Calling All CIOs & CISOs – 5 Ideas to Protect Your Business Right Now

What’s swirling around in the bright minds of some of the most powerful CIOs and CISOs of today? And better yet, what should be in the minds of CIOs and CISOs everywhere?

The Wall Street Journal gathered some of the world’s top IT leaders – from companies like Boeing, Cisco, CVS, Symantec and The Hearst Corporation –  in San Diego earlier this week for a brain-meld on business and policy priorities for 2015. The CIO Network conference covered a wide range of topics, but all came back to two central themes: innovative approaches to cybersecurity concerns and the changing ways businesses communicate efficiently. While a full report from the summit will release in late February, WSJ writer Steven Norton gave readers a sneak peek yesterday at the top five issues on the minds of CIOs. The snapshot is revealing, and highlights the need for fresh thinking.

Here are some additional thoughts to marinate on for each issue:

  • “Make Security Everyone’s Business”: Both CIOs and CISOs must be aware of all enterprise vulnerabilities and stand ready to powerfully enable employees to communicate, act and share securely. Here at Veradocs, we couldn’t agree more. In fact, we echoed this message last month in a post on market-driven demands for every company to become a security company. Meaning, everyone handling enterprise data across the company must be equipped to do so, and be held accountable every step of the way.
  • “Cyber Risk = Business Risk”: Enterprise data security is tied directly to a company’s bottom line, as shown by reports indicating Sony’s $15 million price tag for the hack and Sony Pictures Co-Chair Amy Pascal’s decision to step down. When all is said and done, sensitive information revealed during the Sony hack is expected to cost the company billions of dollars. Security breaches are not just exposures of a series of numbers lying motionless in a databases. They are invasions of the valued trust of your customers and users, they are invasions of personal information, and they often cost millions in revenue loss. Investments in innovative security solutions should be a regular line item and seen as integral to keeping a business healthy.
  • “Be the Change Agent”: CIOs are in the limelight nowadays, namely thanks to the negative, panic-inducing sentiments around the overall uptick in cybercrime across the world. “Be the change you want to see” is a cliche that rings true here, as more and more IT executives are in the position to proactively prevent malicious attacks and inspire others to do the same. CIOs and CISOs alike will succeed in the age of cloud computing and BYOD by assuming a position of influence and ensuring a security model that enables employees to enjoy a non-disruptive, but protected user experience.
  • “Have a Business-Centric Vision”: Revisiting #3, data is the DNA of a business, with a business only being as healthy as the security processes protecting it. This needs to be articulated over and over to executives, employees and stakeholders in order to plainly outline a comprehensive vision for the future of the company’s data security strategy with an actionable game plan ready for implementation. Business leaders respond when the vision is clear and measurable, and employees adhere to guidelines that are direct and user-friendly.
  • “Anticipate a ‘Cyber 9/11’”: Last, but definitely not least, every CIO must proactively build out a crisis plan that covers all aspects of necessary responses to even the worst case scenarios. Consider, the recent hack on Anthem Inc., the country’s second biggest health insurer, in which tens of millions of medical records were stolen. Though cyber attacks are prevalent and growing in severity, they are (in almost all cases) avoidable with effective policies in place. Better yet, this is a chance to explore new and innovate security technologies created specifically for the evolving risks and threats of a mobile, cloud-dominated world.

At Veradocs, we operate with the philosophy that leaks will happen, that the perimeter is inherently porous and your data will travel. By flipping the system on its head, with leaks being the norm, we aim to protect customers from the inevitable — even after the inevitable happens. We believe that each issue laid out above is an opportunity for both CIOs to innovate, excel and inspire change.

Written on February 5, 2015
by Robin Daniels
Tags:
  • Industry, 
  • Security