logo
Effective strategies for turning cyber risk data into business insights

Effective strategies for turning cyber risk data into business insights

The Australian21-07-2025
Business stakeholders, from board members and C-suite executives to regulators and auditors, seem to be looking for answers as to how they should view cyber risk in the context of their role.
'In today's AI-driven landscape, traditional methods of manually gathering technical cyber data points and attempting to report the same information to various audiences across business, technology, and cyber leaders are no longer effective,' says Ajay Arora, a managing director with Deloitte & Touche LLP. 'Organisations should embrace advanced analytics and tailored communication strategies to confirm that cyber risk insights are meaningful and actionable for each stakeholder group.'
'Board members are asking whether the company is exposed to cyber risks that they're reading about in the newspapers,' says Raj Mehta, a partner with Deloitte & Touche LLP. 'Many CIOs and CFOs are asking whether company investments in cyber security capabilities are aligned with the industry and peers. And regulators and auditors are asking whether the organisation has put the right tools and processes in place.'
As the face of cyber security for the organisation, chief information security officers (CISOs) face multiple challenges when it comes to answering these questions, be it the manual nature of data collection, the complexity of generating meaningful analytics or differing opinions and comfort levels when it comes to risk representation.
'Risk decision-making around cyber should be as credible, defendable, and trustworthy as financial statements,' says Ajay Arora, a managing director with Deloitte & Touche LLP. 'Finance teams collect data that is spread across different tools and processes in the organisation, and there is a clear methodology, framework, and understanding of what statements and reports like a balance sheet and a P&L are. That enterprise-wide understanding does not typically exist in cyber today, but it is where the industry is going.'
To get to the point where cyber is a standard part of the general business lexicon, it is essential for an organisation to develop a common assessment methodology for the risk-relevant data generated by cyber security tools and processes.
'Risks can then be quantified by consolidating and normalising data for processing through a common risk model,' says Mehdi Houdaigui, a principal with Deloitte & Touche LLP. 'The output of the model is then used for the purpose of creating detailed analyses across business units, regions, and functions in a way that is meaningful to different audiences.'
Below are three strategies to consider when building a foundational and trustworthy cyber reporting capability that enhances understanding for stakeholders.
Build a scalable cyber analytics foundation
The first step is to understand the audience and their use cases. Consider separating stakeholders into broad categories — for example, the cyber team, the IT team, and an extended business category — and then segmenting those categories further into different levels, such as executive, management, and operational.
When it comes to building a cyber analytics foundation, the first element to put into place is a metrics framework that incorporates the appropriate key risk indicators (KRIs), key performance indicators (KPIs), and the underlying data points to support each. For example, a reporting program that indicates workforce cyber resilience by identifying trends in failed phishing tests, or data loss event resolution. It might also provide supply chain risk intelligence by focusing on program governance and assessment coverage and remediation.
'To run a cyber metrics and reporting program, organisations will need to continually analyse the data sets collected from their portfolio of cyber and technology tools,' says Stephen Gathman, a manager with Deloitte & Touche LLP. 'From those data sources, an effective set of risk indicators can be produced as a foundation for communicating cyber-induced business risks,' he explains.
Next, using standard risk scoring methodologies, data transformation, and advanced techniques (such as AI and machine learning), develop a risk engine that can take cyber data feeds and translate them into indicators of business risk.
Once these foundational capabilities are in place, the organisation can work on maturing capabilities in three areas: effective storytelling that is customised to particular audiences, translating technical cyber risk into both business risk and financial terms, and linking the cyber strategy to the business strategy.
Confirm trustworthy data quality, models
Technology and application teams must parse through vast amounts of cyber data to address risks, which can lead to uncertainty in prioritisation of risk reduction efforts. Common challenges include conflicting or redundant data gathered from multiple data sources, mixed data structures and models leading to issues when merged, varied rating methodologies and scales that can lead to confusing results, and excessive metrics tracking that can produce unclear messaging in reporting.
'It is imperative for cyber analytics teams to build trust in the quality of the risk analytics and metrics being produced from the varied data sources by implementing consistent and transparent models,' says Duncan Molony, head of Cyber Security and Data Analytics at Corebridge Financial.
Some trust-related metrics include identity and access protocols that help leaders visualise increased attack vectors, or secure application development (DevSecOps) and tracking the use of secure code repositories.
Several steps can help address these challenges and develop a mature risk model:
• Deploy a common data model that houses data from multiple sources to maximise utility.
• Normalise the common data model to remove redundancy and achieve a centralised warehouse of risk data.
• Leverage a common risk scoring methodology to enable risk aggregation over multiple dimensions, such as business units or applications.
'Traditional cyber metric bottom-up reporting and cyber risk quantification (CRQ) in financial terms are increasingly converging to provide a richer context for decision-makers,' says Molony. 'This integration allows organisations to present a more comprehensive view of cyber risks, aligning technical data with financial impacts to enhance strategic decision-making.'
The goal is to end up with data that is accurate, complete, consistent, unique, and timely. This can then be aggregated appropriately for a particular audience.
'As cyber risk reporting moves up the chain within an organisation, the scope of relevant risk metrics narrows and more data needs to be aggregated at the appropriate level for the right audience or stakeholder group,' says Tiffany Kleemann, a managing director with Deloitte & Touche LLP.
'For example, those at the operational level may need to see technical data points, whereas those in the C-suite may require information to be aggregated and presented in business terms that reflect business risk, operational resiliency and disruption, or compliance risk. As aggregation increases, it is imperative to strengthen the foundation of data governance and data quality to build and sustain trust in cyber risk reporting,' adds Kleemann.
Provide actionable risk intelligence
'In Deloitte's experience, boards and audit committees often ask questions that fit into one of two buckets: risk exposure, or readiness and resiliency,' says Arora. 'They want to know how exposed the company is to cyber risk and then how ready the organisation is to respond should an incident occur.'
A leading way to measure and illustrate cyber risk is to build a series of persona-based dashboards and composite, outcome-oriented indicators that can provide actionable insight in a way that is easily digestible. Effective reporting and dashboards gauge levels of cyber risk exposure and resilience, helping the organisation to quantify its cyber posture via frameworks such as the National Institute of Standards and Technology Cybersecurity Framework.
In addition to decision intelligence, actionable cyber reporting can be used to translate cyber risks into the business terms typically used to discuss operational disruption, reputational risk, or financial loss. 'The output also provides cyber teams with the insight to break down items by dimensions, such as business units, brands, products, or regions so the information is meaningful for the owners who drive action in the business,' says Arora.
'Being able to slice and dice the metrics by dimension is what helps make the risk intelligence actionable,' says Gathman.
By leveraging momentum from strong quantification foundations and data models, the rapid advancement in AI and data collection is slated to enable streamlined identification and potential burndown of cyber risk. By pursuing these capabilities, organisations can enhance investment value in cyber tools and capabilities, while removing ineffective processes and technologies.
Isobel Markham, senior writer, Executive Perspectives in The Wall Street Journal, Deloitte Services LP
As published by the Deloitte US Chief Financial Officer Program in the June 14 2025 edition of The Risk & Compliance Journal in the WSJ.
Disclaimer
This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional adviser.
Deloitte shall not be responsible for any loss sustained by any person who relies on this publication.
About Deloitte
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ('DTTL'), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as 'Deloitte Global') does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the 'Deloitte' name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.
Copyright © 2025 Deloitte Development LLC. All rights reserved.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Nvidia says no 'backdoors' in chips as China questions security
Nvidia says no 'backdoors' in chips as China questions security

News.com.au

time2 hours ago

  • News.com.au

Nvidia says no 'backdoors' in chips as China questions security

Nvidia chips do not contain "backdoors" allowing remote access, the US tech giant has said, after Beijing summoned company representatives to discuss "serious security issues". The California-based company is a world-leading producer of AI semiconductors, and this month became the first company to hit $4 trillion in market value. But it has become entangled in trade tensions between China and the United States, and Washington effectively restricts which chips Nvidia can export to China on national security grounds. "Cybersecurity is critically important to us. Nvidia does not have 'backdoors' in our chips that would give anyone a remote way to access or control them," Nvidia said in a statement Thursday. A key issue has been Chinese access to the "H20" -- a less powerful version of Nvidia's AI processing units that the company developed specifically for export to China. Nvidia said this month it would resume H20 sales to China after Washington pledged to remove licensing curbs that had halted exports. But the tech giant still faces obstacles -- US lawmakers have proposed plans to require Nvidia and other manufacturers of advanced AI chips to include built-in location tracking capabilities. Beijing's top internet regulator said Thursday it had summoned Nvidia representatives to discuss recently discovered "serious security issues" involving the H20. The Cyberspace Administration of China said it had asked Nvidia to "explain the security risks of vulnerabilities and backdoors in its H20 chips sold to China and submit relevant supporting materials". China is aiming to reduce reliance on foreign tech by promoting Huawei's domestically developed 910C chip as an alternative to the H20, said Jost Wubbeke of the Sinolytics consultancy. "From that perspective, the US decision to allow renewed exports of the H20 to China could be seen as counterproductive, as it might tempt Chinese hyperscalers to revert to the H20, potentially undermining momentum behind the 910C and other domestic alternatives," he said. Other hurdles to Nvidia's operations in China are the sputtering economy, beset by a years-long property sector crisis, and heightened trade headwinds under US President Donald Trump. CEO Jensen Huang said during a visit to Beijing this month that the company remained committed to serving local customers, adding that he had been assured during talks with top Chinese officials that the country was "open and stable".

