In this environment, cyber defence strategies seek to protect critical assets from potential ingress. This starts with identifying those assets, which itself takes work. CISOs need to have this discussion with the enterprise, establishing what data must be protected, what functions are critical to sustaining operations and how cyber threats can impact those critical functions. It’s also important to understand what data can be deleted to reduce the data exposure landscape.
High-profile cyber breaches have helped to put personal data losses firmly on the board’s radar. Yet, as recent incidents have shown, cyber threats can also cause material operational resilience issues in the financial system. The economic (and reputational) impact of a widescale failure in digital financial infrastructure would be disastrous.
Shift the security focus onto solving business problems
Our survey found 68% of financial services Secure Creators were focusing on creating value – rather than simply protecting it. Institutions have plenty of non-cyber budgets targeting productivity or user experience improvements. CISOs who support the secure design of technology architectures to improve workforce productivity to ensure a frictionless yet secure experience for customers could command a slice of these broader business budgets.
Pick less, simplify and deploy completely
Secure Creators in financial services are more likely to describe their organisations as “early adopters of emerging technology” than the global average (82% vs. 70%). However, while the sector is certainly quick to adopt new tools, coverage tends to be limited to specific use cases. For example, some institutions have tested passwordless authentication at the proof of value stage, but widespread adoption has slow due to traditionally fragmented approach for authentication in organisations and little investment in change management for user’s reliance on password.
The reason a successful pilot implementation does not become business as usual is often because, while cyber problems cut across multiple different areas of an institution, tools are very targeted solutions that are slotted into current processes. Usually, people and process changes need to be made to ensure a tool’s features are used everywhere it can be of use across the organisation.
There is no point putting locks on windows if the front door is open. Rather than implementing point controls, CISOs should focus on taking a balanced approach to adopting new technologies to meet business requirements and respond to the changing threat landscape. For example:
- Look across the entire identity and access management architecture to design solutions and implement policies, controls for authentication and authorisation with a considered approach to business process efficiency and experience that support frictionless authentication and authorisation.
- Don’t just buy another product labelled Zero Trust. Take a step back to look at the attack surface holistically and orchestrate controls at different layers, moving from outside to inside the network.
- Consider what changes are required to standards, controls, guideline to manage the expansion of attack surface introduced through increasing adoption on AI technologies by the Business.
A critical question to ask is: Will the new tool replace or enhance existing capabilities?
A holistic approach, including investing in people (training and reskilling) and process changes, will both increase the return on the cyber investment and help to clean up the complex technological “spaghetti” that currently constitutes the cyber security operations environment.