The Arithmetic of Risk

Institutions today are facing a rapidly growing challenge involving risk identification and risk management across multiple areas. A briefing published by the Association of Governing Boards lists four areas or risks that institutions must confront: traditional operational risk (e.g. weather disaster); legal and regulatory risk (e.g. litigation and compliance); financial risk (sudden decline in revenue); and political and reputational risk. Since this is a column dealing with emerging technologies, I will mention my constant concern with cybersecurity risks. But the reality is that this in itself points to the extraordinarily complex nature of risk management.

Of enormous concern is ensuring the privacy and security of our networks, systems, data and users’ identities. The challenge is in understanding the risks surrounding privacy and security, and how to operationalize a reasonable response. The only way to do so from a hypothetical perspective would be to eliminate existence and action. By definition, that would be to eliminate actions taken to pursue the institution’s mission and goals, and the ability to capitalize on them — things such as educating students and conducting research. Logically, this would mean that the vast majority of institutions would cease to exist.

Managing Risk

So how do we go about the business of risk management? The reality is that managing risk, including security, compliance and all its other aspects, is a balancing act. Further, this balancing act is as much informed by judgment and intuition as it is by actual data. To move the needle that could theoretically increase security and simultaneously lower risk, takes resources — lots of resources.

Because nearly all of us work at institutions where resources are limited, we are required to find a point of reasonableness. The question is how much to spend on preventive measures and how much to spend on recoverability, should a risk manifest into an actual incident. This is a difficult proposition, which occurs in the context of imperfect data and a highly dynamic external environment. Concerning cybersecurity, the hard reality is that building a hardened, secure, bulletproof environment is unachievable. If the experiences of numerous disastrous breaches over the past few years have taught us anything, it is this: Even the best can be beaten on any given day, and we are all subject to becoming a potential target.

This is a challenge we are all dealing with, and increasingly in a collaborative way across sectors including business, government, healthcare and higher education. In this spirit of collaboration, I would offer several important considerations.

Steps to Take

First, ensure you have solid professionals at the controls of your cyber defenses. This is not a role for amateurs, and no place to try and save a few salary dollars. Second, invest in reasonable cybersecurity technology. Make your environment a difficult target to penetrate by implementing effective countermeasures. They aren’t cheap, but in the scheme of things they are certainly justified. Even hackers deal with the cost-benefit question of which targets to spend their time on.

EDUCAUSE (2014) cites a crucial consideration that represents the third recommendation: communication and end-user management. Humans, including students, employees and contractors, are among the most problematic challenges for cybersecurity. Take steps to ensure they understand and accept the responsibilities of living and working in a networked world.

Fourth, monitor, manage, monitor. Simply putting countermeasures in place is ineffective. Attacks occur constantly. It is reported that half a million attacks occur in cyberspace every minute. Awareness of the types of attacks, appropriate management and updating of technology, and quickly responding to incidents such as spear phishing are among the essential ongoing activities required. Fifth, proactively engage partners to evaluate your security posture through penetration testing and other means. Better to be hacked by a friend than an enemy.

Sixth, plan for recoverability. Current wisdom is that it is not whether an organization gets hacked; it is only a matter of when. News reports would support this. Cyber liability insurance, validated and secured data backups, and business continuity capabilities should all be in place for what will be for some the inevitable attack that succeeds.

As noted in a Harvard Business Review (2012) article, risk is difficult to talk about and many leaders don’t want to spend money on risk mitigation “when the sun is shining.” Our lot in higher education is made more difficult because “the arithmetic of risk” doesn’t operate as favorably as it would in many sectors. But risk identification, risk management and planned recoverability are essential requirements for the world in which we live and work.

You could ask those who didn’t take this seriously enough, but some may no longer be around to answer.

This article originally appeared in the issue of .

About the Author

David W. Dodd is vice president of Information Technology and CIO at the Stevens Institute of Technology in Hoboken, NJ. He can be reached at 201/216-5491 or [email protected].

Featured

  • Howard Community College President Joins National Research Council

    Howard Community College President Daria J. Willis was recently appointed to the American Association of Community Colleges (AACC) Commission on Research and Community College Trends and Issues, according to a news release.

  • KI Launches K–12 Classroom Furniture Giveaway

    Contract furniture company KI recently announced the launch of its fourth-annual Classroom Furniture Giveaway, which awards $50,000 each to four K–12 educators across the U.S., according to a news release. The goal is to address decreasing student engagement and increasing teacher burnout numbers by updating learning spaces to accommodate modern needs.

  • Anderson Brulé Architects Rebrands as ABA Studios

    Anderson Brulé Architects, based in San Jose, Calif., recently announced that it is celebrating 40 years of service by rebranding under a new name, according to a news release. The architectural, interior design, and planning firm will now be known as ABA Studios to refresh its identity underneath a new generation of leadership.

  • UCNJ Launches $30M Modernization of Physical Education Center

    The Union College of Union County (UCNJ) in Cranford, N.J., recently broke ground on a new $30-million modernization project for its Physical Education Center (PECK), according to a news release. The college partnered with DIGroup Architecture for the project’s design, transitioning the existing 42,000-square-foot structure into a campus hub for student athletics and campus life.

Digital Edition