
Five Ways for Cyber Security Teams to Successfully Adapt to Evolving Environments


Mike Holcomb, Director - Information Security, Fluor (NYSE:FLR)
Finding ourselves at the beginning of the Fourth Industrial Revolution, organizations are working towards transforming their businesses to take advantage of the latest technologies and solutions, more and more of which are becoming connected to enable new functionality by sharing data. Companies today are evolving at an ever-increasing rate and will only continue to do so. While most company leaders will agree that ensuring cybersecurity across the business is important, security requirements will very rarely slow or stop a company’s forward momentum in digital transformation.
As IT and cybersecurity professionals, it is our responsibility to position ourselves to best protect our organizations, clients, and employees from cyber risks that are introduced in an ever-expanding connected environment as this new technical and digital revolution continues. Here’s a compiled list of five ways you can help support your company’s changing technological landscape while strengthening its cybersecurity posture:
1. ALWAYS BE PREPARED TO ADAPT (AND THEN ADAPT SOME MORE)
Start by understanding that the company is changing and it will continue to change. Cybersecurity teams can often seem to be at the mercy of the winds of change, especially as companies rush to transform with the latest and greatest technologies. Not only do new systems bring new capabilities, but they can also bring new regulatory, cultural, and security concerns. One only needs to look to GDPR to see how companies have had to evolve their security, and privacy practices, not to mention how they will need to continue to evolve these practices as other global privacy laws continue to evolve.
Security leadership must grow a positive mindset that change is here to stay and determine an overall strategy that takes into consideration the uncertainty of the future while helping support the company in its latest digital innovation and at the same time, accounting for potential roadblocks including cybersecurity concerns.
2. NEVER SAY NEVER
Building off of the idea of always being ready to adapt, we need to ensure that we are able to support the business in achieving its goals—as securely as possible. When the company’s leadership launches a new initiative, it is necessary to support the business in making that new initiative or project as successful as possible without being considered a roadblock. Realistically, the initiative or project will happen regardless— with or without the security team’s involvement. Keeping this in mind, we want to be at the table as early in the development of the project to ensure that the project is delivered on time, under budget AND as securely as possible.
3. ALWAYS BE LOOKING FOR NEW VULNERABILITIES AND RISKS
With new systems and applications come new vulnerabilities. Not only are there new risks introduced to the environment with new systems, but there are also vulnerabilities that come into being when connecting systems which were once independent of each other. In order to discover and remediate these new vulnerabilities in a timely manner, security leaders must ensure that they adapt their current vulnerability and risk assessment processes to reflect new environments, technologies, and other evolving factors.
For some security teams, they are still working to develop these processes for cloud environments and other new technologies even though their companies have been doing business in the cloud and using these new systems for years at this point. We cannot wait this long to update our ability to automatically scan for new vulnerabilities and prioritize them based on the true risk each presents to the organization. Once we discover a vulnerability, we need to ensure that it is remediated in a timely manner and that we verify the issue was indeed addressed.
4. CONTINUOUSLY EVALUATE AND IMPROVE
As the organization continues to evolve, the security team must evolve too—not only in its support of the company’s mission but also in support of its employees. While most organizations are evolving, the members of the security team are not always. Leaders must encourage their team members to take training each year to grow their skills, both technical and non-technical, helping to build off of their existing strengths while helping to compensate for skills needing improvement. An organization’s security posture is only as strong as its cybersecurity team. Training helps strengthen both at the same time.
Training also helps the security team look outside of itself and the organization it supports. Too often, security team members can develop tunnel vision, focused on protecting their organization, but losing track of the world evolving around them including the latest tactics and techniques used by attackers. Team members should take the time to not only look at the current security landscape but also examine how other organizations, especially those similar to their own, are protecting themselves in today’s world.
It is essential that cybersecurity team members look to the growing cybersecurity community to develop a much more well-rounded approach and increase their own knowledge set and skills.
5. USE METRICS TO COMMUNICATE AND DEMONSTRATE
“Not everything that counts can be counted, and not everything that can be counted counts.” - Albert Einstein
One of my favorite quotes attributed to Einstein helps demonstrate the struggle many security teams have in being able to effectively measure what they do and how they support the organization in doing so. It is essential that the security team gathers relevant metrics that demonstrate how it helps support the business and how it aligns with the company’s business objectives. Any metrics that are gathered and reported on should demonstrate how the cybersecurity team helps the business succeed so that it can be seen as a business enabler—and ultimately be actively engaged in the future to help continue security the company and all of its latest endeavors.
Featured Vendors
THETA432: Performance, Precision, Efficiency, Visibility - The Key to Incident Response and Answer to the Talent Shortage
EveryCloud Technologies: Delivering Powerful Email Filtering Services" title="Graham O'Reilly, CEO & Co-Founder" style="float:left; margin-right:10px; margin-bottom:20px;" width="60px" height="50px">
EveryCloud Technologies: Delivering Powerful Email Filtering Services
Onepath: A Responsive Info-Security Management Framework – the easier way to dramatically improve your overall info-security posture
Covenant Security Solutions, Inc.: Revolutionary Solutions to Mitigate Security and Compliance Risks
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
The Under- And Overestimation Of Data.
Protecting IP Amidst The Pandemic
AI Will Improve Talent Management Practice But Change Management Is...
Keys To Reaching The Peak Of A Cyber Security Program Journey
Sailing through Uncertain COVID times
Paving the Way for Incentivized, Ethical Waste Collection
