{"id":1863,"date":"2019-08-03T02:28:32","date_gmt":"2019-08-03T02:28:32","guid":{"rendered":"http:\/\/kusuaks7\/?p=1468"},"modified":"2024-07-22T12:53:18","modified_gmt":"2024-07-22T12:53:18","slug":"cyber-security-is-becoming-a-matter-of-good-corporate-governance-good-ethics-and-quite-simply-good-business","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/cyber-security-is-becoming-a-matter-of-good-corporate-governance-good-ethics-and-quite-simply-good-business\/","title":{"rendered":"Cyber security is becoming a matter of good corporate governance, good ethics, and quite simply \u2013 good business."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1863\" class=\"elementor elementor-1863\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3ff9d452 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ff9d452\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e7f8b41\" data-id=\"2e7f8b41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-04a7ba5 elementor-widget elementor-widget-heading\" data-id=\"04a7ba5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3 style=\"color: #aaa;font-style: italic\">Key factors for boards and executive management to consider in 2019 around cyber security and privacy<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-903b33d elementor-widget elementor-widget-text-editor\" data-id=\"903b33d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyber security has risen as a key issue on the radar of virtually all organisations. As a recent AT Kearney <a href=\"https:\/\/www.atkearney.com\/web\/global-business-policy-council\/article?\/a\/rising-to-the-challenge_2018\" target=\"_blank\" rel=\"noreferrer noopener\" label=\"report (opens in a new tab)\" class=\"broken_link\">report<\/a> suggests, cyber-attacks have been topping executives\u2019 lists of business risks for three straight years. In fact, the overwhelming majority of organisations have experienced some form of cyber-attack at some point over the past few years.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e07b16e elementor-widget elementor-widget-text-editor\" data-id=\"e07b16e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis concern is also driven by security and privacy becoming increasingly valued by customers and the media, and by regulators who are now stepping into the topic with the ability to impose business-threatening fines (GDPR in Europe, California Consumer Privacy Act of 2018). In parallel, the cyber risk landscape is ever-complexifying \u2013 with new technologies such as <a href=\"https:\/\/corixpartners.com\/artificial-intelligence-cybersecurity-common-sense\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"AI (opens in a new tab)\">AI<\/a> bringing at least as many new threats as they bring opportunities to improve cyber security.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ab4a27 elementor-widget elementor-widget-text-editor\" data-id=\"4ab4a27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn this new age of \u201cwhen-not-if\u201d around cyber-attacks, it is worrying to see so many large organisations still struggling with the <a href=\"https:\/\/corixpartners.com\/cyber-security-execution-challenge\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"delivery (opens in a new tab)\">delivery<\/a> of cyber security initiatives. Maturity levels on the topic have remained dangerously low, and in fact, the same AT Kearney study found that more than 60% of surveyed firms had not yet fully developed and implemented cyber defence strategy. Their findings echo those of many firms and research bodies year after year and the situation appears rooted in <a href=\"http:\/\/www.blurb.co.uk\/b\/9015902-cyber-security-the-lost-decade-2018-edition\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"decades (opens in a new tab)\">decades<\/a> of short-sighted adverse prioritization of cyber security issues. It has also engineered a <a href=\"https:\/\/corixpartners.com\/ciso-talent-alienation-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"talent alienation (opens in a new tab)\">talent alienation<\/a> dynamics which only reinforces the problem.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec6ca2f elementor-widget elementor-widget-text-editor\" data-id=\"ec6ca2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Board is ultimately accountable for cyber resilience and the only way out of this dire situation can only come from the board down. To that end, it is crucial that cyber security stops appearing periodically at the board-level only as a check-box exercise or after an incident, \u2013 but instead starts anchoring itself at that level and informing every other strategic decision.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58ebef6 elementor-widget elementor-widget-text-editor\" data-id=\"58ebef6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nA way to achieve this could be to frame cyber security as a formal and integral part of a company\u2019s Environmental, Social and Corporate Governance (ESG) strategy, and this is the proposition the <a href=\"https:\/\/securitytransformation.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Security Transformation Research Foundation (opens in a new tab)\">Security Transformation Research Foundation<\/a> analyses in its <a href=\"https:\/\/securitytransformation.com\/wp-content\/uploads\/2017\/07\/STRF-CyberSecurity-ESG-White-Paper-January2019-FINAL-10.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"latest White Paper (opens in a new tab)\">latest White Paper<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6f1b20 elementor-widget elementor-widget-text-editor\" data-id=\"b6f1b20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nCyber security is crucial in helping organisations create and protect value \u2013 an aspect increasingly backed up by <a href=\"https:\/\/www.bcg.com\/publications\/2017\/total-societal-impact-new-lens-strategy.aspx\" target=\"_blank\" rel=\"noreferrer noopener\" label=\"data models (opens in a new tab)\" class=\"broken_link\">data models<\/a>. Beyond this straightforward argument, however, security is also becoming a key social and governance topic for all organizations.