• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  Aligning Cybersecurity with Business Objectives
Aligning Cybersecurity with Business Objectives
10 June 2017

Aligning Cybersecurity with Business Objectives

Written by Seqrite
Seqrite
Security

A report by Center for Strategic and International Studies revealed that there are three levels of misaligned incentives that work against cyber security in organizations:

  • The corporate structure of organizations vs free flow of criminal enterprises: The incentives of attackers are shaped by decentralized, fluid market, while rigid bureaucracy constrains the defending corporations and top-down decision-making systems.
  • Misaligned strategy and implementation: More than 90% organizations have a security plan in place. However, not even half of these organizations have implemented these policies.
  • Senior executives vs those in implementation roles: The parameters by which the top executives who design the strategy and measure success are different than those of the team that implements the cyber security.

What can companies do?

There’s no one size fits all solution out there for aligning cybersecurity into strategic execution; no single solution that will work for all enterprises. Different techniques are suited to various organizations based on their culture and environment. However, on a broad level, few of the important organizational areas that are important to attain business alignment for cyber security are:

Culture:  Developing a culture, across the organization, to imbibe secure practices into daily routine tasks, is probably the best solution to achieve security objectives. Management may define security policies, but if all do not follow them, it fails the purpose. If everyone from top to bottom, supports them as a part of daily routine without compromise, even if it costs little higher to the company, it has the best chance of success. Managers, users, IT professionals and everyone else should be able to make a wise and policy based decision when it comes to information risk.

Planning: The strategic and tactical planning of the security across the organization provides best opportunity to align individual security projects to business requirements. It is best to leverage enterprise architecture principles in the planning of security processes.  Building cyber security right into enterprise architecture also gives it the best chance to be adopted and followed for every project.

Processes:  Implementing industry standard systems such as Information Security Management Systems (ISMS) prescribed by ISO 27001, provides the ability to assess, develop and deploy security solutions as and when required by the organization.  These processes make an evaluation of organization’s security requirements a continuous process instead of a single instance of security implementation.

Communication:  The communication about incidents, resolutions, and other security related activities should be defined as service level metrics and built into service level agreements between IT organization, users and partners.

Competencies:  Cyber security experts are expected to have technical skills. However, to align with business, they must also have business skills such as understanding of business architecture, personal communication, marketing (of security ideas within organization at levels above, below and at par of the expert)

Technology:  It is not just about implementing the best of tools available in the market that meet your requirements. Organizations also need to set up best of the breed processes and practices related to technology. Implementation of processes based on standards such as ITIL (V3), ensure technical integration of security controls integrated with IT services.

Relationships: Alignment of any department with business depends upon the cooperation and support of decision makers and stakeholders. Security is no different. Cyber security department must maintain alignments with key people to get visibility into business and get appropriate and required resources for them to do their job.

Business Alignment of cyber security cannot be addressed with one size fits all approach. It needs time, resources and comprehensive strategy to integrate and built the security into the business practices and organization’s business model.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website. 

 Previous PostCyber Security – Do Manufacturing Firms Need to Bother?
Next Post  Security Threats in Cloud Computing
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies