ArticlesC2 Fall 2022Why it’s Time to Get Proactive About Security by Thomas Gloerfeld October 16, 2022 written by Thomas Gloerfeld October 16, 2022 Of all the business risks facing organizations today, cyber-attacks were recently highlighted by executives as the most serious. That’s a heartening sign that awareness levels at the very top are at least improving. But it’s too soon to get carried away. In fact, separate research reveals that many organizations still treat security as an afterthought, until they’re breached.It’s 2022 and organizations can do better. Closer communication between IT and business leaders can help to drive a more strategic, proactive approach to manage cyber risk. For those keen to get on the front foot against their adversaries, data-centric security is increasingly an essential best practice for doing so. Why cyber demands attentionGlobal businesses have been buffeted by strong economic headwinds of late. But cyber still ranked as the top business risk, according to C-suite executives surveyed by PwC. Even more remarkable is the fact it beat risk factors such as inflation, talent acquisition and retention, and rising production costs—which are causing sleepless nights for executives everywhere.It does seem like the C-suite is starting to understand that cyber risk is an intrinsic part of business risk. A serious security breach could derail digital transformation projects, and cause major financial and reputational damage that may take years to recover from. Another driver may be more pertinent still for senior executives: new SEC proposals that would require boards to directly oversee cybersecurity, and make regulatory disclosures about directors’ cyber expertise. Post-breach security is too lateHowever, old challenges persist, as evidenced by a new UK government report which looks at the state of security in several organizations. Crucially, IT respondents had the following to say:“Not all were sure that their leadership teams fully understood the ‘scale of the threat,’ or the ‘cultural transition’ required to meet the growing cybersecurity challenge. Consequently, for many organizations in this study, leadership became more engaged in the cybersecurity challenge post-breach and has since demonstrated more serious intent to help the organization improve.”While engagement post-breach is better than no engagement at all, it is also sub-optimal. Executives that continue to view security in reactive terms will be less engaged, and less committed to long-term, strategic thinking. As this report argues, they’re less likely to ask tough, pointed questions of their CISOs. And they’re more likely to passively approve only the most basic people, process, and technology changes, to ensure bare minimum levels of compliance. On the front footOrganizations need instead to tackle security as an urgent imperative, to reduce overall business risk and enhance growth opportunities. It’s heartening to note that, despite the headline findings, respondents to the UK government study did acknowledge cyber-attacks are growing in volume and sophistication. And they agreed that security controls need to evolve as a result. The challenge is communicating that message to boardroom executives.But what happens once the message does get through? One of the first things CISOs can advocate is a data-centric security approach. That means applying protection to the data itself rather than relying solely on controls at the endpoint, perimeter, and other layers of the IT environment. Doing so ensures that even if threat actors get hold of the organization’s crown jewels – highly regulated customer information and/or IP – they won’t be able to use it. By applying the right kind of format-preserving encryption, it also means those organizations can leverage this data via analytics tools to drive innovation and growth. When it comes to mitigating cyber risk, being proactive is the best way to get results. Secure sensitive data in your cloud ecosystemSecure all your sensitive data and information intended for cloud destinations without disrupting your business processes and workflows.Download our fact sheet to learn more: comforteConnect ConvergeConnect HPE User CommunityConnect WorldwideConnectConvergecyber-attacksCybersecurityDataData ProtectionData Securitydata-centric securityDigital transformationHewlett Packard EnterpriseHPEHPE user communityHPE User Groupsecurity breachThomas Gloerfeld 0 comment 0 FacebookTwitterPinterestEmail Thomas GloerfeldThomas Gloerfeld is Director Partner Development & Marketing NonStop Solutions at comforte and has been associated with the NonStop community for over 25 years. Before joining comforte, he held various management positions at ACI Worldwide in Germany and the UK. In his role at comforte he manages all aspects of marketing for HPE NonStop solutions and comforte's NonStop partners. As part of his role, he closely monitors topics such as data security, risk and compliance, as well as digital transformation and connectivity. previous post HPE Accelerates its Sustainability Goals While Improving the Impact of IT On the Environment and Society next post Catharina Hospital Chooses HPE Ezmeral to Help Improve Patient Care You may also like Developers: Get free resources and training through the... October 16, 2022 Historic collaboration: Next-gen virtual infrastructure accelerates apps, boosts... October 16, 2022 Modernize the hospital data center with personalized healthcare... October 16, 2022 Are we on the path to a National... October 16, 2022 The Struggle with Threat Intelligence October 16, 2022 Modernize your data management with HPE GreenLake and... October 16, 2022 Introducing Qualcomm Cloud AI 100 Accelerators for HPE... October 16, 2022 Recap HPE Discover 2022 October 16, 2022 Making App Modernization Easier with HPE and vFunction October 16, 2022 The Insider Threat Problem: Your biggest threat may... October 16, 2022