{"id":13951,"date":"2018-11-29T11:00:03","date_gmt":"2018-11-29T19:00:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/29\/news-7718\/"},"modified":"2018-11-29T11:00:03","modified_gmt":"2018-11-29T19:00:03","slug":"news-7718","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/29\/news-7718\/","title":{"rendered":"Scrutinizing your cybersecurity strategy through a digital risk lens"},"content":{"rendered":"<p><strong>Credit to Author: Herv\u00e9 Coureil| Date: Thu, 29 Nov 2018 11:42:38 +0000<\/strong><\/p>\n<p>The Symantec 2018 Internet Security Threat Report<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a> mentions a 600% increase in overall IoT attacks in 2017. It\u2019s clear: cyber threats and incidents are a major operational risk every enterprise faces along their digital transformation journey. That\u2019s why we believe that implementing a cybersecurity strategy that is viewed through the lens of digital risk is imperative.<\/p>\n<p>McKinsey estimates there are 120 million new malware variants developing every year<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a>, showing how cyber attacks become more and more relentless\u2026We must heighten end-to-end digital risk measures and operate with a cyber-resilient mindset at every step.<\/p>\n<p>For companies embarking on digital transformation, risk today goes well beyond a sole connected object, or database. It now spans <a href=\"https:\/\/blog.schneider-electric.com\/energy-management-energy-efficiency\/2018\/07\/13\/the-rise-of-the-extended-enterprise-in-todays-digital-economy\/\" target=\"_blank\">the full extended digital enterprise<\/a>, including supply chain and partners. Managing digital risk therefore must be framed by a business-driven strategy, as \u201cOrganizations can no longer evade the truth that digital has become the need of the hour and the most effective enabler for creating a differential and unique competitive advantage\u201d (Deloitte) <a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a>. This strategy should be clear and communicated across the company, as<\/p>\n<h3><span style=\"color: #3dcd58\">&#8220;78% of Board decisions are are regularly influenced by risk data per Gartner.&#8221;<a href=\"#_edn4\" name=\"_ednref4\">[iv]<\/a><\/span><\/h3>\n<p> <a href=\"https:\/\/twitter.com\/home?status=%E2%80%9C78%25%20of%20Board%20decisions%20are%20are%20regularly%20influenced%20by%20risk%20data%20per%20%40gartner_inc.%E2%80%9D%20%23Cybersecurity%20Read%20more%20in%20our%20latest%20%40SchneiderElec%20Blog%3Ahttps%3A\/\/blog.schneider-electric.com\/cyber-security\/2018\/11\/29\/scrutinizing-your-cybersecurity-strategy-through-a-digital-risk-lens\/\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-52576 alignnone\" src=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/11\/CTA-Twitter.png\" alt=\"\" width=\"200\" height=\"20\" \/><\/a> <\/p>\n<h2><span style=\"color: #3dcd58\"><strong>4 ways to stay ahead of cyber risk<\/strong><\/span><\/h2>\n<p>Only 30% of CIOs, in conjunction with CISOs, take cross-organization steps to drive a business-led approach to digital risk. <a href=\"#_edn5\" name=\"_ednref5\">[iiv]<\/a>. We can do more. Start by re-framing cybersecurity as a business conversation instead of a technology one. Rethink cybersecurity as a continuous, always-on, proactive activity \u2014 not a task or a cog in a process.<\/p>\n<p>Within this context, here are 4 items that we believe are important while implementing an effective risk-based approach to cybersecurity:<\/p>\n<ol>\n<li><span style=\"color: #3dcd58\">Look at cyber from all perspectives. <\/span>Cyberattack scenario planning is often a good starting point, as it makes you think from the perspective of the attacker. Model threats and make cyber risk scenarios tangible from a bottom line standpoint (i.e., cost, reputation, business disruption, supply chain impact). This approach makes cyber a business conversation, not a technology one.<\/li>\n<li><span style=\"color: #3dcd58\">\u00a0A blast-all stance simply won\u2019t work with cyber.<\/span> Trying to do everything at once does nothing, except, that is, make prioritization impossible and the impact of each project or effortless than it should be. Instead, using concrete risks scenarios \u2014 as mentioned above \u2014 allows you to be efficient at prioritizing prevention, detection, response, and recovery plans. In this way, you can target funding to the best use.<\/li>\n<li><span style=\"color: #3dcd58\">Cybersecurity no longer is about just protection. <\/span>It demands a layered in-depth approach, from identification to recovery. <a href=\"https:\/\/www.schneider-electric.com\/en\/download\/document\/998-20244304\/\" target=\"_blank\">Schneider Electric uses the NIST framework<\/a> to guide its end-to-end cyber strategy. Regarding digital security only as a matter of building thicker walls slows down everything and creates barriers. But if you think of cybersecurity as spanning everything, you can take a proactive approach and drive digital innovation as an inherent part of your security framework.<\/li>\n<li><span style=\"color: #3dcd58\">Strengthen your cyber posture by learning as much as possible about every and any incident.<\/span> And be sure to share debriefing information across your extended enterprise and digital ecosystem, including partners, customers, and authorities. Doing so allows you to correct processes, plans, and risk scenario modeling. The recovery phase is critical. It is during this phase of the NIST framework that your cyber muscles become stronger, making you faster to beat the next event.<\/li>\n<\/ol>\n<h2><span style=\"color: #3dcd58\"><strong>Improve your cybersecurity resilience<\/strong><\/span><\/h2>\n<p>In a digital world, no company can become a castle. Building a higher wall isn&#8217;t the answer.<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/y4k61_XuPC4?feature=oembed\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<h3><span style=\"color: #3dcd58\">&#8220;It\u2019s time to think about your entire digital ecosystem with a wide view that sees beyond the boundaries of your own firm.&#8221;<\/span><\/h3>\n<p> <a href=\"https:\/\/twitter.com\/home?status=%22It%E2%80%99s%20time%20to%20think%20about%20your%20entire%20digital%20ecosystem%20with%20a%20wide%20view%20that%20sees%20beyond%20the%20boundaries%20of%20your%20own%20firm.%22%20-%20Herve%20Coureil%20%23CDO%20%40SchneiderElec%20-%20Read%20more%20here%3Ahttps%3A\/\/blog.schneider-electric.com\/cyber-security\/2018\/11\/29\/scrutinizing-your-cybersecurity-strategy-through-a-digital-risk-lens\/\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-52576\" src=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/11\/CTA-Twitter.png\" alt=\"\" width=\"200\" height=\"20\" \/><\/a> <\/p>\n<p>And consider welcoming cyber partners into your ecosystem to build a robust, holistic posture.<\/p>\n<p>Within its extended enterprise, Schneider Electric cultivates strong cyber and <a href=\"http:\/\/ai.se.com\/\" target=\"_blank\">AI partnerships<\/a> with Industry 4.0 security experts and specialists in threat prediction and prevention to build resilience at the convergence of IT and OT infrastructure. Our customers, too, can reap the benefits of our ecosystem to secure their own critical sites by leveraging <a href=\"https:\/\/www.schneider-electric.us\/en\/work\/services\/field-services\/industrial-automation\/industrial-cybersecurity\/industrial-cybersecurity.jsp\" target=\"_blank\">Schneider\u2019s Industrial Cybersecurity Services<\/a>.<\/p>\n<p>A digital risk strategy, bolstered by <a href=\"https:\/\/www.schneider-electric.com\/en\/partners\/alliances\/\" target=\"_blank\">cyber partnerships and the extended digital ecosystem<\/a>, is a great asset in your digital journey \u2014 and the best way to see the road ahead clearly at every turn.<\/p>\n<p>&nbsp;<\/p>\n<p> <a href=\"https:\/\/www.schneider-electric.com\/en\/download\/document\/998-20244304\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-53084 size-full aligncenter\" src=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/11\/CTA-herve_blog_digital_disruption_560x115.gif\" alt=\"\" width=\"560\" height=\"150\" \/><\/a> <\/p>\n<hr \/>\n<h6><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a> <a href=\"https:\/\/interactive.symantec.com\/ISTR?CID=70138000001MD17AAG\">https:\/\/interactive.symantec.com\/ISTR?CID=70138000001MD17AAG<\/a><\/h6>\n<h6><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a> McKinsey Cybersecurity and Cyber risk Service Line, cited in \u201c<a href=\"https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/a-new-posture-for-cybersecurity-in-a-networked-world\">Digital and Risk A new posture for cyber risk in a networked world<\/a>,\u201d March 2018.<\/h6>\n<h6><a href=\"#_ednref3\" name=\"_edn3\">[iii]\u00a0<\/a>Deloitte, \u201cManaging Risk in Digital Transformation,\u201d January 2018 <a href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/security-risk-management-us\">https:\/\/www.gartner.com\/en\/conferences\/na\/security-risk-management-us<\/a><\/h6>\n<h6><a href=\"#_ednref4\" name=\"_edn4\">[iv]\u00a0<\/a> Gartner Annual Security and Risk Survey, February &#8211; March 2017\u00a0 <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/in\/Documents\/risk\/in-ra-managing-risk-in-digital-transformation-1-noexp.pdf\">https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/in\/Documents\/risk\/in-ra-managing-risk-in-digital-transformation-1-noexp.pdf<\/a><\/h6>\n<h6><a href=\"#_ednref5\" name=\"_edn5\">[iiv]<\/a> Gartner, Analyst(s): Rob McMillan, Paul E. Proctor, \u201c<a href=\"https:\/\/www.gartner.com\/doc\/3846477\/cybersecurity-digital-risk-management-cios\">Cybersecurity and Digital Risk Management: CIOs Must Engage and Prepare<\/a>.\u201d Published: 17 January 2018 ID: G00349114<\/h6>\n<h6><\/h6>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/11\/29\/scrutinizing-your-cybersecurity-strategy-through-a-digital-risk-lens\/\">Scrutinizing your cybersecurity strategy through a digital risk lens<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/11\/29\/scrutinizing-your-cybersecurity-strategy-through-a-digital-risk-lens\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Herv\u00e9 Coureil| Date: Thu, 29 Nov 2018 11:42:38 +0000<\/strong><\/p>\n<p>The Symantec 2018 Internet Security Threat Report[i] mentions a 600% increase in overall IoT attacks in 2017. It\u2019s clear: cyber threats and incidents are a major operational risk every enterprise&#8230;  <a href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/11\/29\/scrutinizing-your-cybersecurity-strategy-through-a-digital-risk-lens\/\" title=\"ReadScrutinizing your cybersecurity strategy through a digital risk lens\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/11\/29\/scrutinizing-your-cybersecurity-strategy-through-a-digital-risk-lens\/\">Scrutinizing your cybersecurity strategy through a digital risk lens<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[12608,4500,12512,10495],"class_list":["post-13951","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-cyber-security","tag-cybersecurity","tag-iiot","tag-iot"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13951"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13951\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13951"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}