- The document discusses how information security professionals can quantify the value of security using financial analysis tools like net present value (NPV), weighted average cost of capital (WACC), and economic profit.
- It provides examples of calculating NPV and economic profit for security investments and factors like expected and unexpected losses.
- The key message is that security professionals should think and communicate about security in business terms that relate to revenue, costs, risk reduction, and overall company value in order to obtain appropriate budgets.
1 of 60
More Related Content
Finance for hackers
1. Finance for Hackers or How to get all the budget you deserve Nick Owen @wikidsystems
5. How is value created? ¡° When you're working for a business only 2 things matter ...the top line and bottom line. Translated into normal speak that means you need to contribute to the business in one of two ways: > help the business make money (adding to the top line) > help the business save money (managing the bottom line) If you're not working to one of those two goals, you're wasting company resources.¡± Rafal Los http://h30499.www3.hp.com/t5/Following-the-White-Rabbit-A/Business-Relevant-Information-Security-The-Top-and-Bottom-Lines/ba-p/4823525
7. The SEC cares CF Disclosure Guidance: Topic No. 2, 10/13/2011 Analyze Cyber Security Risks, including frequency and impact and if material, you might have to disclose.
8. Goals Provide infosec pros with the tools to talk to business, in particular, finance Improve understanding of infosec's impact on business Review some current developments on risk management Consider Buy, Build or Rent & Acquisition
16. How to create value? Improve return on existing base of capital Invest where return is > WACC Divest where return is < WACC For infosec: manage the risk of a cash flow stream so the cost of capital is less than the firm's WACC. Avoid Losses that decrease the return on existing capital.
17. How is WACC calculated Where Sigma is ¡°Ask your CFO¡±
18. WACC Cost of all your sources of financing Sum of cost of debt, equity, retained earnings, etc. 50% debt at 10% and 50% equity at 15% = 12.5%
19. Return on Equity Capital Asset Pricing Model: Ra = Rf + beta(Rm-Rf) Rf = Risk-free Rate Beta = relative volatility vs market Rm = expected market return IE: Investors want to be compensated for time-value of money and risk
23. Economic Profit Economic profit aka EVA ? Works in projections and in real life Operational Includes Balance Sheet & P&L Introduces Off-Balance sheet/P&L Items
31. Acquisition ¡° We're going to invest $75 in a company that has $100 in revenues and projected NOPAT of $21 per year for 5 years. Will there be additional IT costs or investment needed for security? Are their potential losses?¡±
35. Actuarial Methods Internal & External Data/¡°Soft¡± data and ¡°hard¡± data Threat Landscape Loss analysis Frequency Ease of attack Control Strength
53. Questions for your CFO What's our WACC or what should I use as a target cost of capital? If I retire an asset, can you write it off? What is the impact? How should I estimate an annual cost of infrequent very bad events if that unexpected loss could be $X? If I determine that our risks have dramatically increased, can I request emergency budget $Y?
54. Reducing Business Risk "No sooner is one problem solved than another surfaces¡ªnever is there just one cockroach in the kitchen." Warren Buffet
57. InfoSec & Economic Profit Reduce invested capital ¨C don't play capex/opex games (if your company does...) Reduce expenses 'Necessary but not sufficient' e.g firewalls Non-core: move to services over software ¨C eg. Waf, anti-virus, scanning unless it increases the threat landscape, then choose wisely.
58. In sum? Do analysis like a financial analyst Do as deep analysis as is needed for your firm Differentiate between average risk and infrequent, but bad risk Be aware of threat landscape Be ready to adjust quickly Good companies do most things well.
59. Sources/Suggestions The Quest for Value ¨C G. Bennett Stewart III A New Approach for Managing Operational Risk http://www.soa.org/files/pdf/research-new-approach.pdf Society for Information Risk Analysts: http://societyinforisk.org/
60. Questions? Nick Owen @wikidsystems [email_address] 404-962-8983 http://www.wikidsystems.com
Editor's Notes
SEC
Discuss Risk of outsourcing
Problem: This is not accurate. You don't know what year.