{"id":15294,"date":"2021-03-15T19:16:45","date_gmt":"2021-03-15T13:46:45","guid":{"rendered":"https:\/\/coforge.site\/cigniti\/blog\/?p=15294"},"modified":"2023-12-19T17:10:02","modified_gmt":"2023-12-19T11:40:02","slug":"cxos-modern-cybersecurity-practices","status":"publish","type":"post","link":"https:\/\/coforge.site\/cigniti\/blog\/cxos-modern-cybersecurity-practices\/","title":{"rendered":"Why CxO\u2019s Must Embrace Modern Cybersecurity Practices"},"content":{"rendered":"<p>To stay ahead in business, digital customer experience transformations have become mandatory. Cutting-edge digital experiences across every device are every customer&#8217;s need of the hour.<\/p>\n<p>To fulfill their digital transformation requirements, enterprises are leveraging technologies such as Artificial Intelligence (AI), Machine Learning (ML), and the Internet of Things (IoT). They are implementing Design Thinking and Lean approaches.<\/p>\n<p>While digital transformations are imperative, they do not come without a risk. New digital processes produce humongous data and generate a dizzying array of <a href=\"https:\/\/coforge.site\/cigniti\/blog\/5-best-practices-automated-security-testing\/\">cybersecurity<\/a> risks.<\/p>\n<p>Consequently, it will be wise for any enterprise embarking on the digital transformation of their customer experience to have cybersecurity as an integral part of their culture.<\/p>\n<p>According to <strong><em>John A. Wheeler<\/em><\/strong>, Senior Director Analyst at <strong><em>Gartner<\/em><\/strong> Research &amp; Advisory, \u201c<strong><em>By proactively assessing risk appetite and the value of the desired business outcome, Chief Information Officers\u2019 (CIO\u2019s) and Chief Information Security Officers\u2019 (CISOs) can transform digital risk management into a competitive advantage.<\/em><\/strong>\u201d<\/p>\n<p>Digital business has created a new ecosystem where partners add new business capabilities and security complexities.<\/p>\n<p>For the business to move forward, there is a need for CISOs to strike a balance between what is needed in a security program and the risks to undertake. There may be missed opportunities if this balance is not meted out.<\/p>\n<p><strong><em>Gartner<\/em><\/strong> states, \u201c<strong><em>By 2023, 30% of chief information security officers\u2019 (CISO\u2019s) effectiveness will be directly measured on the role\u2019s ability to create value for the business<\/em><\/strong>.\u201d<\/p>\n<p>CxOs must strategize the need to reinvent security. While we move to the new decade, it is the perfect time to assess potential threats and take stock of the current security structures.<\/p>\n<p>To develop flexible approaches that avoid current limitations, identify business-relevant objectives, and take a fresh look at security management.<\/p>\n<p>There is a need for CIOs and CISOs to drive security investments that directly impact business outcomes and engage executive decision-makers to change how <a href=\"https:\/\/www.cigniti.com\/services\/security-testing\/\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> is treated in the organization.<\/p>\n<p>According to <strong><em>Paul Proctor<\/em><\/strong>, VP Analyst, <strong><em>Gartner<\/em><\/strong>, \u201c<strong><em>The stories we\u2019ve seen during the COVID-19 outbreak are the latest example highlighting the failed approach to cybersecurity many organizations take. While executives were focused on ensuring compliance and stopping hackers, simple opportunities like enabling secure remote access technologies, which have a much larger business impact, were ignored. Now, organizations are scrambling to catch up<\/em><\/strong>.\u201d<\/p>\n<h2>Address failing cybersecurity approaches<\/h2>\n<p>An ineffective approach to cybersecurity often leads to bad investments and poor decisions.<\/p>\n<p>&nbsp;<\/p>\n<p>A few challenges that limit cyber security&#8217;s impact on business, as put forth by Gartner \u2013<\/p>\n<ul>\n<li>Societal perception is that cybersecurity is a technical problem, best handled by technical people.<\/li>\n<li>Organizations ask the wrong questions about cybersecurity.<\/li>\n<li>Current investments and approaches designed to address limitations are not productive.<\/li>\n<li>Real failures are not getting enough attention to change behavior productively.<\/li>\n<\/ul>\n<p>The COVID-19 disconnect is a wake-up call for CIOs, CISOs, and IT executives about the critical need to address cybersecurity as a business decision in a business context.<\/p>\n<h2>Create a business context around cybersecurity<\/h2>\n<p>Identify the business context of your organization to create a business context around cybersecurity. While every organization has costs and budgets, sources of customers and revenue, desired outcomes, and supporting business processes, each component comes with critical technology dependencies.<\/p>\n<p>Identify how technology maps back to them and understand the organization\u2019s business outcomes and most essential processes. Shift towards an outcome-driven approach to cybersecurity using the business context as a guide.<\/p>\n<p>This approach is a governance process where investments and priorities are determined based on their direct impact on protection levels in a business context. It also helps the organizations understand how well they are protected.<\/p>\n<h2>Upgrade your risk and security perspective<\/h2>\n<p>According to <strong><em>Tom Scholtz<\/em><\/strong>, VP Analyst, <strong><em>Gartner<\/em><\/strong>, \u201c<strong><em>The objective is to provide an ecosystem that balances the imperative to protect the enterprise with the need to adopt innovative, risky new technology approaches to remain competitive<\/em><\/strong>.