June 26, 2014 By Martin Borrett 2 min read

For the latest strategies on fighting cybercriminals, read my new blog, “Checkmate: How to Win the Cybersecurity Game.”

Throughout the last year, I have been collaborating with Sogeti to develop an overarching cyber security point of view. We’re proud to announce that the resulting (free!) e-book, “Staying Ahead in the Cyber Security Game,” was published this month. This practical guide aims to inspire and provoke new thoughts and insights even if you are familiar with the topic; for those new to security, it’s a primer on what matters today.

We purposely chose to be brief with this resource and focus on the most recent and relevant topics; we avoided extensive descriptions of well-known practices, such as how to practice security risk management or how to build an authentication model, even though they are still important today. We decided to look at the organization as a whole and what you should consider doing differently.

Cyber Security Takes Center Stage

Cyber security is front and center in the tech world today thanks to near continuous revelations about incidents and breaches. In this context of unpredictability and insecurity, organizations are redefining their approach to security, trying to find the balance between risk, innovation and cost. At the same time, the field of cyber security is undergoing many dramatic changes, demanding that organizations embrace new practices and skill sets.

Cyber security risk is now squarely a business risk — dropping the ball on security can threaten an organization’s future — yet many organizations continue to manage and understand it in the context of the IT department. This has to change.

Technology is continuously evolving, and there is no recent shift larger than the explosion of mobile device usage. People bringing their own devices to work is an unstoppable wave that is engulfing organizations, regardless of their policies. This increased demand for BYOD poses serious challenges for how security is managed in terms of technology, process and policy. These mobile devices seem to be the antithesis of everything security professionals have been trying to do to keep things secure: They are mobile, rich in data, easy to lose and connected to all kinds of systems with insufficient security measures embedded.

The final key security highlight is the increased focus on people and their behavior. It is a common understanding that with enough determination and skill, a persistent attacker will eventually be able to break any defense, but making this process difficult every step of the way not only reduces risk and the time in which organizations can respond to incidents, but also improves the ability to intercept them before the impact becomes substantive. In order to get security right, it must be made part of the most elementary fiber of the organization, both in technology — including security as part of the design — as well as in behavior, by giving employees secure options. Simply using fear as a tool to motivate the organization will get blunt very rapidly.

Download the Free e-Book: Staying Ahead of the Cyber Security Game

More from CISO

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today