Written by Corinium on Nov 16, 2019
Bring both technical and business leadership skills. I believe that skillsets that are a combination of a broad technical foundation with some depth combined with strong business leadership and communications skills are a must to succeed in security. The ability to translate the technical conversation into a business risk conversation at all levels of the organisation is a winner.
Internal threat actors are more successful because they have been cleared for some level of access in the network and have established a level of trust with the organisation based on the employment contract or engagement agreement if they are a service provider and also because security monitoring mainly focuses on threats that are coming from outside the organisation instead of looking inward. There needs to be a balance in monitoring internal and external network activity.
Totally, you might have an amazingly talented, diverse group of professionals at your organisation. But cybersecurity’s dirty little secret is that no matter how skilled your employees are, they still usually represent your biggest risk. Research shows that human error ranks even higher for cyber risk than software flaws and vulnerabilities. Consequently, there is a case for running an intense cyber-security awareness programme as part of risk mitigation.
It has become very clear for us that the metrics used in the past will not help in the future. Whether you are “low, medium, or high” on compliance scores does not tell you enough about the risk to the business. We do not present the board project plans on encryption. We present the board with metrics on data protection for the customer. And we don’t have metrics around patching. We have metrics around maintaining the integrity of our production environments.
This approach makes the conversation simpler with Business unit leaders and the board.
In My View…
Running an infrastructure transformation strategy globally for Sasol. In the past Sasol had multiple data centres and data storage capacity and abilities; coming into the environment – I then defined a global strategy where the business will be able to consistently manage infrastructure across the globe on cloud as well on premise-and that gave us significant cost-savings.
My view would be that these hacktivist groups are starting to be more organised and are continuously innovating; they are very patient in taking time to understand the organisation that they want to get into – they know exactly which areas to target; where it’s going to hurt the most. It’s no longer about that person sitting in a garage somewhere in a dark corner; playing around just for the thrill of it – it’s a bigger agenda being driven by these hacktivists groups.