We’ve detected that you are using an outdated browser. This will prevent you from accessing certain features. Update browser

cyber security

Developing a Comprehensive Cybersecurity Risk Management Strategy

As businesses reach new levels of digitisation, enabled by faster connectivity, the use of data offers a significant opportunity to better monitor, analyse, predict, and mitigate risk.

As businesses reach new levels of digitisation, enabled by faster connectivity, the use of data offers a significant opportunity to better monitor, analyse, predict, and mitigate risk. However, the same assets present new vulnerabilities for cyber threat actors to exploit, making the protection of data, and the systems that process, transfer, and store it, crucial.

Cybersecurity is now listed as one of the top priorities globally, according to the latest Annual Global CEO Survey by PwC, sitting only behind the pandemic in terms of extreme concerns. So cybersecurity risk management strategy should no longer be seen as a concern solely for the CTO and IT Director, it needs to be on the agenda with every supply chain and technical director too.

A Predictive Approach to Risk Assurance

Data has the potential to transform risk management and resilience. The right data, analysis and reporting tools can help to establish where future risk is more likely to occur, and where it isn’t, enabling resource to be focused on areas where the greatest value is at stake. Using these metrics can also help to avoid emotional bias in decision making: the risks that we assume are greater are not always those that require the closest monitoring.

Benefits of a Predictive Approach:

  • Focus resources on high-value, high-risk areas
  • Develop efficient methods for lower-risk areas
  • Make data-driven decisions, avoiding emotional bias
  • Work with an experienced digital assurance partner to analyze and act on data

The Need for Cohesive Digital Transformation

The opportunity offered by digital transformation is significant, but experience tells us that implementation can be challenging and, if approached in a piecemeal way, it is unlikely to deliver the right impact. A 2020 study revealed that of the digital upgrades put in place at the start of the pandemic, 59% required short-term fixes to solve issues that arose from rushed deployment. This might have been avoided had assurance and risk mitigation been better integrated into the change management process.

A common mistake is to take a tech-driven approach, deploying technology for technology’s sake. Critically, the starting point for organisations seeking to digitise their operations and risk assurance programmes must be the problems that they want to solve, not the technology or data source they feel is missing. This requires a cohesive digital assurance strategy that includes the right blend of people, process, and technology.

Supply Chain Data and Cybersecurity Risk Management

Growing digitisation and data flows increase the potential vulnerabilities which might be exploited by malicious threat actors. Suppliers are a vital source of data for any company wishing to obtain a complete picture of its operations and quality assurance, but this digital supply chain also needs cybersecurity assurance. Organisations need to be aware not just of their own cybersecurity risk management strategy, but of the potential of cyber threats arising when assessing the supply chain.

In the last few years, we have seen a shift in the cyber threat landscape with ransomware, not only doubling in frequency to count for 10% of all breaches, but increasingly being targeted at supply chains through sleeper ransomware. These attacks not only gain privileges on the host network, but also see how the whole ecosystem can be impacted. The global nature of supply chains increases the potential impact of these attacks, increasing the importance of risk assessment in cybersecurity.

Towards Continuous Monitoring

In this environment, traditional audits and an annual cybersecurity risk assessment are no longer adequate. They only provide a snapshot of systems at one moment in time and do not take into account new vulnerabilities or changes to the system required in the interim.

Similarly, in the past, many organisations have chosen to transfer their cybersecurity risk management to an insurance provider. However, the volume and sophistication of cyberattacks has pushed up premiums, so insurers are increasingly requiring organisations to proactively mitigate against risks to remain covered. Investment in robust assurance can even reduce the cost of the insurance policy.

Implementing Continuous Controls Monitoring

One solution to both of these issues is Continuous Controls Monitoring. This allows organisations to track, in real-time, the data needed for a cybersecurity risk assessment, including that obtained from suppliers. Threat intelligence platforms and dashboards can facilitate a continuous and proactive monitoring approach.

Collaborative, Real-time Assurance

Taking a collaborative approach with suppliers and specialists can help an organisation make great strides in developing a smarter approach to risk assurance and in establishing the appropriate information security policies in cybersecurity.

The requirement for certification against global management system standards, such as ISO 27001, and the right to audit and assess IT security is part of many contractual agreements. The National Institute of Standards and Technology (NIST) Cybersecurity Framework is also gaining ground as a global standard that takes into account the need to look at the controls of suppliers. This provides mutual advantage to both parties, with procurers helping to educate and upskill suppliers, increasing competency and resilience throughout the chain. The shift to digital assurance and a continuous model of monitoring also has the potential to reduce the need for any cost and disruption created by unnecessary in-person inspections when auditing the supply chain.

As decisions are made around suppliers, new product development, and growth into new geographies and territories, cybersecurity must form part of the discussion. Cybersecurity risk management must form part of a robust and continuous assurance strategy - not just a checkpoint to be met at the initial onboarding stage.

Conclusion

As industry digitises, the need for smarter, real-time assurance against both traditional risks and cyber threats grows. All of this points towards the need to integrate cyber resilience into digital risk assurance programmes in a way that is tailored to the business, addressing the threats you are aware of and taking account of the ones that you aren’t. Continuous and collaborative monitoring of operational data and information security, vulnerabilities, and threats has the potential to better mitigate risk, drive efficiency and facilitate more informed decision making.

Get in touch

Hit enter or the arrow to search Hit enter to search

Search icon

Are you looking for?