free counter

The problem with this cybersecurity problem

Image Credit: Getty Images

Were you struggling to attend Transform 2022? Have a look at all the summit sessions inside our on-demand library now! Watch here.

The thing is not there are problems. The thing is expecting otherwise and convinced that having problems is really a problem.

Theodore Isaac Rubin, American psychiatrist

Weve got a cybersecurity problem, but its not the main one we think we’ve. The thing is in how exactly we consider cybersecurity problems. Way too many folks are stuck in a reactive loop, searching for silver bullet solutions, whenever we have to change how exactly we view cybersecurity problems instead.

For CISOs at companies worldwide, across every industry, the struggle is real. Theres an incident, and the business reacts. All too often, the response is to purchase a new software product that’s eventually destined to fail, starting the reactive cycle yet again.

The difficulty with this particular approach is that it forecloses the chance to be proactive rather than reactive, and given the rising stakes, we genuinely require a holistic approach. In the U.S., the common cost of a data breach now exceeds $4 million, and that could not include downstream costs, such as for example higher cyber insurance rates and the revenue hit the business may experience because of reputational damage.

We are in need of a fresh approach, and lessons from the generation ago can point us in the proper direction. In the past, cybersecurity professionals created disaster recovery and business continuity plans, calculating downtime and its own disruptive effects to justify investment in a holistic approach. We are able to do this again, nonetheless it will demand less concentrate on tools and much more clarity of purpose.


MetaBeat 2022

MetaBeat provides together thought leaders to provide help with how metaverse technology will transform just how all industries communicate and conduct business on October 4 in SAN FRANCISCO BAY AREA, CA.

Register Here

Clear as mud: Marketplace complexity and diverse cybersecurity needs

One barrier to clarity may be the growing volume and sophistication of threats and the corresponding proliferation of tools to counter those threats. Fast cybersecurity solution growth had been a trend prior to the pandemic, but work-from-home protocols significantly expanded the attack surface, prompting a renewed concentrate on security and much more new solution market entrants.

The option of new tools isnt the problem most of the cybersecurity solutions available today are great and sorely needed. But expansion of an already crowded marketplace, alongside proliferating threats and evolving attack surfaces, helps it be a lot more challenging for CISOs to learn which way to choose.

Further complicating matters may be the proven fact that each organization has unique cybersecurity needs. They will have different assets to safeguard, and the perfect schema varies considerably across organizations in accordance with size, infrastructure (cloud vs. on-premise, etc.), workforce distribution, region along with other factors. Gaining clarity takes a shift in mindset.

Gain clarity by concentrating on outcomes rather than tools

CISOs that are stuck in a reactive loop can begin to get away from that pattern by concentrating on outcomes rather than tools. The quote from Theodore Isaac Rubin near the top of this short article is instructive here; the issue cant be solved by replacing a failed tool, though according to the circumstances, which may be necessary.

The thing is the attitude concerning the larger problem, i.e., the delusion that people can solve our cybersecurity woes by choosing the best product. The thing is being surprised when that doesnt work, repeatedly.

Instead, its time and energy to focus on the required outcome one which is exclusive to each organization based on its threat landscape and seek solutions across people, processes and technologies to attain that desired state. It cant be about software and platforms. If the pandemic years have taught us anything, its that folks and processes need to be section of the solution too.

The business enterprise case for a fresh approach

A concentrate on outcomes and an idea that encompasses people, processes and technologies is really a modern strategy that borrows a full page from the disaster recovery and business continuity plans of days gone by in that it really is comprehensive. It makes up about the revenue hit connected with cybersecurity exposure and justifies investment in a fresh method of avoid those costs thats area of the business case.

Another argument and only change is that its had a need to address the speed of which threat vectors grow and asset protection must evolve today. At way too many companies, the existing cybersecurity posture is analogous to just how operating systems was previously periodically updated vs. the live updates we depend on now. Everything moves faster now, so looking forward to a fresh release isnt acceptable.

A fresh approach will demand broader input to formulate a satisfactory response because threats tend to be more distributed than ever before. CISOs need internal input from employees and business unit executives. They want information from the FBI and cybersecurity thought leaders. Many will demand a partnership to steer the business through this journey and enable the business to spotlight its core business.

Choosing the best cybersecurity solution

Identifying the correct cybersecurity solution starts with defining critical business assets and a desired outcome. For CISOs who opt to partner having an expert to greatly help them succeed with this journey, its smart to look for a team that isnt selling a specific tool. Its also vital that you consult experts who recognize that solving the cybersecurity problem calls for people, processes and technologies.

Folks are always likely to function as front type of defense, so creating a security-minded culture and matching processes will undoubtedly be critical. Somebody who understands the key role people play is therefore essential. Its also advisable to demand proof points from potential partners, such as for example access to a person who spent some time working with the team by way of a breach.

Our cybersecurity problem isnt what we believe that it is. The true problem is really a failure to simply accept there are no magic bullets and that just a holistic approach that addresses the real scale of the threat and all areas of the attack surface is add up to the task. CISOs who accept this may get away from the reactive loop and proactively reduce organizational risk.

Peter Trinh can be an SME in cybersecurity at TBI Inc.


Welcome to the VentureBeat community!

DataDecisionMakers is where experts, like the technical people doing data work, can share data-related insights and innovation.

In order to find out about cutting-edge ideas and up-to-date information, guidelines, and the continuing future of data and data tech, join us at DataDecisionMakers.

You may even considercontributing articlesof your!

Read More From DataDecisionMakers

Read More

Related Articles

Leave a Reply

Your email address will not be published.

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker