digitization kpmg cyber threat [shutterstock: 2007736076, Zoomik]
[shutterstock: 2007736076, Zoomik]
Press Release Security

A New Approach To Tackling Cyber Threats

Organizations across the world have made strides in remote working and collaboration during the COVID-19 pandemic, but the proliferation of digitization is creating significant new cyber threats that require radical cultural change at boardroom level.

A new report from KPMG titled “From enforcer to influencer: Shaping tomorrow’s security team” is calling on business leaders to ensure cybersecurity specialists are part of the C-suite decision-making process, with digitization at the heart of their future growth strategies.

The report offers the following seven key recommendations to IT leaders and Chief Information Security Officers (CISOs).

Act like you belong in the C-suite

CISOs must speak the language of the C-suite, building consensus, demonstrating pragmatism, and navigating politics, to help leaders understand the cyber implications of their strategic choices. CISOs are also becoming public figures, serving as the face of the firm to help build trust and confidence.

Broaden horizons

CISOs’ responsibilities are broadening to include safeguarding data, dealing with disruptive events to maintain operational resilience, managing third parties, handling regulatory compliance, and helping to counter cyberenabled financial crime. This demands they forge strong working relationships with other business leaders including the Chief Risk Officer (CRO), the Chief Data Officer (CDO) and the Chief Information Officer (CIO).

Weave cybersecurity into the organizational DNA

Today’s CISOs should be sophisticated communicators, working with other business leaders to embed cybersecurity into the DNA of the organization. This involves integrating security into governance and management processes, education and awareness, plus establishing the right mix of corporate and personal incentives to do the right thing.

Shape the future cybersecurity workforce

CISOs will have to acquire capabilities from outside the organization, build new partnerships, and look for unconventional and diverse talent. In the future, we may even see the cyber function becoming far smaller, taking on a strategic and governance role, with cybersecurity being truly embedded into the business.

Embrace automation as the rising star

Automation can reduce the manual workload and ease skills shortages, bringing in greater efficiency and helping meet growing compliance requirements in a consistent and repeatable way. It can also help embed security and improve the user experience, as well as reduce the time to respond to a major cyber incident.

Brace for further disruption

We are heading towards a hyperconnected world in which the IoT and 5G networking will massively increase efficiency and enable radically different business models. But this also opens up organizations to new attack surfaces and raises privacy concerns, demanding a shift to new, data-centric security models such as zero trust.

Strengthen the cybersecurity ecosystem

Organizations are now part of a complex ecosystem of suppliers and partners, tied together through shared data and shared services. Conventional contracts and liability models seem ill-suited to the rapidly evolving supply chain threat, calling for a new partnership approach that brings security to all parties and individuals.

About the author

E-3 Magazine

Articles published through E-3 Magazine International. This includes press releases by our partners as well as articles and reports from the E-3 team of journalists.

Add Comment

Click here to post a comment

Sign up for e3zine´s biweekly newsbites

Please do not use administrative mail adresses like "noreply@..", "admin@.." or similar as these may get blocked for security reasons.

We use rapidmail for dispatching our newsletter. By signing up, you agree that the data you have entered will be transmitted to rapidmail. Please take note of their terms and conditions and privacy policy.termsandconditions.

Our Authors