Site icon IT Vortex

Four key challenges for cybersecurity leaders

Sata protection - Four key challenges for cybersecurity leaders

In business and society today, we are too often focused on bolting on cybersecurity in a hyphenated manner. We want “security-enabled” this, “security-enhanced” that. But cybersecurity cannot be an add-on. Rather it must be built into every product and system from the moment it is conceived. To achieve such integration, we need to address four fundamental leadership challenges:

1) Real-time information sharing

The pace of the digital world continues to increase exponentially. To keep up, security professionals have to address threats and security weaknesses rapidly, before cybercriminals strike. Speed is fundamental to an effective cybersecurity strategy; cybersecurity systems must keep up with the increasing speed and volume of internet traffic. Speed of reaction is vital as well. Too often, there are long lag times in addressing cybersecurity problems. Criminals can – and do – take advantage of this.

But speed requires visibility. To act fast, we must share threat information in near real-time. Cybercrime has no borders. In a world that is so deeply interconnected by digital technology, cybersecurity and global security are the same thing. No single organization, public or private, can have a complete view of the entire cyber landscape. Senior leadership must insist organizations share information to put the pieces of the puzzle together. Otherwise, we will be flying blind.

2) Widespread collaboration in cybersecurity

Effective cybersecurity must be deeply and widely collaborative. Collaboration enables the good guys to create a hive mind, to learn rapidly, constantly expanding our competency and capacity. If organizations or states do not learn from one another, the same attacks will needlessly take down countless entities.

Wide collaboration means including everyone in a broader conversation about cybersecurity. Deep collaboration means making everyone smarter and creating knowledge repositories that are part of our operational systems. It means collaborating on threat intelligence sharing and it means collaborating on education.

The more we talk about the importance of cybersecurity and its fundamental role, and the more education is shared, the more we will educate and nurture the future generations of cybersecurity professionals we very much need. The estimated cost of damage caused by hackers, malware and data breaches is projected to reach $6 trillion by 2021. To empower leadership to meet these challenges, technological experts and top-level decision-makers across the public and private sectors must work together. This takes time. Senior leaders should make it clear that such collaboration is time well-spent.

Working together, we could see tangible results very fast. More than 92% of malware is delivered via email. With the right awareness campaigns and policies, as well as diligence in practice, we could eliminate more than 90% of malware simply by teaching new skills that overcome ingrained behaviours.

3) Creating and promoting a common vision for integrated cybersecurity

Public and private sector leaders must commit to creating a common vision for integrated cybersecurity – something akin to NATO, which is based on clearly defined fundamental principles.

This vision for integrated cybersecurity must be comprehensive and inclusive, anticipating the next actions of cybercriminals rather than solely reacting to them. Just like NATO has well-trained armies and constantly evolving battlefield strategies, the common vision must be operational and must look at how best to address the technical challenges of effective cybersecurity, including the skills gaps I focused on in a previous piece.

Cybersecurity competency must be embraced by individuals and organizations. Cybersecurity education and training should be part of everyone’s educational development. Without such efforts, we will not have enough experienced soldiers to fight this war.

4) Promoting the technology platform we need to make this work

Cybersecurity was not part of the design of most of the world’s current infrastructure. This must change.

Making cybersecurity work requires computing power. From now on, most products, devices and infrastructure should have this additional computing power designed in. Furthermore, the cybersecurity capabilities inside the devices must fit into an integrated platform that distributes workloads over the layers of a system.

An example of such a larger vision for cybersecurity where all parts of the network participate together is security-driven networking, which changes traditional assumptions of networking. Instead of looking only for the fastest path, security-driven networking takes the risk of each path into account and moves traffic over the fastest safe path. To make this work, the networking devices all need to share information about the speed and the risk of each network path.

The ability to offer robust security across the network with low latency and high performance is a critical functionality that organizations are seeking, especially with the deployment of 5G networks. A centralized approach is no longer tenable.

An integrated, optimized platform won’t emerge in a perfect form, but it won’t emerge at all unless we realize that it is needed. Organizations like the World Economic Forum’s Centre for Cybersecurity must continue to educate product designers around the world about the need to build cybersecurity into their products, and and best practices in doing so. In some cases, this may lead to a product refresh while in others it will lead to a redesigned ecosystem. In many cases, both changes will be required. We also need more widely accepted standards and protocols and public discussion about the topic to encourage trust.

A way forward

Given these four challenges, it is only once we have true integration, both across national and geographic borders, and also within our own businesses, that cybersecurity will achieve its full potential of creating a truly protected world.

Regardless of industry, vertical market, and geography, industry and government leaders have a responsibility to guide us toward a safer world. In a climate permeated by lack of trust and poor cooperation between established industry leaders, the only winners are cybercriminals. As leaders of important global organizations, members of the WEF and its Centre for Cybersecurity, and as an individual deeply aware of the importance of this imperative, I believe that cybersecurity is a responsibility we must all take on.

Written by

Ken Xie, Founder, Chairman of the Board and Chief Executive Officer, Fortinet

Exit mobile version