Blog / Framework & Concepts

The Power of Causality: Why the Bow-Tie Model Transforms Cyber Risk Management

How Understanding Cause, Effect, and Event Chains Revolutionizes Our Approach to Cyber Threats

BK
Bernhard Kreinz
14 min read

Introduction: The Causality Crisis in Cybersecurity

Picture this: Your organization experiences a data breach. The board asks, "What was the threat?" and receives answers like "data breach," "ransomware attack," or "system vulnerability." These responses reveal a fundamental problem in cybersecurity today—we've lost sight of causality.

But here's the deeper issue: even when we correctly identify the initial threat, we often fail to understand what happens next. A system compromise isn't the end of the story—it's the explosive start. The initial attack vector dictates the entire chain of events that follows, from data loss to market share erosion.

The Top Level Cyber Threat Clusters (TLCTC) framework, through its elegant Bow-Tie model, brings us back to first principles: understanding what causes what, and how those causes cascade into business consequences. This isn't just academic precision—it's the difference between playing cybersecurity whack-a-mole and building truly resilient defenses.

Part One: The Bow-Tie Model as a Causal Diagram

The Bow-Tie model in TLCTC is fundamentally a causal diagram that maps the flow of cause and effect in cyber incidents. A risk event is a deviation from a strategic goal. At the IT-strategy level, the goal is "to operate IT systems securely" and the risk event is "the compromise of an IT system" or "loss of control."

Click to Enlarge
CAUSE SIDE 10 TLCTC Clusters Generic Vulnerabilities CONSEQUENCES Data Risk Events Business Risk Events Business Impact Loss of Control (System Compromise) IDENTIFY & PROTECT DETECT RESPOND & RECOVER
Figure 1: The TLCTC Bow-Tie Causal Chain Structure

Left Side (Causes): The 10 Top Level Cyber Threat Clusters

Each cluster represents a distinct way a generic vulnerability can be exploited. According to the framework's axioms, these threats are the root causes that initiate the causal chain:

# Cluster Generic Vulnerability
1Abuse of FunctionsScope of software functions and configurations
2Exploiting ServerServer-side code implementation flaws
3Exploiting ClientClient-side code implementation flaws
4Identity TheftWeak identity management / credential protection
5Man in the MiddleLack of communication channel control
6Flooding AttackFinite capacity limitations
7MalwareDesigned code execution capabilities
8Physical AttackPhysical accessibility of hardware/facilities
9Social EngineeringHuman psychological factors
10Supply Chain AttackTrust in third-party components/vendors

Center (Pivotal Event): Loss of Control / System Compromise

This is the moment when preventive controls have failed and a threat has successfully materialized. It is the critical transition point from cause to effect—the "knot" of the bow-tie.

Right Side (Effects): The Consequence Cascade

  • Primary Effects: Data Risk Events (Loss of Confidentiality, Integrity, or Availability).
  • Secondary Effects: Business Risk Events (service disruption, regulatory triggers).
  • Tertiary Effects: Process-level impacts (supply chain, financial reporting).
  • Ultimate Effects: Business Impact (revenue loss, reputation damage, market position).

This structure enforces temporal causality—threats must occur before compromise, which must occur before data risk events, which precede business impacts.

Part Two: Why Causality Matters

1. Eliminates Dangerous Confusion

Without causal clarity, organizations make critical errors: treating "data breach" as a threat (it's an effect), confusing "DDoS" with the threat itself (it's an outcome of #6 Flooding Attack), or mixing vulnerabilities with threats.

For example, "Ransomware" isn't a threat cluster—it's typically the malware payload (#7) in a causal sequence that results in a Loss of Availability:

#9 Social #7 Malware #4 Creds (#1 + #7) Encryption Availability Loss

2. Enables Precise Control Placement

The causal model clarifies exactly where and how to implement controls. Crucially, a control failure is defined as a control risk—it is a deviation from the control objective, not the actual cyber risk itself. This distinction transforms resource allocation from guesswork to science.

3. Reveals Attack Sequences as Causal Chains

Modern attacks aren't single events—they're causal sequences. The TLCTC notation captures this perfectly. Consider the MFA Bombing attack path:

#4 → #1 → #9 → #4

Breaking this down causally:

  • #4 (Initial): Attacker possesses valid credentials (acquired elsewhere).
  • #1 (Abuse): Abuses legitimate MFA request function repeatedly.
  • #9 (Social): User fatigue leads to psychological manipulation.
  • #4 (Complete): User approves prompt, completing identity compromise.

Each arrow represents a causal link and a potential point of intervention.

Part Three: The Event Chain—What Happens After Compromise

Understanding causality on the left side is only half the battle. The key to managing cyber risk isn't just stopping the breach; it's understanding and interrupting the event chain it triggers on the right side.