Trump to build huge $200mn ballroom at White House
Trump to build huge $200mn ballroom at White House

News.com.au

time3 hours ago

  • News.com.au

Trump to build huge $200mn ballroom at White House

President Donald Trump, who is remodeling the White House to his tastes, will build a massive ballroom for hosting official receptions, one of the largest projects at the US executive mansion in over a century. Trump himself and unspecified donors will foot the bill for the $200 million project, White House Press Secretary Karoline Leavitt told a press briefing on Thursday. "For 150 years, presidents, administrations and White House staff have longed for a large event space on the White House complex," the spokeswoman said. "There's never been a president that was good at ballrooms," the 79-year-old president and former real estate developer told reporters of the latest bid to leave his mark on the White House. "I'm good at building things, and we'll get it built quickly and on time. It'll be beautiful," said Trump, assuring that the character of the original building would be preserved. The new structure will span over 8,000 square meters (90,000 square feet) and have space to seat 650 people, according to Leavitt. Work on the ballroom -- one of Trump's long-time ambitions -- will begin in September and is expected to be completed "well before" the end of his second term in January 2029, Leavitt said. The hope is it will host grand state dinners, given in honor of foreign heads of state visiting Washington. Until now, these were generally done by erecting a huge tent on the White House grounds. - Facade - A model of the ballroom presented by the government shows it will be a white building with tall windows. Its columns and front look reminiscent of the main White House building, a facade is known worldwide. The ballroom building will replace the East Wing, which usually houses the offices of the US first lady. Trump, who does not shy away from the gaudy, has also redone the Oval Office to splash the room in gold -- from the stars surrounding the presidential seal on the ceiling, to the gold statues on the fireplace, to the mantel itself. The project is shaping up to be one of the most significant to break ground at 1600 Pennsylvania Avenue since renovation and expansion works undertaken by President Theodore Roosevelt at the start of the 20th century. President Harry Truman also oversaw notable construction work between 1948 and 1952, but did so without changing the external structure. Trump has said for some time that he wants to build a White House ballroom inspired by his own properties. On Thursday, he praised the newly built, lavish ballroom -- named after himself -- at his Turnberry golf resort in Scotland, one of dozens of properties owned by the Trump family. It will also be inspired by the ballroom of the Mar-a-Lago mansion in Florida, which has served as the model for Trump's remodeling of the White House to suit himself. The Republican billionaire, inspired by the patios of Mar-a-Lago, recently ripped up the lawn at the White House's historic Rose Garden and is paving that area, where official events are often held. He is flying two huge American flags outside the White House, which has been the residence and workplace of American presidents since 1800.

Donald Trump reveals new 'reciprocal' tariffs for US's trading partners
Donald Trump reveals new 'reciprocal' tariffs for US's trading partners

ABC News

time5 hours ago

  • ABC News

Donald Trump reveals new 'reciprocal' tariffs for US's trading partners

Donald Trump has signed an order for new tariffs on select trading partners, just hours before the pause on his "reciprocal" tariffs scheme is lifted at midnight, local time. The US president announced the reciprocal tariffs, which vary from country to country, on April 2. But they have been on pause to provide time to negotiate deals. The White House now says: "The president has determined that it is necessary and appropriate to modify the reciprocal tariff rates for certain countries." Australia's exports to the US have been subject to the minimum 10 per cent "baseline" tariff since April. Mr Trump recently suggested the baseline tariff could increase to 15 or 20 per cent. But the White House says that is not immediately changing, meaning the tariff on Australian products remains at 10 per cent for now.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store