<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/rob-lesieur/rss" /><link>https://www.ivanti.com/blog/authors/rob-lesieur</link><item><guid isPermaLink="false">cb685e9c-f71b-4942-b89d-9bdac94452dc</guid><link>https://www.ivanti.com/blog/crq-risk-appetite-for-digital-vulnerability</link><atom:author><atom:name>Rob Lesieur</atom:name><atom:uri>https://www.ivanti.com/blog/authors/rob-lesieur</atom:uri></atom:author><category>Endpoint Management</category><title>Risk Appetite, CRQ and Exposure Management: Closing the Loop on Cyber Risk</title><description>&lt;p&gt;Executives today operate in a constant state of pressure. Regulatory demands grow faster than budgets, customers expect proof of resilience and every system outage becomes a business event. When each function manages risk in isolation, leaders spend more time reacting than advancing strategy.&lt;/p&gt;

&lt;p&gt;The real issue is coherence. Most organizations still rely on partial instruments: dashboards filled with red and amber, but no clarity on which risks matter or what an outage would actually cost. Anyone updating risks once a year in a spreadsheet is flying the enterprise through fog without instruments. &lt;a href="/resources/v/doc/ivi/2873/4eb345cbbd7a" target="_blank"&gt;Cyber risk quantification&lt;/a&gt; (CRQ) brings those instruments in the form of credible metrics, realistic scenarios and ROI-based priorities.&lt;/p&gt;

&lt;p&gt;But measurement alone isn’t enough. &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;Risk appetite&lt;/a&gt; defines how much uncertainty an organization is willing to accept; &lt;a href="https://www.ivanti.com/exposure-management"&gt;exposure management&lt;/a&gt; operationalizes that boundary. When CRQ, risk appetite and exposure management operate together, risk becomes a controllable variable — a closed loop that ties monitoring to strategy and action.&lt;/p&gt;

&lt;p&gt;The result is a system that reduces noise, sharpens priorities and enables leaders to balance security, profitability and innovation. And while measurement by itself is insufficient, it is the crucial first step for IT leaders.&lt;/p&gt;

&lt;h2&gt;Why measurement is the first act of leadership&lt;/h2&gt;

&lt;p&gt;You cannot manage what you cannot measure. A single “critical” label might conceal a $50,000 nuisance or a $5.4 million disaster. Without quantification, leadership decisions rely on instinct dressed up as process.&lt;/p&gt;

&lt;p&gt;Measurement is the first act of control. When risk is expressed in financial terms (e.g., probability of loss, potential impact, return on mitigation) security becomes a business function rather than a technical debate. It re-enters the language of value, cost and return. Investors and boards increasingly judge resilience as an indicator of governance maturity. Quantified risk doesn’t just support better posture — it stabilizes valuation and reinforces confidence in executive judgment.&lt;/p&gt;

&lt;h2&gt;Cyber risk quantification (CRQ): Turning guesswork into dollars&lt;/h2&gt;

&lt;p&gt;Cyber risk quantification provides the translation layer that business leaders need. It models what a specific threat could cost in dollars, how likely it is to occur and which factors amplify or reduce exposure. Inputs include internal metrics (e.g., production revenue per hour, contractual penalties, data-handling costs) augmented by actuarial models, such as those from Munich Re.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Left box titled “Inputs” listing “Revenue/hour,” “Penalties,” and “Actuarial models”; arrows feed into “Cyber risk quantification” (magenta, calculator icon), then into “Constraint layer: Risk appetite” (red, slider icon); outputs box on the right lists “Expected loss vs. tolerance,” “Likelihood relative to controls,” and “Decision options.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/194951_diagram_1_1200.png"&gt;&lt;/p&gt;

&lt;p&gt;CRQ reframes risk through three primary business impact categories. Each category has its own drivers and timeline, and ignoring those distinctions leads to flawed prioritization.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Business interruption: When systems fail, the cost clock starts running as production outages, penalties and lost revenues accumulate by the hour.&lt;/li&gt;
	&lt;li&gt;Data breach: Where damage unfolds in waves and cleanup, fines, legal action and the erosion of customer trust linger for years.&lt;/li&gt;
	&lt;li&gt;Financial theft and fraud: Compromised accounts, tampered transfers or false payment orders that inflict immediate losses.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;CRQ also reverses the usual IT tunnel vision. Rather than starting with vulnerabilities, it begins at the business-model level. It asks: what would this cost us and which processes would cause the greatest financial impact if they failed?&lt;/p&gt;

