• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Winning at cyber security means thinking like a hacker

James Nunn-Price by James Nunn-Price
March 2, 2022
Photo by Kammeran Gonzalez-Keola from Pexels

Photo by Kammeran Gonzalez-Keola from Pexels

As security threats run aplenty, new vulnerabilities faced from remote working and the upward trajectory of malicious activity, including ransomware continues to hit businesses in the region.

The state of cyber resilience today

The security landscape has become increasingly fraught with danger. There were on average 270 attacks per company recorded in 2021, a 31% increase from 2020.

Security is fast becoming an imperative for most organisations. Accenture’s latest State of Cyber Resilience Report revealed that 85% of global respondents agree that cyber security strategies need to be developed with business objectives in mind.

Source: Accenture 2022

Yet, the truth is that 78% do not know when or how a cyber security incident will affect their organisation. The report also found that 81% of respondents also report struggling with staying ahead of their hackers, citing it as a “constant battle” with “unsustainable costs”. 

Facing the security crossroads

Unsurprisingly, security budgets have increased. Accenture notes that IT security budgets are now up to 15% of an organisation’s total IT spend, 5% higher than the spendings reported in 2020.

As they look to defend themselves against the increasingly rampant cyberattacks, organisations find themselves at a cyber crossroad. Most think of cyberattacks as an either-or situation, where they are forced to choose between business objectives or their security priorities.

However, there is a third option to these long-outdated approaches. Cyber Champions, defined by Accenture as organisations that were able to achieve strong business performance while maintaining super cyber resilience were found to be ahead of the pack because of their ability to strike a balance between the two.

Absolute security is impossible, and organisations need to move from a posture of cyber security to one of cyber resilience. While cyber security is about reacting, cyber resilience is about anticipating and being able to continuously deliver on the intended outcomes despite adverse cyber events.

By adopting a stance that incorporates cyber resilience, Cyber Champions were better at stopping attacks, were faster at finding and fixing breaches, and were more adept at reducing the impact of cyber threats. This is as compared to their peers who were still relying on traditional cyber security postures.

Let CISOs do their jobs

To contend with hackers, leaders must first learn to think like them. Understanding how information can be uniquely externalised and exploited by adversarial forces is key to getting inside the minds of cyber attackers and helping organisations stay ahead of them.

Within the company, Chief Information Security Officers (CISOs) are the individuals best placed to do this, but they must be able to marry their technical knowledge in areas of information and data security with a keen understanding of the business.

Which can only be done when CISOs are deeply embedded in the heart of the business decision-making process and are no longer operating in a security-focused silo. Accenture research finds that by aligning cybersecurity and business needs, firms can reduce the frequency of successful cyberattacks and reduce their cost by up to US$294,000 per instance.

With a seat at the table, CISOs can gain a broader perspective that serves the whole business well. This also means they will be better equipped to uncover potential weak points and prioritise securing the data and applications that are the most mission-critical to the business.

We also find that CISOs with more autonomy over their cybersecurity budgets fared better at staying ahead of threat actors.

Keep an eye on what hackers want 

Like business competitors, cybercriminals and more advanced adversaries are innovating continuously. Businesses and their security teams must do the same and do so within budget.

By taking a threat-centric approach and identifying the firm’s “crown jewels” – the data and applications most critical to the business – teams can then better design and execute threat and vulnerability programs that secure and deny access to them.

This requires firms to be realistic about their cyber security postures. The most prepared organisations measure and monitor the maturity of their cyber security programmes at least once a year to identify new or emerging gaps.

For example, many companies would have identified gaps in cyber security readiness with staff potentially not having the required knowledge to stay secure as they shifted to predominantly remote work models. This would have been combatted through education and potentially implementing more stringent access controls.

Additionally, working with red teams – white hat hackers that test an organisations’ cyber defences – to simulate attacks and actively seek out weak links can provide valuable information in conceptualising how your IT ecosystem could be vulnerable.

Remaining nimble

In a constantly shifting threat landscape, knowledge is power, but only if we can act on it. To make insights and threat intelligence actionable, organisations need to ensure that they have a robust security system that can adapt to the demands of a cloud-first world.

Cloud has opened new doors for hackers; easy remote access has turned computer systems into coffee shops where people and services move in and out. Leveraging cloud for security will help organisations better adapt to the rapidly evolving digital landscape and respond more effectively to modern security challenges.

This becomes increasingly pertinent as the world transitions quickly into a cloud-first one. In fact, over the next three to five years, it is predicted that more than two-thirds of workloads within APAC businesses will shift into the cloud.

Despite this, nearly one-third of global respondents say that security is not part of the cloud discussion from the outset, and report that their organisation is trying to play catch-up.

With 44% of APAC respondents citing security and compliance risk as one of the top barriers to cloud migration, security is seen as the biggest inhibitor to a cloud-first journey when in reality, it can be its greatest accelerator.

Too often, security is only added at the end of the cloud-first journey which leaves the organisation vulnerable to attacks. Thinking like a hacker means ensuring that these potentially vulnerable areas are secure and consistently embedding security within every aspect of it.

Focusing solely on business objectives exposes organisations to the threat of cyber attacks, especially in a world where responding to and preventing cyber threats have become a non-negotiable.

Nurturing the right conditions, fostering a mindset of resilience, and working actively to adapt people and processes will be part of winning the race towards cyber resilience.

Related:  Time to reimagine assumptions and turn uncertainty into certainty
Tags: AccentureCISO
James Nunn-Price

James Nunn-Price

James Nunn-Price is a senior managing director leading Accenture’s Growth Markets Security business — which spans cyber defense, applied cybersecurity solutions and managed security services — across Africa, Australia & New Zealand, Greater China, India, Japan, Latin America, the Middle East and Southeast Asia. Nunn-Price has more than 20 years of experience in cybersecurity, including in cyber incident responses, managed security services and cyber transformation programs. He will join a global practice of more than 8,000 cybersecurity professionals and report to Kelly Bissell, Accenture’s global lead for Security. Nunn-Price holds a Bachelor of Science in Computer Science and Management Science from the University of Kent, along with several certifications in security and cloud technology. He is based in Sydney, Australia

No Result
View All Result

Recent Posts

  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams
  • Dropbox updates universal search and knowledge management product
  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe