• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Modernising security starts and ends with culture

Allan Tan by Allan Tan
May 25, 2023
Photo by Thomas Windisch: https://www.pexels.com/photo/black-and-white-cctv-cameras-179993/

Photo by Thomas Windisch: https://www.pexels.com/photo/black-and-white-cctv-cameras-179993/

CISOs and security professionals are in an unenviable position: they deal with relentless cyberattacks from across an expanding attack surface, some regulations may at times appear to conspire against ever meeting compliance, and the plethora of solutions can render inexperienced practitioners to freeze from the sheer variety of approaches and tactics to solve the challenges.

Looking beyond the traditional

Vivek Gullapalli, chief information security officer (CISO) for APAC at Check Point Software Technologies, opines that in many organisations, cybersecurity controls have been a band-aid approach of only fixing what’s broken — a reactive cycle.

"In today’s security climate, traditional approaches are simply not sufficient. Cybercriminals are leveraging sophisticated tools to aid their attacks, their methods highly intelligent and coordinated," he added.

While he acknowledges that detection and response are important, he suggests that organisations focus more on the prevention of such attacks. "A prevention-first approach provides organisations with the ability to be proactive and give defenders an advantage over the adversary," he continued.

Concurring with Gullapalli, Synopsys Software Integrity Group's head of solutions strategy, Phillip Ivancic, says real-time information is vital in today’s climate — just like a car alarm will alert an owner if someone is attempting to steal their vehicle.

"However, a car alarm will not make a vehicle safe to go around a racetrack at speed – only a good set of breaks can do that!" he quipped.

"The best security leaders I’ve observed are able to frame their decisions and priorities to invest in business agility in addition to risk reduction," Ivancic commented.

To be effective

Gullupalli noted that the digital era requires an expanded set of leadership qualities, including a broader understanding of the overall business, products, customers, finance, compliance, growth and the direction the organisation is heading.

Ivancic believes that the most effective cybersecurity leaders can link proposed security controls to specific and measurable business outcomes.

Calls for re-evaluating cybersecurity approaches

According to Gullapalli, post a security incident it is important to dig deeper to identify root causes and gaps. The best way to identify the gaps would be to look at the cyber-attack path and determine what controls could have stopped this attack earlier.

Vivek Gullapalli

"Adopting MITRE ATT&CK or “Cyber Kill Chain” can also provide a deeper understanding of the potential attack path and identify which controls need to be implemented to mitigate risks. Mapping the NIST or ISO 27001 frameworks against Cyber Kill chain/MITRE would provide a good assessment of where the controls need to be enhanced."

Vivek Gullapalli

"Other powerful tools that can help improve the overall defence across the organisation include Artificial Intelligence (AI), Machine Learning (ML), and threat intelligence integration into security controls," he continued.

Ivancic warns that it is expensive to deal with a compromise compared with the cost of early prevention. That’s why “security by design” is important. This means conducting “threat modelling” and “architecture review” exercises early during a project.

"This allows threats to be mapped out and preventative controls to be built into the project straight from the design phase. This has been proven to reduce re-work and improved time to market," he continued.

What needs to happen

“Culture eats strategy for breakfast” and the same is true for cybersecurity. 

"When Cyber security is seen as an enabler, business leaders and staff will naturally champion its adoption," said Gullapalli. "People, if given the right opportunity, will identify problems or issues or how to make it better."

He cautioned that these problems or issues could be security gaps and if not remediated, could result in risk to the organisation. However, if the organisation is not open to recognising people for coming forth to raise an issue and instead reprimands them, the culture will shift to ‘be quiet and don’t say’.

"This is extremely dangerous for an organisation. Thus, it is extremely vital for CISOs to champion the security culture shift as a common goal/shared responsibility to protect the organisation," continued Gullapalli.

One global bank Synopsys works with found threat modelling so effective at reducing the cost of re-work and project overruns, they embarked on a large training rollout to ensure the skills required are ubiquitous across their organisation.

Phillip Ivancic

"Culture change and skills transfer was a combination of hands-on learning, typically achieved with Synopsys experts shadowing projects as they started their ‘secure by design’ activities and formal instructor-led training courses."

Phillip Ivancic

"All this was underpinned with e-learning modules to support the new skills being rolled out," he concluded.

Related:  70% of APAC businesses are ill-prepared for an uncertain future
Tags: Check Point Software TechnologiesSynopsys Software Integrity Group
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe