Cyber Security Strategy In The Digital Age

Despite recent higher levels of investment in advanced cyber security technologies less than 20% of organisations are effectively stopping cyber-attacks and fixing hacks.  CISOs must embrace the commercial realities facing their organisations in a disruptive marketplace. 

The security posture of a company is now just as important to the CEO as it is to the CISO, especially if that company handles data and is rolling out digital initiatives, which in the digital economy, is the vast majority.

Getting cyber security right is now the big question facing executive leadership and security teams alike and the rest of the business, from board level down, must ensure cyber security has a seat at the leadership table.

The shift is a shared responsibility: CISOs can and must, engage more collaboratively with the rest of the business, while boards, C-suites and other business functions must commit to a closer working relationship with their cyber security colleagues. Only in this way can cybersecurity teams play a crucial role as enablers of transformation.

According to Kelly Bissell, the global senior managing director of Accenture, 93% of companies are now “Internet companies,” meaning they work in digital and online spheres. “Our analysis identifies a group of standout organisations that appear to have cracked the code of cybersecurity when it comes to best practices.... Leaders in our survey are far quicker at detecting a breach, mobilising their response, minimising the damage and getting operations back to normal.” he said.

Organisations can no longer take a fully defensive or reactive approach to security, because the damage will have been done. Instead, organisations must be proactive.

To meet these increasingly stringent compliance requirements, organisations can’t take a compliance checkbox approach. Instead, a holistic, all-encompassing cyber security and data protection strategy is needed with a leader at the helm.

The Key Issues In Understanding Cyber Security

Leaders focused more of their budget allocations and on sustaining what they already have, whereas the IT non-leaders place significantly more emphasis on piloting and scaling new capabilities. Leaders once it is explained to them are more than three times as likely to provide users of security tools with required training for those tools.

Organisations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.

Some of the most, high profile, breaches in the last few years suggests they can be even more detrimental than previously thought, particularly for publicly-traded companies. Record-breaking fines, plummeting share prices and sky high legal fees are, unfortunately, all par for the course. With stronger relationships at business and board level, a better understanding of the organisation’s commercial imperatives, and the ability to anticipate the evolving cyber threat, CISOs can become central to their organisations’ transformation. As the threats increase employee cyber security training is becoming very important.

For Information and Training recommendations for your type of company please contact Cyber Security Intelligence for a free consultation.

Accenture:       EY.com:     Accenture:      TEISS:     BitGlass:      Information-Age

You Might Also Read:

Cyber Intelligence & Business Strategy:

Five Features Of The Changing Threat Landscape:


 

« 5G Will Affect Jobs In 2020
The Most Common Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Lastline

Lastline

Lastline is the leader in advanced malware protection.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

SecuLetter

SecuLetter

SecuLetter is able to detect unknown attacks with hybrid approaches, static and dynamic analysis.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.