What We Do
How we do it
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
Mar 15, 2023
CVE-2023-23397 - Microsoft Outlook Elevation of Privilege Zero-Day Vulnerability
THE THREAT On March 14th, as part of Microsoft’s monthly Patch Tuesday release, the company disclosed a critical, actively exploited vulnerability impacting Microsoft Office and Outlook. The…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Mar 20, 2023
Exertis and eSentire Partner to Deliver 24/7 Multi-Signal MDR, Digital Forensics & IR Services and Exposure Management to Organisations Across the UK, Ireland, and Europe
Basingstoke, UK– 20 March, 2023. Leading technology distributor, Exertis, announced today that it has bolstered its cybersecurity services, adding eSentire, the Authority in Managed Detection and Response (MDR), to its Enterprise portfolio of offerings. eSentire’s award-winning, 24/7 multi-signal MDR, Digital Forensics & Incident Response (IR), and Exposure Management services will be available…
Read More
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Aug 27, 2021

Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

5 minutes read
Speak With A Security Expert Now

The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and complexity, business leaders are left wondering just how effective their security programs are. After all, we’ve heard it many times before: cybersecurity is not an IT problem, it’s a business risk to manage.

There are many approaches to developing and managing a cybersecurity program. Currently, the rousing debate within the security industry appears to center on these two options: should organizations adopt a maturity-based approach or a risk-based approach?

The traditional approach to managing cyber risk is maturity-based, wherein organizations aim to achieve a desired level of maturity by implementing certain capabilities and controls. This approach is lauded as the industry favorite and paves the way for an organization to demonstrate the controls and defenses it has built based on standard industry framework, such as the Cybersecurity Maturity Model Certification (CMMC). In order to demonstrate a specific level of maturity, organizations must fulfill specific requirements outlined by the industry framework, such as:

However, one drawback for some organizations is that maturity models may require a hefty financial investment if the focus is placed on building a multi-layer of defense against everything.

A risk-based approach, on the other hand, allows business leaders to prioritize “building the appropriate controls for the worst vulnerabilities, to defeat the most significant threats”. Risk-based approaches tend to be significantly more cost-effective than maturity models since business leaders have the option to invest heavily in defenses for the vulnerabilities that affect the business’s most critical areas.

A 2019 article by McKinsey & Co. argues that a risk-based approach is an advanced stage in an organization’s cybersecurity journey, whereas a maturity-based approach is still foundational. Rather than chase maturity, business leaders should look inward to identify the set of gaps and critical vulnerabilities identified for their specific business and mitigate those first.

For example, if you identify that the end users in your organization are the weakest link (as is normally the case), you may want to go beyond conducting phishing training or sharing threat advisories to mitigate that risk. Under the risk-based approach, you would implement those practices and more, such as providing simulations and training sessions on good cyber hygiene and how to stay safe online. These additional activities might not be a priority for CISOs who are more concerned with checking off the requirements of a maturity model.

So the question remains, which approach should business leaders rely on to develop their security program? The reality is that while there isn’t a definitive answer that can apply to every type of organization, there is merit in using a risk-based approach since it is geared specifically toward mitigating gaps and vulnerabilities, which can significantly help in reducing cyber risk.

To be successful in using a risk-based approach, here are some questions you can ask yourself:

1. Does my executive team accept that cyber risk is an enterprise risk?

Many business leaders may consider cyber risks completely separate from other enterprise risks. Given the evolving threat landscape and acceleration towards digital transformation, this is a luxury.

2. What are my business’ “sources of value” and do I understand the specific risks that can impact those sources of value?

Every business has its own set of processes or workflows that are integral to business operations--these are the ‘sources of value’. Retail businesses, as an example, must have a point-of-sale system in their storefronts and an online payment processing portal for e-commerce. Each value source comes with its own enterprise risk. Adversaries can inject malicious code within your website to steal your customers’ credit card information. So, you must understand the specific sources of value for your business and/or industry, and map each to an enterprise risk. Only by doing this will your team be able to gauge the best way to protect your data.

3. Have I identified all potential vulnerabilities that can impact my organization today?

Since your organization’s attack surface is continuously evolving, you must have a deep understanding of any vulnerabilities--especially those tied to a value source--that can impact your organization. Once these vulnerabilities have been identified, you can create a roadmap to establish the protocols and controls needed to fix the vulnerabilities.

4. Do I know the specific TTPs (tactics, techniques, and procedures) that threat actors can use to target my business?

Based on the industry your business falls in, the size of your team, and the type of data you have access to, your organization will face certain TTPs that another organization may not. Insurance firms may have access to financial and medical records and government-issued identification for their clients, whereas banks may only hold financial records for their customers. TTPs also vary based on the software applications and tools used by your organization.

So, it’s critical to identify the specific TTPs that any threat actor can leverage against your organization (i.e., which vulnerabilities are they most likely to target, what are the attack vectors commonly used, etc.) and identify controls to close those gaps.

5. How am I planning to address the vulnerabilities that were discovered?

Once you’ve worked with your security provider to discover all vulnerabilities, you’ll find that either you already have certain measures in place to fix them outright, or that you need to establish a new set of controls altogether. Perhaps it’s a mix of both. Either way, you can now work to set up a roadmap to ensure that you’ve addressed all critical vulnerabilities and work cross-functionally with various teams to determine which controls are working and which controls aren’t working.

As it stands today, it’s inherently more difficult for organizations to get away entirely from maturity models since mapping processes and procedures to an industry framework is a standard practice within cybersecurity. However, it’s also unwise for business leaders to focus so heavily on achieving a certain maturity level that they overlook reducing enterprise risk.

“Business leaders need to make sure that they are cyber risk aware and focused on reducing their cyber risk instead of focusing on a model that pushes towards a certain level of maturity, which can result in a roadmap they are forced to align to amidst a changing threat landscape,” Tia Hopkins, our VP, Cyber Risk Advisory and Solutions Architecture, states. “When you end up chasing a maturity model, you might have a scenario where you’re focused entirely on implementing certain tools and technologies in place, when in reality the largest area of concern might be the users, which means the focus should have been on endpoint prevention and response or security awareness training.”

The attack surface is ever-changing, and the threat landscape is continuously evolving. Ultimately, the goal for any strong cybersecurity program should be to continuously assess and reduce cyber risk.

To learn about the eSentire Cyber Risk Advisory program, please connect with a security specialist today.

View Most Recent Blogs

eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.