Intelligent Tech Channels Issue 48 | Page 38

Mitigating cyber-risk becomes top priority for the boardroom

California-based Saket Modi , Co-Founder and CEO at Safe Security , explains why cybersecurity is no longer just the concern of IT departments but has become a dominant issue for the boardroom itself .

As businesses continue to invest in Digital Transformation and base their business models on technology , cyberthreats only become more imminent . Cyber-risk is no longer an IT problem , but a board-room concern .

With cyberattacks disrupting Business Continuity , they pose a direct impact on the top and bottom line of an organisation ’ s balance sheet . Thus , making cybersecurity one of the top priorities of every organisation .
Saket Modi , Co-Founder and CEO , Safe Security
Challenges with traditional cybersecurity approach
The evolving breach trends verify that complying to frameworks alone can no longer holistically safeguard organisations .
The board and business executives are expected to incorporate the management of cyberrisk as part of their business strategy .
Frameworks such as ISO , NIST , PCI DSS and others are used as reference checklists for cybersecurity and risk management practices , however , they provide limited visibility .
Cybersecurity must be aligned in every organisation ; threats and missioncritical business needs , provided by products that deliver holistic and actionable insights . The Frameworks approach to risk-posture assessments is subjective , labor-intensive and only offers point-intime snapshots / assessments .
They rely on a qualitative scale without any objective and quantitative measure to assess the security posture of an organisation . Similarly , Security Rating Services represent an independent source of publicly accessible data to support some use cases . However , these services don ’ t provide a complete assessment of security controls , as their information is primarily sourced from publicly accessing Internet IP addresses , honeypots , analysing Deep and Dark web content , and individual proprietary data warehouses .
38