What is it?
An ongoing process to define an organization’s risk and threat environment as it relates to its people, processes, policies, and technology.
Why is it important?
Situational awareness provides the foundation upon which to build a strategy for all other activities related to safeguarding your information and reducing cybersecurity risks. Every organization is unique in its mission, culture, and function; therefore, effective risk management requires that business professionals maintain situational awareness to ensure proper focus and perspective.
Why does a business professional need to know this?
The success of any cybersecurity risk management program depends on the ability of an organization to protect information and digital assets. In order to define a cybersecurity risk strategy, business professionals and cybersecurity specialists must understand the environment their organization operates in. In other words, they must have good situational awareness of their environment.
The situational awareness process considers all aspects of an organization from supply chain to information technology in relation to potential cybersecurity vulnerabilities and threats. For example, what would be the impact on your organization if you lost critical privacy or intellectual property? Would such a loss require operations to cease for a period of time or even permanently? Can you manage the operational impact?
If you attempt to define a risk management program without good situational awareness, you are likely to waste resources on strategies and safeguards that either do not achieve an optimal Return on Investment (ROI) or are ineffective.
2013, the danger of losing situational awareness became clear to the department store chain Target when the company’s vendor system was breached, costing the retailer millions of dollars and damaging its reputation(Abrams 2017)(Kassner 2015). Vendors often have access rights to intellectual property, privacy data, and information systems across multiple business units and functions. Understanding their role in your environment is key to developing an effective strategy to manage cybersecurity risks.
References
- (Abrams 2017) Target to Pay $18.5 Million to 47 States in Security Breach Settlement: Abrams, Rachel (2017). The New York Times. Details the $18.5 million settlement Target was ordered to pay as a result of a major data breach that exposed the names, credit card numbers, and other personal information about tens of millions of people in 2013. Includes details on the financial impact the breach had on the popular US-based retailer.
- (Kassner 2015) Anatomy of the Target data breach: Missed opportunities and lessons learned: Kassner, Michael (2015). ZDNet. Examines how the Target data breach might have happened and what the retailer could have done to prevent the hack.
- (Stewart 2012) A Practical Guide to Situational Awareness: Stewart, Scott (2012). WorldView. Discusses the basics of situational awareness and suggests how to help users develop a cybersecurity mindset (the “right level of awareness”) so they can spot threats and report them.
- (Jackson 2017) Why a Long-Term Data Strategy is Essential to Stopping Insider Threats: Jackson, William (2017). GovTech Works. Argues for a long-term strategy designed to safeguard personal and other sensitive information that strikes a good balance between access and cost.