• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Build a security strategy aligned to resilient business directives

Allan Tan by Allan Tan
August 27, 2020
Photo by Pixabay from Pexels

Photo by Pixabay from Pexels

Digital transformation (DX) has expanded the availability, velocity, and mission-critical need of data. The COVID-19 pandemic has exacerbated the DX imperative and compounded it with almost unrealistic pressures on time-to-market for projects while keeping the lights on – not just for IT but for the entire organisation.

Despite the attention paid to DX efforts, one area that continues to be a mainstay of interest for leadership and the entire organisation is security.

The Ponemon Institute/ServiceNow study titled, Costs and Consequences of Gaps in Vulnerability Response, revealed that cybersecurity breaches are occurring faster than the ability of cybersecurity teams to respond.

Why enterprise security is failing miserably

While proactive mitigation is the preference, the reality is that the complexity of the IT infrastructure makes it extremely difficult to provide full security cover.

Sixty percent of respondents to the study acknowledged that the breached they experienced was due to an unpatched known vulnerability where the patch was not applied.

The study highlighted a disturbing pattern, there is greater awareness of the importance of timely patching vulnerabilities (44% in 2019 vs 40% in 2018) and yet there is actually a decline (50% in 2019 vs 52% in 2018) in the ability to quickly detect vulnerabilities and preventing threats.

Lame excuse or focusing on the wrong approach?

In 2019, it takes 43 days to detect a cyberattack once a patch is released for a high priority vulnerability, an increase from 36 days in 2018. What happened?

According to 52% of the respondents, 67% of whom are CIOs, head of IT, head of IT security or head of enterprise risk management, said their organisations are at a disadvantage in responding to vulnerabilities because they use manual processes.

Another excuse is ownership of responsibility with 88% of respondents claiming their team is not fully responsible for patching. Coordinating with other teams means an additional 12 days delay in getting the patch done.

Source: Costs and Consequences of Gaps in Vulnerability Response, Ponemon Institute/ServiceNow 2020

Vulnerability patching is delayed because of a lack of resources, no common view of applications and assets and no ability to take critical applications and systems off-line so they can be patched quickly.

Paradox of the digital era

Gartner forecasts cybersecurity spending to reach US$123 billion in 2020. Who has this kind of money when businesses are trying to contain the bleed from declining revenue and rising cost of keeping remote working processes secure?

Source: Costs and Consequences of Gaps in Vulnerability Response, Ponemon Institute/ServiceNow 2020

In 2019, organisations spend an average US$1.439 million on vulnerability management, up over 24% from 2018. That is US$282,750 that could either go back to profit or spent on other activities to generate more revenue.

Tony Stark (or Iron Man on his day job) is quoted as saying: “Is it better to be feared or respected? I say, is it too much to ask for both?”

Paraphrasing Tony Stark’s is it better to be feared or respected question: “Do I focus on security (data protection) or revenue?” The rhetoric should be: Is it too much to ask for both?

Understanding the complexity paradox

To be fair to those responsible, managing the security of an organisation has become expansively complex.

There are at least 13 areas that require attention: threat intelligence, incident response platforms, security, automation, security information and event management, artificial intelligence or machine learning, user behaviour analytics, data loss prevention, firewalls, web security, sandbox, manual processes using spreadsheets and paper, endpoint security and email security.

It’s almost like you need a small army to protect the business, its employees, partners and customers. It’s a full-time job! For organisations that see this role as in-house, what is their option?

A better future starts here

With cybercriminals employing artificial intelligence and machine learning to improve their attacks, perhaps it is time for enterprises to do the same. But what is required is more than just adding AI/ML into the game. It is also about improving visibility over the security landscape of the enterprise, followed by a workflow that encourages responsibility.

Where to begin?

Write to us at [email protected] and share with us your views on how security should be approached to ensure business resilience without sacrificing data privacy and data protection.

Related:  Tech advancements drive Social Media Management Software Market growth
Tags: COVID-19digital transformationGartnerPonemon InstituteServiceNowvulnerability response
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams
  • Dropbox updates universal search and knowledge management product
  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe