• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

ExecOpinion: Cybersecurity strategies - time to think outside the box

Allan Tan by Allan Tan
May 9, 2023
Cybersecurity strategies - time to think outside the box

Cybersecurity strategies - time to think outside the box

The authors of the paper, Thinking Outside-the-Box for Cyber Defense: Introducing an Innovation Framework for the 21st Century, noted that most defensive cyber capabilities, such as intrusion prevention systems and automated self-healing systems, are typically breakthrough innovations that are expensive, technologically more complex, and require extensive research.

"We believe that to systematically defend cyberspace, every type of innovation is needed to ensure an acceptable level of cybersecurity. In particular, by refusing to concede disruptive innovation to cyber threats and pursuing this type of innovation for the defence, we can prevail in future cyber conflict."

Katherine Hutton, LTC Ernest Wong, Ryan Gagnon
Yvette Lejins

In this FutureCISO series, we ask Yvette Lejins, resident CISO for Asia Pacific and Japan at Proofpoint, for her take on the importance of looking beyond traditional approaches to security monitoring, detection and response to manage a wider set of risks.

"Because cyber threats are becoming more sophisticated! Just last year (2022), TA453 evolved and started using Multi-Persona Impersonation to trick victims," called out Leijins.

She explains this is why organisations must adopt a proactive and holistic approach to manage a wider set of risks since traditional security measures are no longer sufficient to protect against modern threats like ransomware, phishing, and supply chain attacks.

"Integrating threat intelligence, security automation, and employee training to enhance security posture is necessary. Advanced technologies (e.g., machine learning and behavioural analytics) are also needed to identify and respond to threats in real time," she continued.

Developing personal effectiveness

Stuart Madnick, a John Norris Maguire (1960) Professor of Information Technologies at the MIT Sloan School of Management, argues that cybersecurity has reached a tipping point.

"Following decades of private-sector organisations more or less left to deal with cyber incidents on their own. Now, governments feeling a need to “do something,” and many are considering new laws and regulations," he writes in a Harvard Business Review post.

Evolving regulations must now be added to the already myriad challenges security professionals must face as part of their role as stewards of the organisation's security policies and frameworks.

Leijins says to be effective, a strategic cybersecurity leader requires technical expertise, business acumen, and leadership skills.

"A successful CISO should align cybersecurity initiatives with the organisation's business objectives and communicate effectively with executives and board members to demonstrate the value of cybersecurity investments."

Yvette Lejins

Building a strong board-CISO relationship is critical, according to Proofpoint’s Cybersecurity: The 2022 Board Perspective report. "CISOs should be risk experts and consider employee viewpoints while managing risks and bridging security gaps. They should see the bigger picture and be adept at incident management during high-pressure situations," she added.

Keeping cybersecurity strategies relevant

How do you re-evaluate your overall cybersecurity approach to identify opportunities for detecting compromise and immediately investigating and responding?

Proofpoint advocates for people-centric cybersecurity as most attacks originate from someone clicking on a malicious link or downloading a suspicious attachment. Leijins comments that with socially engineered attacks rising, it's crucial that organisations identify very attacked people (VAPs) and determine who is most likely to fall for these attacks to prevent data compromise.

She advises that organisations must also recognise that traditional security approaches are insufficient for remote workforces. With cloud adoption and BYOD (bring your own device) policies, employees can bypass corporate networks and firewalls.

"Implementing layered defences at the email gateway, in the cloud, and at the endpoint, while utilising email authorisation protocols like DMARC and SPF, is necessary to ensure an organisation's protection," she continued.

Essentials to modern security practices

Security tools have evolved over the years to reflect the changing business and technology landscape. Sadly, the pace at which organisations are modernising their security posture, be it in the form of processes and decision-making, may not be in lockstep with the speed, tenacity and even cunningness of threat actors.

And as governments increase their efforts to force industry players to take on the threats with greater zeal, it may be time for organisations to listen and support the CISO and the security team to do their job and do it well. And this includes modernising security to provide the most strategic benefit in a cloud-application-centric and hybrid worker future.

"Security modernisation efforts should focus on adopting a cloud-centric security approach that enables a more holistic view of threats across on-premises and cloud environments," said Leijins. "This should include integrating security tools and technologies to enable quick detection, response, and remediation of threats."

She lists other key aspects including implementing identity and access management controls, prioritising data protection, and embracing a risk-based approach to security.

Security is as much about behaviour and culture

While a lot of attention has been placed around the critical role of technology towards the security of an organisation, at the core of the threat lies human behaviour. Remember the adage: humans are the weakest link.

Source: 2023 State of Phish, Proofpoint

And just to be clear, the "human" in this case is not limited to the untrained consumer or even careless employees of an organisation. It includes well-meaning, even sometimes trained professionals, who by circumstances of the occasion, failed to practice good security hygiene.

This brings us to the topic of investing in holistic behaviour and culture change programs designed to provoke more secure ways of working. Leijins acknowledges that holistic behaviour and culture change programs require a combination of training, awareness campaigns, and policy enforcement to promote more secure ways of working.

While regular security awareness training is critical in helping employees recognise and avoid common threats, according to Proofpoint’s 2023 State of the Phish report only 54% of Singaporean organisations train their entire workforce, and only 2 in 5 conduct phishing simulations.

Attitudes can be everything in this case. The same report reveals that at the global level, only 33% of employees say cybersecurity is a priority, compared to 90% of security professionals who see security as a top priority at their companies.

"Establishing clear policies and procedures around data protection, access control, and incident response and enforcing them consistently across the organisation is equally crucial. A robust security awareness training program and consistent policy enforcement can help protect an organisation's people and data," she concluded.

Related:  Narrowing the gender gap in cybersecurity
Tags: CISOcybersecurity professionalscybersecurity strategyproofpoint
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe