Should We Apply Statistics to Cybersecurity Risk Decisions?

ACM.2 Considering different methods of risk analysis

Teri Radichel
Cloud Security

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: Cybersecurity | Cybersecurity Math | Governance

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

https://en.wikipedia.org/wiki/File:Standard_Normal_Distribution.png

In the last post I reviewed a book How to Measure Anything in Cybersecurity Risk. I listened to parts of it again while researching and writing this blog post.

The book covers various formulas and methods to calculate the probability of whether or not an organization is likely to have a data breach.

While listening to the methods in this book I had three questions:

1. How accurate are the methods recommended in this book?2. Do the methods…

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award