INTERVIEW
cybersecurityeurope PAGE 50
2019, the World Economic Forum published the Cybersecurity Guide for Leaders in Today’s Digital World and more so recently, the ‘Cybersecurity leadership principles to prepare to the new normal’, to support business leaders with their efforts at integrating cyber resilience into their overall business strategy, and help them shape an appropriate course of action that balances cyber risks with business priorities. It is imperative that the leaders manage all information risks strategically, working towards a company culture of shared cyber-risk ownership across organisations, and take a strategic approach to cyber resilience. Effective cyber resilience requires a combined and aligned multi-disciplinary effort to move beyond compliance to cohesive business and digital enablement. The WEF now works with several industry communities – such as the electricity, oil and gas, and aviation sectors – to amplify these best practices and also to accelerate their adoption within sectors.
variety of cyber security services, for example monitoring, and cope with an increasing shortage of cyber security professionals in the market. Besides, in the current digital economy, businesses will have to allocate limited resources wisely and invest in technologies such as Artificial Intelligence, Machine Learning and Big Data, to automate mundane cyber security processes and minimise the risk of human error.
CSE: To ensure that business in general adheres to the regulatory requirements, cyber security leadership teams need to include the legal and compliance executives as the stakeholders within the cyber governance processes. Do you expect to see an increase in appointment of cyber-specific chief officers with a specific responsibility for data protection and cyber risks management – who take the responsibility for workloads that have previously fallen onto the roles of CIOs and CISOs?
CSE: The Guide for Leaders report notes an escalation in the volume of work involved in following up on security alerts and incidents that cannot be automated, continuing the reliance on humans to carry out security functions. GDM: The Guide’s Tenet 2 ‘Foster internet and external partnerships’ does encourage the use of external services to provide support for the design, implementation, integration and operationalisation of a
GDM: The CISO – Chief Information Security Officer – role has [already] been elevated to the c-suite in more mature industries such as financial services and defence. As the board’s accountability for cyber security increases, they will appoint a ‘Corporate Officer’ to be accountable for reporting on the organisation’s capability to manage cyber resilience and ensure they have regular access to the board, sufficient autonomy and command.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62