{"id":285,"date":"2018-06-22T11:03:09","date_gmt":"2018-06-22T11:03:09","guid":{"rendered":"https:\/\/hotlineit.launchmedigital.com\/?p=285"},"modified":"2018-12-04T08:13:54","modified_gmt":"2018-12-04T08:13:54","slug":"why-its-important-to-invest-in-your-cyber-security-maturity","status":"publish","type":"post","link":"https:\/\/staging.hotlineit.com\/why-its-important-to-invest-in-your-cyber-security-maturity\/","title":{"rendered":"Why it\u2019s important to invest in your Cyber Security Maturity"},"content":{"rendered":"
Often, CISOs struggle to understand and share precisely what is happening across their estate at all times. To support business change or user demands, organisations have evolved highly sophisticated, interconnected structures. Some of there are internally owned and some run by third parties.<\/p>\n
Brett Ogilvie<\/a> of Celtech Energy Systems<\/a> states; \u201cA properly formed cyber security program<\/a> is far-reaching, pragmatic and risk based. When the basics are all properly in place with appropriate monitoring the entire IT (and or OT) operations infrastructure changes from a reactive to a proactive function.\u201d<\/p>\n This growing lack of control and visibility directly impacts how informed and prepared an organisation is to deal with either attempted or successful attacks. If a CISO wants to have an informed business conversation with their executives about risk, they need the same level of confidence in their presentation of cyber performance data and reporting as the finance director would have in the numbers they bring to the board. Organisations that invest in creating a concise and accurate view of their cyber security state and can communicate this clearly with the rest of the business, see the benefits in terms of confidence and more informed, collaborative decision making around the value of cyber investment.<\/p>\n Michelle Joosse from Hotline IT goes on to say; \u201cA Mature Cyber security business has policies and processes in place that staff has been trained and educated on.\u201d<\/p>\n The cyber security landscape has grown rapidly; outside of IT, its traditional home, cyber risk touches every aspect of a modern business. Various departments are involved, such as HR through their responsibility for cyber awareness training. Others include risk experts in Finance, to compliance and audit and increasingly resilience and business continuity professionals. An organisation\u2019s data is similarly dispersed.<\/p>\n Those in the unenviable position of reporting the organisation\u2019s current cyber state to the board will often approach the question of the cyber security state from a rather narrow view point. Until now there have been significant inconsistencies in the content and delivery of CSM reporting.<\/p>\n There are a number of reasons for this; the evolving risk landscape and associated technology developed at unprecendeted speed. This has led to organisations implementing a range of security solutions and services from different suppliers. The result is conflicting tools that do not necessarily communicate with one another, leading to gaps, crossover and duplication.<\/p>\n This lack of integration between solutions means organisations get very little value from over half of their cyber security spend. Worse, they will not even have a way of deciding which solution best fits the business priorities. This continual spending without clear direction and results leads to the decrease in the agility of security teams to respond to the next threat that emerges. Throughout multiple industries we have seen companies find themselves in a never-ending cycle of testing, part-fixing, requesting budget, spending budget, testing \u2013 repeat. Though at no point do these companies or the individuals feel confident that every penny of investment is driving CSM.<\/p>\n CSM requires businesses to look beyond security technologies and processes and examine indicators such as behaviours, events, systems and potential threats across the entire organisations. CSM owners need to be able to articulate across the business, especially to the board, the state of preparedness and organisational activity across five areas:<\/p>\n 1. Compliance and accreditation Thomas Jreige<\/a>, Managing Director at Focus Cyber Group<\/a> believes; \u201cWhen implementing cyber security in an organisation, it must therefore be implemented within the context of the organisation in mind. Additionally, it must aim to maintain the risks to information in the environment, under the risk appetite for the organisation.\u201d<\/p>\n Having the ability to analyse and benchmark your organisation in these areas in a consistent way allows an organisation to create a contextual and prioritised transformation plan to improve the overall CSM. CISOs, IT Security managers and CIOs can then track improvements and report confidently and knowledgeably to everyone in the business quickly highlighting areas of improvement and the value of these gains as well as building a positive, informed narrative around areas that require improvement.<\/p>\n At CNS, we\u2019ve helped a number of clients unravel the complexity of their estates to establish greater control and visibility of performance \u2013 supporting them through the processes of building and then running their CSM programmes. Clients value our independent advice to plan and deliver CSM dashboards that meet their specific business, risk and compliance requirements. And whether organisations have struggled long and hard with cyber or are just beginning \u2013 the value of CSM is clear \u2013 transforming the on-going business conversation about cyber risk, return on investment and measurable, comparative improvement.<\/p>\n To read our full paper, \u2018Cyber Security Maturity: Driving Clarity through Complexity\u2019 click here<\/a>.<\/p>\n To find out more about how CNS Group can help you develop your organisation\u2019s CSM, click here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" Often, CISOs struggle to understand and share precisely what is happening across their estate at all times. To support business change or user demands, organisations have evolved highly sophisticated, interconnected structures. Some of there are internally owned and some run by third parties. Brett Ogilvie of Celtech Energy Systems states; \u201cA properly formed cyber security … Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":798,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"\nAssessing your CSM: What are the challenges?<\/h2>\n
So, what is the answer?<\/h2>\n
\nRoger Smith<\/a> from R and I ICT Consulting Services<\/a> makes a valid point; \u201cThe more mature an organisation is, the more developed the protective strategies should be. In most cases this in incorrect.\u201d<\/p>\n
\n2. Technical compliance
\n3. Transformation and maturity
\n4. Events, alerts and threats
\n5. Governance and policy<\/p>\nConclusion<\/h2>\n