Cyber Security Strategy In The Digital Age

Despite recent higher levels of investment in advanced cyber security technologies less than 20% of organisations are effectively stopping cyber-attacks and fixing hacks.  CISOs must embrace the commercial realities facing their organisations in a disruptive marketplace. 

The security posture of a company is now just as important to the CEO as it is to the CISO, especially if that company handles data and is rolling out digital initiatives, which in the digital economy, is the vast majority.

Getting cyber security right is now the big question facing executive leadership and security teams alike and the rest of the business, from board level down, must ensure cyber security has a seat at the leadership table.

The shift is a shared responsibility: CISOs can and must, engage more collaboratively with the rest of the business, while boards, C-suites and other business functions must commit to a closer working relationship with their cyber security colleagues. Only in this way can cybersecurity teams play a crucial role as enablers of transformation.

According to Kelly Bissell, the global senior managing director of Accenture, 93% of companies are now “Internet companies,” meaning they work in digital and online spheres. “Our analysis identifies a group of standout organisations that appear to have cracked the code of cybersecurity when it comes to best practices.... Leaders in our survey are far quicker at detecting a breach, mobilising their response, minimising the damage and getting operations back to normal.” he said.

Organisations can no longer take a fully defensive or reactive approach to security, because the damage will have been done. Instead, organisations must be proactive.

To meet these increasingly stringent compliance requirements, organisations can’t take a compliance checkbox approach. Instead, a holistic, all-encompassing cyber security and data protection strategy is needed with a leader at the helm.

The Key Issues In Understanding Cyber Security

Leaders focused more of their budget allocations and on sustaining what they already have, whereas the IT non-leaders place significantly more emphasis on piloting and scaling new capabilities. Leaders once it is explained to them are more than three times as likely to provide users of security tools with required training for those tools.

Organisations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.

Some of the most, high profile, breaches in the last few years suggests they can be even more detrimental than previously thought, particularly for publicly-traded companies. Record-breaking fines, plummeting share prices and sky high legal fees are, unfortunately, all par for the course. With stronger relationships at business and board level, a better understanding of the organisation’s commercial imperatives, and the ability to anticipate the evolving cyber threat, CISOs can become central to their organisations’ transformation. As the threats increase employee cyber security training is becoming very important.

For Information and Training recommendations for your type of company please contact Cyber Security Intelligence for a free consultation.

Accenture:       EY.com:     Accenture:      TEISS:     BitGlass:      Information-Age

You Might Also Read:

Cyber Intelligence & Business Strategy:

Five Features Of The Changing Threat Landscape:


 

« 5G Will Affect Jobs In 2020
The Most Common Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

The main objective of the Hub is to bring cybersecurity and other advanced technologies closer to companies and as a result help to increase their performance as Industry 4.0.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

AngelList

AngelList

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.