Cybersecurity: More a People Than a Tech Challenge?

  /     /     /  
Publicated : 22/11/2024   Category : security


Cybersecurity: More a People Than a Tech Challenge?


When it comes to cybersecurity strategies, the human angle needs to be brought to the fore, according to BT and KPMG.



With so many high-profile attacks impacting companies, governments and organizations around the world, awareness of cybersecurity threats has never been higher -- but that doesnt mean companies have a suitable security strategy, or even feel they need one at all, according to experts at BT Group plc (NYSE: BT; London: BTA) and consultancy
KPMG LLP
. (See
Petya Ransomware Takes the World by Storm
and
Unknown Document 734444
.)
The two companies have just issued a report, entitled The cyber security journey -- from denial to opportunity, which aims to highlight some of the key challenges facing all types of enterprises and institutions in the modern era and make suggestions about how to overcome those challenges. (See
Unknown Document 734444
.)
The report identifies five steps on the cybersecurity maturity journey -- Denial, Worry, False Confidence, Hard Lessons and becoming a True Leader -- and digs into each of those with examples and recommendations. That might sound a bit corny, but the stages are well explained (and will likely resonate with many) and the recommendations are clear and simple without being patronizing. They also highlight that the major cybersecurity challenges are related to people, not technology.
A couple of key messages stand out from the report.
First, that any company, of any size and in any sector, is under threat –- it wont happen to us is the cry of the deluded. A lot of CEOs dont realize that cybersecurity threats are commoditized … Even if your company is not being specifically targeted by cyber criminals, you still need to defend against the commoditized threats such as the recent extensive ransomware attacks, noted David Ferbrache, technical director at KPMGs cybersecurity practice, during a recent media briefing at BTs cybersecurity facility in Sevenoaks, UK.
Second, for those organizations that identify the need to protect themselves against cybersecurity threats (some, amazingly, still believe they are immune), simply investing in security technology such as firewalls is not enough. Security technology is not a silver bullet, said the CEO of BT Security, Mark Hughes. (No, not
THAT Mark Hughes
…)
Dont start [a cybersecurity strategy] with the technology! he advised.
In fact, throwing money at the latest security tech can lead to unwelcome attention, including, the two companies noted in their official announcement of the report, from over-zealous IT salespeople. (Editors note: Thats the first time I have laughed at a press release in 20 years…)
What is needed before any action is taken, according to Hughes and Ferbrache, is a rational assessment of existing security procedures and a decision about what it is that matters most to a company -- what needs to be protected above all else. Its possible that companies can spend a lot of money and not actually secure what is valuable to them, noted the KPMG man.
All of which requires agreement from all levels within a company or organization, particularly from the top management, that cybersecurity is actually important and strategic. The research conducted for the report suggests this is not currently the case: BTs Hughes noted that 68% of CEOs surveyed dont regard security to be part of their digital transformation processes, which is surprising, he noted.
BT Security CEO Mark Hughes: Dont start with the technology!
A more favorable scenario would involve a senior executive -- a chief information security officer (CISO) if the company is large and well resourced enough -- taking responsibility for a security strategy and, importantly, engaging with the rest of the business or organization and not working in isolation. Too often I hear chief security officers refer to the business as if they are not part of it… but they are a key part of the business and all the moving parts need to work together, stated Hughes.
And to be truly effective, that security officer needs to not only engage internally and clearly communicate a security strategy (including what to do when security defenses are compromised), but also engage and learn from the broader community, from others that are also implementing a strategy and may have been subject to attacks and breaches. There are lots of hard lessons to be learned, stated Hughes.
That, of course, applies to Hughes as it does any other head of security: He says he talks with his peers from other major telcos, such as AT&T, Deutsche Telekom, Orange and Verizon, about best practices, current threats and the future. Current conversations include the impact of 5G on security procedures, noted the BT man.
Both BT and KPMG have skin in this game, of course -- KPMG offers security strategy consultancy and BT provides a range of security services built upon its own network security capabilities -- but the two companies have managed to produce a report that is useful without coming across as a sales pitch. The report can be downloaded
here
. (See
Unknown Document 734444
and
Unknown Document 734444
.)
— Ray Le Maistre,

, International Group Editor,

Light Reading
, for Security Now

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cybersecurity: More a People Than a Tech Challenge?