{"id":11705,"date":"2021-01-29T03:45:00","date_gmt":"2021-01-29T03:45:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/01\/29\/new-report-top-three-ways-to-drive-boardroom-engagement-around-cybersecurity-strategy\/"},"modified":"2021-01-29T03:45:00","modified_gmt":"2021-01-29T03:45:00","slug":"new-report-top-three-ways-to-drive-boardroom-engagement-around-cybersecurity-strategy","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/01\/29\/new-report-top-three-ways-to-drive-boardroom-engagement-around-cybersecurity-strategy\/","title":{"rendered":"New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\">\n                            <!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               ESG study reveals prevailing problem of under-prioritized security technology                            <\/p>\n<p>HONG KONG SAR &#8211; <a href=\"https:\/\/www.media-outreach.com\/\">Media OutReach<\/a> &#8211; 29 January 2021 &#8211; <a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/>&#13;<br \/>\n(<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>), the leader in cloud\u00a0security, shared results from a sponsored study conducted by the Enterprise&#13;<br \/>\nStrategy Group (ESG)[1]&#13;<br \/>\nthat reveals systemic challenges with security integration into business&#13;<br \/>\nprocesses. The report includes the top ways to drive engagement and&#13;<br \/>\nagreement around cybersecurity strategies within an organization.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Read&#13;<br \/>\na full copy of the report, <i>Cybersecurity in the C-suite and Boardroom<\/i> (<a href=\"https:\/\/resources.trendmicro.com\/rs\/945-CXD-062\/images\/ESG-eBook-TrendMicro-Cyber-C-Suite-Boardroom-Dec2020.pdf\">https:\/\/resources.trendmicro.com\/rs\/945-CXD-062\/images\/ESG-eBook-TrendMicro-Cyber-C-Suite-Boardroom-Dec2020.pdf<\/a>), or watch this webinar to&#13;<br \/>\nlearn more (<a href=\"https:\/\/resources.trendmicro.com\/WBN-ESG-Cybersecurity-Boardroom.html?linkId=109490866\">https:\/\/resources.trendmicro.com\/WBN-ESG-Cybersecurity-Boardroom.html?linkId=109490866<\/a>).<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The study found that only 23% of organizations prioritize the alignment of security&#13;<br \/>\nwith key business initiatives. Here are three key recommendations to remedy&#13;<br \/>\nthis core challenge:<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<ol>\n<li>Add a Business Information Security Officer (BISO) to improve business-security&#13;<br \/>\nalignment.<\/li>\n<li>Build a top-down, measurable program to help CISOs better&#13;<br \/>\ncommunicate with their boards.<\/li>\n<li>Change reporting structures so CISOs report direct to their CEO.<\/li>\n<\/ol>\n<p>&#13;<br \/>\n&#13;<br \/>\n&#13;<br \/>\n&#13;<br \/>\n&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The study also found that when board members are more educated and engaged in the&#13;<br \/>\ncybersecurity function, they ask tougher questions, dig deeper into issues, and&#13;<br \/>\nare more likely to make the leap from technical to business issues.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The&#13;<br \/>\nvast majority (82%) of survey respondents claimed that cyber risk has increased&#13;<br \/>\nin the past two years, thanks primarily to a rise in threats, an expanding&#13;<br \/>\ncorporate attack surface and the fact that business processes are more&#13;<br \/>\ndependent than ever on technology.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Yet&#13;<br \/>\ndespite the rapid adoption of digital transformation processes in the past&#13;<br \/>\nyear, security is still viewed as primarily (41%) or entirely (21%) a&#13;<br \/>\ntechnology area. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The lack of cybersecurity prioritization is&#13;<br \/>\nparticularly true in the boardroom. Although 85% of respondents claimed that&#13;<br \/>\nthe board of directors are more engaged in security decisions and strategy than&#13;<br \/>\ntwo years ago, often those executives are passively drawn in because of a major&#13;<br \/>\nbreach, new compliance requirements or the creation of a security program by a&#13;<br \/>\nCISO.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>In&#13;<br \/>\nfact, 44% of respondents indicated that their board of directors have limited&#13;<br \/>\ninvolvement in many critical cybersecurity operations. This lack of engagement&#13;<br \/>\nmeans many boards are only prepared to fund the bare minimum to meet&#13;<br \/>\nrequirements for compliance and protection.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Striving for &#8216;good enough&#8217; security is&#13;<br \/>\nfrankly not good enough given today&#8217;s cyber risk landscape. This report mirrors&#13;<br \/>\nmany of my conversations with CISOs highlighting that lack of boardroom&#13;<br \/>\nengagement can lead to poor cyber hygiene, and security that is not properly&#13;<br \/>\nintegrated into business processes,&#8221; said Ed Cabrera, chief cybersecurity&#13;<br \/>\nofficer for Trend Micro. &#8220;We can only create a culture of cybersecurity if CEOs&#13;<br \/>\nand corporate directors lead by example. This encourages every employee to believe&#13;<br \/>\nthey have a role in protecting the organization.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<div><br clear=\"all\"\/><\/p>\n<hr align=\"left\" size=\"1\" width=\"33%\"\/>\n<div id=\"ftn1\">\n[1] The study was&#13;<br \/>\ncompiled from a web-based survey of 365 senior business, cybersecurity, and IT&#13;<br \/>\nprofessionals in North America (US and Canada) and Western Europe (UK, France,&#13;<br \/>\nand Germany) working at midmarket (500-999 employees) and enterprise-class&#13;<br \/>\n(1,000+ employees) organizations.<\/p>\n<\/div>\n<\/div><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/release.php\/View\/63077#Contact\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ESG study reveals prevailing problem of under-prioritized security technology HONG KONG SAR &#8211; Media OutReach &#8211; 29 January 2021 &#8211; &#13; (;), the leader in cloud\u00a0security, shared results from a sponsored study conducted by the Enterprise&#13; Strategy Group (ESG)[1]&#13; that reveals systemic challenges with security integration into business&#13; processes. The report includes the top ways &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/11705"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=11705"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/11705\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=11705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=11705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=11705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}