In Defence of Maturity-based Approaches for Cyber Security

JC Gaillard
Jan 6 · 3 min read
Image for post
Image for postImage for post

It doesn’t make sense to oppose maturity & risk-based approaches to cyber security

This interesting piece from McKinsey made me think and deserves some comments: “The risk-based approach to cybersecurity” (Jim Boehm, Nick Curcio, Peter Merrath, Lucy Shenton, and Tobias Stähle — October 2019).

The risk-based approach itself which it promotes has solid foundations, and in fact is nothing new. Actually, it echoes in many ways the model we — at Corix Partners — have been developing and delivering with clients and associates for the past 10 years

But I don’t think it makes sense — or indeed helps the industry move forward — to oppose maturity-based approaches and risk-based approaches. And the characterization of maturity-based models as “a dog that had its day” is frankly excessive.

The assumption that risk-based approaches are somehow more advanced than maturity-based ones, and represent an “evolution” of cyber security practices is highly disputable, and the quantification of maturity-based approaches as leading to over-engineering and over-spending by a factor 3 compared to risk-based approaches is simply misleading (a foot note actually refers to the costs mentioned as “illustrative and extrapolated from real-world examples and estimates”).

As a matter of fact, those two approaches are just different ways of managing, driving and measuring action around cyber security in different situations and different firms. One does not have to be superior to the other.

The keys are elsewhere: The approach one firm decides to follow has to be right in relation to the firm’s management and governance culture, and its objectives around cyber security. Those will vary naturally from one organization to another, and from one management team to the next.

One trend we are observing more and more is actually the weakening of traditional risk and compliance drivers around cyber security with senior executives. The “when-not-if” paradigm around cyber-attacks is strongly taking root in many boardrooms, and many firms are committing very large amounts to large-scale transformative security programmes; but in return, the board expects execution and protection, and are holding CIOs and CISOs accountable for both.

In those situations, risk often goes to the background, delivery takes centre-stage, and maturity-based approaches generally work well, as long as they revolve around a clear set of capabilities to be developed through the delivery of clear tangible actions to achieve a clear target maturity level.

This is not an approach which will work well only in situations where initial maturity levels are low: It can continue to work throughout the maturity spectrum up to advanced levels. And as long as the capabilities and the actions required to develop them are backed against the firm’s objective around cyber security and the real threats it is facing, there is no reason to assume that it would lead to a greater degree of over-engineering — and over-spending — compared to other approaches.

As a matter of fact, whether a firm takes a maturity-driven route or a risk-driven route to ensure it is well protected from cyber threats, none of that changes the nature, the reality or the virulence of those threats, and as a result, the nature of the measures the firm needs to have in place to be well protected. Those necessary protective measures may end-up ordered or prioritised differently, in order to improve maturity or reduce risk, but barring political manipulation by stakeholders, they will be the same and will cost the same.

The chosen approach simply needs to be right to give the executives in charge the levers they need to understand and manage the firm’s cyber security posture.

It is our experience that simplicity, clarity and consistency are often the real factors behind successful approaches, and at that game, maturity-based models often win because they can be action-driven from the start, faster to put in place, and less vulnerable to window-dressing by stakeholders.

Click here to join our newsletter for more Cyber Security Leadership insights.

Contact Corix Partners to find out more about developing a successful Cyber Security Practice for your business.

Corix Partners is a Boutique Management Consultancy Firm, focused on assisting CIOs and other C-level executives in resolving Cyber Security Strategy, Organisation & Governance challenges.

Security Transformation Leadership

Sign up for The Security Transformation Leadership Newsletter

By Security Transformation Leadership

Delivering a challenge and an alternative view on common practices in the CyberSecurity space to help the Industry move forward Take a look

Create a free Medium account to get The Security Transformation Leadership Newsletter in your inbox.

JC Gaillard

Written by

Founder & MD @CorixPartners | Co-president #CyberSecurity Group @TelecomParisAl | Non Executive Director | Author | Blogger | Cyber Security Leader

Security Transformation Leadership

The Security Transformation Research Foundation is a dedicated think-tank and research body aimed at approaching Security problems differently and producing innovative and challenging research ideas in the Security, Business Protection, Risk and Controls space

JC Gaillard

Written by

Founder & MD @CorixPartners | Co-president #CyberSecurity Group @TelecomParisAl | Non Executive Director | Author | Blogger | Cyber Security Leader

Security Transformation Leadership

The Security Transformation Research Foundation is a dedicated think-tank and research body aimed at approaching Security problems differently and producing innovative and challenging research ideas in the Security, Business Protection, Risk and Controls space

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store