How to calculate your risk appetite: Accepting the impossibility of flawless IT security

A dial against a red background labeled "Risk" with a range of low to high. The dial is set midway between the two extremes.In the world of cybersecurity, the pursuit of perfection is a futile endeavor. You could devote every last cent of your company’s budget to fending off threats and still get hacked tomorrow, Gartner Distinguished VP Analyst Paul Proctor explained in a webinar titled “Treat Cybersecurity as a Business Investment for Better Outcomes.”

He went on to note that when auditors determine penalties following a breach, they’re aware that “everybody gets hacked.” It’s impossible to avoid the relentless flood of cybercrime: The global volume of cyberattacks hit a new record high in the fourth quarter of 2022, reaching 1,168 weekly cyberattacks per organization on average, according to Check Point Research.

With everyone facing a bombardment of attacks, what matters to regulators is the CARE standard – i.e., having security controls that are consistent, adequate, reasonable, and effective.

“It’s not about whether you get hacked or not,” Proctor said. “It’s about whether you have the right level of protection.”

Finding that ideal level involves calculating your organization’s “risk appetite.” However, many businesses don’t have a proper scale to measure how much IT security risk they’re willing and able to stomach. If you haven’t yet assessed your appetite, here’s everything you need to know about defining it and why it’s a crucial part of your cybersecurity strategy.

What is risk appetite and why does it matter?

Risk appetite is “the amount of risk an entity (i.e., enterprise, organizations, public or private organizations) is willing to take to achieve its strategic objectives,” according to the ISACA article “Tips for Setting or Evaluating Risk Appetite” by Lisa Young, CISA, CISM, CISSP, a senior metrics engineer at Netflix and (ISC)² Board of Directors member.

Effective enterprise risk management involves crafting a risk appetite statement at a high level for your company. You must clearly communicate this statement across the organization and serve as a framework for making decisions and policies, establishing boundaries for reasonable behavior that balances taking risks with achieving desired outcomes. It will also help your company prove to regulators that you’ve taken steps to proactively manage IT security risks, according to the McKinsey & Company article “Creating a technology risk and cyber risk appetite framework.”

Similarly, the Factor Analysis of Information Risk (FAIR) TM  Institute states that risk appetite is an acceptable “target level of loss exposure” for your organization, taking your resources and goals into account. Meanwhile, “risk tolerance” is the amount of variance you’ll accept from your defined risk appetite. Your risk appetite is like a speed limit on the highway, whereas the risk tolerance is the amount you can drive over or under the limit (e.g., 5 miles per hour) without receiving a ticket, according to the FAIR Institute.

Determining your cybersecurity risk appetite: 9 key factors to consider

When you define your company’s risk appetite, you should consider the following crucial factors, according to McKinsey & Company, ISACA, and the FAIR Institute.

  1. Your current cyber insurance coverage
  2. The maximum amount of downtime tolerable for each business-critical system
  3. The maximum number of confidential records you’re willing to accept exposure of in the event of a data breach
  4. The impact of previous significant security incidents affecting your organization
  5. The maximum total financial loss acceptable for your business
  6. Regulatory compliance requirements
  7. Potential health and safety impacts of security incidents
  8. High-level organizational objectives that you must balance with security
  9. Overall capabilities to enforce your risk appetite and security controls

Lighten the workload with managed security services

Effectively managing security risks can prove incredibly challenging, given how quickly the cybersecurity solution and threat landscapes change. Working with a third-party security service provider to define your risk appetite and tolerance can lessen the workload for your in-house IT and cybersecurity staff and ensure you have access to cutting-edge solutions and expertise. With our background as a former managed security service provider (MSSP), we can leverage our experience and extensive partner network to streamline the process of finding a partner capable of meeting your organization’s unique needs. Instead of spending dozens of hours researching your options and arranging demos and meetings, let us do all the homework for you.

Take the first step toward enhanced security today by calling 877-599-3999 or emailing sales@stratospherenetworks.com to schedule a meeting with our consultants.

Contact Us

We will handle your contact details in line with our Privacy Policy. If you prefer not to receive marketing emails from Stratosphere Networks, you can optout of all marketing communications or customize your preferences here.