The bold decisions CISOs need to make today

Issue 6 2021 Information Security

This is a rare opportunity to drive an agenda that puts security at the heart of every future step. And we know that business leaders are receptive: security has shot up the boardroom agenda with 58% of business leaders noting improving data and network security as the issue of most importance to the organisation over the past year. More than ever, CISOs (chief information security officers) are getting involved in decision-making from the outset – and they need to be ready to lead from the front.

Organisations are changing how they operate as they begin to get a clearer vision as to what the future of work looks like.


Kevin Brown.

We’re entering the era of hybrid working, where some employees remain homeworkers, others return to the office full time and a large part of the workforce splits their time between the two. Organisations that want to win people back to the office need to pay close attention to their users’ experience – why should they stop working from home where they’ve got a steady supply of the coffee of their choice, a comfy sofa for breaks and a good broadband connection? Offices need to play connectivity catch-up if they’re to supply the seamless experience expected for effective collaboration and productivity.

This is an opportunity for organisations to baseline what they have and clear out the skeletons from the closets. It’s not often leaders get the freedom to fundamentally rethink how their business operates. This is a chance to be bold about the infrastructure plans and security investments, to put the organisation in the best possible place to capitalise on growth and tackle any future challenges.

Standing firm against a growing threat landscape

As well as preparing for the future of work, organisations are recognising that the threat landscape is escalating in an ominous way and are looking to do something about it. In recent research we conducted with over 7000 business executives, employees and consumers, 75% of executives said there are more security threats to their organisations every year. So, leaders know they have to be able to react quickly to threats, whilst also building flexibility and elasticity into their infrastructure to see them through at least the next three to four years. And it makes sense to incorporate security from the beginning.

Operating during the pandemic has given organisations renewed confidence that they can make changes at pace, supported by the rise of cloud providers. They’ve realised that agile development is a strong alternative to more traditional and slower waterfall iterative transformation and they’re seizing the moment.

This is a critical time to rethink how the organisation operates, how leaders want their employees to work and what they need from their connectivity and security.

Missing this golden opportunity has consequences

I believe that organisations that don’t make strong moves with their security now risk being left behind. It’ll be a lost opportunity to really capitalise on market growth. Users are becoming increasingly dissatisfied with their connectivity and this affects operational efficiency. And as the threat landscape expands, if organisations don’t make rapid changes to their security, their vulnerability to cyber-attacks will increase.

Some organisations will be more at risk than others. For instance, a cloud-native organisation is likely already in good shape. But those organisations that evolve their infrastructure and security slowly, tend to have to bolt on security, incurring greater costs in the long run. Ironically, being adventurous and strategic in the first instance can save the organisation money.

The bold decisions to take today

So, where to start? Well, above all I believe CISOs should be ambitious in their decisions and below I’ve outlined my suggested focus areas.

1. Put customers and users at the heart of security plans

Explore what will enable them to work in the most productive and secure way, without security causing friction. The idea is to deliver a seamless user experience with invisible security.

2. Make sure security is embedded in all plans

So many organisations today have a lot of different point solutions, but no overarching strategy. Thinking boldly now could protect the organisation against an escalating threat landscape.

3. Ensure the business has visibility and control

Data is increasingly flowing in ways that don’t involve the enterprise network, widening the organisation’s risks and decreasing its control. Threat actors are alert to the possibilities these potential new weaknesses bring, so it’s vital to have end-to-end visibility, from the user/device to the application/data.

4. Embrace automation

Think about how automation can be used as a cost-effective way to take the pressure off security teams so that they can focus on what’s critical.

5. Look for security partners that can help achieve the business aims

Be clear-sighted about what a co-managed security model could provide and how it could be used to stay ahead of threats. Although organisations can be reluctant to outsource completely, working with a partner on a co-management approach is an effective way to fill any expertise gaps.

Get involved in early strategy

Traditionally, the CISO hasn’t always been involved in shaping the strategy. However, right now, when security is at the top of the boardroom agenda, CISOs need to be at the heart of decision-making, shaping and driving a security policy that will protect the organisation as it emerges from the pandemic.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...