SlideShare a Scribd company logo
1 of 3
Download to read offline
Navigating the cyber-security vortex 
Security leadership for the Digital Age 
This paper outlines critical security leadership imperatives for those charged with the digital transformation and business innovation agenda inside businesses today. 
2014 
Charles Forte 
CharlesForte Solutions Limited 
5/10/2014
This paper outlines 4 cyber-security leadership imperatives that business leaders must consider as they lead the business towards realising the benefits of increased digitisation. 
The unprecedented rate of change driving business opportunity 
The pace and range of digitisation is accelerating and is creating huge new revenue generating possibilities for businesses on an unprecedented scale. Digital technology is now an inherent part of every new product and service, is internet connected and generates data that can be interpreted to create new business opportunities. 
Cultural changes driven by consumerism, the use of social media and the ability to connect from anywhere has created consumers who interact and buy in very different ways. Predictions are that internet connected devices will have grown from 2000m in 2010 to 19,000m by 2018 and that this new ‘internet of everything’ will generate up to $20trillion of new revenue by 2020. 
The forces that drive risk and create a potential ‘drag’ on value realisation 
These changes drive disruptive opportunities to create new business models and dynamically change existing ways of doing business, but also drive business models that need to be increasingly connected, accessible, integrated and open. This opens the door for a sophisticated community of criminals, activists, spies, terrorists and nation states to create and exploit vulnerabilities. Risks extend beyond financial loss through theft and disruption to loss of IP and to physical threats at national scale. Despite lots of investment the pace of response struggles to keep pace with the threats. 
Governments are increasingly legislating to create new levels of compliance protecting individuals and national infrastructure. Board rooms are becoming more aware of these dynamics and cyber- security is increasingly a priority risk topic. Some commentators are predicting that this may create a risk aversion response that will delay up to $3 trillion in value and create a real ‘economic drag’. 
Opposing forces that may delay value realisation
Four leadership imperatives 
How are we to successfully innovate and realise new value to avoid a ‘value drag’ impact from these increasingly turbulent waters? Here are 4 leadership imperatives business leaders must engage with. 
1. Define clear success criteria in business outcome terms and integrate cyber- security awareness as a core part of the business conversation 
The growing nature of the cyber-security risk and its impact means that businesses will need to make careful choices between value and risk at the highest level. Defining ‘what good looks like’ in business outcome terms is critical in shaping the business appetite for value versus risk assessments and turning implicit ‘risk aversion’ reactions into clear and explicit strategic directions with consequent resource allocation decisions. Executive level engagement is also key to creating the right cultural awareness at all levels and driving the cross-functional involvement required to effectively integrate the topic into business operational thinking. 
2. Prioritise assets recognising that you cannot protect everything with equal intensity 
Focus on what is important and do not try to ‘fix’ or address everything. Decide what is most important, accessing the strategic conversation on ‘what good looks like’ and using a risk and impact based approach employing differentiated protection, controls and responses to what matters most. This must work as an active conversation to keep the view of priorities current. 
3. Move to a pro-active and predictive approach vs a singular focus on reactive response 
Protecting assets with the right technology and controls is essential but not sufficient. The dynamic nature of the risk means it is critical to develop a balanced approach that predicts and senses attacks and continuously tunes the response. Create a capability built around a ‘PROTECT - SENSE - RESPOND’ cycle. 
4. Create a ‘war game’ capability to rehearse risk scenarios and responses 
This approach recognises that things will go wrong and as such a successful way of managing cyber-security must include practising how to respond effectively as a business, involving all functions. Cross functional engagement and practising with a ‘war game’ mentality will create an effective and integrated business response and will illuminate learning and new insights in a virtuous improvement cycle.

More Related Content

What's hot

Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperMicrosoft
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the gameFranco Ferrario
 
InsurTech & The Sharing Economy - An Insurance Market Perspective
InsurTech & The Sharing Economy - An Insurance Market PerspectiveInsurTech & The Sharing Economy - An Insurance Market Perspective
InsurTech & The Sharing Economy - An Insurance Market PerspectiveAlchemy Crew
 
Infographic - Key Issues CIO's and CISO's Face
Infographic - Key Issues CIO's and CISO's FaceInfographic - Key Issues CIO's and CISO's Face
Infographic - Key Issues CIO's and CISO's FaceElizabeth Gladen
 
The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...Aladdin Dandis
 
Mitre: People in Progress
Mitre: People in ProgressMitre: People in Progress
Mitre: People in ProgressSoCo Partners
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeprcircle
 
Cybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfCybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfFiyona Nourin
 
Women in Fintech: Evolving the Financial Landscape
Women in Fintech: Evolving the Financial LandscapeWomen in Fintech: Evolving the Financial Landscape
Women in Fintech: Evolving the Financial LandscapeCareer Communications Group
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 

What's hot (17)

Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaper
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
 
HFMTech22
HFMTech22HFMTech22
HFMTech22
 
InsurTech & The Sharing Economy - An Insurance Market Perspective
InsurTech & The Sharing Economy - An Insurance Market PerspectiveInsurTech & The Sharing Economy - An Insurance Market Perspective
InsurTech & The Sharing Economy - An Insurance Market Perspective
 
Infographic - Key Issues CIO's and CISO's Face
Infographic - Key Issues CIO's and CISO's FaceInfographic - Key Issues CIO's and CISO's Face
Infographic - Key Issues CIO's and CISO's Face
 
The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...
 
Mitre: People in Progress
Mitre: People in ProgressMitre: People in Progress
Mitre: People in Progress
 
brochure
brochurebrochure
brochure
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
Cybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfCybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdf
 
Women in Fintech: Evolving the Financial Landscape
Women in Fintech: Evolving the Financial LandscapeWomen in Fintech: Evolving the Financial Landscape
Women in Fintech: Evolving the Financial Landscape
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 

Similar to Navigating The Cyber-Security Vortex : 4 leadership imperatives

eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Smart Growth, Smart Defense Building A Scam-Resilient Business At Scale CXO ...
Smart Growth, Smart Defense Building A Scam-Resilient Business At Scale  CXO ...Smart Growth, Smart Defense Building A Scam-Resilient Business At Scale  CXO ...
Smart Growth, Smart Defense Building A Scam-Resilient Business At Scale CXO ...CXO 2.0 Conference
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
Understanding the black hat hacker eco system
Understanding the black hat hacker eco systemUnderstanding the black hat hacker eco system
Understanding the black hat hacker eco systemDavid Sweigert
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docxwrite30
 
How Data Security is Strangling Companies and What to Do About It
How Data Security is Strangling Companies and What to Do About ItHow Data Security is Strangling Companies and What to Do About It
How Data Security is Strangling Companies and What to Do About ItFinance Network marcus evans
 
How Data Security is Strangling Companies and What to Do About It
How Data Security is Strangling Companies and What to Do About ItHow Data Security is Strangling Companies and What to Do About It
How Data Security is Strangling Companies and What to Do About ItHealthcare Network marcus evans
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookChris Cornillie
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10David X Martin
 
Trends in Technology for the year 2014
Trends in Technology for the year 2014Trends in Technology for the year 2014
Trends in Technology for the year 2014Winston DeLoney
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015John Budriss
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 

Similar to Navigating The Cyber-Security Vortex : 4 leadership imperatives (20)

eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Smart Growth, Smart Defense Building A Scam-Resilient Business At Scale CXO ...
Smart Growth, Smart Defense Building A Scam-Resilient Business At Scale  CXO ...Smart Growth, Smart Defense Building A Scam-Resilient Business At Scale  CXO ...
Smart Growth, Smart Defense Building A Scam-Resilient Business At Scale CXO ...
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Understanding the black hat hacker eco system
Understanding the black hat hacker eco systemUnderstanding the black hat hacker eco system
Understanding the black hat hacker eco system
 
How Cyber Resilient are we?
How Cyber Resilient are we?How Cyber Resilient are we?
How Cyber Resilient are we?
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
 
How Data Security is Strangling Companies and What to Do About It
How Data Security is Strangling Companies and What to Do About ItHow Data Security is Strangling Companies and What to Do About It
How Data Security is Strangling Companies and What to Do About It
 
How Data Security is Strangling Companies and What to Do About It
How Data Security is Strangling Companies and What to Do About ItHow Data Security is Strangling Companies and What to Do About It
How Data Security is Strangling Companies and What to Do About It
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
Trends in Technology for the year 2014
Trends in Technology for the year 2014Trends in Technology for the year 2014
Trends in Technology for the year 2014
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Navigating The Cyber-Security Vortex : 4 leadership imperatives

  • 1. Navigating the cyber-security vortex Security leadership for the Digital Age This paper outlines critical security leadership imperatives for those charged with the digital transformation and business innovation agenda inside businesses today. 2014 Charles Forte CharlesForte Solutions Limited 5/10/2014
  • 2. This paper outlines 4 cyber-security leadership imperatives that business leaders must consider as they lead the business towards realising the benefits of increased digitisation. The unprecedented rate of change driving business opportunity The pace and range of digitisation is accelerating and is creating huge new revenue generating possibilities for businesses on an unprecedented scale. Digital technology is now an inherent part of every new product and service, is internet connected and generates data that can be interpreted to create new business opportunities. Cultural changes driven by consumerism, the use of social media and the ability to connect from anywhere has created consumers who interact and buy in very different ways. Predictions are that internet connected devices will have grown from 2000m in 2010 to 19,000m by 2018 and that this new ‘internet of everything’ will generate up to $20trillion of new revenue by 2020. The forces that drive risk and create a potential ‘drag’ on value realisation These changes drive disruptive opportunities to create new business models and dynamically change existing ways of doing business, but also drive business models that need to be increasingly connected, accessible, integrated and open. This opens the door for a sophisticated community of criminals, activists, spies, terrorists and nation states to create and exploit vulnerabilities. Risks extend beyond financial loss through theft and disruption to loss of IP and to physical threats at national scale. Despite lots of investment the pace of response struggles to keep pace with the threats. Governments are increasingly legislating to create new levels of compliance protecting individuals and national infrastructure. Board rooms are becoming more aware of these dynamics and cyber- security is increasingly a priority risk topic. Some commentators are predicting that this may create a risk aversion response that will delay up to $3 trillion in value and create a real ‘economic drag’. Opposing forces that may delay value realisation
  • 3. Four leadership imperatives How are we to successfully innovate and realise new value to avoid a ‘value drag’ impact from these increasingly turbulent waters? Here are 4 leadership imperatives business leaders must engage with. 1. Define clear success criteria in business outcome terms and integrate cyber- security awareness as a core part of the business conversation The growing nature of the cyber-security risk and its impact means that businesses will need to make careful choices between value and risk at the highest level. Defining ‘what good looks like’ in business outcome terms is critical in shaping the business appetite for value versus risk assessments and turning implicit ‘risk aversion’ reactions into clear and explicit strategic directions with consequent resource allocation decisions. Executive level engagement is also key to creating the right cultural awareness at all levels and driving the cross-functional involvement required to effectively integrate the topic into business operational thinking. 2. Prioritise assets recognising that you cannot protect everything with equal intensity Focus on what is important and do not try to ‘fix’ or address everything. Decide what is most important, accessing the strategic conversation on ‘what good looks like’ and using a risk and impact based approach employing differentiated protection, controls and responses to what matters most. This must work as an active conversation to keep the view of priorities current. 3. Move to a pro-active and predictive approach vs a singular focus on reactive response Protecting assets with the right technology and controls is essential but not sufficient. The dynamic nature of the risk means it is critical to develop a balanced approach that predicts and senses attacks and continuously tunes the response. Create a capability built around a ‘PROTECT - SENSE - RESPOND’ cycle. 4. Create a ‘war game’ capability to rehearse risk scenarios and responses This approach recognises that things will go wrong and as such a successful way of managing cyber-security must include practising how to respond effectively as a business, involving all functions. Cross functional engagement and practising with a ‘war game’ mentality will create an effective and integrated business response and will illuminate learning and new insights in a virtuous improvement cycle.