The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Other content in this Stream
Marine Shipping Marketplace Leader Moves to Cloud with Enhanced Security and Efficiency
Fortinet extends virtualized Security Fabric apps to AWS users
Extending on their existing relationship, Fortinet announced AWS has joined its Fabric-Ready Partner Program, enabling partners to...
Q&A: BT’s Neil Sutton Views Global Scale, Security as Cloud Chall
BT recently updated a long-standing deal with AWS in an effort to tackle ongoing cloud challenges of enterprise customers.
Fortinet Expands Fabric-Ready Program with Amazon Web Services
Extended Collaboration to Deliver Advanced Application Security to Fortinet-AWS Customers
Top 3 Reasons Why Your Business Needs FortiSandbox in AWS
Organizations have the option of adding the first cloud-based sandbox product in AWS marketplace, FortiSandbox, to their cloud security infrastructure, allowing businesses to operate a complete...
The cybersecurity skills shortage is an existential threat
ESG research with ISSA shows that organizations don’t have the right levels of cybersecurity personnel, skills and ongoing training to keep up with cyber risk.
Securing the Multi-Cloud: It’s Harder Than It Looks
Enterprises must realize the advantages of the cloud, and multi-cloud environments, without introducing new risk.
Fireside Chat with Gibson Energy: Talking Data Center Consolidation, IoT and Cloud Security
Richard Hannah is Vice President of Information Services and he oversees the entire IT environment at Gibson Energy. The company has doubled in size in recent years, and a major focus of Hannah’s...
AT&T enhances Amazon Web Services relationship to further cloud bond with enterprise customers
AT&T has expanded its business cloud network solution partnership with Amazon Web Services (AWS).
Webinar: Arm Your Digital Learning with these E-rate Truths & Myths
Join our E-rate and education experts for a tutorial on how to use E-rate to maximize network infrastructure investment and make the best use of Category 2 funds.
Food Services Giant Moves Securely to the Cloud Over a Single Weekend
When one of the world’s largest food services companies needed a better way to connect its vast distributed network of operations, it turned to Microsoft Azure and Fortinet to "move the entire...
Best practice: Security operations automation before orchestration
Based on numerous conversations with CISOs, I've learned there is widespread interest in automating and orchestrating security operations. In fact, lots of enterprises are already doing so....
IoT security is critical, hard, achievable: 3 best network practices
The rapid adoption and deployment of IoT devices is a significant contributor to digital transformation. To compete in the new digital marketplace, organizations must monitor and manage critical...
Accenture left a huge trove of sensitive data on exposed servers
(Image: file photo) Technology and cloud giant Accenture has confirmed it inadvertently left a massive store of private data across four unsecured cloud servers, exposing highly sensitive...
Securing Dynamic Cloud Environments
Learn about the three key aspects that a cloud security solution must address.
Carriers’ 5G plans are Rooted in SDN/NFV, Says Ixia Survey
A new survey sponsored by Ixia reinforces the impression that telecommunications companies around the world are chomping at the bit to deploy 5G technology. The majority of carriers say they have...
Webinar: Dynamic Security for AWS Workloads
Join Fortinet and AWS to learn how to optimize your AWS networks with Fortinet’s auto scaling security solution plus best practices for mitigating complex security threats.
Webinar: Top Security Considerations in Cloud Infrastructures – Featuring a Gartner Perspective
Gain a powerful perspective on network security in the cloud era plus what you should know about cloud trends and adoption, and how to position security as an enabler rather than an inhibitor.
How to Maintain Control When Moving to the Cloud
CSO: Phased Process for Cloud Security