There is now a lot more data to defend, as the information footprint has expanded beyond the control of IT and cybersecurity. The increase in new cyber threats per day in the last decade has gone from 25 to over 500,000.Therefore, both businesses and governments must remain agile, competitive and need to stay within acceptable levels of operational risk, IT and cybersecurity threats.
More than 85% of companies have experienced a breach in the past three years.Companies do not or cannot move fast enough, despite seemingly significant efforts and investment when it comes to privacy, data protection and cybersecurity. Since it can take months or in a few instances even years to detect a security breach, in-house professional resources are not keeping pace with the increased volume of attacks and sophistication of the challengers.
At a recent cybersecurity event we surveyed the participants and asked what it would take to overcome the overarching cybersecurity challenges that drive cybersecurity strategies:
The results were split in half and into two groups:
Half of the group favoured a best-of-breed approach, believing that self-integration of disparate technologies with manual processes delivers the best security outcomes.
The other group wanted efficiency as a critical component to success. They favoured an integrated IT and platform approach. An open and integrated GRC security framework that enables consolidation and automation for better overall security results.
In both situations’ companies cannot solve the growing cyber security complexity and risk equation by adding more human capital. The speed and scale of the cyber issue require the combined efforts of human and machine processing.
More than 60% of organisations report that their GRC and IT security department is understaffed[1].As was the case for compliance professionals in the Financial Services industry within four years, there will be a shortfall of nearly 2 million qualified cybersecurity professionals.
Therefore,Let the 2019 strategy have the following components to ensure that:
Therefore, our GDPR seminars https://www.eugdpr.institute/events/include a GRC, Data Privacy and Cybersecurity component to emphasise that a fully implemented cyber strategy and trained staff result in organisations to be better prepared for cyber attacks.
Let the GRC IT Security 2019 strategy have the following components to ensure that:
[1]according to an A.T. Kearny report.