2024HPE Nonstop NewsMarch 2024Uncategorized Cybersecurity in the Boardroom: A Strategic Driver for Growth by comforte March 13, 2024 written by comforte Cybersecurity has struggled for many years to make it onto the boardroom agenda. The perception of it as a purely technology function with limited strategic importance has led many organizations to take a short-term, check-box approach to managing cyber risk. This grossly undervalues the role cyber can and should have. In fact, one 2023 study finds that half (51%) of global business decision makers (BDMs) still consider “it a necessary cost but not a revenue contributor,” while 38% see it as a barrier rather than a business enabler. However, boards that are more engaged in cyber could stand a much better chance of achieving their strategic objectives. Time for engagement Boardroom interest in cybersecurity can vary significantly from business to business. That’s part of the reason why regulators are increasingly stepping in. The SEC’s recently introduced rules are designed to improve transparency and accountability to investors by forcing prompt incident disclosures and mandating boards to describe their oversight of and processes to manage cyber risk. The NIS2 regulation in Europe makes senior managers personally liable for non-compliance, resulting in serious breaches. It gives regulators the potential power to temporarily suspend their role. Even without the presence of such a big regulatory stick, it should be clear to boards that greater engagement with their CISOs makes sense for many reasons. It could help them to: Preserve competitive advantage by protecting sensitive corporate data Bolster growth by mitigating threats that could impact the organization financially and reputationally Drive success by supporting digital transformation initiatives and R&D investment Open the door to new markets by ensuring the organization can comply with local privacy/cybersecurity laws Build trust with prospective and existing customers, partners, and suppliers. A fifth (19%) of global BDMs claim their security posture has already impacted the organization’s ability to win new business Putting the pieces in place So, how should boards plan their cybersecurity governance efforts? A report from the World Economic Forum (WEF) is instructive. It describes six principles for improved oversight of cyber-resilience, which could also help to drive strategic goals. These are: Cybersecurity is a strategic business enabler. Understand the economic drivers and impact of cyber risk. Align cyber-risk management with business needs. Ensure organizational design supports cybersecurity. Incorporate cybersecurity expertise into board governance. Encourage systems resilience and collaboration. This work should begin with board directors increasing their knowledge of cyber risk management. A great place to start would be closer interaction with their CISOs, who should ideally be reporting to the CEO for maximum exposure to the business. The importance of data security Cybersecurity is no simple task. However, one core focus for boards must be on protecting the data itself. Why? Because data is arguably the most precious commodity an organization holds. It’s also key to winning customer trust. According to McKinsey, over half (53%) of consumers specifically look for companies with a reputation for protecting data, rising to 63% of those buying on behalf of organizations. And 46% say they’d consider switching brands when a company’s data practices are unclear. The challenge for modern organizations is that data can be created, stored, and moved across several distributed on-premises and cloud environments. That demands a data-centric security solution designed to continuously discover, classify, and then apply strong protection according to policy – wherever that data exists. Products like comforte’s Data Security Platform offer extra value in protecting data whilst enabling it to continue being used for processing and analytics. Data security should sit at the core of a strategic, board-led approach to cyber. From Apple to banking giant HSBC, the organizations that get this right at the very top are likely to put themselves in the driving seat for long-term growth. Learn how to discover, classify, and protect all sensitive data. Click the button below to download the solution brief for our Data Security Platform: March 13, 2024 0 comment 0 FacebookTwitterPinterestEmail
2024HPE Nonstop NewsMarch 2024Uncategorized ETI-NET and XYPRO Enhance the Digital Resilience of HPE NonStop Systems by ETI-NET & XYPRO Team March 13, 2024 by ETI-NET & XYPRO Team March 13, 2024 Expanding on their leadership positions in HPE NonStop Backup Storage Management and Cybersecurity Threat Detection, the latest partnership delivers enhanced levels of HPE NonStop digital resiliency. ETI-NET, the leading provider of HPE NonStop backup systems data and monitoring management, and XYPRO Technology, the leading provider of HPE NonStop Cybersecurity and Compliance … 0 FacebookTwitterPinterestEmail
2024AIArtificial IntelligenceEnewsLatest NewsMarch 2024Uncategorized Welcome to the Era of BadGPTs by Belle Lin March 11, 2024 by Belle Lin March 11, 2024 A new crop of nefarious chatbots with names like “BadGPT” and “FraudGPT” are springing up on the darkest corners of the web, as cybercriminals look to tap the same artificial intelligence behind OpenAI’s ChatGPT. Just as some office workers use ChatGPT to write better emails, hackers are using manipulated versions of … 0 FacebookTwitterPinterestEmail
2024HPE Nonstop NewsUncategorized 2024 Top 5 Cybersecurity Predictions by XYPRO Team February 29, 2024 by XYPRO Team February 29, 2024 Steve Tcherchian, CISSP, PCI-ISAChief Product OfficerXYPRO Technology Corporationhttps://www.linkedin.com/company/xyprolinkedin.com/in/stevetcherchian 2024 promises to be a year marked by unprecedented challenges and innovations. Picture this: a bustling metropolis where the heartbeat of daily life synchronizes with the hum of digital connectivity. Now, imagine the sudden jolt when schools, utilities, critical infrastructure, entertainment … 0 FacebookTwitterPinterestEmail
Enews5 Cyber hygiene can combat security threats posed by quantum computing by Rob Jenks August 13, 2023 by Rob Jenks August 13, 2023 But more than two decades later, is this level of cyber hygiene enough? 0 FacebookTwitterPinterestEmail
Enews4-2 13 go-to podcasts that inspire IT industry leaders today by Linda Rosencrance July 13, 2023 by Linda Rosencrance July 13, 2023 From the most up-to-date tech and cybersecurity news to interviews with top female technology leaders, 0 FacebookTwitterPinterestEmail
Enews4 The 3 Traits of Successful Cyber Security Leaders by JC Gallard July 13, 2023 by JC Gallard July 13, 2023 Here is why successful cyber security leaders have to be trusted business insiders. 0 FacebookTwitterPinterestEmail
inclusion3Uncategorized KaaS Series: Cyber Security Mesh Architecture (CSMA) by Liz Lovelace May 5, 2023 by Liz Lovelace May 5, 2023 EXPERT WEBINAR SERIES: CSMA represents a significant shift away from traditional perimeter-based security models and towards a more decentralized approach. 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2022 Are we on the path to a National Data Privacy Law? by Stan Wisseman October 16, 2022 by Stan Wisseman October 16, 2022 For years, US lawmakers have avoided making tough calls about what data privacy protections we should give consumers and how they should be enforced. That finally may be changing. Last week, the US House Energy and Commerce Committee greenlit a watershed privacy bill that strikes compromises on a series … 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2022 The Struggle with Threat Intelligence by Kevin Swan October 16, 2022 by Kevin Swan October 16, 2022 Driven by a vast majority of security professionals who consider cyber threat intelligence a valuable resource in finding and dealing with security threats, the adoption of threat intelligence services and capabilities continues to take off. Yet, security analysts continue to slowly adopt the technology needed to make better use … 0 FacebookTwitterPinterestEmail