In recent years, the role of Business Analyst has expanded to that of cybersecurity specialist. BAs promote cybersecurity by acting as liaisons between security, IT, business, and project management, as well as by helping businesses apply policies, tools, and practices created for the sole purpose of preventing cyber crime. Since cyber crime is currently such a threat to businesses, a trend that is not likely to change anytime soon, the demand for BAs is on the rise. More specifically, the demand for business analysts will increase 14 percent by 2024.1
Cyber crime is expected to cause $6 trillion worth of damage yearly by 2021, according to Cybersecurity Ventures.2 As a response to this increase in cyber crime, global spending on cybersecurity will reach $133.7 billion by 2022, stated Gartner.3 BAs help organizations win the war on cyber crime by having them adopt a risk-based approach to security that includes a holistic assessment of a company’s threats and vulnerabilities. Using this risk-based approach to cybersecurity, BAs enable businesses to stay ahead of cyber threats as opposed to merely reacting to them. For these reasons, and because they help business leaders make good security decisions and work with SMEs to implement security measures, Business Analysts are a tremendous asset to all businesses that are vulnerable to cyber attacks, which is every business.
Today’s Business Analyst must be prepared to assist companies with cybersecurity as many organizations’ one-size-fits-all approaches to cyber crime will be unsuccessful. By mastering skills related to business process modeling, engaging stakeholders, assessing cyber risks, and establishing RASCI, BAs can quickly advance their cybersecurity practice and meet clients’ information security needs.
BAs Should Use Business Process Modeling for Better Cybersecurity Outcomes
Business process modeling is a technique that can be very helpful to Business Analysts working in the cybersecurity realm. Business process modeling improves efficiency, encourages best practices and standardization, and promotes process agility. The technique involves creating graphs that represent a company’s business processes. Flowcharts and data-flow diagrams are two examples of graphic methods BAs can implement when creating a business process model. The main purpose of business process modeling is to help BAs identify potential improvements to be made in a company’s processes.
Business process models can help Business Analysts better analyze and plan for security risks. “Traditional risk analysis approaches are based on events, probabilities and impacts,” explained Stefan Taubenberger and Jan Jürjens.4 “They are complex, time-consuming, and costly, and have limitations regarding the data and assessment quality…” The team goes on to explain that an approach for risk analysis that is based on business process models bypasses these limitations. “...security risk events can be derived from the business process models together with the security requirements, and probabilities do not have to be provided.”
By growing in their understanding of business process modeling and learning to analyze cyber risks using process models, a business analysis practitioner will effectively advance their cybersecurity practice.
Want more tech news? Subscribe to ComputingEdge Newsletter Today!