High-level cyber security strategy - IT Empathy ® Blog


IT Empathy ® Blog - High-level cyber security strategy

https://www.itempathy.com/blog/index

High-level cyber security strategy.

Published: 27.02.2023
ITEmpathy

Introduction

There are really only two types of cyber security high-level strategy businesses can deploy to fight the cons while supporting the pros of innovations like artificial intelligence, Cloud Computing, IoT or 5G.


1. Proactive. (Uncommon)

1.1 Invest in high standards and controls upfront to squeeze significant risk down to residual risk. As in plug the holes and keep plugging new holes.

1.2 Balanced approach between innovation and cybersecurity efforts. As in, don’t sacrifice cybersecurity to adopt Swiss cheese innovation. But at the same don’t stifle the purpose of innovation with too much rope. Careful balance is required!

1.3 Has a budget agreed upfront based on risk levels involved. What assets are at risk? Brand protection etc.

1.4 Human centred approach as staff are the most significant risk. Build cyber efforts into staff culture. Help them help the company be more secure.


2. Reactive (common)

2.1 Results in knee jerk responses to cybersecurity incidents and last minute compliance struggles with audit requirements.

2.2 Consumes all your internal resouces and suppliers time and energy. Preventing projects and change.

2.2 Results in significant expense post, which is very likely to not have a current proactive budget.

2.3 Perceived as a headless chicken approach and unprofessional.

2.4 Risk of massive brand and reputationable damage.

2.5 Risk of financial ruin.

2.6 Manifests politics between teams creating blame cultures and silo communication in working environments as staff fight for survival.

2.7 Demoralises IT & cybersecurity staff.

2.8 Creates conflict when multiple things go wrong. Consuming executives limited time.

2.9 Leads to a high turnover of IT resources and suppliers.

2.9 Blocks strategic objectives.

2.11 It's a bad idea to be reactive with Cybersecurity👎.

Conclusion

For advice and support choose IT Empathy ® be your proactive IT strategic guide 👍. Get in touch via our contact page shown below.

 Thank you for taking the time to read this article.

Jon Bailey

Independent Consulting and Advisory

Copyright © IT Empathy Limited 2023 All rights reserved.

ITEmpathy_Logo

Home IT Empathy Phone IT Empathy Email IT Empathy LinkedIn IT Empathy Twitter IT Empathy Youtube IT Empathy

About | Contact | Cookies | Privacy | Terms

Podcast episodes

S2 EP1: AI Emerging Tech Weather Outlook

S1 EP14: An interview with ChatGPT

S1 EP13: AI Washing

S1 EP12: Rise of the YouTube Auditors

S1 EP11: Microsoft Cyber Signals and OpenAI

S1 EP10: Google Circle to Search

S1 EP9: Podcast Lessons

S1 EP8: Cybersecurity Strategy in the age of SaaS

S1 EP7: Business Startup Lessons

S1 EP6: What is IT Empathy?

S1 EP5: What are AI Deep Fakes?

S1 EP4: QR Code Cyber-attacks

S1 EP3: Platforms for innovation

S1 EP2: Innovation, Engagement and Communication

S1 EP1: Introducing the IT Empathy podcast

ITEmpathy_Logo

Extra Blog content

2023: There is opportunity in all problems. This leads to innovation!

2023: High-level Cybersecurity Strategy

2020: EPOS EXPAND 80T

2020: Amazon Distance Assistant Innovation

2018: NetApp ONTAP AI

2018: The Cybersecurity Yin and Digital Innovation Yang

2018: Why Is Corporate Internet Expensive?

2016: The Jenga Change Analogy


About | Contact | Cookies | Privacy | Terms

© 2024, IT Empathy Limited. All rights reserved.

Registered in England & Wales, No. 10362337