Understanding Security in the World of the “Risk Society”

Renowned sociologist Ulrich Beck explained the so-called “Risk Society” as: “Modern society becoming a risk society in the sense that it’s increasingly occupied with debating, preventing and managing risks that it itself has produced”. Beck was writing in the mid-1980s in a post-Chernobyl environment where the globally significant risk consequences of human activity were becoming starkly apparent. Fast-forward to today, asserts Jake Olcott, and his insight is even more incisive as we struggle to manage the inherent risks that have developed in tandem with our innovations in technology and digital networks.

Preventing, managing and mitigating the impacts of cyber risk – a risk we have ourselves created – is a major challenge for individuals, businesses and nations worldwide.

As technology constantly evolves, we want to take advantage of it to make our lives easier and more successful. The data we provide to organisations we use for social and business purposes are becoming more important, but at the same time the risk increases. This causes problems for individuals at a personal level, but there are also serious knock-on effects for business and society as the trust on which relationships depend is eroded.

Beck observed this, in fact, noting that perceptions of risk can alter the future development of systems, technologies and societal structures themselves.

From a personal point of view, every transaction and interaction you have with organisations involves sharing personal data, such as your name, address and birth date. This is the same when sharing data online, every time you visit a website, search for or buy something, use social media or send an e-mail. Sometimes you share data consciously and deliberately by entering it into a website, for example. Sometimes data is shared less overtly through the ever-present cookies and tracking apps that we all tend to authorise without a second thought.

Sharing data helps makes life easier, more convenient and connected, but the data is still your personal property. The price of it falling into the wrong hands can be very high in physical, financial and psychological terms. This includes limitation of an individual’s rights, discrimination, identity theft or fraud, financial loss, damage to reputation and significant economic or social disadvantage.

Evolution of the risk

As Beck predicted, the evolution of this risk has given rise to an intense preoccupation with discussing, managing and preventing it, largely through the implementation of regulations – such as the European Union’s General Data Protection Regulation (GDPR) – designed to protect individual privacy and hold businesses and organisations that collect personal data to account.

Befitting the risk associated with personal data loss, the punishments are severe – multimillion-pound fines, legal ramifications and reputational damage all have a direct impact on the business’ bottom line. They combine to make the consequences of mis-managing this risk as unacceptable to businesses as having data stolen is to individuals. The aim is to try and restore a balance of trust between individuals and business/society that reduces the risks of data sharing for all involved.

So, in the ever-connected digital world, security risk is inevitable and both customers and businesses are heavily affected. Regulation is one way that society is tackling the issue – creating a “stick” to keep corporations in line. However, Beck has more insight on how the “Risk Society” manages itself, describing the development of “a systematic way of dealing with hazards and insecurities induced and introduced by modernisation itself”.

Reflexivity and monitoring

Beck draws heavily on the concept of reflexivity. This is the idea that, as a society examines itself, it changes itself in the process. Within the social theory of reflexivity sits the idea of monitoring. Monitoring enables us to assess and understand the ways that a new set of practices affect business and people.

The concept of self-monitoring was first introduced in the 1970s, highlighting how it can help people with self-presentation, expressive behaviour and non-verbal affective displays. The concept provides an important tool for society for both personal and businesses purposes. Self-monitoring is something we’re all doing every day to help manage risk. This could be through calorie counting apps to avert ill-health, credit rating services to help manage financial obligations or time management for work productivity.

All self-monitoring is transacted as a preventative measure. It’s the “carrot” of self-improvement, creating a better and safer life. However, it’s fair to say that self-monitoring of personal data privacy remains in its infancy among the general population. Few people take a proactive, systematic approach to maintaining personal data hygiene and security. So, while the public still requires education, the business world needs to ensure it’s taking the lead in ensuring customer data is protected. This is where security sits in the “Risk Society”.

Causes for concern

From the perspective of the public, there is of course no ‘one size fits all’ view on exactly which privacy issues they are concerned about, but the most common themes tend to be the following.

*They want to control their personal data

*Transparency – people want to know what organisations will do with their personal data

*Education on the different purposes, risks and benefits of data sharing

*Reassurance over the security of their personal data and the specific rights of access, deletion and portable personal data

As more of the public’s daily lives are spent online and the range of information held about them by organisations increases and is more likely to be processed electronically, this brings in new challenges for enterprises handling the data. Chief among these is the fact that large data repositories are highly attractive to cyber criminals who want to steal and monetise personal information. How, then, can businesses mitigate the risks in the context of Beck’s “Risk Society”? A three-step process of planning, monitoring and metrics can help.

Planning proactively

Understanding that the business operates in a risk society and treating risk as a strategic issue is the first step. The second is to plan proactively for what happens should those risks become reality.

For businesses it’s important to agree an incident response plan. This should include breach notification within an agreed timescale and the remedial actions to be taken by the organisation. Proactiveness and transparency pays dividends not just in containing a breach from a security perspective, but also during post-breach compliance analysis by the regulators. It all adds to the awareness that’s essential for operating in a “Risk Society”.

Monitoring third party ecosystems

The threat environment is continuously changing. Any supplier that has passed due diligence yesterday may not be secure today. This is where the self-monitoring aspect comes in. It has to be ongoing and as real-time as possible to identify emerging threats.

The security performance of the business itself and the suppliers that are critical to its operation must be monitored continuously to ensure that customers are protected from service interruptions and data theft. The act of observing allows businesses to refine and inform their risk mitigation activities to directly reflect the reality of “Risk Society”.

Setting success metrics

Jake Olcott

Jake Olcott

Looking back at the “stick” of regulation, an important part of compliance is being able to demonstrate that a risk management programme is not just in existence, but is also understood and endorsed at Board level. Key to this is regular reporting of metrics that link cyber risk to business risk.

Regulations such as the GDPR have highlighted how operating in the “Risk Society” is one of the biggest challenges facing today’s business ecosystem. As individuals trust their personal data to businesses with the expectation that it will be protected, so businesses need to adopt practices of self-monitoring and using real-time risk intelligence in order to ensure that their own security posture and their third parties don’t introduce unacceptable risk into the organisation.

Jake Olcott is Vice-President of Government Affairs at BitSight

About the Author
Brian Sims BA (Hons) Hon FSyI, Editor, Risk UK (Pro-Activ Publications) Beginning his career in professional journalism at The Builder Group in March 1992, Brian was appointed Editor of Security Management Today in November 2000 having spent eight years in engineering journalism across two titles: Building Services Journal and Light & Lighting. In 2005, Brian received the BSIA Chairman’s Award for Promoting The Security Industry and, a year later, the Skills for Security Special Award for an Outstanding Contribution to the Security Business Sector. In 2008, Brian was The Security Institute’s nomination for the Association of Security Consultants’ highly prestigious Imbert Prize and, in 2013, was a nominated finalist for the Institute's George van Schalkwyk Award. An Honorary Fellow of The Security Institute, Brian serves as a Judge for the BSIA’s Security Personnel of the Year Awards and the Securitas Good Customer Award. Between 2008 and 2014, Brian pioneered the use of digital media across the security sector, including webinars and Audio Shows. Brian’s actively involved in 50-plus security groups on LinkedIn and hosts the popular Risk UK Twitter site. Brian is a frequent speaker on the conference circuit. He has organised and chaired conference programmes for both IFSEC International and ASIS International and has been published in the national media. Brian was appointed Editor of Risk UK at Pro-Activ Publications in July 2014 and as Editor of The Paper (Pro-Activ Publications' dedicated business newspaper for security professionals) in September 2015. Brian was appointed Editor of Risk Xtra at Pro-Activ Publications in May 2018.

Related Posts