{"id":241188,"date":"2017-06-08T00:41:29","date_gmt":"2017-06-08T04:41:29","guid":{"rendered":"http:\/\/www.eugenesis.com\/the-behavioral-economics-of-why-executives-underinvest-in-cybersecurity-harvard-business-review\/"},"modified":"2017-06-08T00:41:29","modified_gmt":"2017-06-08T04:41:29","slug":"the-behavioral-economics-of-why-executives-underinvest-in-cybersecurity-harvard-business-review","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/behavioral-science\/the-behavioral-economics-of-why-executives-underinvest-in-cybersecurity-harvard-business-review.php","title":{"rendered":"The Behavioral Economics of Why Executives Underinvest in Cybersecurity &#8211; Harvard Business Review"},"content":{"rendered":"<p><p>Executive Summary    <\/p>\n<p>    Human judgment is often biased in predictably problematic ways.    In the case of cybersecurity, some decision makers use the    wrong mental models to help them determine how much investment    is necessary. These mental models treat cybersecurity as a    finite problem that can be solved, rather than as the ongoing    process that it is. Our research points to steps that security    executives and other cybersecurity professionals can take to    work around CEOs human biases and motivate decision makers to    invest more in cyber infrastructure. Appeal to the emotions of    financial decision makers. Replace your CEOs mental model with    new success metrics. Survey your peers to help curb    overconfidence. You are the weakest link. By turning the lens    of behavioral science onto cybersecurity challenges, CISOs can    identify new ways to approach old problems, and maybe improve    their budgets at the same time.  <\/p>\n<p>    Determining the ROI for any cybersecurity investment, from    staff training to AI-enabled authentication managers, can best    be described as an enigma shrouded in mystery. The digital    threat landscape changes constantly, and its very difficult to    know the probability of any given attack succeeding  or how    big the potential losses might be. Even the known costs, such    as penalties for data breaches in highly regulated industries    like health care, are a small piece of the ROI calculation. In    the absence of good data, decision makers must use something    less than perfect to weigh the options: their judgment.  <\/p>\n<p>    But insights from behavioral economics and psychology show that    human judgment is often biased in predictably problematic ways.    In the case of cybersecurity, some decision makers use the    wrong mental models to help them determine how much investment    is necessary and where to invest. For example, they may think    about cyber defense as a fortification process  if you build    strong firewalls, with well-manned turrets, youll be able to    see the attacker from a mile away. Or they may assume that    complying with a security framework like NIST or FISMA is    sufficient security just check all the boxes and you can keep    pesky attackers at bay. They may also fail to consider the    counterfactual thinking  We didnt have a breach this    year, so we dont need to ramp up investment  when in    reality they probably either got lucky this year or are unaware    that a bad actor is lurking in their system, waiting to strike.  <\/p>\n<p>    The problem with these mental models is that they treat    cybersecurity as a finite problem that can be solved, rather    than as the ongoing process that it is. No matter how fortified    a firm may be, hackers, much like water, will find the cracks    in the wall. Thats why cybersecurity efforts have to focus on    risk management, not risk mitigation. But    this pessimistic outlook makes for a very tough sell. How can    security executives get around the misguided thinking that    leads to underinvestment, and secure the resources they need?  <\/p>\n<p>    Over the past year, my behavioral science research and design    firm, ideas42, has been interviewing experts across the    cybersecurity space and conducting extensive research to    identify human behavioral challenges at the levels of    engineers, end users, IT administrators, and executives. Weve    uncovered insights about why people put errors into code, fail    to install software updates, and poorly manage access    permissions. (We delve into these challenges in Deep Thought: A Cybersecurity Story, a    research-based novella.) Our findings point to steps that    security executives and other cybersecurity professionals can    take to work around CEOs human biases and motivate decision    makers to invest more in cyber infrastructure.  <\/p>\n<p>    Appeal to the emotions of financial decision    makers. The way that information is conveyed to us has    a huge effect on how we receive and act on it. For    cybersecurity professionals, its intuitive to describe cyber    risk in terms of the integrity and availability of data, or    with quantifiable metrics like packet loss, but these concepts    arent likely to resonate with decision makers who think about    risk very differently. Instead, cybersecurity professionals    should take into account peoples tendency to overweight    information that portrays consequences vividly and tugs at    their emotions. To leveragethis affect bias,    security professionals should explain cyber risk by using clear    narratives that connect to risk areas that high-level decision    makers are familiar with and already care deeply about. For    example, your companys risk areas may include customer data    loss as well as the regulatory costs and PR fallout that can    affect the companys reputation. Its not just about data    corruption  its also about how the bad data will reduce    operational efficiency and bring production lines to a    standstill.  <\/p>\n<p>    Replace your CEOs mental model with new success    metrics. Everyone uses mental models to distill    complexity into something manageable. Having the wrong    mental model about what a cybersecurity program is supposed to    do can be the difference between a thwarted attack and a    significant breach. Some CEOs may think that security    investments are for building an infrastructure, that creating a    fortified castle is all thats needed to keep a company safe.    With this mental picture, the goals of a financial decision    maker will always be oriented toward risk mitigation instead of    risk management.  <\/p>\n<p>    To get around this, CISOs should work with boards and financial    decision makers to reframe metrics for success in terms of the    number of vulnerabilities that are found and fixed. No    cybersecurity system will ever be impenetrable, so working to    find the cracks will shift leaders focus from building the    right system to building the right process.    Counterintuitively, a firms security team uncovering more    vulnerabilities should be considered a positive sign. All    systems have bugs, and all humans can be hacked, so treating    vulnerabilities as shortcomings will create an unintended    incentive for an internal security team to hide them. Recognize    that the stronger the security processes and team capabilities    are, the more vulnerabilities theyll discover (and be able to    fix).  <\/p>\n<p>    Survey your peers to help curb overconfidence.    Overconfidence is a pervasive bias, and it can be a big problem    if it clouds leaders judgment about cybersecurity investment.    Our research found that many C-level executives believe that    their own investments in cybersecurity are sufficient but that    few of their peers are investing enough (a belief that, given    how widespread it is, cant possible be true). One way that    CISOs can overcome a CEOs overconfidence is to compare the    companys performance with a baseline from similar firms  in    other words, confront the problem head-on. You can accomplish    this by regularly polling CISOs and executives about how well    organizations in your industry are managing cybersecurity    infrastructure, prompting them to be as specific as possible    about what theyare doing well and what theyre not, and    asking those same CISOs to help determine how well your own    firm is doing. This way, CISOs can provide clearer information    to CEOs about how they are actually performing relative to    their industry peers.  <\/p>\n<p>    You are the weakest link. In her essay    Regarding the Pain of Others, Susan Sontag wrote, To    photograph is to frame, and to frame is to exclude. Human    attention functions quite similarly. People concentrate on    certain aspects of information in their environment while    ignoring others; what a CEO chooses to invest in can be thought    of in a similar light. For instance, in the wake of a    newsworthy hack, CEOs may push their teams to ramp up    investment in cyber infrastructure to prot<br \/>\nect against external    threats. But in doing so they may be inattentive to unwitting    internal threats that may be just as costly  employees    clicking on bad links, or falling for phishing attacks.  <\/p>\n<p>    How can a CISO work around a decision makers inattention? No    one likes to be embarrassed, but negative feedback can    sometimes be an effective remedy for inattention. Security    teams should regularly try to break their own systems through    penetration testing, and the CEO should be the biggest target.    After all, thats how outside hackers would see it. By making    the CEO the victim of an internally initiated (and safe)    attack, it might be possible to draw their attention to    potential risks that already exist and motivate leaders to    increase their investment in cyber infrastructure.  <\/p>\n<p>    If the focus of cybersecurity programs continues to be on    designing better technologies to combat the growing menace of    cyberattacks, well continue to neglect the most important    aspect of security  the person in the middle. By turning the    lens of behavioral science onto cybersecurity challenges, CISOs    can identify new ways to approach old problems, and maybe    improve their budgets at the same time.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"https:\/\/hbr.org\/2017\/06\/the-behavioral-economics-of-why-executives-underinvest-in-cybersecurity\" title=\"The Behavioral Economics of Why Executives Underinvest in Cybersecurity - Harvard Business Review\">The Behavioral Economics of Why Executives Underinvest in Cybersecurity - Harvard Business Review<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Executive Summary Human judgment is often biased in predictably problematic ways. In the case of cybersecurity, some decision makers use the wrong mental models to help them determine how much investment is necessary.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/behavioral-science\/the-behavioral-economics-of-why-executives-underinvest-in-cybersecurity-harvard-business-review.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":57,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[577410],"tags":[],"class_list":["post-241188","post","type-post","status-publish","format-standard","hentry","category-behavioral-science"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/241188"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=241188"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/241188\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=241188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=241188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=241188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}