You are on page 1of 27

Name Student ID

✓ Nevein Shaker DT05005


✓ Mohamed Omar DT05006 2022 Global
✓ Karim AbdelHakim Digital Trust
Insights
✓ Wael Shehata DT05004
✓ Fayrouz Nazmy DT05028
✓ Omar Awad DT05026
 Introduction and purpose of the Survey “Simplify Cyber
Sec”
 How can CEOs make a difference to your organization?

Table of  Is your organization too complex to secure?

Content  How do you know if you’re securing your organization


against the most important risks to your business?
 How well do you know your third-party and supply chain
risks?
 The Global Digital Trust Insights Survey is formally known
as the Global State of Information Security Survey
(GSISS).
 PwC Research, PwC’s global Centre of Excellence for
market research and insight, conducted this survey
 This 2022 Global Digital Trust Insights Survey offers the C-
suite a guide to simplifying cyber with intention.
Introduction and purpose
of the Survey “Simplify  The 2022 Global Digital Trust Insights is a survey of 3,602
Cyber Sec” business, technology, and security executives (CEOs,
corporate directors, CFOs, CISOs, CIOs, and C-Suite
officers) conducted in July and August 2021. Female
executives make up 33% of the sample.
 It focuses on four questions that tend to get short shrift but,
if properly considered, can yield significant dividends.
 They focus, instead, is on working together as a unified
whole, from the tech stack to the board room — starting at
the top with the CEO. Security is a concern for the entire
business, in every function and for every employee.
How is your cyber budget changing in
2022?
 More than 25% expect double-digit growth in
cyber budgets in 2022.
 Investments continue to pour into cybersecurity.
69% of organizations predict a rise in cyber
spending in 2022 compared to 55% last year.
 More than a quarter (26%) predict cyber
spending hikes of 10% or more; Organizations
know that risks are increasing. 2021 is shaping
up to be one of the worst on record for
cybersecurity.
 what extent is your organization
prioritizing investments in the
following?

 Few have realized benefits to-date,


raising the question of what could
be done better for future cyber
investments prioritizing investments
in the following:
 Simplifying cyber

 increasingly complex webs that grow more intricate with each new
technology. The Internet of Things lets us perform myriad tasks by
uttering a simple command, enables factories to all but run
Cybersecurity scorecards: 4 out of 10
themselves, and lets our healthcare providers monitor our health
organizations report significant
from a distance. But the processes needed to manage and
progress in the past two years on four
maintain all these connections — including cybersecurity — are fronts:
getting more complicated, too. Runaway complexity evokes the
Lernaean Hydra from Greek mythology: cut off one head, and  instilling a culture of cybersecurity
two grow in its place.  Cyber risk management
 Communications between management
 Is the business world now too complex to secure? 75% and board
 Aligning cyber with overall business goals
say that too much avoidable, unnecessary organizational
complexity poses “concerning” cyber and privacy risks. But
because some complexities are necessary, your enterprise
shouldn’t streamline and simplify its operations and processes
thoughtlessly, but consciously and deliberately.
10% Most • progress in 4 areas (Engaged CEO/streamlined
- Organizations with the most advanced
Advanced: org/Data trust/secure ecosystem)
practices are twice as likely to have
made significant progress in • progress in 4 outcomes (Cyber risk management/
cybersecurity over the past two years. 10% Most instilling a culture of cybersecurity / enhancing
Improved: communication between boards and management/
alignment cyber strategy with business strategy

- The top 10% reporting significant progress toward meeting these goals — the most improved
— are many times more likely to be doing the right things
 How simplifying business processes and operations
can have a “multiplier” effect on security and privacy?

- Multiplying the effect: simplifying moves that get you 5x or more results

- Here are the four Ps to realizing your full cyber potential, as exemplified by most advanced and most
improved organization’s, who employ them all.

Principle People Prioritization Perception


The CEO must articulate an Hire the right leader &let CISO Your risks continually change as You can’t secure what you can’t
explicit, unambiguous and security teams connect with your digital ambitions rise. Use see. Uncover blind spots in your
the business teams. Your people data & intelligence to measure relationships &supply chains.
foundational principle
can be vanguards of your risks continually
establishing security and simplification even as you build
privacy as a business “good complexity” in the
imperative. business.

