ArXiv TLDR

Mitigate or Fail: How Risk Management Shapes Cybersecurity Competency

🐦 Tweet
2604.21604

Jeffrey T. Gardiner

cs.CRcs.CYecon.GN

TLDR

Cybersecurity professionals are trained for threat management, not true risk management, despite using risk language, leading to persistent failures.

Key contributions

  • NIST NICE Framework lacks "likelihood" and "probability," with risk management content at only 4.5%.
  • Cybersecurity professionals show no measurable advantage in foundational risk reasoning over general professionals.
  • Training exposure predicts risk management competence, but the competence construct is epistemically compressed.
  • Leaders expect Likelihood x Impact reasoning but often cannot articulate the formula themselves.

Why it matters

This paper reveals a critical disconnect: cybersecurity professionals are trained for threat management, not comprehensive risk management, despite using risk terminology. This structural flaw explains persistent organizational failures and necessitates a fundamental redesign of professional training to truly integrate risk reasoning.

Original Abstract

Contemporary cybersecurity governance assumes that professionals apply risk reasoning. Yet major organisational failures persist despite investment in tools, staffing, and credentials. This study investigates the structural source of that paradox. Cybersecurity speaks the language of risk, but its training architecture has shaped the profession to think in terms of threats. A sequential mixed-methods design integrated four analyses; NLP of the NIST NICE Framework v2.0.0 (2,111 TKS statements), SEM (n = 126 cybersecurity professionals), a control-group comparison (n = 133 general professionals), and thematic coding of seven leadership interviews. Four convergent findings emerged. First, "likelihood" and "probability" appear zero times across all TKS statements. Risk management content accounts for 4.5% of high-confidence semantic classifications, ranking 18th of 29 competency domains. NICE codifies threat-management activity while invoking risk mainly at the category level. Second, SEM showed that training exposure significantly predicts risk management competence directly and indirectly through conceptual salience, for a total effect of Beta = .629. However, the theoretically four-dimensional competence construct collapsed into a single factor, indicating epistemic compression. Third, cybersecurity professionals showed no measurable advantage over the general professional population in foundational risk reasoning; only 11.9% showed high differentiation. Fourth, all seven leaders expected Likelihood x Impact reasoning, yet five did not articulate the formula themselves. These findings support a structural conclusion: cybersecurity has taken professional form as a threat-management discipline that has borrowed risk vocabulary. Remediation requires redesign of professional formation, not marginal curriculum reform.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.