&lt;p&gt;The analysis uses company-specific data, such as hourly production revenue and contract penalties, cross-referenced with Munich Re’s actuarial models. The result: credible, actionable numbers. Executives can compare cyber investments to any other capital decision. Instead of "&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;patch all vulnerabilities,&lt;/a&gt;" the question becomes: which action reduces the most financial risk per dollar spent?&lt;/p&gt;

&lt;p&gt;That shift marks the moment cybersecurity joins the CFO’s balance sheet. And, when CISOs talk in dollars instead of acronyms, cybersecurity becomes a language of enterprise value rather than fear management.&lt;/p&gt;

&lt;h2&gt;Risk appetite: Setting the boundary of ambition&lt;/h2&gt;

&lt;p&gt;Quantification alone is instrumentation — not leadership. Leadership requires defining how much risk your organization is willing to accept in pursuit of its goals. That definition (i.e., your organization’s risk appetite) is the hinge between measurement and management.&lt;/p&gt;

&lt;p&gt;Every company balances ambition against exposure. A high-growth startup accepts volatility for potential upside while a regulated utility prizes stability over experimentation. Risk appetite transforms those instincts into policy, linking goals to thresholds, such as maximum loss, acceptable downtime and tolerance for reputational impact.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A horizontal gray arrow from “More aggressive” (left) to “More conservative” (right); a bracketed magenta segment labeled “Risk appetite,” with a purple triangle above the right side labeled “Risk posture.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/194951_diagram_2_1200.png"&gt;&lt;/p&gt;

&lt;p&gt;Defining risk appetite is both a quantitative and moral exercise. It signals not only how much loss a company is willing to bear but what kind of company it intends to be. Metrics like maximum loss and ROI coexist with softer judgments about values, reputation and ethics.&lt;/p&gt;

&lt;p&gt;When a &lt;a href="https://www.ivanti.com/ty/security/downloads/risk-appetite-statement"&gt;risk appetite statement&lt;/a&gt; (RAS) codifies those boundaries (distinguishing between risk capacity, tolerance and hard limits), leaders gain a common language for decision-making. For example, many organizations distinguish high appetite for innovation, moderate appetite for operations, minimal for security and low for compliance. Each organization must make these tradeoffs explicit.&lt;/p&gt;

&lt;p&gt;A clear RAS ensures alignment. Without it, departments drift; marketing pushes for speed while legal demands caution. Well-defined risk appetite balances that friction. It also supports trust — investors and regulators can see that risk governance is intentional, transparent and measurable. Key risk indicators then track performance against these thresholds, providing early warning before conditions deteriorate.&lt;/p&gt;

&lt;h2&gt;Exposure management: Where visibility meets control&lt;/h2&gt;

&lt;p&gt;Until it meets daily operations, risk appetite is theoretical. Exposure management operationalizes that boundary by unifying three disciplines: &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;attack surface management&lt;/a&gt; (ASM), &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management&lt;/a&gt; (RBVM) and validation and remediation. This aligns with Gartner’s Continuous Threat Exposure Management (CTEM) model of scope, discover, prioritize, validate and mobilize.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Attack surface management (ASM): Provides visibility into every asset that could be attacked, including shadow IT.&lt;/li&gt;
	&lt;li&gt;Risk-based vulnerability management (RBVM): Contextualizes vulnerabilities by exploitability and business impact.&lt;/li&gt;
	&lt;li&gt;Validation and remediation: Confirms which threats are truly exploitable and whether fixes are effective.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="A purple circular wheel divided into three sections pointing inward to a red center labeled “Exposure management”; the segments read “Attack surface management,” “Risk‑based vulnerability management,” and “Validation and remediation,” with red arrows indicating continuous flow." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/194951_diagram_3_1200.png"&gt;&lt;/p&gt;

