A new report from American networking technology giant Cisco has outlined the expectations of Chief Information Security Officers for the coming year.
Based on a survey of 2,800 security professionals in 13 countries, the report, entitled the “2020 CISO Benchmark Report”, some of the key findings included the fact that, while cybersecurity remains a priority among business leaders, the complexity of infrastructure change due to digital transformation opens up vulnerabilities.
One method of covering this threat is through combatting complexity. That can be achieved through the consolidation of vendors, investing in automation and implementing cloud security.
In an accompanying press release, Steve Martino, Senior Vice President and Chief Information Security Officer, Cisco, said:“As organizations increasingly embrace digital transformation, CISOs are placing higher priority in adopting new security technologies to reduce exposure against malicious actors and threats. Often, many of these solutions don’t integrate, creating substantial complexity in managing their security environment. To address this issue, security professionals will continue steady movement towards vendor consolidation, while increasing reliance on cloud security and automation to strengthen their security posture and reduce the risk of breaches.”
Recommendations stemming from the report included implementing a layered defence consisting of multifactor authentication and endpoint protection, as well as a focus on cyber hygiene; such as training staff and updating devices.
In this month’s edition of the magazine, our cover feature found us speaking to the CISO of super app Gojek, George Do, who discussed his own approach to the challenges of balancing agility with security. ““We want to enable our developers and our engineers to move as fast as possible, but in order for them to do that securely, their identity and how they go about accessing systems to do their work is paramount. So we employ, and have a robust roadmap to implement, a very strong identity and access management program”