Only 10% have adopted these precepts and practices and reported making a huge progress towards their
objectives in the last two years.
 Can the CEO make a difference to your organization's cybersecurity?
Chief executives at companies that had the best cybersecurity outcomes over the past two years are 14x more likely to provide
significant and broad support to cybersecurity
findings: “expectations gap” for cyber, with CEOs perceiving that they are more involved in, and supportive of, setting and achieving cyber goals than their teams
do. A persistent gap can spell disaster given the CEO’s leading role in defining an organization’s culture.
CEOs tend to see themselves as more involved in cybersecurity than others in the organization do. Many CEOs self-identify as engaged and strategic in their
approaches to cyber. Our CEO respondents indicate that they participate in discussions about the cyber and privacy implications of mergers and acquisitions,
future changes to their operating model, and future strategy. Other executives don’t view things in quite the same way. Non-CEOs rated their CEOs as more
reactive than proactive regarding cybersecurity

Executives see CEOs getting involved in cyber when a crisis


strikes. CEOs think they are more engaged
 How much support does the CEO provide CISO leadership?
There are a couple of ways that can help enhance the cybersecurity for a
 CEO were more likely than non-CEOs to rate as “significant” their level of
more secure digital society by 2030:
support in six areas.
1. CEOs and executive should be well educated for better duty and
 The presence of CEO matters. CEOs in our "most improved" group are 14x responsibility fulfilling.
more likely to offer substantial help in all areas. The non-CEOs in the most
improved group are also 12x more likely to claim that their CEOs provide 2. Learn about technological innovations that make things simpler
them that substantial lift. while enhancing cyber defense.

 Also, according to the survey respondents, the interaction with the CEO on 3. Establish regulatory frameworks that enforce organizational
the cybersecurity matters has increased significantly by 46%. accountability and responsibility for fundamental cybersecurity
procedures.
4. Enhancing the cybersecurity awareness through working with
schools and universities
5. Nations cooperation to improve the resilience of vital infrastructure
6. Hold signatory countries liable for engaging in appropriate online
conduct in accordance with international agreements.
7. Create s cyber workforce full of diversity
8. Combine cyber and GRC, ERM, and crisis management
frameworks
9. Establish a consistent talent pipeline to address the skill shortfall
 Concurring the cyber mission changed according to the CEOs and  Top goals that org should focus on the next
other executives: 3years in relation to the changes you will be
making in cyber strategy, people and investments
 About 54% of the CEOs have asked their security teams are:
to set broad, growth-related goals rather than specific,
short-term ones and the non-CEOs shared the same
mindset.
 CEOs and Non-CEOs have almost the same goals for
the cybersecurity, these goals follow the famous
Maslow's hierarchy of needs, with prevention as the
fundamental, or most important, followed by resilience
and trust.

 Which of the following best describes how you/your CEO


frames the cybersecurity mission to your organization?
 How can CEOs make a difference to
their organization's cybersecurity?
 Make cyber security a top priority As the CEO, you need to
63% of organizations don’t get the kind of support they need from their CEO. set the tone for your company when it comes to cyber
The fact is, both the CEO and CISO need to work together better to benefit the security.
company.  Educate your employees /Keep your software up to date
 Use strong passwords /Install a firewall/Use anti-virus
A powerful CEO move: making an explicit statement establishing an imperative
software/Install a VPN
for security and privacy organization wide. the organization’s mission statement
 Review your third-party vendors /Beware of phishing scams
is already implicitly supportive to “help people live safer, more secure lives.”
 Back up your data/Restrict access to sensitive data/Monitor
Red Bull’s dedication to distinguished products and services gives its CISO the
your network
mandate to make security an integral part of the product and service quality
delivered to customers.
A related CEO imperative: empowering your CISO to carry out the This period of great complexity in the business world demands a third CEO imperative.
cybersecurity mission, voicing support and providing resources for secure-by- The CEO must make the company “simply secure” when the security team identifies
design, secure-by-default processes through wasteful habits. “get to market first, fix security later” mindset prevails. Companies
aren’t fully mitigating remote work risks. Business units often buy technologies and
 add the CISO to the C-suite. contract with third parties autonomously. Cybersecurity is too often an afterthought in
 Help the CISO communicate more with the board cloud adoption or transformation. By taking action, the CEO reinforces a zero-tolerance
 revamp the enterprise’s structure to embed security staff on business mentality for complexity that gets in the way of security
teams. For an organization that’s simply secure, CISOs must move out of the technology
 giving them the platform to speak outside the organization to customers trenches and broaden their outreach, learning from the CFO how to talk about the
about its security and privacy initiatives, as a trust officer would. financial implications of risk
This change may require a mindset shift for many CISOs. CISOs interact most frequently
with the CIO &CTO, our survey shows, least frequently with the chief marketing officer
and product management leader. The CFO also ranks low on the interactions list. CISO
will need to spend more time with these business partners to begin to speak their
language and better understand their business imperatives.
 Takeaways

the CISO
the CFO

 Familiarize yourself with your organization's business strategy.


 Create a security mindset organization-wide.  Build a stronger relationship with your CEO and keep the
 Demonstrate your trust in and steadfast support for your dialogue going to help your CEO clear the way for simply
CISO. secure practices.
 follow Peter Drucker’s advice: “Management is doing things  Equip yourself with the skills you need to thrive in the evolving,
right; leadership is doing the right things.” expanding role for cyber in business. And reorient your teams,
if you haven’t already, towards business value and customer
trust.
 Isyourorganizationtoocomplextosecure?

 75% say their organizations are too complex. But those that had the
best cybersecurity outcomes over the past two years are 5x more likely
to have streamlined operations enterprise-wide.

 Be deliberate about simplicity and simplification In an overly


complex organization, it’s easy for the left hand not to know what the
right hand is doing & the consequences for cybersecurity &privacy can
be dire.
 75% of C-suite respondents to our survey, including CISOs, say their
companies are too complex, avoidably, and unnecessarily so, and
nearly as many say complexity poses “concerning” cyber and
privacy risks to their organizations in 11 key areas. Data seems to
be a chief point of concern, especially among large companies
(revenues of $1 billion or more). Data governance (77%) and the data
infrastructure (77%) ranked highest among areas of “unnecessary and
avoidable” complexity.
 The most worried about all this complexity are CEOs. They assign a
complexity level of 10 to seven of 11 areas in their organizations.
CEOs tend to be more concerned about cyber and privacy risks arising
from complexities in the cloud environment, governance of tech
investments, and crossover from IT to operational technology (OT).
Executives in large organizations and in North America are more likely
to be concerned about risks from complexities in the cloud environment
and the crossover from IT to OT
 Thecostsofcompe
lxty
i

Complexity isn’t bad in and of itself. Often, it’s a by-product of business growth. The
larger an organization, the more complex it will naturally be, needing more people
and technologies to serve a growing customer base.

The costs of creating unnecessary complexity are not obvious, and it’s hard to create What are the most important consequences of
urgency around combatting complexity — that is, until an attack occurs.
complexity on your business?
One company needlessly kept the sensitive data of people it no longer did business
with, making that data available for hackers to steal.
 Inability to innovate as quickly as the
This simplification improved security: Monitoring two vendors is easier than keeping market opportunities offer
tabs on six, making information access easier to control, and the retailer could more  Inability to innovate as quickly as the
readily back up the smaller cache of customer data.
market opportunities offer
Asked to name the top consequences of operational complexity, our respondents  Lack of operational resilience or
named: inability to recover from a cyber-
1. Financial losses due to successful data breaches or cyber attacks. attack or technology failure
2. Inability to innovate as quickly as the market opportunities allow.
3. Lack of operational resilience, or the ability to recover from a cyber attack or
technology failure.

Complexity not only threatens today’s fortunes, in the view of executives. It also
prevents organizations from creating new opportunities quickly and pursuing future
ones.
 The move to simplification
Simplifying an organization takes time, requiring changes in viewpoints and To be fair, simplifying cybersecurity can be challenging. Even knowing
company culture. That’s not easy to achieve, but the payoffs are mighty. where to begin can be difficult, especially given the attacks hitting
businesses on every front. Asked to priorities among nine initiatives
The companies that had the best cybersecurity outcomes over the past two years aimed at simplifying cyber programs and processes, respondents
(most improved) are 5x more likely to have streamlined operations enterprise-wide. couldn’t choose, allotting near-equal importance to all of them.

More and more CISOs and CIOs are taking a hard look at their tech investments, no In the next two years, what proportion of your cybersecurity spend will your
longer just entertaining or chasing the latest products from tech vendors. We’re organization allocate to each of the following initiatives to simplify
seeing consolidation of tech vendors and applications to reverse the hard-to-manage cybersecurity?
and risky tangle of disparate and vulnerable software and tech stack.
.

