Cyber Security Strategy In The Digital Age

Despite recent higher levels of investment in advanced cyber security technologies less than 20% of organisations are effectively stopping cyber-attacks and fixing hacks.  CISOs must embrace the commercial realities facing their organisations in a disruptive marketplace. 

The security posture of a company is now just as important to the CEO as it is to the CISO, especially if that company handles data and is rolling out digital initiatives, which in the digital economy, is the vast majority.

Getting cyber security right is now the big question facing executive leadership and security teams alike and the rest of the business, from board level down, must ensure cyber security has a seat at the leadership table.

The shift is a shared responsibility: CISOs can and must, engage more collaboratively with the rest of the business, while boards, C-suites and other business functions must commit to a closer working relationship with their cyber security colleagues. Only in this way can cybersecurity teams play a crucial role as enablers of transformation.

According to Kelly Bissell, the global senior managing director of Accenture, 93% of companies are now “Internet companies,” meaning they work in digital and online spheres. “Our analysis identifies a group of standout organisations that appear to have cracked the code of cybersecurity when it comes to best practices.... Leaders in our survey are far quicker at detecting a breach, mobilising their response, minimising the damage and getting operations back to normal.” he said.

Organisations can no longer take a fully defensive or reactive approach to security, because the damage will have been done. Instead, organisations must be proactive.

To meet these increasingly stringent compliance requirements, organisations can’t take a compliance checkbox approach. Instead, a holistic, all-encompassing cyber security and data protection strategy is needed with a leader at the helm.

The Key Issues In Understanding Cyber Security

Leaders focused more of their budget allocations and on sustaining what they already have, whereas the IT non-leaders place significantly more emphasis on piloting and scaling new capabilities. Leaders once it is explained to them are more than three times as likely to provide users of security tools with required training for those tools.

Organisations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.

Some of the most, high profile, breaches in the last few years suggests they can be even more detrimental than previously thought, particularly for publicly-traded companies. Record-breaking fines, plummeting share prices and sky high legal fees are, unfortunately, all par for the course. With stronger relationships at business and board level, a better understanding of the organisation’s commercial imperatives, and the ability to anticipate the evolving cyber threat, CISOs can become central to their organisations’ transformation. As the threats increase employee cyber security training is becoming very important.

For Information and Training recommendations for your type of company please contact Cyber Security Intelligence for a free consultation.

Accenture:       EY.com:     Accenture:      TEISS:     BitGlass:      Information-Age

You Might Also Read:

Cyber Intelligence & Business Strategy:

Five Features Of The Changing Threat Landscape:


 

« 5G Will Affect Jobs In 2020
The Most Common Cyber Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

Resec Technologies

Resec Technologies

Resec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

System Two Security

System Two Security

System Two Security automates detection engineering and threat hunting.

Motive Managed Services

Motive Managed Services

Motive Managed Services take the complexity out of IT, Cybersecurity, and Network Operations, so you can focus on growing your business.