Cyber risks have taken center stage in the corporate world. It is estimated that more than 80 percent of organizations have now included cyber risk as one of the top five risks in their risk register. Cyber security has become a key concern for boards and executive leadership.
Recent surveys and research suggest that although visibility at the board level has increased, requisite organizational structures (to support cyber risk mitigation) are still lagging. I believe that is a result of a combination of factors:
1. Cyber security as a domain, being new, has no specific standard format to follow in terms of implementing structures and allocating responsibilities.
2. There is an inherent shortage of resources and the problem is more exacerbated at senior levels.
3. Depth of cyber security knowledge is lacking at the board level.
The apparent disconnect and gap in trust needs to be closed if the cyber threat is to be tackled effectively. Organizations must realize that, in order to have a mature cyber security posture, they need transformational leadership in their cyber security area.
An executive/manager in charge of cyber security in an organization has the unenviable task of influencing the board and the executive leadership group, as well as impacting the security culture across the organization. The cyber security leader does not necessarily need in-depth technical skills, but certainly needs dynamic leadership skills.
What are the skills required for cyber leadership? If you are a board member/executive manager looking to hire a security manager or you are a security manager looking to rise to the challenge, in addition to technical understanding of security, I recommend focusing on getting/developing the following skills:
Original blog sourced from ISACA Now Blog https://www.isaca.org/Knowledge-Center/Blog/default.aspx
By Ashutosh Kapse, Head of Cybersecurity, IOOF Holdings Australia
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.