Sign in
  • News
  • Interviews
  • 2021: The Comeback Year
  • Articles
  • Insights
    • Guest Post
    • Use Cases
  • Quick Bytes
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Friday, March 5, 2021
  • Sign in / Join
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • 2021: The Comeback Year
  • Articles
  • Insights
    • Guest Post
    • Use Cases
  • Quick Bytes
Home Featured Articles Are Business Leaders Taking Cyber-Security Concerns Seriously?
  • Featured Articles

Are Business Leaders Taking Cyber-Security Concerns Seriously?

By
Sudipta Choudhury
-
February 12, 2021
15
Are Business Leaders Taking Cyber-Security Concerns Seriously

Even in this digital era, there are certain systemic defies with security integration across businesses, claims a recent Trend Micro study.

With the rapid shift towards IT modernization, enterprises are expanding their security teams to cyber-security measures to head in the right direction. Experts believe, for any business, cyber-security should be viewed as a primary technology aspect. A recent research study from Trend Micro reveals the systemic challenges with security integration within the business processes.

The study highlights the top techniques to drive engagement and enhance agreement around cyber-security strategies in an organization. It was found that only 23% of companies prioritize the alignment of security with crucial business plans.

The significant recommendations to remedy this principal challenge are –

  • Adding a business information security officer (BISO) to augment business-security alignment
  • Building a measurable, top-down program to help CISOs communicate easily with their boards
  • Modifying the reporting structures so that CISOs report directly to their CEO

However, cyber-security is still viewed as a chief technology area. When the leadership team is more engaged and educated around the security functions, they generally ask tricky questions. Besides, when they dig deeper into critical issues, things are more likely to make the leap big from technical to overall business disputes.

Nearly 82% of the survey respondents noted that cyber risk has amplified in the last two years – undoubtedly due to the rise in threats. Moreover, the increasing corporate attack surface and since business processes are more reliant on technology than ever- has expanded the risk landscape.

Regardless of the rapid adoption of digital transformation solutions in the pandemic era, security is still viewed as principal (41%) or exclusively (21%) a technology area. Yet, the lack of cyber-security prioritization is somewhat valid in the boardroom, claims the study.

Although almost 85% of professionals claimed that the boards of directors (BODs) are currently more engaged in security strategy and decision making than they were two years back. Such executives are often passively drawn in due to a major breach, new compliance necessities, or a security suite creation by the CISO.

In fact, some 44% of the respondents reported that their BODs have limited involvement in critical cyber-security operations. This lack of engagement indicates that many boards are only prepared to fund to meet protection and compliance requirements. Indeed, striving for just “good enough” cyber-security is not sufficient given the current cyber threat scene.

As Ed Cabrera, the chief cybersecurity officer at Trend Micro mentions in the company blog – “This report mirrors many of my conversations with CISOs highlighting that lack of boardroom engagement can lead to poor cyber hygiene and security that is not properly integrated into business processes. We can only create a culture of cyber-security if CEOs and corporate directors lead by example. Every employee must believe they have a role in protecting the organization.”

  • TAGS
  • boards of directors
  • business information security officer
  • business processes
  • business-security structure
  • CEO
  • chief cybersecurity officer
  • CISO
  • cyber attack
  • cyber security strategies
  • cyber-security operation
  • cybersecurity policies
  • Digital Transformation
  • Ed Cabrera
  • IT modernization
  • lack of boardroom engagement
  • Security compliance
  • Trend Micro
Previous articleFuture-Proofing Enterprise Systems with an Observability Pipeline
Next articleThe Return of Shadow IT – and the Need to Remain Vigilant
Sudipta Choudhury
Sudipta Choudhury
http://itsecuritywire.ondot.media
Marketing professional with experience in B2B and MR industry. Skilled in Marketing, Strategy Making, Copywriting and Content Creation, Sales, and SEO with excellent Communication Efficiency. Holding a dual master's degree focused on Marketing from IBS, Pune and ICFAI University.

RELATED ARTICLESMORE FROM AUTHOR

The Top Three Security Flaws in IoT and Smart Devices-01

The Top Three Security Flaws in IoT and Smart Devices

Strict Regulation Shaping 5G Security in Europe-01

Strict Regulation Shaping 5G Security in Europe

Global Zero Trust Security Market Revenue to Touch _51.6 Billion-01

Global Zero Trust Security Market Revenue to Touch $51.6 Billion by 2026

Latest posts

Cofense Introduces

Cofense Introduces Industry Changing Phishing Detection and Response (PDR) Platform and in-region Phishing Defense Center...

December 8, 2020
Phishing, phishing attack, email, Cofense Phishing Defense Center, mobile service provider

New Phishing Campaign Attacks Executives with Fake Email

May 7, 2020
Thomas Platt head of the e-commerce at Netacea

What can retailers learn from Ed Sheeran’s battle against ticket touts?

September 2, 2020
Donald Trump

Hackers Broke into Donald Trump’s Campaign Site

October 28, 2020
Fusion Financial Partners Launches FusionNetix™ to Provide High-Touch Technology Services Tailored to Unique Needs of RIA Community

Fusion Financial Partners Launches FusionNetix™ to Provide High-Touch Technology Services Tailored to Unique Needs of...

December 11, 2020


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • Protecting SSH Keys in Multi-Cloud Operations
  • Pangiam Appoints New Chief Financial Officer
  • Corero Network Security improves its SmartProtect DDoS protection solution
  • Yardstik Unveils Its Human Security Platform for Platforms
  • Bridgecrew shifts cloud security all the way left with real-time scanning and fixes in VS Code

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy