APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    Reshape your Cyber Security Journey in the Covid-19 era

    Michael Chue, Vice President and General Manager, Mandiant North Asia

    Tweet
    content-image

    Michael Chue, Vice President and General Manager, Mandiant North Asia

    Cyber risk can be a big blindspot for organizations. And now, more senior leaders are more engaged than ever before and working to develop a better understanding of how cyber risk is being managed within their organizations. More dialogue with executive management around cyber risk and the impacts proactive and reactive measures have on an organization’s risk profile is a great trend to see.

    Especially in these few years under pandemic, many Chief Information Security Officers or IT seniors have to take on the overwhelming tasks of supporting day-to-day operations while constantly being prepared for attackers in their environment. According to the report of Cybersecurity Ventures, global cybercrime costs to grow by 15 percent % per year over the next five years, reaching USD10.5 trillion annually by 2025, up from USD3 trillion in 2015. Balancing the criticality of in-flight projects and operational responsibilities with response preparedness is a difficult trade-off. How could an organization steer and guide the overall direction of the cyber security of organization?

    To start, it is important to understand that cyber risk is not dissimilar to other business risk. It is an aggregation of the threats and vulnerabilities present across an organization, any of which—if exploited—could lead to financial loss, reputation damage and regulatory matters. When looking specifically at threats and vulnerabilities, the focus should be more around what technologies or processes organizations have created or consumed that are potentially vulnerable, and that create ‘opportunities’ for abuse. Threats we can then overlay as the potential vectors or methods for how those vulnerabilities or opportunities could be exploited.

    When it comes to communicating impact, organizations often get paralyzed around how to reduce cyber risk and what controls are being relied upon, and over time how the fidelity of those controls is truly validated and Return on Investments (ROI) around security investments maximized. Simplicity is the key when looking to both gain the ear and appreciation of Boards around how cyber risk is being managed. This minimizes complexity and focuses upward reporting around the impacts that matter.

    This is frequently brought on when there is no clear agreement across the organization on what constitutes the “Crown Jewels”—or what matters most to the business.

    Developing maturity around cyber risk does not happen overnight; rather, it is a continuous process that builds upon itself

    Without alignment across all teams, there is no solution for security investments, and critical questions about organizational risk going unanswered. Ultimately, security teams need to consider and fully understand ROI; those that don’t tend to be unable to defend their investment decisions to more business-focused executives.

    How to Map Your Cyber Risk Journey

    Cyber risk is a broad and deep subject, and there is no single process or technology or solution that will drive it down. Maturity-based programs are a key contributor to a security program’s overall direction, but they should not be the only driver of the program. A properly designed program is instead a coordination of capabilities that requires both defining and aligning to the organization’s direction and tolerances and connecting it to the evolving threat landscape.

    Here are some key takeaways to remember when developing your program:

    • Understand What Matters Most: Take time to develop an understanding of the critical business assets with the highest potential for adverse impact to your organization and prevent you from staying a going concern if compromised.

    • Define and Align Cyber Risk Tolerances Across the Organization: Develop a top-down view of the organization’s cyber risk, clarify executive reporting requirements, establish, and target an organizational risk tolerance.

    • Identify and Model Security Architectural Risks for Critical Systems: Decompose mission critical systems into their components and connections and identify threats and vulnerabilities, assign risks to each threat, and align to organization tolerances around impact.

    • Identify Cyber Risks and Key Partners and Portfolios: Identify those partners and organizations that you are heavily reliant on and perform due diligence to assess integration and supply chain risks that would expose your organization, but also drive your risk profile to levels of unacceptable risk.

    Developing maturity around cyber risk does not happen overnight; rather, it is a continuous process that builds upon itself

    • Identify Operational Vulnerabilities and Align to Organizational Risk Tolerances: Link vulnerabilities and degrees of exploitability to the potential for compromise to mission critical systems and validate those against defined cyber risk tolerances.

    • Validate if Your Security Capabilities Are Moving in the Right Direction: Map the existing security program initiatives against best-practices and validate deviations from standard practices for your industry and region of operation.

    Developing maturity around cyber risk does not happen overnight; rather, it is a continuous process that builds upon itself. To successfully manage cyber risk, organizations need to rethink and better identify threats to those things that matter most to the organization and have that information integrate and inform the organizational operational risk profile from a cyber vantage point. It’s a simple thought, but it’s often missing from most programs we interact with. The goal with proper cyber risk management is to help to surface the threats and vulnerabilities the organization should care most about, and that have the ability to cause significant impact and true risk.

    tag

    ROI

    Financial

    Information Security

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/reshape-your-cyber-security-journey-in-the-covid19-era-nwid-8801.html