“If you do not ask the right question, you will not get the right answer.” — Olivier Serrat, “The Five Whys Technique

In the 21st century, cybersecurity is paramount to an organization’s survival. Yet many organizations have managed to get by with poor cybersecurity practices, which then only serves to reinforce the illusion that things are under control. Security leaders, C-suite executives and board directors tend to interpret near misses that go uninvestigated as evidence of the organization’s ability to successfully protect or react to security incidents.

Eventually, your luck will run out, disaster will strike, and none of your systems or processes will be able to save your data. You will be left wondering where things went wrong and why your layers of protective, detective and reactive controls didn’t put a stop to threats when there was still a chance.

Hold on to that inquisitive mindset: It could save your organization.

When Disaster Strikes

Why do disasters happen? What could we have done to prevent them? In his 2008 book “Outliers,” Malcolm Gladwell explored the lessons that can be drawn from studying aviation disasters, seeking to shed light on the root causes of some major crashes. The work, firmly grounded in the Federal Aviation Administration’s (FAA) Human Factors Analysis and Classification System (HFACS), pointed to the breakdown of communications inside the cockpit at key moments in the flight as a major source of human error, eventually leading to a perfect storm of factors contributing to a crash.

Yet airliners are built to very robust specifications and often have multiple resilient systems in case one fails. Similarly, today’s information technology systems and their accompanying security controls provide robust and fairly resilient systems that ensure the confidentiality, integrity and availability of data throughout the enterprise. Of course, having safety systems and resilience doesn’t completely eliminate the potential for disasters, much like having brakes on cars doesn’t remove the chance of a crash.

After an incident, it is tempting to blame someone, as was too often done in FAA crash investigations: “Unfortunately the root cause analysis of an accident often stops after the simple finding of ‘failure to follow procedures.’ This failure goes far beyond a ‘lazy mechanic’ who chooses to be noncompliant.”

What we need is a straightforward but effective technique to guide us to determine the root cause — not the person to blame — and thus identify elements that can be improved or tweaked to prevent future incidents.

The Five Whys

The Five Whys is a method of exploring cause-and-effect relationships. This technique can be used as part of a root-cause analysis to uncover ways to avoid future incidents. When applied to recent near misses, it can help prevent future events from turning into full-blown disasters.

The Five Whys technique helps investigators and analysts determine the root cause of a problem by repeatedly asking, “Why?” Investigators are cautioned to use deduction, to focus on processes and not behavior, to avoid jumping to conclusions, and to focus on causes, not symptoms.

Fast Company provided an example of the Five Whys technique in action:

  1. Why did the machine stop? (There was an overload and the fuse blew.)
  2. Why was there an overload? (The bearing was not sufficiently lubricated.)
  3. Why was it not lubricated sufficiently? (The lubrication pump was not pumping sufficiently.)
  4. Why was it not pumping sufficiently? (The shaft of the pump was worn and rattling.)
  5. Why was the shaft worn out? (There was no strainer attached and metal scrap got in.)

Ask the Right Questions

Don’t let a near miss go uninvestigated. After all, a near miss could become a serious incident if not for a lucky catch by a security control, a call from an attentive employee who remembered his or her security awareness training, or a smart decision by security leadership to learn as much as possible from previous incidents (or near incidents) and apply those lessons to the entire security apparatus.

While not without its flaws, the Five Whys technique can help foster a sound and systematic approach to investigating both incidents and near misses. It puts the organization on a path to continuous self-improvement and provides improved clarity about just how efficient its security controls truly are.

Listen to the podcast: Have a Plan, Practice It and Then Practice It Again

More from CISO

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network at risk. Yes, all those people can cause issues for cybersecurity. But the people who are usually blamed for cybersecurity issues wouldn’t have such an…

The Cyber Battle: Why We Need More Women to Win it

It is a well-known fact that the cybersecurity industry lacks people and is in need of more skilled cyber professionals every day. In 2022, the industry was short of more than 3 million people. This is in the context of workforce growth by almost half a million in 2021 year over year per recent research. Stemming from the lack of professionals, diversity — or as the UN says, “leaving nobody behind” — becomes difficult to realize. In 2021, women made…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…