&lt;p&gt;In practice, exposure management is a living feedback loop between visibility and governance. Data aggregation breaks down silos by correlating vulnerabilities with asset value, while validation ensures theoretical models match reality. Remediation closes the loop automatically (through &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm"&gt;integrated ITSM workflows&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;An online retailer, for example, may choose to tolerate higher risk on Black Friday to maximize revenue, but does so with heightened visibility and rapid mitigation. Security thus becomes dynamic equilibrium rather than reactive crisis management.&lt;/p&gt;

&lt;p&gt;Where traditional vulnerability management is reactive and incomplete, modern exposure management spans assets, endpoints, applications and clouds, adapting continuously to the organization’s defined risk appetite. Automation, escalation and real-time reporting ensure that leadership always knows where your organization stands, what an outage would cost and which actions deliver the greatest reduction in financial exposure.&lt;/p&gt;

&lt;h2&gt;The closed loop: Turning cyber risk into a controllable system&lt;/h2&gt;

&lt;p&gt;When cyber risk quantification, risk appetite and exposure management operate together, risk becomes a controllable variable — a closed economic and operational feedback loop.&lt;/p&gt;

&lt;p&gt;CRQ shows how much financial damage a vulnerability could cause. Risk appetite defines how much of that risk the organization is willing to accept. Exposure management ensures that the company’s attack surface aligns precisely with this threshold. Together, these three form a system of measurement, direction and control.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Without CRQ, the foundation is missing.&lt;/li&gt;
	&lt;li&gt;Without risk appetite, there is no strategy.&lt;/li&gt;
	&lt;li&gt;Without exposure management, there is no enforcement.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="Three overlapping circles labeled “CRQ—Measurement” (top, purple with calculator icon), “Exposure management—Control” (left, orange with shield icon), and “Risk appetite—Direction” (right, magenta with slider icon); the intersections illustrate how measurement, control, and direction connect." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/194951_diagram_4_1200.png"&gt;&lt;/p&gt;

&lt;p&gt;This closed loop converts cybersecurity from a compliance obligation into a performance discipline. It gives executives the same levers they use everywhere else (metrics, thresholds and continuous feedback). Imagine board meetings where risk variance is discussed with the same fluency as margin variance, where resilience becomes a competitive KPI.&lt;/p&gt;

&lt;p&gt;For years, cybersecurity was the department of “no,” blocking ideas to prevent incidents. Quantification and exposure management transform it into the department of “how.” Leadership can now take calculated risks, prove the ROI of resilience and communicate in a language investors and regulators share: impact, probability and value at risk.&lt;/p&gt;

