The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Other content in this Stream
Webinar: Take Your Fortinet Security with You From On-Premises to the AWS Cloud
Find out all the benefits of using one security solution across your on-premises data center and AWS cloud workloads.
Security Transformation in the Age of Azure
As cloud migrations accelerate, those securing this digital transformation will need to realize new techniques and efficiencies to meet the needs of the business at speed.
Webinar: To Cloud or Not to Cloud
With the non-stop cloud chatter, too many Federal agencies think that they need to choose between “all cloud” and “no cloud at all.” But the reality is not either, it’s both.
Google intends to make GCP the most secure cloud platform
I attended my first Google Next conference last week in San Francisco and came away quite impressed. Clearly, Google is throwing its more and more of its engineering prowess and financial...
'Identity Has Become the Perimeter': Oracle Security SVP
Eric Olden, Oracle's new leader in security and identity, shares how the enterprise tech giant plans to operate in a cloud-first world.
Not All Cloud Software is Created Equal
Not all cloud security solutions are the same. Careful analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your...
CenturyLink connects with Oracle Cloud to serve enterprise customers
Oracle customers can now access their data and business applications across North America and Europe thanks to a new deal with CenturyLink.
What Cloud Natives Can Teach the Rest of Us
Cloud natives differ from traditional companies in more ways than just their lack of legacy infrastructure: They think and operate differently.
Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and...
Locking It Down: Securing Multicloud IT Across Industries | Light Reading
As healthcare, financial services, and education move to multi-cloud they face different security requirements.
Overcoming Multi-cloud Security Challenges in Education
Here are five best practices for keeping things safe when you have applications and data spread across multiple clouds.
Machine Learning, Cloud, Compliance and Business Awareness Drive Cybersecurity
Gartner determine the six trends that it sees driving cybersecurity forward
Why Enterprises Struggle with Hybrid Cloud and DevOps
More enterprises are moving to the cloud and implementing DevOps, containers and microservices, but their efforts are falling short of expectations. A recent study from the Ponemon Institute...
The Holy War of Enterprise Tech: One Cloud Isn't Enough
Enterprises may be asking for trouble if they go with a single-cloud strategy.
Web Application Firewalls Adjust to Secure the Cloud
Cloud-based WAFs protect applications without the costs and complexity of on-prem hardware. Here's what to keep in mind as you browse the growing market.
Configuring Active-Active Enterprise Firewall in Microsoft Azure
Achieving High Availability for a secure connection for cross-premises and hybrid Cloud deployment is essential and yet can be quite simple with the right product. Fortinet’s Martin Twombly walks...
AT&T Wraps Google Cloud Into Its NetBond for Cloud Platform
The agreement was fostered by Google’s April launch of its Partner Interconnect platform. Visit us at www.sdncentral.com for the complete article.
The Enterprise Cloud Rush
Starting with the first commercial public cloud launch in 2006, it has become apparent to enterprise organizations that moving infrastructure out of their traditional data centers has tremendous...
On-Demand Cloud Security for Microsoft Azure
Cloud has gone mainstream and its growth is accelerating as new delivery, management, and security options become available.
Securing Microsoft Azure: A new Fortinet-Microsoft Cloud Security Workshop Series