• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

PodChats for FutureCIO: Cybersecurity with software and cloud-first strategies in 2021

Allan Tan by Allan Tan
March 4, 2021
PodChats for FutureCIO: Cybersecurity with software and cloud-first strategies in 2021

PodChats for FutureCIO: Cybersecurity with software and cloud-first strategies in 2021

One of the conclusions of the Cisco 2021 Security Outcomes Study for APJC is that organizations that proactively upgrade technology report more security success. Among the 2,110 respondents to the survey, only 36% reported being successful navigating cybersecurity challenges in today’s remote-first world with software and cloud-first strategies.

In describing the disparity in successfully combating cybersecurity, Kerry Singleton, managing director, Cybersecurity, APJC, for Cisco attribute this to the differing levels of maturity across Southeast Asia. The other factor he reckoned has to do with prevailing local laws.

Will upgrading security solutions fix the problem?

Singleton confided that customers today are having conversations around cloud-delivered security. “When we talk about upgrade, it’s also changing from traditional on-prem based security solutions to cloud-delivered solutions.”

“It is also about adding new things to protect from new attack vectors,” he added as he explained the multiple layers that make up cybersecurity. “When we are talking about upgrading, we are also thinking about how to protect ourselves from different layers in an attack.”

Extending security from the company to its customers

Singleton noted that doing transactions in a medium such as the Internet necessitates the use of encryption.

“There is some formal type of handshake between two persons where there is an opportunity to encrypt the message communication from end to end which means nobody can eavesdrop or do a man-in-the-middle attack.”

He emphasised the importance of having a security framework when it comes to cybersecurity. “When we think about cybersecurity, it is difficult for the executives to get into the details of every single component. Having a framework to follow puts structure around how they protect themselves,” explained Singleton.

Security in the face of sanctioned shadow IT

Singleton acknowledged that Bring Your Own Device (BYOD) and remote working have expanded the attack surface. Compounding the situation is the sanctioned use of shadow IT that give businesses the ability to respond quicker to changing customer behaviour.

“Having good tools in place so you can see every connection going out of the network and every user that is authenticated into the network, allows you to get a very good picture of your exposure from a shadow IT perspective.”

He commented that it is possible to assess the risks and stop the use of applications that are malicious or encourage sensitive data to be shared insecurely out of the organization.

Securing the hybrid operating model

Singleton lists the three pillars of cybersecurity as protect, detect and respond. Already much has been investment around protect. This includes firewalls, VPNs, endpoint solutions, web gateways and DNS solutions.

The challenge he noted is attaining visibility of what is happening, and being able to detect and respond to threats.

“We have a lot of customers speaking to us about how to look at a set of products which are integrated together and detect threats regardless of whether they are in the corporate network or a remote network, or if they are on a Wi-Fi hotspot at a café, and how do they go about responding to those threats.”

He conceded that at present this is a blind spot for a lot of C-suites. “They are not sure what is happening in those remote environments,” he added.

The more things change

As enterprises prepare for a return to a new normal, Singleton see enterprises using the opportunity to become more efficient. He believed enterprises will continue operating the way they do now – with part of the teams working remotely.

This will require organisations to look at a more permanent and long-term solution to providing security and IT services.

“We went from business continuity planning to business continuity execution overnight. We did things in a rush and there were blind spots of things we don’t have visibility into.”

“We understand we are going to do this the long-term and we need to look at a set of solutions which allow us to have the necessary cybersecurity capabilities in the longer term,” concluded Singleton.

Cybersecurity in 2021

“COVID-19 has accelerated the shift from CAPEX models to software0vased solutions that have a re-occurring OPEX models,” observed Singleton. He believed this will not slow down in 2021 as organisations use the opportunity to further digitise processes, including the way of working.

“You will see a lot of customers wanting to have deeper conversations around how they can secure the different types of workers in a better way. You will see customers having conversations around integrated architecture, not just investing heavily on protection but how they go about detecting and responding to threats,” he opined.

Click on the PodChat player above to listen to the full dialogue with Singleton.

  1. Let’s start off with the gist of the study. Very briefly, what is the focus of the study?
  2. How would you compare this security success among the countries in Asia that were part of the survey?
  3. One of the conclusions of the study is the linkage between successful security and proactive upgrade of technology. When you say “upgrade” does it mean “replacing older technologies”?
  4. Not everyone has deep pockets and most leaders, including CFOs, would want to maximise what they can extract from their investments including IT. At what point in the future, should an organisation look at replacing?
  5. BYOD may not be the official culprit and digital transformation may not have empowered business unit leaders. But Shadow IT is growing nonetheless. How do you enforce cybersecurity in an organization where shadow IT is encouraged by leadership?
  6. How do you secure the infrastructure – on-prem, off-prem and at the edge, and to do it with real-time visibility and control?
  7. Why is Cisco interested in cybersecurity?
  8. Any final thoughts around cybersecurity in 2021 – with and without COVID-19?
Related:  Oracle to invest in AI and cloud computing in Malaysia
Tags: CiscoCOVID-19cyber threatscybersecurityPodchatsremote workingShadow IT
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers
Show More

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

Select Category
    • Privacy Policy
    • Terms of Use
    • Cookie Policy

    Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

    Login to your account below

    or

    Not a member yet? Register here

    Forgotten Password?

    Fill the forms bellow to register

    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    No Result
    View All Result
    • Management Leadership
      • Growth Strategies
      • Finance
      • Operations
      • Sales and Marketing
      • Careers
    • Technology
      • Infrastructure and Platforms
      • Business Applications and Databases
      • Big Data, Analytics and Intelligence
      • Security
    • Industry Verticals
      • Finance and Insurance
      • Manufacturing
      • Logistics and Transportation
      • Retail and Wholesale
      • Hospitality and Tourism
      • Government and Public Services
      • Utilities
      • Media and Telecommunications
    • Resources
      • Whitepapers
      • PodChats
      • Videos
    • Events
    Login

    Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

    Subscribe