SlideShare a Scribd company logo
1 of 3
CISO Organizational priorities to build a Resilient Bimodal IT
Every Enterprise is challenged to provide increased value to customers to find predictable growth
as their stakeholders expect. Constantly delivering increased value show their customer care
which will in turn help their businesses to grow. On a closer look, senior business leaders become
responsible for the following during certain as well as uncertain times.
1. Keep-the-wheels-on to deliver predictable stakeholder expectations at minimum.
2. Constantly maximize value by using innovative methods and approaches.
The above mentioned sustain and innovate type of paradigm confirm to two different work
models and approaches. When these two modes are combined to deliver results through
Information Technology, it is referred as Bimodal IT. These two modes require different
leadership styles, strategies, approaches, workforce, culture and execution models.
Developing such an IT Organization is a CIO priority. CISO has to align security Organization to
support the IT Environment to realize Bimodal success. From a CISO perspective, they use a
different lens to review the inner workings of IT Environment and operations. With-in these two
silos, CIO objectives are most unilateral as his/her key focus is only on enablement to produce
desired outcomes. CISO’s organization has to take on the harder task of identifying different
Bimodal IT risk dynamics. Their approach has to be tuned-for-modal which otherwise, there is
an increased tendency of creating friction in supporting Bimodal initiatives. These two modes
different types of information risk, business continuity and resilience issues. It is a CISO priority
to ensure most of the Cyber risk (if not all) is addressed.
Modal 1 Organization is more conventional organization which focuses on ensuring the continuum of
activities using existing Systems, Channels, Architectures, Infrastructure, Frameworks & Applications.
Modal 2 Organization may be using exploratory technologies that are less than 3-4 years old, often may
be from Gartner’s first or second plateau of Hype cycle. Quick adoption to these technologies provide
strategic and transformative edge over competition. To insert these technologies, IT has to identify game-
changing usecases. To pilot these, they use new business models, new systems – on-premise/cloud, new
devices, niche vendor’s workforce for a short-term --- all these variabilities introduce a different type of
risk. To facilitate such R&D, Modal 2 priorities and their risks should be well-understood and
communicated to the workforce.
Knowing the symbiotic relationship between cybersecurity and
cyber-risk, it would be better we speak with respect to risk
dynamics, objectives and priorities rather than solely from
cybersecurity moving forward. Because time and time again, no
matter how much ever technology has been stood up, there is
always an enterprise that has been breached. So, enterprises
started to look cybersecurity as a risk management issue rather
than it is solely a technology issue.
Modal 1 Security Challenges & Objectives Modal 2 Security Challenges & Objectives
Protect existing Intellectual Property Secure new innovation
Preserve Privacy Ensure delivery of competitive advantage
Secure existing Systems Manage unknown risks introduced due to new
technologies, new business processes and people
engagement through new partnerships
Sustain value Anticipate risk and sufficiently allocate people and
financial resources
Ensure CIA of existing infrastructure – network,
systems and applications
Ensure risk is transferred to third party suppliers
and vendors while drafting new contracts &
agreements
Ensure safety of People – Employees, Partners &
Customers
Isolate environments from day to day to contain
emerging risk
Secure day to day functioning of enterprise Identify suitable approach to integrate new
development into existing. Be aware thread
model and knowledge may not be completely
available for new technologies and their
integration touchpoints
All modal 2 initiatives mostly pose high risk and constantly face greater resistance of change-averse forces
due to the very nature of their perceived engagement to serve as business extenders and game changers.
All this new and creative work that has been developed soon or later has to be integrated into the modal
1 IT environment. Most of the Modal 1 environment infrastructure is not so latest and there may already
be a high technical debt, which further modification to infrastructure, network and applications may
introduce new threats and vulnerabilities when they are being integrated at a rapid speed. New
technology has to be gradually and incrementally adopted across the enterprise to deliver the required
business value.
As an example, if an Enterprises has just started journey with Big Data, Machine Learning, building new
data lakes, 3D technology, Robotic Process Automation etc., the threat model for these technologies and
their integration touchpoints are aware to a greater extent. So, with right partnerships, all the risks can
be sufficiently mitigated. There is very little residual risk that may exist for integrating these types of
technologies.
However, if an Enterprise has started understanding the relevance of IoT, Cognitive, 4D Printing,
Computer Vision, Brain-computer interface, Smart Robots, Virtual Assistants, Blockchain, Autonomous
vehicles etc., the technology and tools aren’t sufficiently developed. Threat model for these is not
completely known. These threats may not purely emerge from the technology itself but may also emerge
from its application. While addressing such integrations, ensure the following:
• security policies are appropriately updated
• vulnerabilities are caught early in the development cycle
• collect required data points sufficiently to meet compliance objectives
• rely strongly on adaptive monitoring, detection and protection model leveraging SIEM &
integrations
• constantly collect KPI’s that help you review the security posture of new software
• consider security by design
• perform risk assessments
• transfer risk wherever applicable in new contracts and agreements
• apply latest patches ensuring endpoint security
• perform sufficient penetration testing
• use third party expertise to minimize exposure
• keep check on technical debt. Remediate wherever necessary
• use network sandboxing during pilot phases
• perform business continuity exercises and update playbooks to meet revised RPO & RTOs
• take more backups at frequent intervals until sufficient trust is developed
• think through the domino effect, it may be different from what is before. As an example, it may
cause loss of privacy along with lost sales and pressure on operations.
• review controls
The above are just few that I could think of, there may be many other considerations. No matter what is
done, everything cannot be protected. It will be a myth to think that you have considered everything to
sufficiently protect the enterprise. Occasional negligence may also a risk. It is not just the responsibility
of Business Leaders and Executive/Senior Management to ensure cybersecurity. It is everyone’s
responsibility. So, everyone should be educated to defend risks at all levels. At the last, be prepared to
respond if there is a breach. It is inevitable, often times, the lack of proper response to a breach will cause
more damage than the breach itself.

More Related Content

What's hot

Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1securityAnne Starr
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...adeel hamid
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisPECB
 
Oep light
Oep lightOep light
Oep light7change
 
It staff augmentation before and after covid 19
It staff augmentation  before and after covid 19It staff augmentation  before and after covid 19
It staff augmentation before and after covid 19Katy Slemon
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentationesbosman
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Maurice Dawson
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governancedigitallibrary
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk ManagementSocial Tables
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive ActionMighty Guides, Inc.
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTScsandit
 

What's hot (20)

Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field Analysis
 
Oep light
Oep lightOep light
Oep light
 
It staff augmentation before and after covid 19
It staff augmentation  before and after covid 19It staff augmentation  before and after covid 19
It staff augmentation before and after covid 19
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governance
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 

Similar to Ciso organizational priorities to build a resilient bimodal it

The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe Economist Media Businesses
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfAbdulbasit Almauly
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Ajay Kumar Uppal
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 
Trends in Technology for the year 2014
Trends in Technology for the year 2014Trends in Technology for the year 2014
Trends in Technology for the year 2014Winston DeLoney
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 

Similar to Ciso organizational priorities to build a resilient bimodal it (20)

The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journey
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
 
The path to self-disruption
The path to self-disruptionThe path to self-disruption
The path to self-disruption
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
201605 R&P on Digitization
201605 R&P on Digitization201605 R&P on Digitization
201605 R&P on Digitization
 
Trends in Technology for the year 2014
Trends in Technology for the year 2014Trends in Technology for the year 2014
Trends in Technology for the year 2014
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Ciso organizational priorities to build a resilient bimodal it

  • 1. CISO Organizational priorities to build a Resilient Bimodal IT Every Enterprise is challenged to provide increased value to customers to find predictable growth as their stakeholders expect. Constantly delivering increased value show their customer care which will in turn help their businesses to grow. On a closer look, senior business leaders become responsible for the following during certain as well as uncertain times. 1. Keep-the-wheels-on to deliver predictable stakeholder expectations at minimum. 2. Constantly maximize value by using innovative methods and approaches. The above mentioned sustain and innovate type of paradigm confirm to two different work models and approaches. When these two modes are combined to deliver results through Information Technology, it is referred as Bimodal IT. These two modes require different leadership styles, strategies, approaches, workforce, culture and execution models. Developing such an IT Organization is a CIO priority. CISO has to align security Organization to support the IT Environment to realize Bimodal success. From a CISO perspective, they use a different lens to review the inner workings of IT Environment and operations. With-in these two silos, CIO objectives are most unilateral as his/her key focus is only on enablement to produce desired outcomes. CISO’s organization has to take on the harder task of identifying different Bimodal IT risk dynamics. Their approach has to be tuned-for-modal which otherwise, there is an increased tendency of creating friction in supporting Bimodal initiatives. These two modes different types of information risk, business continuity and resilience issues. It is a CISO priority to ensure most of the Cyber risk (if not all) is addressed. Modal 1 Organization is more conventional organization which focuses on ensuring the continuum of activities using existing Systems, Channels, Architectures, Infrastructure, Frameworks & Applications. Modal 2 Organization may be using exploratory technologies that are less than 3-4 years old, often may be from Gartner’s first or second plateau of Hype cycle. Quick adoption to these technologies provide strategic and transformative edge over competition. To insert these technologies, IT has to identify game- changing usecases. To pilot these, they use new business models, new systems – on-premise/cloud, new devices, niche vendor’s workforce for a short-term --- all these variabilities introduce a different type of risk. To facilitate such R&D, Modal 2 priorities and their risks should be well-understood and communicated to the workforce.
  • 2. Knowing the symbiotic relationship between cybersecurity and cyber-risk, it would be better we speak with respect to risk dynamics, objectives and priorities rather than solely from cybersecurity moving forward. Because time and time again, no matter how much ever technology has been stood up, there is always an enterprise that has been breached. So, enterprises started to look cybersecurity as a risk management issue rather than it is solely a technology issue. Modal 1 Security Challenges & Objectives Modal 2 Security Challenges & Objectives Protect existing Intellectual Property Secure new innovation Preserve Privacy Ensure delivery of competitive advantage Secure existing Systems Manage unknown risks introduced due to new technologies, new business processes and people engagement through new partnerships Sustain value Anticipate risk and sufficiently allocate people and financial resources Ensure CIA of existing infrastructure – network, systems and applications Ensure risk is transferred to third party suppliers and vendors while drafting new contracts & agreements Ensure safety of People – Employees, Partners & Customers Isolate environments from day to day to contain emerging risk Secure day to day functioning of enterprise Identify suitable approach to integrate new development into existing. Be aware thread model and knowledge may not be completely available for new technologies and their integration touchpoints All modal 2 initiatives mostly pose high risk and constantly face greater resistance of change-averse forces due to the very nature of their perceived engagement to serve as business extenders and game changers. All this new and creative work that has been developed soon or later has to be integrated into the modal 1 IT environment. Most of the Modal 1 environment infrastructure is not so latest and there may already be a high technical debt, which further modification to infrastructure, network and applications may introduce new threats and vulnerabilities when they are being integrated at a rapid speed. New technology has to be gradually and incrementally adopted across the enterprise to deliver the required business value. As an example, if an Enterprises has just started journey with Big Data, Machine Learning, building new data lakes, 3D technology, Robotic Process Automation etc., the threat model for these technologies and their integration touchpoints are aware to a greater extent. So, with right partnerships, all the risks can be sufficiently mitigated. There is very little residual risk that may exist for integrating these types of technologies.
  • 3. However, if an Enterprise has started understanding the relevance of IoT, Cognitive, 4D Printing, Computer Vision, Brain-computer interface, Smart Robots, Virtual Assistants, Blockchain, Autonomous vehicles etc., the technology and tools aren’t sufficiently developed. Threat model for these is not completely known. These threats may not purely emerge from the technology itself but may also emerge from its application. While addressing such integrations, ensure the following: • security policies are appropriately updated • vulnerabilities are caught early in the development cycle • collect required data points sufficiently to meet compliance objectives • rely strongly on adaptive monitoring, detection and protection model leveraging SIEM & integrations • constantly collect KPI’s that help you review the security posture of new software • consider security by design • perform risk assessments • transfer risk wherever applicable in new contracts and agreements • apply latest patches ensuring endpoint security • perform sufficient penetration testing • use third party expertise to minimize exposure • keep check on technical debt. Remediate wherever necessary • use network sandboxing during pilot phases • perform business continuity exercises and update playbooks to meet revised RPO & RTOs • take more backups at frequent intervals until sufficient trust is developed • think through the domino effect, it may be different from what is before. As an example, it may cause loss of privacy along with lost sales and pressure on operations. • review controls The above are just few that I could think of, there may be many other considerations. No matter what is done, everything cannot be protected. It will be a myth to think that you have considered everything to sufficiently protect the enterprise. Occasional negligence may also a risk. It is not just the responsibility of Business Leaders and Executive/Senior Management to ensure cybersecurity. It is everyone’s responsibility. So, everyone should be educated to defend risks at all levels. At the last, be prepared to respond if there is a breach. It is inevitable, often times, the lack of proper response to a breach will cause more damage than the breach itself.