The Terminology Discussion

Working through the conflation of words

Steve Grigg

1/5/20262 min read

Before we begin a discussion about operational tools and functions, it’s worth getting some terminology straight. I’m a security practitioner who’s been doing this work for a little over twenty years, and I’ve read enough of the literature to know how these terms are supposed to be used. Even so, I catch myself conflating risk, threat, and vulnerability more often than I’d like to admit. Not because I don’t know the difference, but because they’re closely related and tend to collapse into one another over time. This short article is as much a re-calibration for me as it might be for anyone else. It’s an attempt to slow things down just enough to be precise without becoming pedantic.

In practice, most experienced professionals can cite the difference between a threat and a vulnerability without much trouble. Where things tend to blur is around the word risk, and where risk fits relative to the other two terms. It can start to feel as though the words are describing the same thing, just from slightly different angles. In meeting after meeting, I find myself unsure which of those things we’re actually discussing. That ambiguity makes it easy for fundamentally different concepts to coexist without clear differentiation. The confusion tends to persist because few people want to be the one to stop the conversation and admit they’re no longer sure which term is being discussed in that moment.

So, for the purposes of this series, I’m using the terms this way. A threat is a person, process, or event that could cause harm. A vulnerability is a condition that a threat can exploit to cause harm. Risk is the combination of impact and likelihood if a threat were to successfully exploit a vulnerability, in the context of what actually matters to the organization. Stated a little differently, risk is the financial and or reputational cost if the threat exploits the vulnerability. Threats and vulnerabilities exist whether we talk about them or not. Risk only exists once consequence enters the conversation.

With that clear and out of the way, we can turn to operational tools and functions as they actually behave within the context of those three terms. The articles that follow explore how those tools and functions are used to address risks, threats, and vulnerabilities in day-to-day work, and how small imprecision in terminology use quietly shapes the decisions that follow. The goal isn’t to re-litigate what most practitioners already know, but to examine how well-understood ideas bend and blur once they’re put into practice.