• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home People Culture and Behaviour

Effective cybersecurity focuses on people

FutureCISO Editors by FutureCISO Editors
April 13, 2023

Photo by George Becker from Pexels: https://www.pexels.com/photo/close-up-of-keys-333837/

Share on FacebookShare on Twitter

Gartner says security and risk management (SRM) leaders must rethink their balance of investments across technology and human-centric elements when creating and implementing cybersecurity programs in line with nine top industry trends.

“A human-centred approach to cybersecurity is essential to reduce security failures,” said Richard Addiscott, Sr director analyst at Gartner.

Richard Addiscott

“Focusing on people in control design and implementation, as well as through business communications and cybersecurity talent management, will help to improve business-risk decisions and cybersecurity staff retention.”

Richard Addiscott.

To address cybersecurity risks and sustain an effective cybersecurity program, SRM leaders must be focused on three key domains: (i) the essential role of people for security program success and sustainability; (ii) technical security capabilities that provide greater visibility and responsiveness across the organisation’s digital ecosystem; and (iii) restructuring the way the security function operates to enable agility without compromising security.

Nine trends to have a broad impact for SRM Leaders

Trend 1: Human-centric security design

Human-centric security design prioritizes the role of employee experience across the controls management life cycle. By 2027, 50% of large enterprise chief information security officers (CISOs) will have adopted human-centric security design practices to minimise cybersecurity-induced friction and maximise control adoption.

Addiscott says traditional security awareness programs have failed to reduce unsecure employee behaviour. “CISOs must review past cybersecurity incidents to identify major sources of cybersecurity induced-friction and determine where they can ease the burden for employees through more human-centric controls or retire controls that add friction without meaningfully reducing risk,” he added.

Trend 2: Enhancing people management for security program sustainability

Traditionally, cybersecurity leaders have focused on improving technology and processes that support their programs, with little focus on the people that create these changes. CISOs who take a human-centric talent management approach to attract and retain talent have seen improvements in their functional and technical maturity.

By 2026, Gartner predicts that 60% of organisations will shift from external hiring to “quiet hiring” from internal talent markets to address systemic cybersecurity and recruitment challenges.

Related:  Gartner reveals five behaviours of effective CISOs

Trend 3: Transforming the cybersecurity operating model to support value creation

Technology is moving from central IT functions to lines of business, corporate functions, fusion teams and individual employees. A Gartner survey found that 41% of employees perform some kind of technology work, a trend that is expected to continue growing over the next five years.

According to Addiscott business leaders now widely accept that cybersecurity risk is a top business risk to manage – not a technology problem to solve. “Supporting and accelerating business outcomes is a core cybersecurity priority yet remains a top challenge,” he added.

CISOs must modify their cybersecurity’s operating model to integrate how work gets done. Employees must know how to balance several risks including cybersecurity, financial, reputational, competitive and legal risks. Cybersecurity must also connect to business value by measuring and reporting success against business outcomes and priorities.

Trend 4: Threat exposure management

The attack surface of modern enterprises is complex and creates fatigue. CISOs must evolve their assessment practices to understand their exposure to threats by implementing continuous threat exposure management (CTEM) programs. Gartner predicts that by 2026, organisations prioritizing their security investments based on a CTEM program will suffer two-thirds fewer breaches.

“CISOs must continually refine their threat assessment practices keeping up with their organisation’s evolving work practices, using a CTEM approach to evaluate more than just technology vulnerabilities."

Richard Addiscott

Trend 5: Identity fabric immunity

Fragile identity infrastructure is caused by incomplete, misconfigured or vulnerable elements in the identity fabric. By 2027, identity fabric immunity principles will prevent 85% of new attacks and thereby reduce the financial impact of breaches by 80%.  

Addiscott cautioned that identity fabric immunity not only protects the existing and new IAM components in the fabric with identity threat and detection response (ITDR), but it also fortifies it by completing and properly configuring it.

Trend 6: Cybersecurity validation

Cybersecurity validation brings together the techniques, processes and tools used to validate how potential attackers exploit an identified threat exposure. The tools required for cybersecurity validation are making significant progress to automate repeatable and predictable aspects of assessments, enabling regular benchmarks of attack techniques, security controls and processes. Through 2026, more than 40% of organisations, including two-thirds of midsize enterprises, will rely on consolidated platforms to run cybersecurity validation assessments.

Related:  Unlocking potential while ensuring security and trust

Trend 7: Cybersecurity platform consolidation

As organisations look to simplify operations, vendors are consolidating platforms around one or more major cybersecurity domains. For example, identity security services may be offered through a common platform that combines governance, privileged access and access management features. SRM leaders need to continuously inventory security controls to understand where overlaps exist and reduce the redundancy through consolidated platforms.

Trend 8: Composable businesses need composable security

Organisations must transition from relying on monolithic systems to building modular capabilities in their applications to respond to the accelerating pace of business change. Composable security is an approach where cybersecurity controls are integrated into architectural patterns and then applied at a modular level in composable technology implementations.

By 2027, more than 50% of core business applications will be built using composable architecture, requiring a new approach to securing those applications. 

Addiscott says composable security is designed to protect the composable business. “The creation of applications with composable components introduces undiscovered dependencies. For CISOs, this is a significant opportunity to embed privacy and security by design by creating component-based, reusable security control objects,” he elaborated.

Trend 9: Boards expand their competency in cybersecurity oversight

The board’s increased focus on cybersecurity is being driven by the trend toward explicit-level accountability for cybersecurity to include enhanced responsibilities for board members in their governance activities. Cybersecurity leaders must provide boards with reporting that demonstrates the impact of cybersecurity programs on the organisation’s goals and objectives.

“SRMs leaders must encourage active board participation and engagement in cybersecurity decision making. Act as a strategic advisor, providing recommendations for actions to be taken by the board, including allocation of budgets and resources for security.”

Richard Addiscott.
Tags: GartnerSecurity and risk management
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses
  • Weak password reuse crisis remains

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl