APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    Creating a Culture of Security

    Lyle Hardy, Global CIO, Teleperformance

    Tweet
    content-image

    Lyle Hardy, Global CIO, Teleperformance

    The ongoing security breach­es that continue to plague retailers, government web­sites, and online enterpris­es convey the impression that stopping unauthorized access to sensitive electronic details is an im­possible task. Paradoxically, creating automated systems that detect and prevent unlawful access to servers and data theft is only half the solution. The other half, which is arguable, is more difficult—yet essential—is develop­ing a culture of security, a structure that says to employees, “Compliance is the responsibility of every employ­ee, every day, without exception. We expect you to be a part of our team, to work toward our clients’ success. It’s to your benefit and ours. And we will accept nothing less.”

    Operational security is a much more difficult task, because it involves the vagaries of human behaviour, dealing with individuals who possess a multitude of motivations, personalities, and work ethics.

    “The reality is that opportunities likely exist for employees to cheat because it’s primary focus is always on external threats”

    It’s one thing to design an automated system that can quickly detect a denial of service attack on a company’s database. It’s an even more difficult—yet essential— challenge to set up a system that figures out a spider-web of possible quirks and deceits from within the organization by employees intent on committing fraud, and then shuts down all avenues to their implementation.

    “If you want to cheat and steal, you can cheat and steal in any business in the world,” said former Morgan Stanley CEO, John Mack. Speaking recently to Bloomberg TV, Mack pointed out that “you can’t have a list of things you don’t do, and then when employees do them, you don’t punish them.”

    To create a viable, secure workplace, “you have to talk about what’s right. You have to set a standard. You need to talk about culture all the time.”

    The reality is that opportunities likely exist for employees to cheat because IT’s primary focus is mostly on external threats. While majority of employees are honest and trustworthy, systems and business processes must be put in place to prevent potential dishonest employees from committing fraud. One of the most common fraud risks is related to employees sharing  login IDs and passwords; statistics show that employee fraud is often committed using someone else’s credentials. Employees can even be contacted on Facebook or other social media sites to ask them to reveal personal or otherwise damaging data to third parties in exchange for money.

    Using a carrot and stick approach, companies must develop an internal culture in which employees adopt the goals of the corporation as their own and are rewarded for doing so; at the same time, they need to know that if they don’t, they will suffer the consequences.

    For B2B companies, the consequences of fraud and data theft are magnified. Which is why it’s key that your client understand that as a third-party supplier, you can only do your best work if you’re as familiar with their own internal data structures as you are with your own. While your clients may be hesitant to reveal too much, you should encourage them to open up and partner with you in conducting a thorough risk assessment of their operations.

    At the beginning of your engage­ment with them, create a detailed mapping of all their processes, system and resource interactions, allowing you to identify critical points that are vulnerable to potential breaches, or ones that could lead to negative im­pacts from improper access.

    By suggesting ways to improve their systems, ideally preventing a breach before it occurs, you’ll be saving the client headaches while preserving your company’s own good name.

    Holding employees accountable is practiced in a variety of industries, doing so improves outcomes. For example, in the UK, National Health Service hospitals publicly post the number of patients who contract hospital-borne infections in each facility, allowing not only physicians, but patients and their families, to see how risky a particular location is. Consequently, medical caregivers have become more alert to proper sanitary practices. As a result of this and other actions, the UK has seen a dramatic drop in infections, according to Dr. Mark Wilcox, Professor of Medical Microbiology at the University of Leeds.

    Provide instructional materials and ongoing training to all new hires, thereby elucidating company security policies and procedures on how to handle financial transactions, critical information, and fraud, while constantly reinforcing the company’s goals and culture through regular staff discussions.

    Post signs in public spaces warning against fraud and its consequences. Run videos in common areas discussing the importance of security and the sensitivity of data that employees handle. Issue color-coded ID cards that indicate which areas each employee has access. Allow only permitted items on each employee’s desk. For example, if pens, writing materials, and USB drives are not needed for the employee’s work, make sure that they are not present.

    Monitor access to databases and cut off employees the moment they are terminated, change roles, or go on vacation for extended periods of time. While employees may be loathed to “snitch” on each other, make it clear that it’s important for the future health of the company that bad apples are weeded out. Provide an anonymous tip line so that employees can report wrongdoing, and reward employees monetarily as appropriate for cutting down on fraud. Should an individual be caught cheating or accessing data for nefarious purposes, and sufficient evidence is present to confirm the employee’s misdeeds, make sure that that person is publicly held to ac­count. If someone must be arrested, do so in front of that person’s col­leagues, to show that wrongdoers will be punished.

    And to react quickly to changes in the security landscape, create a com­pletely-independent security council at the top level of your organization, one that reports to a C-level executive.

    Luis A. Aguilar, commissioner at the U.S. Securities and Exchange Commission (SEC), said in June 2014, “Boards that choose to ignore, or minimize, the importance of cyber security oversight responsibility, do so at their own peril”. So, while you may not be able to stop all fraud and security breaches, by implementing a culture of honesty and shared values and an understanding of the need to grow the company through best practices, you will minimize the impact of fraud and security breaches while maintaining an important edge on your competitors.

    You’ll also accomplish one im­portant personal goal: the ability to sleep well at night.

    Founded in 1978, Teleperformance is a customer experience management company based in Singapore offering multi-channel, multi-lingual, and geographic diversity support to enhance customer experience.

    tag

    Customer Experience

    Financial

    Securities

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Samuel Budianto, Head Of Information Technology, Time International
    Transforming Cybersecurity Leadership in Critical Industries

    Transforming Cybersecurity Leadership in Critical Industries

    Joel Earnshaw, Senior Manager, Cybersecurity, Perenti
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    Meeting Business Travel Demands with Intelligent Platforms

    Meeting Business Travel Demands with Intelligent Platforms

    Zamil Murji, Chief Technology Officer, Corporate Travel Management – Asia
    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    Cara Pring, Digital & Cx Director, Winc Australia
    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Cindy Chaimowitz, GM Wholesale & Customer Service and Karen Smith, Head of Customer Service, Foodstuffs North Island
    Why Compliance Needs a Seat at the Strategy Table

    Why Compliance Needs a Seat at the Strategy Table

    David Koh, Head, Legal & Compliance (Singapore) and Operational Risk Management Country Lead, Perpetual Limited
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/creating-a-culture-of-security-nwid-4165.html