The Arithmetic of Risk

Institutions today are facing a rapidly growing challenge involving risk identification and risk management across multiple areas. A briefing published by the Association of Governing Boards lists four areas or risks that institutions must confront: traditional operational risk (e.g. weather disaster); legal and regulatory risk (e.g. litigation and compliance); financial risk (sudden decline in revenue); and political and reputational risk. Since this is a column dealing with emerging technologies, I will mention my constant concern with cybersecurity risks. But the reality is that this in itself points to the extraordinarily complex nature of risk management.

Of enormous concern is ensuring the privacy and security of our networks, systems, data and users’ identities. The challenge is in understanding the risks surrounding privacy and security, and how to operationalize a reasonable response. The only way to do so from a hypothetical perspective would be to eliminate existence and action. By definition, that would be to eliminate actions taken to pursue the institution’s mission and goals, and the ability to capitalize on them — things such as educating students and conducting research. Logically, this would mean that the vast majority of institutions would cease to exist.

Managing Risk

So how do we go about the business of risk management? The reality is that managing risk, including security, compliance and all its other aspects, is a balancing act. Further, this balancing act is as much informed by judgment and intuition as it is by actual data. To move the needle that could theoretically increase security and simultaneously lower risk, takes resources — lots of resources.

Because nearly all of us work at institutions where resources are limited, we are required to find a point of reasonableness. The question is how much to spend on preventive measures and how much to spend on recoverability, should a risk manifest into an actual incident. This is a difficult proposition, which occurs in the context of imperfect data and a highly dynamic external environment. Concerning cybersecurity, the hard reality is that building a hardened, secure, bulletproof environment is unachievable. If the experiences of numerous disastrous breaches over the past few years have taught us anything, it is this: Even the best can be beaten on any given day, and we are all subject to becoming a potential target.

This is a challenge we are all dealing with, and increasingly in a collaborative way across sectors including business, government, healthcare and higher education. In this spirit of collaboration, I would offer several important considerations.

Steps to Take

First, ensure you have solid professionals at the controls of your cyber defenses. This is not a role for amateurs, and no place to try and save a few salary dollars. Second, invest in reasonable cybersecurity technology. Make your environment a difficult target to penetrate by implementing effective countermeasures. They aren’t cheap, but in the scheme of things they are certainly justified. Even hackers deal with the cost-benefit question of which targets to spend their time on.

EDUCAUSE (2014) cites a crucial consideration that represents the third recommendation: communication and end-user management. Humans, including students, employees and contractors, are among the most problematic challenges for cybersecurity. Take steps to ensure they understand and accept the responsibilities of living and working in a networked world.

Fourth, monitor, manage, monitor. Simply putting countermeasures in place is ineffective. Attacks occur constantly. It is reported that half a million attacks occur in cyberspace every minute. Awareness of the types of attacks, appropriate management and updating of technology, and quickly responding to incidents such as spear phishing are among the essential ongoing activities required. Fifth, proactively engage partners to evaluate your security posture through penetration testing and other means. Better to be hacked by a friend than an enemy.

Sixth, plan for recoverability. Current wisdom is that it is not whether an organization gets hacked; it is only a matter of when. News reports would support this. Cyber liability insurance, validated and secured data backups, and business continuity capabilities should all be in place for what will be for some the inevitable attack that succeeds.

As noted in a Harvard Business Review (2012) article, risk is difficult to talk about and many leaders don’t want to spend money on risk mitigation “when the sun is shining.” Our lot in higher education is made more difficult because “the arithmetic of risk” doesn’t operate as favorably as it would in many sectors. But risk identification, risk management and planned recoverability are essential requirements for the world in which we live and work.

You could ask those who didn’t take this seriously enough, but some may no longer be around to answer.

This article originally appeared in the issue of .

About the Author

David W. Dodd is vice president of Information Technology and CIO at the Stevens Institute of Technology in Hoboken, NJ. He can be reached at 201/216-5491 or [email protected].

Featured

  • American University Launches Sustainability Research Project

    American University in Washington, D.C., recently began a research project exploring the relationship between purchase decisions for university campuses and sustainability, according to a news release. The study seeks to explore how “greening” the purchases involved in student housing renovations, breaking ground on new facilities, buying new equipment and supplies, and more, can foster larger sustainability goals.

  • Michigan School District Installs New Gun-Detection Platform

    Williamston Community Schools in Williamston, Mich., recently announced that it has installed the ZeroEyes gun-detection video analytics platform for its five schools, according to a news release. ZeroEyes is the only solution of its kind with a U.S. Department of Homeland Security SAFETY Act Designation and adds an AI gun-detection and intelligent situational awareness software layer into existing school security cameras.

  • Craig Gaulden Davis Architecture Announces Merger with PBK

    Craig Gaulden Davis Architecture (CGD), based in South Carolina and Maryland, recently announced that it has merged with PBK, the largest K–12 architectural firm in the U.S., according to a news release. The firm will operate as Craig Gaulden Davis | PBK with 31 offices across the country.

  • Understanding the Training of School Resource Officers

    SROs are now integral components of nearly every educational system in the country. But instead of being a more passive entity in schools, they have gradually become mentors to students, adding to their support network of teachers, parents, coaches, and other caring adults.