal and external efforts are required to overcome the attack. Costs attributed to the Post Attack phase are: Loss of Business and Reputation Damage: If an attack on your organization hits the headlines, it can drive away prospects and customers. Cost calculations should include : Customer Churn – the assessed number of customers who will terminate their relationship as a result of the attack. Reduced customer acquisition – the assessed number of prospects who will drop out of the sales cycle or refuse to initiate a relationship with your organization because of the attack. Ransom Paid: In case of ransomware, organizations often prefer to pay the ransom in order to avoid negative publicity and loss of reputation and business. Financial losses for employees or customers: Employees’ or customers’ personal and financial details may be stolen, sold or published as a result of an attack. Affected persons need to take precautions, cancel payments and credit cards. Your organization will have to reimburse employees and compensate customers. Data Recovery: Attacks often cause data loss, requiring lengthy and costly recovery operations. In some cases data is not fully recovered and the loss of information creates severe business disruption. While data recovery costs can be quantified, it is harder to gauge the cost of lost information. 8 Business Disruptions: External remediation causes additional work to be performed and processes to be set up, such as: C-suite: Your executives spend time and resources in PR-related activities Customer support: Your customer support representatives spend vast amounts of time explaining the attack and its ramifications to customers. Most organizations can quantify these expenses using the internal ticketing system. Legal Process: Needed for customer compensation and employee reimbursements as well as assessing liability. In addition, some organizations are fined over regulatory issues discovered. 9 6: Attack Prevention Or: How to Reap the Highest Implicit ROI THE FASTER THE BETTER ELIMINATING FALSE POSITIVES To achieve the highest implicit ROI, you must aim to avoid the majority of the costs associated with a cyber breach. Reducing the period of internal disruption will also Looking at all of the cost calculations, it is easy to see that cyber security measures bring you the greatest ROI in the prevention phase. Research sponsored by IBM and independently conducted by Ponemon Institute LLC in May 2015 found a clear relationship between how quickly an organization can identify and contain data breach incidents and financial consequences. Costs rise the longer the internal disruption period extends. If an attack is stopped as it occurs, early in the kill chain, this time period is reduced to zero and no costs are incurred. add to your ROI on cyber security. This comes starkly into focus when we consider the high cost of analyzing false positives. This is where the difference between deterministic and heuristic protection and detection methods comes into play: With a heuristic method you get a probabilistic indication of an attack, and need to invest investigative efforts to corroborate or refute this assumption. Deterministic methods, however, clearly notify you that an attack has occurred and no further analysis is needed. 10 7. Take-A-Ways Cyber threats are as diverse as the organizations they aim to penetrate. Security countermeasures against those threats should be held to the same standards as all business decisions: whether the benefits outweigh the costs. Calculating the implicit ROI of a particular cyber security measure can be challenging, but all evidence demonstrates that the earlier you break the kill chain, the greater your cost avoidance. Preventing a threat from ever penetrating your organization translates into zero costs other than the cost of the prevention mechanism itself. Once a breach occurs, costs balloon due to the time and expense of analyzing and then remediating the threat. Phase Costs Implicit ROI of protection at this stage Pre-Attack Security solutions and Patching costs. Medium: Patching cycles can be stretched out when using Protection technologies. Internal Disruption phase: Between detecting an attack and confirming it Forensic analysis Business disruption for quarantine, until attack is confirmed. High: All costs are avoided if this time period is 0 when using deterministic prevention tools. Post-Attack Customer turnover Reduced customer acquisition Legal Ransomware Employees Low: Involves high costs which could have been avoided if attack was stopped earlier in the kill chain. Some still incurred if attack was detected post-attack. 11 8: How Morphisec Can Help Morphisec provides powerful software for enterprises concerned with advanced threats, zero-days, exploits, evasive malware, or protection gaps due to patching delays. It protects enterprise endpoints at the earliest stage of a cyber attack, using Moving Target Defense technology to effectively conceal vulnerabilities from attackers. Its polymorphic engine scrambles the application’s runtime environment, randomly and without any trace, every time an application is loaded, making the memory space unpredictable to attackers. Detection Post Breach Costs Morphisec Exploit Infiltration Reconnaissance Persistence Collection Exfiltration Stages of Targeted Attacks 12 About the Author: Netta Schmeidler Netta Schmeidler, VP Product at Morphisec, has more than 25 years of experience delivering complex enterprise applications and managing global development groups and product teams. Her broad expertise includes all aspects of defining, building and successfully bringing solutions to market, with special emphasis on IT cost-benefit analyses. Prior to Morphisec, Netta held senior product management and engineering roles at VMware (Digital Fuel), BMC, Identify Software, and Mercury. She received an MBA from Tel Aviv University, and a BSc in Computer Science from Hebrew University. Connect via LinkedIn 13 About Morphisec Emerging from the national cybersecurity center and from some of the sharpest cybersecurity minds in Israel, Morphisec provides the ultimate in threat prevention by making sure attackers never find the targets they seek. Morphisec’s Moving Target Defense technology Morphisec terminates the kill chain at its very onset, stopping and neutralizing zero-days, advanced attacks, evasive file-based and file-less malware, ransomware, APTs and web-borne exploits before they can do any damage. Morphisec fundamentally alters the cybersecurity Morphisec ETP prevents attack in real time, before any malware can execute. A security stack with Morphisec provides adequate protection alongside operational efficiency – no agents bloat, lower level of compatibility issues, low CPU drain, low level of false alerts, and low remediation costs. trace, every time an application is loaded, making camouflages your applications and web browsers and traps any attempts at access. Your endpoints, once a site of weakness, become an impenetrable defense. landscape with its moving target defense, which keeps defenders consistently ahead of attacks. Its polymorphic engine scrambles the application’s runtime environment, randomly and without any the memory space unpredictable to attackers. Morphisec prevents advanced, evasive attacks, and does so in a deterministic manner, with no false positives, via a lightweight, 1MB agent requiring no administration. Counter the terror of advanced cyberattacks: Schedule a demo with Morphisec today! 14
© Copyright 2026 Paperzz