In the last two years, to what extent has your organization streamlined
operations in the following ways? Simplification in organizations: 3 in
10 have streamlined over the last two years

CISOs who are building layers of control, for defense


in depth, are well-intentioned but must guard against
introducing more complexity and cost. More controls
don’t always make a company more secure.

Cloud security is the top investment priority of our


survey respondents, as well as in our June US-specific
survey.
 Takeaways

Operations and
Transformation the CISO and CIO
Leaders
 Ask: what’s the cyber plan for that? You can ignite major
changes — operational and cultural — simply by asking this
one question of every business executive in charge of a  Dare to subtract. Left on their own, technology and data tend to
transformation or new business initiative. By placing multiply, divide, and conquer efficiency and security. Whittle down
cybersecurity front-row-center, you can avoid the unnecessary excess with security goals in mind: assess your data stores and
and costly complexities you may see now, when it’s an eliminate everything you don’t need now; move your disparate apps
afterthought. Include the CISO and security teams early in and solutions into a cloud environment for easier management; and
cloud migration and adoption, mergers and acquisitions, and consolidate, liquidate, and automate where you can. Also, rethink your
other organizational initiatives. That way, every executive at the tech and cyber investment processes. Focus first on simplifying where
helm of a major business initiative will be able to readily answer benefits are greatest for the whole organization.
the cyber-plan question
 Are you securing against the most
important risks today and tomorrow?
Fewer than 1 in 3 organizations use available data and intelligence when making
decisions. But those that had the best cybersecurity outcomes over the past two years
are 18x more likely to say data and threat intel are integral to their operating model.
 The 2022 threat outlook
The 2022 threat outlook: Executives expect a surge in attacks and
reportable incidents
 Takeaways

the CISO
the CFO

 Build a strong data trust foundation: an enterprise-wide approach to


data governance, discovery, protection and minimization
 Create a roadmap from cyber risk quantification to real-time cyber
 Work with the CISO in taking a risk-based approach to cyber risk reporting.
budgeting that ties to business objectives.  Don’t stop at cyber risks. Tie the cyber risks to overall enterprise risks
and, ultimately, to effects on the business.

 With a fuller accounting of cyber risks, identify what works in your


business model and where you might need to simplify.
 Public-private collaboration

Thinking about your most significant public-private collaboration mechanism, what are your organization's goals with public-private
collaboration? And in the past year, how well has your organization achieved each of those goals you mentioned?

o o Organizations increasing their cyber budgets in 2022 were


Visibility also means seeing which challenges others
face and what they are doing to meet them. significantly likely to say they have achieved these goals “very
effectively”:
o Timely sharing of information matters for  Share knowledge about new threats, approaches, and
cybersecurity in general, critical infrastructure or not. solutions. Demonstrate avoidance of tangible financial
losses .
o Fewer than one-third of respondents said their public-private  Activate public-private sector relationships for more
collaboration efforts are “very effectively” helping them effective responses to a cyber attack on the organization.
achieve their cyber goals.  Promote broader awareness and upskilling of workforce.

Collaborators are an important part of secure


ecosystems. More effective public-private
collaboration is needed before, not just after,
attacks.
Those who’ve had the best cybersecurity
outcomes over the past two years, however,
were 34x more likely to have achieved their
public-private collaboration goals “very
effectively.
 Takeaways

For the CRO and


For the COO and the
CISO
supply chain
executive
 Build up your technological ability to detect, resist and respond
 Map your system, especially your most critical relationships, to cyber attacks via your software, and integrate your
use a third-party tracker to find the weakest links in your supply applications so you can manage and secure them in unison.
chain.  Establish a third-party risk management office to coordinate
the activities of all functions that manage your third-party risk
 Scrutinize your software vendors against the performance areas.
standards you expect. Software/applications that your company  Strengthen your data trust processes. Data is the target for most
uses should undergo the same level of scrutiny & testing that attacks on the supply chain. Data trust and good third-party risk
your network devices and users do. management go hand in hand.
 Educate your board on the cyber and business risks from your third
 Identifying ways to simplify your business relationships & parties and supply chain
supply chain.
Thank you

You might also like