Cyber Security Strategy In The Digital Age

Despite recent higher levels of investment in advanced cyber security technologies less than 20% of organisations are effectively stopping cyber-attacks and fixing hacks.  CISOs must embrace the commercial realities facing their organisations in a disruptive marketplace. 

The security posture of a company is now just as important to the CEO as it is to the CISO, especially if that company handles data and is rolling out digital initiatives, which in the digital economy, is the vast majority.

Getting cyber security right is now the big question facing executive leadership and security teams alike and the rest of the business, from board level down, must ensure cyber security has a seat at the leadership table.

The shift is a shared responsibility: CISOs can and must, engage more collaboratively with the rest of the business, while boards, C-suites and other business functions must commit to a closer working relationship with their cyber security colleagues. Only in this way can cybersecurity teams play a crucial role as enablers of transformation.

According to Kelly Bissell, the global senior managing director of Accenture, 93% of companies are now “Internet companies,” meaning they work in digital and online spheres. “Our analysis identifies a group of standout organisations that appear to have cracked the code of cybersecurity when it comes to best practices.... Leaders in our survey are far quicker at detecting a breach, mobilising their response, minimising the damage and getting operations back to normal.” he said.

Organisations can no longer take a fully defensive or reactive approach to security, because the damage will have been done. Instead, organisations must be proactive.

To meet these increasingly stringent compliance requirements, organisations can’t take a compliance checkbox approach. Instead, a holistic, all-encompassing cyber security and data protection strategy is needed with a leader at the helm.

The Key Issues In Understanding Cyber Security

Leaders focused more of their budget allocations and on sustaining what they already have, whereas the IT non-leaders place significantly more emphasis on piloting and scaling new capabilities. Leaders once it is explained to them are more than three times as likely to provide users of security tools with required training for those tools.

Organisations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.

Some of the most, high profile, breaches in the last few years suggests they can be even more detrimental than previously thought, particularly for publicly-traded companies. Record-breaking fines, plummeting share prices and sky high legal fees are, unfortunately, all par for the course. With stronger relationships at business and board level, a better understanding of the organisation’s commercial imperatives, and the ability to anticipate the evolving cyber threat, CISOs can become central to their organisations’ transformation. As the threats increase employee cyber security training is becoming very important.

For Information and Training recommendations for your type of company please contact Cyber Security Intelligence for a free consultation.

Accenture:       EY.com:     Accenture:      TEISS:     BitGlass:      Information-Age

You Might Also Read:

Cyber Intelligence & Business Strategy:

Five Features Of The Changing Threat Landscape:


 

« 5G Will Affect Jobs In 2020
The Most Common Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

BTQ Technologies

BTQ Technologies

BTQ is a global quantum technology company focused on securing mission critical networks.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.