Intelligent CIO Middle East Issue 11 | Page 34

FEATURE : CYBER SECURITY - STAFF & RECRUITMENT
SOFTWARE DOES NOT PROVIDE THE ANSWERS ; IT PROVIDES THE TOOLS AND DELIVERS THE DATA NEEDED TO DISCOVER ANSWERS . THIS IS WHY ENTERPRISES ARE SHIFTING TOWARD A NEW SECURITY MODEL , ONE THAT IS CHARACTERISED BY CENTRAL COMMAND- AND-CONTROL AND DISTRIBUTED ENFORCEMENT , ANCHORED BY SECURITY INTELLIGENCE AND ANALYTICS
a new security model , one that is characterised by central command-andcontrol and distributed enforcement , anchored by security intelligence and analytics .
Every company is a security company : Security concerns are now top-of-mind not only for companies , but also for consumers . Breaches undermine confidence in both public and private organisations . This trust erosion leads to a decline in customer confidence in the integrity of your products . Without trust , customers will go elsewhere . Maintaining trust through state-of-the-art security capabilities can help you stand out in a crowded market . Innovative securityenabled solutions — such as mobile payments , virtual and automated advice , and customer collaboration tools — can create more valuable and relevant interactions .
Recommended actions for security professionals :
• Develop a cyber security strategy : cyber security strategies should be holistic . They should be :
• Developed in collaboration with critical business units - If your strategy is created in a vacuum , it will not align with business needs . It is recommended that businesses embed security personnel into business units , so security strategy can be baked in instead of bolted on .
• Focused on business growth – If you bring value with your strategy , security becomes a business differentiator and revenue generator , transforming security from a cost centre to a growth centre .
• Validated at the board level – Executive leadership that prioritises security is one of the signs of security sophistication . Keeping company executives informed and involved in data breach preparedness and response plans is essential for maintaining a sophisticated security posture .
• Dynamically managed – Threat actors continuously adapt and so should a business ’ s cyber security strategy . Treat it like it is a living , breathing , constantly questing process . If you let it languish , your threat posture also suffers .
Cyber security is not just about IT . A business strategy has to include OT .
34 INTELLIGENTCIO www . intelligentcio . com