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3eb001a elementor-widget elementor-widget-text-editor\" data-id=\"3eb001a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyber security has obvious and deep links to issues of privacy and the protection of personal data, and as such is necessarily becoming a key enabler to any organisation\u2019s social responsibility initiative. This is especially important as digital trust is likely to become an organisation\u2019s most valuable asset \u2013 irrespective of the direction in which data-driven business models evolve in the years to come.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cda1b2 elementor-widget elementor-widget-text-editor\" data-id=\"1cda1b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThose new security and privacy imperatives also require a significant rethinking of corporate governance frameworks. As organisations cannot do whatever they want with the data they collect anymore, cyber security and data privacy considerations must start to infuse daily business operations and decisions. Crucially, the challenge of executing such transformation is itself a key governance issue, as cyber security is first and foremost a human and cultural problem (despite what tech vendors would like us to believe).\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a011a10 elementor-widget elementor-widget-text-editor\" data-id=\"a011a10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs every enterprise is becoming more and more data-driven, it is key for the Board to realize that cyber security is becoming a central tenet both of its core business and of its social impact and governance strategies. This should the basis on which the cyber security imperative is cemented at Board level. Right where it always belonged.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94fa0e5 elementor-widget elementor-widget-text-editor\" data-id=\"94fa0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tRead the full white paper <a href=\"https:\/\/securitytransformation.com\/wp-content\/uploads\/2017\/07\/STRF-CyberSecurity-ESG-White-Paper-January2019-FINAL-10.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"here (opens in a new tab)\">here<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As every enterprise is becoming more and more data-driven, it is key for the Board to realize that cyber security is becoming a central tenet both of its core business and of its social impact and governance strategies. This should the basis on which the cyber security imperative is cemented at Board level. Right where it always belonged.&nbsp;Here are Key factors for boards and executive management to consider in 2019 around cyber security and privacy.<\/p>\n","protected":false},"author":529,"featured_media":3515,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3178],"class_list":["post-1863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3178,"user_id":529,"is_guest":0,"slug":"jean-christophe-gaillard","display_name":"Jean-Christophe Gaillard","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_b55e5afa-fb86-428a-a054-3be0451df2a4-150x150.jpg","user_url":"https:\/\/www.corixpartners.com","last_name":"Gaillard","first_name":"Jean-Christophe","job_title":"","description":"Jean-Christophe Gaillard\u00a0is Managing Director and Founder at Corix Partners. He is also a Non-Executive Director with\u00a0<a href=\"https:\/\/www.stratasecurity.co.uk\/\">Strata Security Solutions<\/a>, a specialized cybersecurity firm. He has been co-president of the Cyber Security group of the\u00a0<a href=\"https:\/\/www.telecom-paristech.org\/\">Telecom Paris Tech alumni association<\/a>\u00a0since May 2016. He is the author of \u201c<a href=\"http:\/\/www.blurb.co.uk\/b\/9015902-cyber-security-the-lost-decade-2018-edition\" target=\"_blank\" rel=\"noopener\">Cyber Security: The Lost Decade<\/a>\u00a0\u2013 A Security Governance Handbook for the CISO and the CIO\u201d, He contributes regularly to\u00a0<a href=\"http:\/\/www.thedigitaltransformationpeople.com\/authors\/jc-gaillard\">The Digital Transformation People<\/a>,\u00a0<a href=\"http:\/\/www.business2community.com\/author\/jc-gaillard\">Business 2 Community<\/a>, and\u00a0<a href=\"https:\/\/www.iotforall.com\/\">IoTforAll<\/a>\u00a0platforms, as well as the\u00a0<a href=\"https:\/\/www.thebtn.tv\/\">Business Transformation Network<\/a>. He is an expert contributor on the\u00a0<a href=\"https:\/\/ciowatercooler.co.uk\/members\/jean-christophe-gaillard\/activity\/\">CIO Water Cooler<\/a>\u00a0and has previously published articles on\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/bridging-gap-security-it-operations\/\">InfoSecurity<\/a>\u00a0Magazine, \u00a0<a href=\"http:\/\/www.computing.co.uk\/ctg\/opinion\/2396800\/how-to-achieve-effective-cyber-security-in-a-hyperconnected-world\">Computing<\/a>, the C-Suite.co.uk,\u00a0<a href=\"http:\/\/www.informationsecuritybuzz.com\/?s=gaillard\">Info Sec Buzz<\/a>\u00a0and the\u00a0<a href=\"http:\/\/www.director.co.uk\/blog-cyber-insurance-what-do-you-think-youre-buying-20323\/\">IoD Director<\/a>\u00a0websites."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/529"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1863"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1863\/revisions"}],"predecessor-version":[{"id":36915,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1863\/revisions\/36915"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3515"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1863"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}