Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/AI Index
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Generative AI
      • Partners Ecosystem
      • Process Mining
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Summits
      • Roundtables
      • Video Moments
    • By Vendors
      • All Vendors
      • AI/Hyperautomation
      • Cloud
      • Cybersecurity
      • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/AI Index
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Generative AI
          • Partners Ecosystem
          • Process Mining
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Summits
          • Roundtables
          • Video Moments
        • By Vendors
          • All Vendors
          • AI/Hyperautomation
          • Cloud
          • Cybersecurity
          • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How Cybersecurity Standards Protect the Innovative Tech That’s Driving Sustainability
Cybersecurity as a Business Enabler

How Cybersecurity Standards Protect the Innovative Tech That’s Driving Sustainability

Chris HughesBy Chris HughesMarch 30, 20233 Mins Read
Facebook Twitter LinkedIn Email
sustainability cybersecurity
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

We continue to see a push for sustainability in the technology sector. It’s receiving greater attention due to political and social discourse on climate change and the growth of massive cloud computing facilities and their environmental footprint.

Innovative technologies including digital sensors, Internet of Things (IoT) devices, and others support the push for sustainability but they need to be safeguarded — along with the data they process, store, and utilize — in ways that don’t apply to the legacy technologies they are replacing.

Perils of Integrating Sustainable Technologies

As these “smart” devices get integrated into our operational technology (OT) footprint and critical infrastructure, they increase the attack surface that malicious actors can target. Massive growth in IoT and connected devices creates a need for modernized data security standards that takes these innovative technologies, and their expanding usage, into consideration

Additionally, sustainable technologies, much like the broader IT and OT ecosystem, rely heavily on open-source software (OSS), which requires its own unique cybersecurity safeguards. This includes understanding your OSS component inventory, the provenance of those OSS components, and being prepared to “virtually patch” components if project maintainers don’t respond to vulnerabilities in the timelines you require.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

Attacks and the Need for Modernized Data Standards

Sustainable technologies play a key role in critical infrastructure and citizen services upon which our society relies. We know that critical infrastructure is regularly under attack, not just from run-of-the-mill malicious actors, but also national state-sponsored attackers, as we saw in the case of the Colonial Pipeline ransomware attack.

That attack impacted millions of Americans and cost a significant amount to both the organization and citizens due to panic buying and other responses to the pipeline’s shutdown. It also sparked a response from the Transportation Security Agency, which issued new guidance and requirements to pipeline operators.

This is where secure data standards for sustainable technology and efforts come into play. Organizations should be deliberate in their efforts to examine their sustainability efforts, the technologies involved and, most importantly, the data involved.

From there, they can create secure data standards that leverage existing frameworks such as the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF), which is currently undergoing its largest-ever update. As an indicator of the breadth of this work, NIST has even gone as far as producing a “Manufacturing Profile,” which is tailored for managing risk associated with manufacturers.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Continue the Conversation

NIST isn’t the only organization discussing cybersecurity and its relationship to sustainability and associated technologies. The World Economic Forum (WEF) states that cybersecurity should also be a part of environmental, social, and governance (ESG) efforts, saying that cyber threats pose risks to corporate value and to society, and that insurance cannot mitigate risk indefinitely.

Leaders from some of the world’s largest technology organizations, such as Julie Sweet, CEO of Accenture, are echoing this sentiment, noting that sustainability is driving business objectives and that corporate leadership must also consider cybersecurity in its conversations around sustainability.

Final Thoughts

While organizations are integrating sustainability considerations and goals into their key business objectives and strategies, they are faced with cyber threats that continue to evolve and a threat landscape that remains dynamic. This requires a comprehensive approach that considers cybersecurity as part of broader sustainability goals tied to business objectives. If we neglect to incorporate cybersecurity into emerging sustainability initiatives, we risk ending up with an approach that is “bolted-on” rather than “built-in.”


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cloud Compliance featured governance Internet of Things IoT Open-Source Software Sustainability vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

Oracle Q1: Despite Market-Cap Thrashing, Cloud Growth Still Surging

September 13, 2023

C3 AI Extends Enterprise Generative AI Focus With Suite for Industries, Processes

September 13, 2023

Generative AI’s Role in Reshaping Business Dynamics: Uphoff on Industry

September 13, 2023

Oracle Q1: Catz, Ellison Bullish but Investors Cut Market Cap by $35B

September 13, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Oracle Q1: Despite Market-Cap Thrashing, Cloud Growth Still Surging
  • C3 AI Extends Enterprise Generative AI Focus With Suite for Industries, Processes
  • Generative AI’s Role in Reshaping Business Dynamics: Uphoff on Industry
  • Oracle Q1: Catz, Ellison Bullish but Investors Cut Market Cap by $35B
  • AI Index: PayPal and VISA Reduce Risk with AI; ConverSight Secures $9 Million; Hugging Face Announces SafeCoder

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The State of Process Mining 2023: Unlocking Efficiency and Driving Customer Satisfaction

July 31, 2023

How Workday Creates Agile Monetization Opportunities for CFOs

June 21, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.