Intelligent CIO Europe Issue 31 | Page 28

TRENDING business strategy. Adopting a secure-bydesign approach means that the security strategy is aligned to what the business wants to achieve, as well as the business’ risk-tolerance, while an intelligence-driven cybersecurity posture enables businesses to be agile in the face of a changing threat landscape and technology ecosystem. In practice, rather than bolting on security, it should be built in at the beginning, whether that’s infrastructure (network, data centre, clouds), in the workplace (employees, buildings, customer experiences) or business transformation and innovation initiatives (such as the Internet of Things (IoT) or Operational Technology (OT), Blockchain, DevSecOps). As organisations continue their Digital Transformation, inherently secure solutions provide businesses with the services or capabilities required to cover the latest cyberthreat protection which is of significant value to them. The increasing scale of connectivity and borderless Information Technology means “ ORGANISATIONS MUST EMBRACE INNOVATION TO COPE WITH THE EVOLUTION OF THE ATTACKERS AND UNEXPECTED RISKS TO THEIR BUSINESS. organisations have no choice but to evolve to address a non-standard, disorganised world. The proliferation of devices, applications and interconnection of these worlds requires automation and faster analysis to ensure quick and appropriate action. As such, these procedures, controls or policies need to be built into technology solutions from the start to enable an agile digital business. Digital Transformation, cloud computing, mobile devices, robotics, Machine Learning (ML) and Deep Learning are outpacing the security protections many companies have in place and making for a worsening threat environment. And this is why being able to quickly identify, protect and respond to potential threats will reduce the time it takes to thwart, restrict and manage attacks and their effects. In order to achieve cyber-resilience, organisations must embrace innovation to cope with the evolution of the attackers and unexpected risks to their business. • 28 INTELLIGENTCIO www.intelligentcio.com