Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Courses
        • Understanding the New Executive Buying Committee
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Courses
            • Understanding the New Executive Buying Committee
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Why Cybersecurity Risk Must Shift to ‘Secure by Default’ Principles
Cybersecurity Minute

Why Cybersecurity Risk Must Shift to ‘Secure by Default’ Principles

Chris HughesBy Chris HughesApril 28, 20232 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 83 of the Cybersecurity Minute, Chris Hughes takes a look at a new guide out from CISA (Cybersecurity and Infrastructure Agency) that aims to strengthen cybersecurity.

To hear practitioner and platform insights on how solutions such as ChatGPT will impact the future of work, customer experience, data strategy, and cybersecurity, make sure to register for your on-demand pass to Acceleration Economy’s Generative AI Digital Summit.

Highlights

00:43 — There’s a new CISA publication, Shifting the Balance of Cybersecurity Risk. It’s part of the conversation about rebalancing the responsibility to defend cyberspace. The aim is to empower those most capable to be better stewards of our digital ecosystem.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

01:38 — Right now, the scenario is that risk is passed down to the consumer whether it be everyday citizens who have no real competencies in cybersecurity or small to mid-sized businesses with limited resources.

02:03 — CISA’s publication focuses on two things: “secure by design” and “secure by default.” “Secure by design” refers to systems or products that prioritize security as a critical consideration alongside customer and business goals. “Secure by default,” on the other hand, refers to those that are inherently secure when taken out of the box.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

03:08 —The CISA publication does not impose any requirements or regulations. Some are calling for federal regulations to be put in place, such as those seen in states like New York and California. However, having regulations in individual states creates a patchwork framework with many different cybersecurity requirements across the country, burdening businesses.

03:42 — There’s a similar problem in the privacy landscape. States are tackling the issue since the federal government hasn’t quite stepped in yet and put forward a federal privacy framework that’s been required.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

CISO CXO Cybersecurity Cybersecurity Minute data privacy framework risk
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

How to Fix the B2B Technology Sales Process

May 31, 2023

How AI Enhances Endpoint Detection and Response (EDR) for Stronger Cybersecurity

May 31, 2023

How Generative AI Will Redefine the Patient Experience in Healthcare

May 31, 2023

On Location at Appian World 2023: How AI Can Make Process Mining More Proactive

May 31, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Infrastructure, Software, Applications for Modern CIOs | Sadin on Digital
  • How to Fix the B2B Technology Sales Process
  • How AI Enhances Endpoint Detection and Response (EDR) for Stronger Cybersecurity
  • How Generative AI Will Redefine the Patient Experience in Healthcare
  • Why AI Will Transform Every Aspect of Technology

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Co-Creation and Growth With Professional Services

May 24, 2023

The Business Impact and Opportunity of Generative AI

May 16, 2023

Healthcare Industry Clouds

May 10, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.