Securing digital systems herculean task for CISOs

Traditionally, data and systems had perimeters and it was easier to manage their security. In the increasingly digital world, systems and data have fewer boundaries. They are accessible from anywhere and everywhere, over cloud, mobile, Internet of Things. Securing systems and data in this extended perimeter is a herculean challenge for most of the CISOs.

The key enablers driving adoption of cyber security are regulatory changes, growing awareness at top management of the threat landscape and increasing adoption of digital transformation as a journey by more and more organisations.

Technology should be an enabler to business capabilities rather than simply a cost center. It should enable businesses to increase connectivity, enhance customer experience, automation and predictive analytics. Digital transformation is a journey which should be measured by the enhanced customer experience and automation.

In today’s digital world, key skills expected from every CISO are an understanding of the business and the ability to communicate the cyber security challenges in a business language.

The introduction of a new wave of technologies has created tremendous opportunities for technology, as well as consulting vendors in terms of helping businesses adopt and customise these technologies to their business needs. At the same time, this has created challenges in terms of the security of these technologies, compliance to the regulatory requirements, data privacy, technology awareness of the business users.

The upside would be that cyber security solutions from vendors drastically reduce the implementation timeline. A downside is that every new cyber security solution from vendors may create a new set of challenges for business users to adapt to its functionalities.

A typical product portfolio in cyber security should help businesses better identify cyber risks, implement necessary controls to better manage cyber risks and respond fast to a situation in case of any cyber security incident.

The expectations of channel partners are to be able to address a specific business requirement, provide long term support and maintenance, and deliver technology specific trainings.

The expectations of end customers are to be able to innovate to keep up with the evolving threat landscape and technology changes, provide long term support and maintenance, and deliver technology specific trainings.

Sheikh Shadab, Associate Director Cyber Security, KPMG.

Key takeaways

  • The enablers driving adoption of cyber security are regulatory changes, awareness at top management, adoption of digital transformation.
  • Technology should be an enabler to business capabilities rather than simply a cost center.
  • Digital transformation is a journey which should be measured by the enhanced customer experience and automation.
  • The expectations of channel partners are to be able to address a specific business requirement.
  • The expectations of end customers are to be able to innovate while keeping up with evolving threats.

CISOs are under pressure with data being leveraged across the digital enterprise and stricter regulatory compliances.