• About
  • Subscribe
  • Contact
Tuesday, January 27, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home FutureCISO Process Compliance and Governance

Sustaining confidence in cybersecurity values

Allan Tan by Allan Tan
January 5, 2026
Sustaining confidence in cybersecurity values

Sustaining confidence in cybersecurity values

Share on FacebookShare on Twitter

In the Asia-Pacific (APJ) region, cybersecurity leaders are navigating a complex environment marked by rapid digital transformation, intensifying cyber threats, evolving regulations, and the transformative potential of artificial intelligence (AI) and machine learning.

Amid geo-economic uncertainties and aggressive market expansion, CISOs must position cybersecurity as a strategic enabler rather than a mere cost. In an exclusive with FutureCISO, David Allott, field chief information security officer for APJ at Veeam, shares practical insights that underscore resilience as a core driver of business success.

Aligning security with business growth

David Allott

Allott emphasises that cybersecurity must directly support core business objectives such as revenue growth and market expansion. “An effective cybersecurity strategy directly supports business goals such as revenue growth and market expansion by building operational resilience and trust,” he explains.

By aligning security controls with strategic priorities—such as new market entry, digital transformation, and regulatory compliance—organisations can protect critical assets, maintain effective incident response, and boost stakeholder confidence.

He notes that the most resilient organisations foster cross-functional crisis management across IT, security, legal, risk, and communications teams, with at least 70% of IT staff fully trained and response-ready. This integration allows businesses to pursue innovation and growth confidently.

Ransomware: The persistent high-impact threat

Cyber extortion, particularly ransomware, continues to dominate the threat landscape.

“Cyber extortion – including ransomware – remains one of the most significant threats businesses face today, and can rapidly translate into financial loss, operational downtime, regulatory penalties, and reputational damage,” Allott asserts.

Veeam’s latest Coveware research reveals that attacks exploit identity, trust, and access vulnerabilities, often compounded by configuration debt. In APJ, where aggressive ransomware campaigns target critical sectors, Allott advocates for resilience maturity models that map threats to business impacts. Prioritising rapid recovery capabilities helps mitigate financial and reputational consequences.

Related:  PodChats for FutureCISO: Incorporating enterprise-wide GenAI strategies

Enterprise-wide ownership: Building a true security culture

Security is no longer confined to IT—it demands shared responsibility across the organisation. “Cybersecurity is an enterprise-wide responsibility, not just an IT concern,” Allott states.

CISOs must drive a culture where every business unit, from HR to the Board, owns its role in protecting data and assets. This involves building awareness, defining accountability, and engaging stakeholders in incident response planning and scenario workshops.

He highlights a critical gap: “Our research shows 20% of CIOs stating their organisation having not performed a business impact analysis (BIA) within the last five years.”

By reframing “security awareness” as “security culture,” organisations can embed organisation-wide commitment to resilience.

Strengthening defences: Protecting the backup layer

Modern attacks increasingly target backup environments. Allott’s intelligence is sobering: “90% of organisations this year reporting attacks against backup environments, with 66% indicating their backups were compromised.”

Effective protection demands zero-trust principles, immutable, air-gapped, and encrypted backups, alongside layered defences. Integration with SIEM and XDR platforms enables automated responses and forensic data capture.

Aligning with frameworks like NIST CSF and incorporating robust backup, disaster recovery, and incident response capabilities reduces exposure and accelerates clean recovery.

Measuring success: Quantifying risk reduction

Evaluating cybersecurity investments requires clear metrics. Allott recommends tracking reduced incident frequency, shorter recovery times (RTO/RPO), verified clean backups, and stakeholder feedback.

Regular cross-functional tabletop exercises, playbook reviews, and benchmarking against industry standards provide tangible insights. Tools like Veeam’s Data Resilience Maturity Model help organisations measure progress across strategy, people, process, and technology domains. Embedding these efforts in broader GRC programmes ensures prioritised, measurable risk mitigation.

Related:  Cisco AI Defense to address emerging security risks in AI applications

Unlocking ROI: Resilience as a competitive advantage

Cybersecurity investments deliver clear returns through resilience, compliance, and innovation enablement. Insights from over 500 global organisations using Veeam’s Data Resilience Maturity Model show that only 8% achieve best-in-class maturity.

These leaders recover seven times faster and experience four times less data loss. “Understanding your maturity rating provides a view of not just where you are, but where you can go,” Allott notes, with each advancement unlocking higher performance, lower costs, and stronger customer trust.

These insights resonate with broader industry trends. Gartnerhighlights strong security market growth in APJ, driven by AI and cloud adoption, while McKinsey positions cybersecurity as a board-level driver of competitive advantage.

In a region facing intensifying data privacy and AI governance regulations alongside persistent ransomware threats, Allott’s focus on strategic alignment, shared responsibility, and maturity benchmarking offers a practical roadmap for APJ CISOs to navigate uncertainty and drive sustainable growth.

Tags: Artificial IntelligenceCovewarecyber resilienceransomwareVeeam
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • PodChats for FutureCISO: Practical defence strategies against industrialised cyber threats
  • More Singapore firms setting up own SOCs
  • 2026: When autonomous AI transforms cyber attacks and security models
  • Recalibrating CISO strategies amid AI complexity
  • Study reveals urgent need for JIT privileged access amid AI expansion

Categories

  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl