Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/AI Index
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Generative AI
      • Partners Ecosystem
      • Process Mining
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Summits
      • Roundtables
      • Video Moments
    • By Vendors
      • All Vendors
      • AI/Hyperautomation
      • Cloud
      • Cybersecurity
      • Data
  • Courses
    • Cloud Wars Top 10
    • Cultural Impact of GenAI
    • Cocreation in the AI Ecosystem
    • More …
  • What we do
    • Advisory Services
    • Marketing Services
    •  Event & Education Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Ecosystem
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/AI Index
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Generative AI
          • Partners Ecosystem
          • Process Mining
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Summits
          • Roundtables
          • Video Moments
        • By Vendors
          • All Vendors
          • AI/Hyperautomation
          • Cloud
          • Cybersecurity
          • Data
  • Courses
    • Cloud Wars Top 10
    • Cultural Impact of GenAI
    • Cocreation in the AI Ecosystem
    • More ...
  • What we do
    • Advisory Services
    • Marketing Services
    •  Event & Education Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Predictions 2022: 5 Cybersecurity Priorities for CISOs and CXOs
Cybersecurity as a Business Enabler

Predictions 2022: 5 Cybersecurity Priorities for CISOs and CXOs

Chris HughesBy Chris HughesDecember 22, 2021Updated:December 23, 20215 Mins Read
Facebook Twitter LinkedIn Email
cybersecurity priorities
Share
Facebook Twitter LinkedIn Email

Cybersecurity has been considered a cost center, an impediment, even an afterthought for some organizations. Fortunately, with the growth of technical platforms and an economy driven by digital technologies, this perspective is changing. Security in the acceleration economy is not only critical to success but it is an enabler and can often function as a competitive differentiator.

Security leaders can propel security to be recognized as an enabler by not only aligning with business objectives, but through use of metrics to illustrate how security contributes to those objectives.

It’s long been said that the CISO should be considered a peer in the C-suite. For CISOs to be as influential and effective as other corporate leaders, it requires executive support. CISOs must engage their fellow business leaders across the organization to get buy-in and support for key security initiatives, which ideally should be aligned with business objectives as mentioned.

It’s important that CISOs and security leaders avoid a “fear, uncertainty and doubt” approach when discussing cybersecurity with other business leaders. FUD associates cybersecurity with negative emotions, which can be deterrents. Instead, CISOs can call attention to the ways that cybersecurity has a positive impact on stakeholders and customers.

Frameworks and Tools for Stronger Defense

Some of the key frameworks, tools, and methodologies that can help cybersecurity functions include Zero Trust, DevSecOps, and Cloud Service Provider (CSP) native services. Organizations are progressively adopting Zero Trust frameworks, recognizing that legacy security measures are no longer sufficient. Leading organizations are striving to implement DevSecOps tools and practices, reducing costs, removing internal friction, and ensuring shorter feedback loops, ultimately expediting secure value delivery for customers.

Many organizations are also leaning into innovative services exemplified by leading CSPs. These enabling capabilities include AI/ML and Intrusion Detection/Prevention Systems (IDS/IPS) for near real-time compliance automation. These capabilities are driven by rapid elasticity and scalability that cloud computing offers organizations, which weren’t possible in legacy on-premise data centers.

Top 5 Cybersecurity Priorities for the Year Ahead

Heading into 2022, there’s no shortage of key topics in every business and technology leader’s minds. Following are five of the top cybersecurity priorities.

  1. Supply Chain Risk Management (SCRM) – During the last 18-24 months, the supply chain has become a hot topic, and for IT and cybersecurity, it’s no different. A number of publicly visible and impactful supply chain compromises have made headlines. Organizations have quickly realized that their business partners, vendors, managed service providers, and software can all introduce risk when not governed and managed appropriately. From the DoD’s Cybersecurity Maturity Model Certification (CMMC), DHS’s supply chain efforts and others, supply chain risk management (SCRM) is receiving a lot of attention. On the software side, we have seen efforts in both the public and private sectors to secure the software supply chain. Google has championed approaches such as Supply-chain Levels for Software Artifacts (SLSA), while organizations like CISA and NTIA have pushed for the use and adoption of a Software Bill of Materials (SBOM). All of these efforts are fortifying the broader software supply chain as well as the production and consumption of software.
  2. Workforce – The IT/cybersecurity workforce continues to be a challenge for many organizations. The problem is exacerbated by factors like remote workforce growth and widespread digital transformation initiatives. This has left many organizations struggling to attract and retain technical talent. Some of the most competitive areas are AppSec and cloud security, due to the continued proliferation of cloud-native environments and workloads. Leaders should have clear plans for up-skilling their existing workforce and contribute to quality of life, which can help retain existing talent. Organizations also need defined plans to address workforce gaps.
  3. Cloud Security – Cloud adoption has been accelerating for years, but with the Covid pandemic and wide adoption of remote work, many organizations are migrating critical functions and applications to the cloud, often without the relevant security measures in place. Leaders must focus on securing their cloud deployments and environments or risk inadvertent data exposure and potential compromise.
  4. Security Tooling – As organizations move to the cloud, adopt DevSecOps, and implement Zero Trust Network Architectures (ZTNA), new security tools must be adopted. This applies to securing modern compute abstractions such as containers and serverless solutions. That said, as organizations continue modifying their security tool portfolio, they should concurrently rationalize the portfolio and retire legacy tooling where appropriate. If not, sprawl can occur which causes a slew of issues: half implemented tools, burnout and fatigue among security staff, and an overwhelming level of telemetry (noise) which allows real risk and concerns to fall through the cracks.
  5. Endpoint Security – As noted, the past 24 months have seen tremendous growth in the remote workforce with many companies announcing adoption of long-term remote work. For many organizations, this means a distributed workforce, utilizing devices under the organization’s control and outside of it with Bring Your Own Device (BYOD). Security leaders must make efforts to secure these devices, their levels of access to sensitive data, and adopt tools and practices that establish a secure remote work environment. The traditional security perimeter is dead, and legacy approaches are no longer applicable.

2022 is poised to be another challenging year for organizations when it comes to securing data and assets, and protecting business reputation branding. That said, efforts such as elevating CISO reporting and effective relationship-building can raise leadership awareness of business security challenges.

Those changes, coupled with key focus areas such as supply chain risk management, building a robust and capable workforce, and shifting to a Zero Trust architecture, can put organizations in a position to become “anti-fragile” in a time of increasing chaos.


This article appears in the Predictions 2022 Edition of the Acceleration Economy Journal  Download the Full Journal Here

Cybersecurity channel featured predictions
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

Microsoft Ignite: AI Dominance and Breakthrough Cloud Technology Partnerships

December 8, 2023
Tony Uphoff shares 8 strategies for integrating new and old tech

CEO Framework: 8 Ways to Balance Existing and Emerging Technologies

December 8, 2023

Automation Anywhere Results Underscore Power of Generative AI + Automation

December 8, 2023

Celonis Research Highlights Link Between Process Optimization, AI, and Innovation

December 8, 2023
Add A Comment

Comments are closed.

Recent Posts
  • AWS Supports Customers with Managed Database Services
  • Microsoft Ignite: AI Dominance and Breakthrough Cloud Technology Partnerships
  • CEO Framework: 8 Ways to Balance Existing and Emerging Technologies
  • Automation Anywhere Results Underscore Power of Generative AI + Automation
  • Celonis Research Highlights Link Between Process Optimization, AI, and Innovation

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Guidebooks
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Cloud Wars CEO of the Year Special Report

December 7, 2023

How Data is Propelling the Rise of AI

December 6, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

Scale Cloud Native with a Forward-Looking Observability Strategy 

October 26, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.