&lt;p&gt;Measured risk becomes managed value — and leadership finally regains forward momentum. Cybersecurity, once a brake on innovation, becomes the steering system for strategic confidence — the new language of foresight. Anything less is gambling and, in the end, only the attacker wins.&lt;/p&gt;
</description><pubDate>Tue, 13 Jan 2026 13:54:57 Z</pubDate></item><item><guid isPermaLink="false">342be936-e5d6-455e-92fa-67ca1eba15a9</guid><link>https://www.ivanti.com/blog/leaky-apps-how-banning-them-builds-app-security</link><atom:author><atom:name>Rob Lesieur</atom:name><atom:uri>https://www.ivanti.com/blog/authors/rob-lesieur</atom:uri></atom:author><category>Security</category><title>Leaky Apps – How Banning Them Builds App Security</title><description>&lt;p&gt;Banning apps is sometimes necessary to protect your organization from malicious or misused applications. In particular, leaky apps can be a significant threat, and identifying and banning them is an essential app security measure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Some organizations choose a more flexible approach&amp;nbsp;by allowing employees to use unsanctioned apps and monitor their usage for suspicious activity. Yet others don’t monitor employee app use at all, which is the riskiest approach imaginable.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Employees rely on software to help them do their jobs more efficiently, save time and increase their productivity. But not all software is created equal, and not all apps are implemented securely. Even a massive global organization can be threatened by leaky apps that create massive risk, as this &lt;a href="https://securityboulevard.com/2023/02/leaky-app-gives-researcher-total-global-control-over-the-toyota-supplier-network/" rel="noopener" target="_blank"&gt;Toyota example&lt;/a&gt; demonstrates.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The risks of leaky apps and poor app security&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Deciding whether to ban an app on corporate devices should be based on A) how much value that app provides versus B) the likelihood of its misuse at the individual or organizational level. In deciding, the organization should consider&amp;nbsp;several types of risk caused by leaky apps or other software.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Insider threats&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The risk from insider threats is a major concern in app security, due to the difficulty of detecting malicious insiders who already have legitimate access to systems and data.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A recent report found that &lt;a href="https://www.cybersecurity-insiders.com/2023-insider-threat-report-finds-three-quarters-of-organizations-are-vulnerable-to-insider-threats/#:~:text=A%20Rising%20Threat&amp;amp;text=74%25%20also%20say%20insider%20threat,and%20prevent%20than%20external%20attacks." rel="noopener" target="_blank"&gt;48% of cybersecurity professionals agree&lt;/a&gt; that insider attacks are tougher to detect and prevent than external attacks. And according to Verizon, internal actors are responsible for &lt;a href="https://www.googleadservices.com/pagead/aclk?sa=L&amp;amp;ai=DChcSEwjCn7yCz8aBAxXJF7MAHV3eA4wYABABGgJ5bQ&amp;amp;gclid=EAIaIQobChMIwp-8gs_GgQMVyRezAB1d3gOMEAAYAiAAEgJb0vD_BwE&amp;amp;ohost=www.google.com&amp;amp;cid=CAASJeRoWQiL_Y4B5ihr-0YZHjcOVkyBeg9FFf7zThneFj5r78nlRU8&amp;amp;sig=AOD64_0RDzI0v0oSHmZREjV1dxKqkXEIJA&amp;amp;q&amp;amp;adurl&amp;amp;ved=2ahUKEwj-h7SCz8aBAxUpjYkEHZHNCvYQ0Qx6BAgHEAE&amp;amp;nis=8" rel="noopener" target="_blank"&gt;19% of all data breaches&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This makes implementing zero trust capabilities essential to reducing the attack surfaces available to these cybercriminals. Although the magnitude of this threat isn’t as substantial as others, such as phishing, it can still carry a hefty price tag. Recent research shows that the average cost of a data breach is &lt;a href="https://www.ibm.com/reports/data-breach?utm_content=SRCWW&amp;amp;p1=Search&amp;amp;p4=43700075239448391&amp;amp;p5=p&amp;amp;gclid=Cj0KCQjwrMKmBhCJARIsAHuEAPRzyorq7wkU1NsXAjs0tX_cGuYIKtNTMF5P6c0SckdU4spbrkZWiWUaAlp5EALw_wcB&amp;amp;gclsrc=aw.ds" rel="noopener" target="_blank"&gt;$4.45 million&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Malicious software&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Apps can contain malicious software that can harm connected devices and your network. And these&amp;nbsp;threats have increased in recent years:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;According to the 2023 State of Malware Report from Malwarebytes, &lt;a href="https://www.malwarebytes.com/blog/business/2023/04/top-5-cyberthreats-facing-msps-and-vars-in-2023" rel="noopener" target="_blank"&gt;71% of companies&lt;/a&gt; worldwide were affected by ransomware.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;By the end of November 2022, &lt;a href="https://www.cvedetails.com/browse-by-date.php" rel="noopener" target="_blank"&gt;over 22,500 new vulnerabilities&lt;/a&gt; had been added to the worldwide CVE database, already 10% more than in &lt;em&gt;all&lt;/em&gt; of 2021.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The &lt;a href="https://www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html" rel="noopener" target="_blank"&gt;United Nations Office on Drugs and Crime (UNODC)&lt;/a&gt; reported that more than 3.2 million cyberattacks were reported to law enforcement officials in 2022, with more than 1.13 million of them involving malicious software.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On top of malicious software, apps can provide unauthorized access to your system, allowing attackers to gain access and exploit your data. Think of this as malware targeting your systems, not your users. The potential risk of malicious insiders magnifies this threat. Malicious apps are also able to monitor or inject traffic, leading to a loss of privacy, disruption of services&amp;nbsp;or attacks on weak targets.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Banning certain apps, whether leaky apps or deliberately malicious ones, can help reduce the likelihood of exploits. Otherwise, bad actors can target other endpoints on trusted networks behind a corporate firewall.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Leaky app issues&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Leaky apps can result in user data, such as phone numbers and email addresses, being leaked to third-party servers. In one example, a security researcher discovered that TikTok was leaking user data without the user's consent, and a report from the Washington Post found that &lt;a href="https://www.washingtonpost.com/technology/2023/03/10/tiktok-data-whistleblower-congress-investigators/#:~:text=In%20an%20exclusive%20interview%20with,parent%20company%20ByteDance%2C%20even%20as" rel="noopener" target="_blank"&gt;TikTok was sending user data to Chinese servers&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To prevent this, banning leaky apps can ensure that only trusted apps are allowed to access user data. Unfortunately, many commercial apps (especially those that are “free” or ad-supported) don’t always make it clear what data they collect and whom they share it with.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Another potential cost of leaky apps? The regulators behind mandates like the &lt;a href="https://gdpr-info.eu" rel="noopener" target="_blank"&gt;GDPR&lt;/a&gt; and &lt;a href="https://oag.ca.gov/privacy/ccpa" rel="noopener" target="_blank"&gt;CCPA&lt;/a&gt; aren’t going to be forgiving of a company that was negligent in defending against data breaches. The fact that bad external actors may be involved is no excuse for not taking measures to prevent leaky apps and malware from invading a network.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Siloing and data exfiltration hazards&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Using unauthorized applications can lead to the formation of silos when everyone isn’t working with the same app, resulting&amp;nbsp;in decreased efficiency and productivity for the entire organization.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Not only can unapproved downloads create a security risk, but cloud-based SaaS applications can also open the door to unintentional and intentional data exfiltration, as well as data loss if files are misplaced or forgotten. In some cases, employees may even use non-SaaS desktop or laptop applications that haven’t been updated in years because they’re more comfortable with them. But they often still pose risks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;If cybersecurity teams can't see unsanctioned “shadow IT” apps, they can’t take app security measures to assess risk and monitor usage. This lack of visibility&amp;nbsp;leaves&amp;nbsp;the organization vulnerable.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Solving app security issues&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;There are fairly straightforward ways to solve the problem of monitoring and, if necessary, banning apps. These involve educating your organization about the risks involved to forge a “culture of app security” and by using software tools to control the apps that are installed on networked devices and that are being accessed from the cloud.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You should start by explaining the risks involved to employees and leadership. Educating everyone on zero trust principles and good cyberhygiene should be an ongoing, ever-evolving process that makes them aware of the dangers posed by leaky apps and unsanctioned downloads. In educating them on how to recognize and report possible security threats, you can also make them aware of the &lt;a href="https://www.ivanti.com/blog/user-education-cybersecurity-yes-worth"&gt;benefits their diligence brings for everyone&lt;/a&gt;.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;To control device-based apps, &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Mobile Threat Defense (MTD)&lt;/a&gt; software is used. This is often coupled with endpoint management software to monitor the app that’s being installed (or may already be in use) to detect any risks, in which case access to the app is blocked.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/use-cases/cloud-access-security"&gt;Security Service Edge (SSE)&lt;/a&gt; software regulates using cloud-based applications. It can assess risk levels for SaaS apps, allowing security teams to allow and disallowed software based on that assessment. Plus, SSE software can conditionally monitor data transited by SaaS apps to ensure sensitive information isn’t stored in the cloud while still allowing the app to be used.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Learn more about the threats posed by unmonitored and unsecured &lt;a href="https://www.ivanti.com/blog/mobile-devices-are-ubiquitous-and-so-are-cyberattacks"&gt;mobile devices&lt;/a&gt;, the need for &lt;a href="https://www.ivanti.com/blog/applying-strong-cyber-hygiene-security-to-iot-endpoints"&gt;cyberhygiene for Internet of Things (IoT) devices&lt;/a&gt;, and the impact of &lt;a href="https://www.ivanti.com/blog/the-landscape-of-zero-trust-adoption"&gt;zero trust adoption&lt;/a&gt; on organizations that have taken that step to protect themselves from the threats, leaky apps or otherwise, that every enterprise is facing.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 29 Sep 2023 15:00:02 Z</pubDate></item></channel></rss>