In the beginning, digital technologies were alien to organizations and their cultures. But over time this changed, as C-suites and boards became more familiar with digital and its unprecedented ability to transform growth. Today, digital is integral to core business strategies. Organizations are poised to do the same with cybersecurity. But first, organizations need to change the way they are approaching security:
Security teams are getting better—but there is still work to be done. Organizations are now preventing 87 percent of all targeted attacks. But they still face two to three security breaches a month.
Organizations could be cyber resilient in two to three years—but pressure grows daily. Ninety percent of respondents expect investment in cybersecurity to increase in the next three years but only 31 percent expect that increase to be significant (double or more).
New technology is critical—but investments are lagging. Eighty-three percent agree new technology is essential. Only two out of five are investing in AI, machine learning and automation technologies.
Confidence remains high—but a more proactive approach to cybersecurity is needed. More than 80 percent of respondents are confident about monitoring for breaches. But 71 percent say cyber attacks are still a “bit of a black box” and do not know when or how they will impact their organization.
The C-suite and board are more active in cybersecurity—but the CISOs role must adapt. Twenty-seven percent of cybersecurity budgets are authorized by the board of Directors and 32 percent by the CEO. The CISO’s role needs to evolve, to be more integrated with the business.
Five steps to cyber resilience
Organizations interested in innovative business models, building extended business ecosystems and adopting more flexible workforce arrangements need to find a secure and safe way to do so. Here are five steps that can help:
Build a strong foundation.
Identify high-value assets and harden them. Prioritize legacy systems. And prepare for the worst.
Pressure test resilience like an attacker.
Enhance both red attack and blue defense teams with player-coaches that use threat intelligence and communicate closely to provide analysis on where improvements need to be made.
Employ breakthrough technologies.
Automate defenses. Use automated orchestration capabilities and advanced behavioral analytics.
Be proactive and use threat hunting.
Develop strategic and tactical threat intelligence. Monitor for anomalous and suspicious activity.
Evolve the role of CISO.
Progress the next-generation CISO—business adept and tech-savvy.