As Secure as Disruption Demands

Line

4 key Takeaways

Get the board on board

Get the board on board

The key to successful cybersecurity is getting the board members and other stakeholders aligned with the strategy. Chief information security officers (CISOs), on the other hand, must be tuned into the organization’s goals and objectives.

Boards are cyber-literate, you can no longer just wing it

Boards are cyber-literate, you can no longer just wing it

Boards today are more aware than ever before. You need to assure them that you know what you’re doing and can deliver on your promise. When you need help, you need to ask for it. Your board members and other executives will gladly give you a hand.

Cybersecurity is at the forefront, not an afterthought

Cybersecurity is at the forefront, not an afterthought

As we enter and exist within this digital era, we must accept that cybersecurity goes hand in hand with digitalization. We need to create systems that are secure by design to combat the threats now and in the future.

Map cyber threats to business risks

Map cyber threats to business risks

Demonstrate how your program will address the threats and vulnerabilities, and consequently reduce the business risks. Invest time and collaborate with colleagues to create a clear bigger picture that indicates the impact of the security measures you recommend.

Covid-19 brought on the unprecedented digital acceleration that we’re experiencing today. This caused an influx in our dependence on digital, inadvertently leaving us open to a larger number of cyber threats. The rapid and widespread adoption of work-from-home has required CISOs to balance two priorities: protecting against new threats and maintaining business continuity.

At Infosys Confluence 2020, our expert panel discussed the role and significance of cybersecurity in the new normal. The cyber gazers: Jim Woodcock, CISO, MSAmlin and Nicole Ford, VP and CISO, Carrier, moderated by Vishal Salvi, CISO, Infosys.