CONNECTING THE DEFENCE COMMUNITY WITH INSIGHT, INTELLIGENCE & OPPORTUNITIES

Officially Supported By: Defence Contracts International Supply2Defence

Official Media Partners for:

Writing for Defence Online, Kevin O’Leary, Field chief security officer for Asia Pacific region, Palo Alto Networks looks at how security should be successfully integrated into businesses.

When I started in the field of information security over 20 years ago, securing the perimeter seemed like an achievable goal. Much of the focus was on network penetration, intrusion detection, and securing host devices. Cybersecurity conversations were highly technical, impenetrable to those not versed in the area, and often ignored business imperatives. The assumption about security was that one approach would fit all.  

Today’s environments are quite different. We have mobile devices everywhere, cloud services, virtual infrastructure, personal applications being used at any place any time, and smart things inside and outside of our organisations. Our networks are fluid, perpetually changing based on new data sources that often look and act nothing like traditional computer endpoints. Now, add in a few other factors like a creeping compliance footprint, stringent data governance standards, and dramatically higher costs of service interruptions.  

That old organisational model of the security team off by itself, hunting for and fixing problems far away from the centres of business activity, no longer makes any sense. Security must take place where the action is—in the business units, in close concert with business stakeholders.  

Any organisation that does not give security a seat at the table—and within every department of the enterprise—is setting itself up for higher risk and far greater chance of failure. Even more than sophisticated new tools and more useful services, this is critical to a safe and secure organisation. 

When I think about this new security paradigm, I look at it from three angles: 

  1. Why security must have a seat at the table. 
  1. Why that has to happen in every department. 
  1. How you make that happen. 

First, security has to have a seat at the table because what we are being asked to secure is not the technical underpinnings such as servers, storage, networks, and software. What is being protected are data, identities, intellectual property, and business processes. As security professionals, we have built our careers on a foundation of technical knowledge and access to great security tools. But that no longer is enough. 

Security is rooted in improving business outcomes and reducing business risk. That means we have to understand where we have commercially sensitive assets and how those assets are connected to the organisation’s core business processes. Because so many CISOs have come up through the technical side of the house, they are not innately comfortable with business issues such as improving inventory turns, enhancing brand reputation, or facilitating supply chains.  

We need partners on the business side—and they need us—probably more than they might know or be willing to admit. When we sit together and discuss cybersecurity threats to business operations and the impact on our sales, profits, and reputation, our collaboration inevitably yields a broader array of issues, richer solutions, and better execution to secure our digital businesses. And, because security budgets are increasingly funded by different business units rather than solely from a central InfoSec budget, we all need to be on the same page when it comes to what we are going to spend money on and what our priorities need to be. 

Now, let’s talk about the second issue: giving security a seat at the table in every department. With every organisation becoming a data business, we’ve learned the hard way that all parts of an organisation are at risk to malware, zero-day attacks, advanced persistent threats, identity theft, ransomware and more.  

Attackers don’t just go after the engineering department’s pending patent applications, or the sales organisation’s customer lists, or the CFO’s notes on pending acquisitions. Every department of every organisation is at risk, and you must have your business leaders and your security team putting their heads together to identify risks, weigh potential impacts, plot strategies, execute defensive plans, and measure outcomes.  

What experience has taught us is that our networks don’t just enable the free flow of data across boundaries and IT architectures; they actually act as catalysts for change. For instance, marketing campaigns yield digital data that salespeople use to interact with specific customers, which results in constantly morphing sales forecasts that interactively drive manufacturing build plans and component sourcing. When data crosses these dotted lines, security has to be integrated into every department. Bad guys don’t respect organisational boundaries. 

So, when organisations begin to understand the necessity and benefit of giving security a seat at the table—within every department—it then comes down to what leadership can do in order to make that a reality.  

One often-discussed approach involves rethinking the organisational chart—specifically, to whom the CISO should report. While in some industries the reporting line has started to change—most notably in the financial industry—the CISO more often than not reports into the CIO or CTO as part of the overall IT organisation. This removes their ability to be part of the overall conversation around business strategy. Even if the CISO reports to a top business executive (rather than to the CIO or CTO), it is rare that this is enough to ensure security truly has a seat at the table across the organisation. 

The increased transition of DevOps into DevSecOps—where security becomes part of the application development process from the start rather than at the tail end of the process—is another important step in the right direction that business leaders would do well to understand and adopt.  

Today, security risks can—and do—pop up anywhere and at any time. If security is not in lockstep with business stakeholders, threats will emerge, take root, and do potentially irreparable harm. You have to ensure that your security teams understand the business units’ goals and challenges, so security can be an enabler of business outcomes rather than an impediment to action. But how are you going to do that if the security team is ensconced in its ivory tower, intently monitoring network anomalies and shutting down systems at the hint of an incursion? 

Unless your security teams are sitting at the table within every department, you are increasing your risk profile. With the escalating compliance, governance, and legal requirements—let alone ensuring that your business units have every opportunity to succeed—it’s a risk you can’t afford to take. 

To learn more about cyber security and how your business can stay protected from threats, visit the Cyber Essentials Online website.

If you would like to join our community and read more articles like this then please click here.

 

cyber security Kevin O’Leary Palo Alto Networks

Post written by: Matt Brown


LATEST STAKEHOLDER

Become a Stakeholder today and benefit from an exclusive marketing package which will allow you to:

  • Engage with active defence buyers and key supply chain partners
  • Create your own branded micro-site which within Defence Online which is managed by you
  • Have a dedicated Digital Account Manager to help enhance your Stakeholder page
  • Promote your news, products, press releases, eBooks and Videos as a Defence Online partner which feeds through to our homepage and social media channels
  • Have your company promoted on our partner website Defence Contracts Online (DCO)
  • All news promoted in mynewsdesk, a major hub for all of our news articles which enables news to be picked up from trade magazines, national newspapers and many other publications which offers extra exposure at no additional cost!

Contact us today or call us on 0845 557 1315 to take advantage of this exclusive marketing package


.

RELATED ARTICLES

The Ministry of Defence (MoD) has adopted a new approach to cyber security in its capability programmes, called Secure by Design.

August 22, 2023

Homeland - MoD Secure by Design goes live

The Ministry of Defence (MoD) has adopted a new approach to cyber security in its capability programmes, called Secure by

Prepare for Government’s new approach to security – called Secure By Design – or risk missing out on Government contracts

June 19, 2023

Homeland - Deadline looming for changes to Government approach to security

A leading cyber security expert is urging contractors to prepare for the imminent launch of the Government’s new approach to