Intelligent CIO Middle East Issue 106 | Page 88

FINAL WORD through scheduled meeting , without fear of punitive consequences , can help to keep process improvement a side by side feature running in parallel .
This also helps to spotlight and highlight innovative talent , boosts initiative across the team , and helps to keep motivation levels at the highest .
Watch on wastage
Biju Unni , Vice President , Cloud Box Technologies
Challenge assumptions
The fast pace of change in technology lifecycles , adoption of new technology solutions , and changing business environment , also creates the risk of having a significant number of processes and operations , which are mainstream , but may have become redundant or obsolete .
The necessity of keeping the light on every day , creates a momentum of co-existence with such redundant and obsolete processes , which is a drag on resources and hinderance to improvement in efficiency .
Blocking access and having rigid controls for business users , creates negative consequences inside the enterprise for the cyber security team . As the importance of business decision makers increases through their growing size of revenue contribution to the overall enterprise sales , or through strategic support centres , negative sentiments toward cyber security practices can slow down their functioning .
Any technology team that is unable to function at its optimum speed to produce change and delivery will soon start realising erosion in its spending budgets and management support .
To avoid such cyclic consequences , cyber security decision makers must continuously review hinderances and blocks that may affect business functioning and business enablement , without reducing risk or creating an opportunity for threat actors .
By giving members of the security team , the flexibility to question previous assumptions and suggest changes ,
The net benefits of reducing such unnecessary controls is improving positive sentiments towards cyber security functions as well positive benefits of freeing up and redeployment of skilled resources to alternative areas .
Key takeaways
• Gartner research shows that 58 % of boards of directors expect to increase their risk appetite in between 2024 and 2025 .
• The ability of cyber security leaders to deliver is being gauged by the success and enablement of business heads .
• Stakeholder ’ s confidence in the ability of cybersecurity leaders to support these initiatives as a trusted partner is not assured .
• Gartner research shows that 47 % of CIOs see cybersecurity risk mitigation processes as a hindrance to digital execution .
• It is important to identity the biggest internal blocks that are hindering the passage of implementation for modern security policies .
• Cyber security leaders must be seen as helping to trade off restrictive control measures in favour of business enablement
• The necessity of keeping the light on every day , creates a momentum of coexistence with redundant and obsolete processes .
• Blocking access and having rigid controls for business users , creates negative consequences inside the enterprise for the cyber security team .
• As the scale of digital transformation begins to sprawl , it is safe to say that the cyber security team will never have complete control of its enterprise .
Empowering to scale
As the scale of digital transformation begins to sprawl for an enterprise , from on-premises to edge to cloud to remote work , it is safe to say that the cyber security team will never have complete visibility or complete control of its enterprise . It is therefore important to build the capability of cyber judgment across the extended enterprise , where cyber security teams do not necessarily have full visibility .
This means empowering qualified business heads to make high quality judgments that are in the best interest of the enterprise , using independent sources of information that may not necessarily and immediately be available to cyber security team members .
By doing so , cyber security team leaders will be viewed as accelerating the scale of digital transformation , building trust across the extended enterprise , and reducing the resistance to the functioning of the cyber security team . p
88 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com