FEATURE: CYBER SECURITY- STAFF & RECRUITMENT
SOFTWARE DOES NOT PROVIDE THE ANSWERS; IT PROVIDES THE TOOLS AND DELIVERS THE DATA NEEDED TO DISCOVER ANSWERS. THIS IS WHY ENTERPRISES ARE SHIFTING TOWARD A NEW SECURITY MODEL, ONE THAT IS CHARACTERISED BY CENTRAL COMMAND- AND-CONTROL AND DISTRIBUTED ENFORCEMENT, ANCHORED BY SECURITY INTELLIGENCE AND ANALYTICS
a new security model, one that is characterised by central command-andcontrol and distributed enforcement, anchored by security intelligence and analytics.
Every company is a security company: Security concerns are now top-of-mind not only for companies, but also for consumers. Breaches undermine confidence in both public and private organisations. This trust erosion leads to a decline in customer confidence in the integrity of your products. Without trust, customers will go elsewhere. Maintaining trust through state-of-the-art security capabilities can help you stand out in a crowded market. Innovative securityenabled solutions— such as mobile payments, virtual and automated advice, and customer collaboration tools— can create more valuable and relevant interactions.
Recommended actions for security professionals:
• Develop a cyber security strategy: cyber security strategies should be holistic. They should be:
• Developed in collaboration with critical business units- If your strategy is created in a vacuum, it will not align with business needs. It is recommended that businesses embed security personnel into business units, so security strategy can be baked in instead of bolted on.
• Focused on business growth – If you bring value with your strategy, security becomes a business differentiator and revenue generator, transforming security from a cost centre to a growth centre.
• Validated at the board level – Executive leadership that prioritises security is one of the signs of security sophistication. Keeping company executives informed and involved in data breach preparedness and response plans is essential for maintaining a sophisticated security posture.
• Dynamically managed – Threat actors continuously adapt and so should a business’ s cyber security strategy. Treat it like it is a living, breathing, constantly questing process. If you let it languish, your threat posture also suffers.
Cyber security is not just about IT. A business strategy has to include OT.
34 INTELLIGENTCIO www. intelligentcio. com