Click to Enlarge
LEVEL 0 System Compromise LEVEL 1 Data Risk (C, I, or A) LEVEL 2 & 3 Business Risk (Services & Process) LEVEL 4 Business Impact
Figure 2: The Anatomy of an Event Chain

Critical Note: Credentials, tokens, and keys are system control elements. Their use by an attacker is #4 Identity Theft and represents Loss of Control (System Compromise)—not a data classification issue on its own. This is distinct from the acquisition of credentials, which maps to whatever threat cluster enabled it (#2 SQL injection, #5 MitM, #7 keylogger, #9 phishing form).

Part Four: Why the Initial Threat Matters

The starting TLCTC cluster determines the entire playbook. A stealthy attack creates a slow-burning crisis, while a brute-force attack ignites a flash fire.

The Slow Burn: Credential Abuse Chain

This event chain is a game of stealth. An attacker uses stolen credentials (#4 use) to legitimately access systems (system compromise occurs here), then misuses features (#1) to exfiltrate data. The initial compromise might go unnoticed for weeks.

The Flash Fire: Flooding Attack Chain

This event chain is about speed and brute force. A DDoS translates to a near-instant sequence from technical outage to business-level effects for Internet-facing services, demanding automated, resilient infrastructure rather than human-led investigation.

Click to Enlarge
Scenario A: Slow Burn (APT) Entry (#9) Dwell Time Creds (#4) 14 Days Exfil (#1) 3 Weeks Scenario B: Flash Fire (Ransomware) Entry (#9) Exec (#7) 30s Creds (#4) 2m Encryption 15m Attack Velocity (Δt)
Figure 3: Attack Velocity (Δt) Comparison

The clusters are the same, but the velocity changes the game entirely. This is why Attack Velocity (Δt)—introduced in TLCTC V2.0—is the single most accurate predictor of attacker sophistication and the only metric that truthfully measures control effectiveness.

Part Five: Deep Dive—How a Single Breach Topples a Business

Let's apply causal thinking to trace how a credential-based attack cascades through all levels of business impact. The chain begins not with a brilliant hack, but with a simple compromise: an attacker uses stolen developer credentials to gain legitimate access.

Step 0: System Compromise — #4 (use)

Attacker authenticates with stolen developer credentials, achieving Loss of Control over the account/system perimeter.

Step 1: Data Risk Event — Loss of Confidentiality

The attacker's abuse of functions (#1) results in the exfiltration of the entire customer database. At this moment, the damage is technically contained; the business impact is still zero, but a time bomb is set.

Control Point: Egress traffic monitoring and Data Loss Prevention (DLP) are your last chance to disarm the bomb.

Step 2: First Business Risk Event — External Exposure

The stolen data is published on a public forum (attacker action).

Control Point: Dark web monitoring can provide a critical head start.

Step 3: Second Business Risk Event — Reputation

Media reports the breach. This triggers a classic Reputation Risk event.

Control Point: Rapid, transparent, empathetic crisis communication.

Step 5: Final Business Impact — Disruption

Customer churn, regulatory fines, and collapse in new sales render the business model unsustainable.

Part Six: The Detection Coverage Score

How do you tell the Board if you are secure? "We stopped 100 viruses" is a vanity metric. The Detection Coverage Score (DCS) is a strategic KPI derived from Attack Velocity:

DCS = (Mean Time to Detect) / (Attack Velocity Δt)

  • < 1.0: You are faster than the adversary. (Winning)
  • > 1.0: The adversary completes the step before you detect it. (Losing)

Example: If a Ransomware group moves from #4 Identity Theft to #1 Abuse of Functions (Admin Rights) in 10 minutes, and your SIEM alerts in 15 minutes, your DCS is 1.5. You are systematically blind to this attack. No amount of "hard work" by analysts will fix this; you need automation.

Part Seven: Putting Event Chains to Work

  1. Map Your Top 3 Chains: Identify the event chains most relevant to your business.
  2. Identify Your Control Points: Pinpoint where to break the chain earliest.
  3. Measure Your Response Windows: Determine where to invest in automation versus human processes.
  4. Wargame the Scenarios: Run tabletop exercises based on different initial threat clusters.

Conclusion: The Causal Revolution in Cybersecurity

By embracing causality through the Bow-Tie model, the TLCTC framework offers what our industry desperately needs: Clarity, Precision, and Actionability. The next time someone says "we had a data breach threat," you'll know better. You had a threat that caused a compromise that resulted in a data breach that triggered business risk events that led to business impact. That distinction—that causal precision—is the foundation of effective cyber risk management.

References

  1. Kreinz, B. Top Level Cyber Threat Clusters (TLCTC), White Paper V1.9.1.
  2. TLCTC Framework Axioms V2.0