APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    Time for a Change of Approach

    Roger Temple, Information Security Manager,

    Tweet
    content-image

    Roger Temple, Information Security Manager,

    The internet is resplendent with InfoSec advice about what you should or should not be doing to secure your organisation and its data. Given the number of headlines we see around security breaches on a daily basis (and to me, what seems to be an increasing number), this advice either is not getting across or is not appropriate (often very simple), and security controls are not being implemented.

    We have a plethora of standards across the world that provide frameworks and guidance on how to best secure our organisations; NIST 800 series and CSF, ISO 27k series, CIS, and more ANZ-centric standards like the Australian Signals Directive’s Essential 8 and New Zealand’s CERT Top 10, to name a few. We read about the shortage of InfoSec professionals across the world, and according to the ISC2 Cybersecurity Workforce Study from 2022, 3.4 million cyber professionals are needed across the world to plug the current gap.

    Many of the breaches we read about are with organisations large enough that you would have to assume they have security teams or can fund outsourcing, but why are so many of the most basic security controls not being implemented? Are these executive management problems caused by a lack of commitment and investment? Are technical controls either not being implemented or are they inadequate? Is it more basic stuff like having robust processes and procedures or better monitoring and reporting? Is it that we are lacking a good standard of InfoSec professionals? Is it underinvestment or a lack of people? Are industry standards too complex to understand or implement effectively? Is the risk-based approach still a viable one to prioritise what requires investment and improvements and what does not? Or is it simply too much of the ‘it will not happen to me’ syndrome?

    I often reflect on whether there was the same level of debate around the creation of large and diverse HR teams back in the day when they were not a ‘thing’, as there is today around investing in security teams in house or outsourcing. I doubt there are many organisations today that do not have some form of HR capability, and for most large organisations this is now simply a cost and a requirement of doing business in the modern world. Security needs to be the same. The idea that you can assess an organisation’s risk posture to discern if having MFA or undertaking patching is a solid investment or not, whether it will generate an ROI, or whether it will negate a specific, heretofore unidentified business risk is nonsense in my view. This and many other security capabilities simply need to be seen as a cost of doing business in a connected world. Given how many breaches we see that can be at least partially attributed to a lack of MFA alone, it is mind-boggling. And this is just picking out one of the more fundamental security controls that should be in place.

    I Doubt There Are Many Organisations Today That Do Not Have Some Form Of Hr Capability, And For Most Large Organisations This Is Now Simply A Cost And A Requirement Of Doing Business In The Modern World

    Is this the responsibility of individual organisations, the security community and our collective expertise, our executive management teams and boards, the government, and associated regulations and regulatory authorities? What is not working, and why are the bad guys making vast sums of money while more and more organisations are getting their brands in the headlines? Figures vary from source to source, but the cost of cybercrime globally ranges from an estimated $6 trillion (USD) in 2021, $7 trillion to $8 trillion in 2022, and up to a predicted $10.5 trillion by 2025. These are eyewatering figures when you consider the combined value of Facebook, Amazon, Apple, Netflix, and Microsoft is circa $4.8 trillion USD, and in 2021, Canada’s GDP was $1.98 trillion.

    tag

    HR

    ROI

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/time-for-a-change-of-approach-nwid-10224.html