A new era of risk demands fresh approaches

Cybersecurity is in the news daily, and very much on the minds of anybody with valuable data to protect. Attacks such as those experienced by SolarWinds, JBS USA, and Colonial Pipeline, as well as raised levels of threat spinning out of the Ukraine conflict, have heightened tensions and proved two things. One is that absolutely any organisation is vulnerable. Secondly, there’s the uncomfortable truth that traditional perimeter-based safeguards are no longer enough to protect critical systems and data.

 

If you rely on a wide area network then you have to face the possibility, perhaps even likelihood, that bad actors have already got past your defences, such as they are. The job now is to limit damage.

 

Who can fix this? What measures can stem the tide? Governments are doing their bit, in the form of the US’s Cyber Incident Reporting for Critical Infrastructure Act, and the European Union’s Rules for Common Cybersecurity and Information Security Measures. These new rules are a clear indication that the old philosophy of ‘trust and verify’ is no longer applicable. In an era where threat is ubiquitous, perhaps even resident on our networks, then the only sensible approach is one of trusting nothing and nobody until 100% authenticated. Even then, watch out.

 

A Zero Trust approach, meaning that access to applications and data is denied as a default, is the only realistic way forward. This is about granting access to networks and workloads via strict adherence to policy and continuous, contextual, risk-based verification that takes in all users and all of their devices.

 

So what does Zero Trust achieve that other security models do not? For starters it offers the best chance of keeping malware from entering your network, and it offers remote workers a high grade of protection without affecting their productivity. It simplifies the management of security operations, and it provides a degree of automation of security. It also extends visibility allowing potential issues to be spotted before harm is caused.

 

It moves on from conventional notions of what a network perimeter is, making it based less on location and more on identity and access. This approach works well in an age of cloud computing, remote work and digital transformation. Plus it can help the security professional to reduce complexity, lower costs, decrease the number of security tools they need, and at least partially solve the shortage of experienced cyber talent.

 

To hear about these topics in more detail the link below will take you to a recent lively discussion featuring a panel of expert voices:

https://www.businessinnovationleadersforum.org/public/events/cyber-security-meeting-ciso-demands/

 

The discussion features the following people, each a acknowledged leader in their field:

 

MAURICIO SANCHEZ, Research Director, Network Security & Data Center Appliance, SASE Market Research Dell’Oro Group. Mauricio is one of the leading analyst authorities on cybersecurity issues, with considerable knowledge of the various ways in which contemporary network security solutions are being adopted and deployed.

www.delloro.com

 

RYAN HAMMER, Chief Information Security Officer, Ciena. Ryan is well known through the security sector as a leader in the field of software and technical consulting, as well as development and design.

www.ciena.com

 

JOHN KINDERVAG, SVP, Cybersecurity Strategy, ON2IT. Before entering industry, John spent many years at Forrester Research and is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust strategy.

https://on2it.net/en/

 

  1. RONALD LAYTON, Vice President, Converged Security Operations, Sallie Mae Bank. Before joining the banking world, Ron served as Deputy Assistant Director of the United States Secret Service and was the first presidentially appointed White House Technology Liaison to the Obama Administration.

www.salliemae.com/banking

 

BEN DE BONT, Chief Information Security Officer, ServiceNow. Ben has been CISO with many leading organisations, and currently co-leads the Technology & Innovation Council for Business Executives for National Security, and is a founding member of the Cybercrime Support Network (CSN).

www.servicenow.com

 

SRINIVASAN CR, Executive Vice President – Cloud and Security, Tata Communications. Srini is the Chief Digital Officer for Tata Communications, responsible for the overall digital and security strategy and execution for the company. A technologist and a business leader, Srini is also the global business head for cloud and security businesses at Tata Communications, enabling digital transformation initiatives for customers.

www.tatacommunications.com

 

 

By Guy Matthews, Editor-in-chief of the Business Innovation Leaders Forum

 

Share on facebook
Share on twitter
Share on linkedin
Share on pinterest
Share on whatsapp
Share on email

Discussion

Responses

More Articles

Founding Corporate Sponsor:

Media & Analyst Partnerships:

Contact

Membership & administration

forum co-founder

International Events Manager

© Copyright 2021. Business Innovation Leaders Forum. All Rights Reserved. | Privacy Policy

SIGN UP TO ACCESS

Please enter your details below to access this content.

  • This field is for validation purposes and should be left unchanged.

THANK YOU FOR YOUR INTEREST IN THE BUSINESS INNOVATION LEADERS FORUM

TAKE ADVANTAGE OF OUR FREE TRIAL MEMBERSHIP THROUGH TO 30th september 2022

We would like to send you more information about membership so please fill in your details below, and we will get in touch shortly. Meanwhile you can click the link below to explore the forum further.

BE INSPIRED TO INNOVATE!

RECEIVE OUR

Book of the Month*

The Serendipity Mindset: The Art and Science of Creating Good Luck

By Dr Christian Busch
Serendipity is an aptitude for making desirable discoveries by accident. To other people it looks like “good luck”, but it is more the ability to recognise and seize an opportunity, rather than have good fortune thrust upon one. Finding a wallet stuffed with money on the conference room floor is good luck, whereas holding it up and asking if anyone has lost their wallet might be the beginning of a valuable friendship – that would be serendipity.

Chance encounters, or strokes of fortune, feature in countless stories of business success. This book looks beneath the surface, reveals and teaches the mindset that can transform pure chance into opportunity. The author is director of the Global Economy Program at New York University’s Center for Global Affairs, and a lecturer at the London School of Economics.

Serendipity is an aptitude for making desirable discoveries by accident. To other people it looks like “good luck”, but it is more the ability to recognise and seize an opportunity, rather than have good fortune thrust upon one. Finding a wallet stuffed with money on the conference room floor is good luck, whereas holding it up and asking if anyone has lost their wallet might be the beginning of a valuable friendship – that would be serendipity.

The author says “This is a book about the interactions of coincidence, human ambition and imagination”. In the above example: finding the wallet is the coincidence; ambition is the desire to make something of the discovery; add imagination and you open up a whole menu of possibilities: from spending spree to earning a reputation for honesty – or even making a wealthy friend.

Business is typically forged on human ambition and imagination, but early success often feeds an appetite for control – and “control freaks” can be blind to the opportunities thrown up by the unexpected. They only see chance events as distractions. If plans go awry, they may blame the failure on “bad luck” rather than admit their own inflexible attitude.

The author himself admits to being “a German who is used to planning” and prone to feel anxious when something unexpected happens. That makes him an ideal teacher, because he has worked hard to discover and analyse the mindset that enables one to “connect the dots” and cultivate serendipity. He presents a goldmine of examples from science, business and life where an apparent mishap or failure lead to a breakthrough.

Indeed, studies suggest that around 50% of major scientific breakthroughs emerge as the result of accidents or coincidences. A well-known example is Alexander Fleming’s discovery of penicillin, launching the whole field of antibiotics. Other examples include X-rays, nylon, microwave ovens, rubber, Velcro, Viagra and Post-it Notes – where would we be without these!

The book goes beyond the ability to recognise and respond to opportunities in chaos, but the subtitle – The Art and Science of Creating Good Luck – is actually a bit misleading. True, he does show ways to develop better fortune, but it would be better to call it “inviting” or “encouraging” good luck. For example, he suggests better ways to start a conversation with a stranger – ways that will make it more likely to lead to chance connections or shared interests.

The publishers may have chosen the word “creating” to make the book appeal to the human desire to control – for control freaks are exactly the readership that would benefit the most from this book’s wisdom and practical advice.

For the rest of us, it offers a great way to rediscover the sense of play that is so important in life – and too often lost in business.

 

“Following the success of The Serendipity Mindset hardback, a paperback edition has also now been launched under the title “Connect the Dots”.

How to upload a file

This website uses cookies to ensure you get the best experience on our website More info.