Security Market Segment LS
Monday, 29 October 2018 11:33

Mobile computing a rising cyber security risk, say ICT execs Featured

By
Mobile computing a rising cyber security risk, say ICT execs Image courtesy of Stuart Miles at FreeDigitalPhotos.net

Australian ICT industry executives and their counterparts around the world believe mobile computing will raise cyber security risks for organisations, with artificial intelligence topping the list as the greatest security risk, according to a new report.

According to a newly published global security survey of 1460 executives worldwide by management firm Accenture, including in Australia, 74% of respondents said mobile computing would raise cyber risk moderately or significantly – and artificial intelligence will increase risk by 86%.

The survey also found that:

  • Sixty percent of respondents said all employees receive cyber security training upon joining the organisation and have regular awareness training throughout employment.
  • Surprisingly, only 40% of CISOs said establishing or expanding an insider threat program is a high priority.
  • Just 40% of CISOs said they always confer with business-unit leaders to understand the business before proposing the latest cyber security technologies.
  • Eighty-six percent of respondents say the amount of sensitive or confidential data exchanged would increase over the next three years, yet only 41% said that the data exchanged is adequately protected by their cyber security strategy.

According to Accenture, with the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, C-suite and IT decision makers need to embrace a different approach to cyber security to effectively protect against future cyber risks.

Accenture says that while most companies have a chief information security officer or assigned cyber security to a C-suite executive, such as a chief information officer, often, these leaders had “limited influence on cyber security strategy outside their departments”.

Additionally, nearly half of CISOs acknowledge that their responsibilities for securing the organisation are growing faster than their ability to address security issues, Accenture says.

In the Accenture study — “Securing the Future Enterprise Today – 2018" 73% of the Australian C-level executives polled, agreed that cybersecurity staff and activities need to be dispersed and executed throughout all parts of the organisation, but cyber security remains centralised in 82% of companies.

“Moreover, there is little indication that C-suite executives expect to shift more responsibility for cyber security to business units. For example, 21% of respondents say business unit leaders are accountable for cyber security today and 33% believe business unit leaders should be responsible in the future,” the report notes.

“There is no doubt that organisations are taking cyber security more seriously. However, there is still much work to be done,” said Joseph Failla, Accenture’s Security Lead for Australia and New Zealand.

“Cyber security strategy needs to be led by the board, executed by the c-suite and owned at the front lines of the organisation. Further, it must be infused across all aspects of a company’s processes and systems, and built into the daily work activities of employees.

“To be able to grow confidently, companies can establish sustained cyber resilience through a continual, proactive focus on cyber risk management at all levels.”

Accenture says the study exposed a disparity between what Australian c-suite executives say are the emerging areas of concern and the cyber security strategies employed for protection.

“For example, companies are still doing little to spread security knowledge among employees and very few CISOs have the authority to influence business units across their organisations,” Accenture says.

According to Accenture, Australian C-suite executives view several types of new technologies and tools as raising cyber risk for their companies and “they’re highly concerned about the potential dangers of sharing data with third parties”.

The Accenture study recommends five actions for securing the enterprise in the future:

  1. Make your business leaders resilience leaders. Security must be in the room when strategy is being decided and options are being weighed to advise on risk mitigations.
  2. Support the security leader as a trusted business enabler. New roles and skills are needed inside the organisation to implement pervasive cyber resilience
  3. Make your workforce part of the solution. Companies must make clear that employees are accountable for security.
  4. Be an advocate for protecting customers. Go beyond compliance and become advocates for customers when it comes to protecting data.
  5. Think beyond your enterprise to your ecosystem. Work with these ecosystem partners to jointly protect their organisations.

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.

REGISTER HERE!

LAYER 1 ENCRYPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Peter Dinham

Peter Dinham - retired and is a "volunteer" writer for iTWire. He is a veteran journalist and corporate communications consultant. He has worked as a journalist in all forms of media – newspapers/magazines, radio, television, press agency and now, online – including with the Canberra Times, The Examiner (Tasmania), the ABC and AAP-Reuters. As a freelance journalist he also had articles published in Australian and overseas magazines. He worked in the corporate communications/public relations sector, in-house with an airline, and as a senior executive in Australia of the world’s largest communications consultancy, Burson-Marsteller. He also ran his own communications consultancy and was a co-founder in Australia of the global photographic agency, the Image Bank (now Getty Images).

VENDOR NEWS & WEBINARS

REVIEWS

Recent Comments