Cyber Security Strategy In The Digital Age

Despite recent higher levels of investment in advanced cyber security technologies less than 20% of organisations are effectively stopping cyber-attacks and fixing hacks.  CISOs must embrace the commercial realities facing their organisations in a disruptive marketplace. 

The security posture of a company is now just as important to the CEO as it is to the CISO, especially if that company handles data and is rolling out digital initiatives, which in the digital economy, is the vast majority.

Getting cyber security right is now the big question facing executive leadership and security teams alike and the rest of the business, from board level down, must ensure cyber security has a seat at the leadership table.

The shift is a shared responsibility: CISOs can and must, engage more collaboratively with the rest of the business, while boards, C-suites and other business functions must commit to a closer working relationship with their cyber security colleagues. Only in this way can cybersecurity teams play a crucial role as enablers of transformation.

According to Kelly Bissell, the global senior managing director of Accenture, 93% of companies are now “Internet companies,” meaning they work in digital and online spheres. “Our analysis identifies a group of standout organisations that appear to have cracked the code of cybersecurity when it comes to best practices.... Leaders in our survey are far quicker at detecting a breach, mobilising their response, minimising the damage and getting operations back to normal.” he said.

Organisations can no longer take a fully defensive or reactive approach to security, because the damage will have been done. Instead, organisations must be proactive.

To meet these increasingly stringent compliance requirements, organisations can’t take a compliance checkbox approach. Instead, a holistic, all-encompassing cyber security and data protection strategy is needed with a leader at the helm.

The Key Issues In Understanding Cyber Security

Leaders focused more of their budget allocations and on sustaining what they already have, whereas the IT non-leaders place significantly more emphasis on piloting and scaling new capabilities. Leaders once it is explained to them are more than three times as likely to provide users of security tools with required training for those tools.

Organisations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.

Some of the most, high profile, breaches in the last few years suggests they can be even more detrimental than previously thought, particularly for publicly-traded companies. Record-breaking fines, plummeting share prices and sky high legal fees are, unfortunately, all par for the course. With stronger relationships at business and board level, a better understanding of the organisation’s commercial imperatives, and the ability to anticipate the evolving cyber threat, CISOs can become central to their organisations’ transformation. As the threats increase employee cyber security training is becoming very important.

For Information and Training recommendations for your type of company please contact Cyber Security Intelligence for a free consultation.

Accenture:       EY.com:     Accenture:      TEISS:     BitGlass:      Information-Age

You Might Also Read:

Cyber Intelligence & Business Strategy:

Five Features Of The Changing Threat Landscape:


 

« 5G Will Affect Jobs In 2020
The Most Common Cyber Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Sify Technologies

Sify Technologies

Sify is the largest ICT service provider, systems integrator, and all-in-one network solutions company on the Indian subcontinent.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.

Net Essence

Net Essence

Net Essence is a Managed IT Services Provider. We deliver effective, reliable and fit-for-purpose IT solutions for SMEs based in the UK.