\u201d<\/p>\n<p><strong><em>Scholtz<\/em><\/strong> further adds that success is dependent upon CISO\u2019s willingness to adopt a new set of trust and resilience principles:<\/p>\n<ul>\n<li>Shift to risk-based decision-making and away from checkbox compliance<\/li>\n<li>Begin supporting business outcomes rather than solely protecting infrastructure<\/li>\n<li>Become a facilitator, not a defender<\/li>\n<li>Determine how information flows; don\u2019t try to control it<\/li>\n<li>Become people-centric and accept the limits of technology<\/li>\n<li>Invest in detection and response, and stop trying to protect the organization<\/li>\n<\/ul>\n<p>Embracing the above principles requires CISOs to deviate from perceived security conventions and best Cybersecurity practices.<\/p>\n<p>To be able to protect their organizations at the speed of digital business, Gartner recommends the <strong>CARTA<\/strong> approach \u2013 <strong>Continuous Adaptive Risk and Trust Assessment<\/strong>, which creates a security and risk framework that can be applied in 3 phases \u2013<\/p>\n<ul>\n<li><strong>Run<\/strong> \u2013 Adaptive threat and access protections.<\/li>\n<li><strong>Build<\/strong> \u2013 Secure agile development, new vendor evaluations, and creation of ecosystem partners.<\/li>\n<li><strong>Plan<\/strong> \u2013 Business-unit-led adaptive security governance and risk management.<\/li>\n<\/ul>\n<p>While preventing data breaches and protecting against security threats and other enterprise cybersecurity threats, a resilient <a href=\"https:\/\/www.cigniti.com\/services\/security-assurance\/\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> strategy is essential to running the business.<\/p>\n<p>Per <strong><em>Gartner<\/em><\/strong>, by 2023, 75% of organizations will restructure risk and security governance to address the widespread adoption of advanced technologies, an increase from fewer than 15% today.<\/p>\n<h2>Conclusion<\/h2>\n<p>In the absence of a new strategy for cybersecurity, simply increasing the size of the cybersecurity spending may not be sufficient to cope with the magnitude of the threat at hand.<\/p>\n<p>Cigniti\u2019s <a href=\"https:\/\/www.cigniti.com\/services\/security-testing\/?utm_source=blog&amp;utm_medium=hyperlink&amp;utm_campaign=SecurityTesting\" target=\"_blank\" rel=\"noopener\">Cyber Security Testing experts<\/a> have a watchful eye on the technology landscape, helping organizations prevent, detect, and solve the complex security issues that damage brands and hamper productivity. Organizations are protected by assessing system vulnerability, scanning digital threats, and defining intelligent, secure solutions that match end client needs.<\/p>\n<p>Cigniti has a proven record of helping a multi-billion-dollar pharmaceutical company obtain vulnerability assessments of its applications and derive value from the Information Security metrics.<\/p>\n<p>Need help? Consult Cigniti\u2019s team of experienced security testing experts to understand how they can help tackle and prevent any malicious cyberattack against your organization.<\/p>\n<p><a href=\"https:\/\/www.cigniti.com\/contact-us\/?utm_source=blog&amp;utm_medium=hyperlink&amp;utm_campaign=ContactUs\" target=\"_blank\" rel=\"noopener\">Schedule a discussion<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To stay ahead in business, digital customer experience transformations have become mandatory. Cutting-edge digital experiences across every device are every customer&#8217;s need of the hour. To fulfill their digital transformation requirements, enterprises are leveraging technologies such as Artificial Intelligence (AI), Machine Learning (ML), and the Internet of Things (IoT). They are implementing Design Thinking and [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":15295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,3515],"tags":[60,3452,3453,2963,2826,1852,3454,2588,2137,2369,1481,215],"ppma_author":[3727],"class_list":["post-15294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-testing","category-cybersecurity","tag-application-security-testing","tag-cyber-security-assessments","tag-cyber-security-testing-checklist","tag-cyber-security-testing-companies","tag-cyber-security-testing-services","tag-cybersecurity","tag-cybersecurity-practices","tag-security-testing-approach","tag-security-testing-experts","tag-security-testing-methodology","tag-security-testing-services","tag-software-security-testing"],"authors":[{"term_id":3727,"user_id":20,"is_guest":0,"slug":"cigniti","display_name":"About Cigniti (A Coforge Company)","avatar_url":{"url":"https:\/\/coforge.site\/cigniti\/blog\/wp-content\/uploads\/2024\/10\/Coforge-blog-Logo.png","url2x":"https:\/\/coforge.site\/cigniti\/blog\/wp-content\/uploads\/2024\/10\/Coforge-blog-Logo.png"},"author_category":"","user_url":"https:\/\/www.cigniti.com\/","last_name":"(A Coforge Company)","first_name":"About Cigniti","job_title":"","description":"Cigniti Technologies Limited, a Coforge company, is the world\u2019s leading AI &amp; IP-led Digital Assurance and Digital Engineering services provider. Headquartered in Hyderabad, India, Cigniti\u2019s 4200+ employees help Fortune 500 &amp; Global 2000 enterprises across 25 countries accelerate their digital transformation journey across various stages of digital adoption and help them achieve market leadership by providing transformation services leveraging IP &amp; platform-led innovation with expertise across multiple verticals and domains.\r\n<br>\r\nLearn more about Cigniti at <a href=\"https:\/\/www.cigniti.com\/\">www.cigniti.com<\/a> and about Coforge at <a href=\"https:\/\/www.coforge.com\/\">www.coforge.com<\/a>."}],"_links":{"self":[{"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/posts\/15294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/comments?post=15294"}],"version-history":[{"count":0,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/posts\/15294\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/media\/15295"}],"wp:attachment":[{"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/media?parent=15294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/categories?post=15294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/tags?post=15294"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/ppma_author?post=15294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}