Plan Disruption Probability (PDP): A CISO’s Guide to Linking Cyber Risk to Business Strategy.
Introduction
In the relentless battle against cyber threats, the resilience of your security controls could mean the difference between a near-miss and a catastrophic breach. Yet, how often do we ask ourselves: are our controls truly ready to withstand an adversary's test? It's easy to place trust in measures that passed last year’s audit or met compliance standards, but the real question is whether they can hold up in the chaotic, high-pressure reality of a live attack.
The cybersecurity landscape is anything but static. On the one hand. threat actors constantly evolve their tactics, probing for weaknesses in even the most robust defenses. Meanwhile, on the other hand, your organization's technical environment is constantly evolving as you add, configure, and manage assets within your infrastructure which may expose unforeseen weaknesses through misconfiguration, human error and unexpected interactions between systems and controls. Is the architecture that you have in your network diagram actually the true picture of your technical environment?
Organizations often overestimate the strength of their safeguards, blinded by assumptions or outdated testing methods. This gap between theoretical security and operational readiness leaves businesses vulnerable — right when they need their controls to perform most.
Introducing Threat Mitigation Potential (TMP)
At the heart of any effective cybersecurity strategy lies a critical question: How well do your controls mitigate threats in the real world? While compliance and audit results can provide some assurance, they often fall short of revealing how well controls perform under actual attack conditions.
To address this gap, we introduce the concept of Threat Mitigation Potential (TMP) —a comprehensive model designed to quantify the real-world effectiveness of a security control. TMP provides a structured way to evaluate a control's ability to reduce risk, accounting for three pivotal factors:
TMP combines these factors into a practical framework, enabling you to measure the true performance of your controls. It highlights strengths, uncovers blind spots, and provides actionable insights to prioritize and optimize your defenses.
In the sections ahead, we’ll explore how TMP provides a rigorous framework for evaluating your controls' ability to mitigate threats, ensuring you have a solid foundation to continuously strengthen your defensive security posture.
Control Efficacy Decay
Security controls can fail for a variety of reasons: misconfigurations, outdated detection signatures, conflicts with other controls, or unforeseen changes in the environment. To ensure a control remains effective when it’s needed most, continuous testing and validation are essential. Without this, confidence in a control’s ability to meet its threat mitigation objectives diminishes over time.
We represent the decline in confidence using an exponential decay function , which models the effect of time $t$ (in days) on a control's efficacy. The decay function $\Delta(t)$ is defined as follows:
Continuous Validation and Efficacy Decay
Testing a control to ensure it functions as expected provides reassurance and resets our confidence in the control’s effectiveness back to its initial value. This process of continuous validation helps counteract the natural decline in confidence over time, effectively “refreshing” the control’s efficacy.
We model this behavior with the following function: suppose $v$ represents the interval (in days) between tests. The adjusted efficacy decay, $\Delta'(t, v)$, accounts for these validation intervals and is defined as:
The modulus operation ($t \ \text{mod} \ v$) resets the decay whenever validation occurs at interval $v$.
Simulating Threat Mitigation
With an efficacy measure in place, we can use a Monte Carlo simulation to evaluate how effectively a control mitigates threats over time.
The simulation is governed by the following rule:
In this model, the control mitigates the threat if its mitigation potential —calculated as the product of Efficacy, $\Delta'(t,v)$ (decayed efficacy), and Coverage—exceeds the random number $r$. We repeat this process over many iterations to determine how often the control successfully mitigates threats versus when it fails.
By aggregating the results, we can calculate the Threat Mitigation Potential (TMP) of the control, providing a quantifiable measure of its effectiveness in real-world scenarios.
Deriving Threat Mitigation Potential
Instead of approximating the Threat Mitigation Potential (TMP) through thousands of Monte Carlo simulations, we can derive it analytically (details provided in the drop-down below). The formula for TMP is as follows:
This formula provides an exact calculation of TMP, incorporating the effects of control efficacy, validation cadence, and deployment coverage into a single metric. By directly computing TMP, organizations can better understand and quantify the real-world impact of their security controls.
Applying Threat Mitigation Potential in Practice
Let’s explore a couple of examples to illustrate how TMP can guide practical security decisions while aligning controls with an organization’s risk tolerance.
Example 1: How Often Should We Validate Our Anti-Phishing Control?
Imagine a control designed to prevent phishing attacks by analyzing email content and blocking suspicious messages. Its parameters are:
Using the TMP formula:
$$ \text{TMP} = \text{Efficacy} \times \frac{1 - e^{-kv}}{kv} \times \text{Coverage} $$
The result, 51% TMP , indicates that the control’s current configuration is insufficient to meet the organization’s risk tolerance of 70%.
Increase Validation Cadence: Testing the control weekly ($v = 7$ days) instead of monthly yields: $$ \text{TMP} = 0.85 \times \frac{1 - e^{-0.02 \times 7}}{0.02 \times 7} \times 0.80 $$ Solving gives: $$ \text{TMP} \approx 0.85 \times 0.933 \times 0.80 = 0.63 $$
The TMP increases to 63% , narrowing the gap to the 70% threshold but still falling short.
Increase Coverage: Deploying the control across 95% of email systems raises the original TMP to: $$ \text{TMP} = 0.85 \times 0.752 \times 0.95 = 0.61 $$
Combined Approach: Testing weekly and increasing coverage to 95% achieves: $$ \text{TMP} = 0.85 \times 0.933 \times 0.95 = 0.75 $$
With these combined improvements, the control now meets the 70% TMP requirement, aligning it with the organization’s risk tolerance.
Example 2: Is Our Perimeter Firewall Meeting Risk Tolerance Goals?
A perimeter firewall designed to block malicious network traffic has the following characteristics:
The result, 35% TMP , is well below the required 75%.
This approach finally aligns the control with the risk appetite, demonstrating how aggressive testing and broader deployment can meet organizational risk tolerance goals.
Decision Support
These examples demonstrate how TMP enables organizations to:
Conclusion
The Threat Mitigation Potential (TMP) framework provides a structured and quantitative approach to assess and improve the real-world performance of security controls. By incorporating efficacy, coverage, and validation cadence into a single metric, TMP transforms abstract risk discussions into actionable decision-making tools.
These examples illustrate how organizations can apply TMP to evaluate whether their controls align with risk tolerance thresholds and explore strategies for improvement. Continuous validation emerges as a key enabler, reinforcing the importance of proactive testing and deployment in maintaining an effective security posture.
In today’s dynamic threat environment, where the stakes are high and adversaries relentless, TMP equips decision-makers with the confidence and clarity needed to ensure controls are ready to defend when it matters most. Start incorporating TMP into your risk management practices today and position your organization for a resilient tomorrow.