Open Access
Subscription Access
Open Access
Subscription Access
Building the Next-Gen Cyber Security Operating Model in a Digital Eco-System
Subscribe/Renew Journal
The business of today are fast changing from a pipeline based model to a platform based model. The Digital businesses of today are focussed on this simple strategy which makes them use and rely more on technology enablers. These companies create new value and experiences that differentiate them with a competitive edge over their peers. New value is created in business models, customer experiences and the internal capabilities that support core operations of an organization. Thereby in the tech space, organizations transforming the programs to become digital business enablers, is very crucial in order to create an exponential value in this era. A core entity due to this rapid transformation is Cyber Security and the blueprint which one needs to adapt within this ecosystem of devices, applications and interfaces. Due to requirement of enabling digital business, during digital transformation and afterwards organizations are exposed to different risk factors and situations which cannot be handled and detected by utilizing the conventional and existing security practices for IT. This paper essentially focusses on stitching the various capabilities that entails the need and desire of a winning proposition which stands in front of CxOs to start thinking of Risk management and Cyber Security in a very different light and how one can leverage this function to show its direct and indirect benefits. It must address a new reality in which IT organizations have little direct infrastructure, and their biggest security concerns will come from services outside their control eg. using cloud services. That is why it is required to build a Security operational model architecture in the Digital Business World. A Security operational model will integrate all required crucial capabilities along with the security operational processes, skills, infrastructure, security enablers and drivers of customer/ user experience followed by the next gen DNA which need to exist within the whole organization set up. This will eventually ensure better performance and even overcoming pitfalls of the processes by complementing each other and also adding value in terms of providing better customer experience, optimizing cost price, reducing time of operation and other conveniences compared to earlier individually existing conventional security methodologies. In order to create an effective and secured blueprint which will provide fruitful results due to transformation to digital business approach should be initiated by considering having a proper vision as the first and initial step, followed by changes in objectives, embracing principles to ensure trust resilience and developing an adaptive, Context Aware Security Architecture. Ensuring security is very crucial in different real world scenarios such as remote management of IT resources, shared cloud services, encrypting data in motion and rest, effective management of BYOD devices etc.
Keywords
Cybersecurity, Digital Business, Digital Transformation, Risk Management
Subscription
Login to verify subscription
User
Font Size
Information
- Alstyne, M. W., Parker, G., & Choudary, S. (2016, April 06). Pipelines, platforms, and the new rules of strategy. Retrieved from https://hbr.org/2016/04/ pipelines-platforms-and-the-new-rules-of-strategy
- Choi, J., Kaplan, J., Chandru, K., & Harrison, L. (2019).Perspetives on transforming cybersecurity. USA: Digital McKinsey and Global Risk Practice.
- Claessens, J., Dem, V., De Cock, D., Preneel, B., & Vandewalle, J. (2002). Security of today’s online electronic. In J. Claessens, V. Dem, D. De Cock, & B.Preneel, Computers & Security (vol. 21, no. 3, pp. 253265). India: Copyright © 2008 Elsevier Ltd.
- Deloitte. (2014, September 22). CIO insights and analysis from Deloitte. Retrieved from https://deloitte.wsj.com/ cio/2014/09/22/an-introduction-to-cyber-war-games/
- Lainhart, J. W., Fu, Z., & Ballister, C. M. (2016). Holistic IT governance, risk management, security and privacy: Needed for effective implementation and continuous improvement. ISACA Journal, 5.
- Kannan, S. (2017). Disruptions in retail through Reimagining the store of the future. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/ in/Documents/CIP/in-cip-disruptions-in-retail-noexp.
- Sarrab, M., Aldabbas, H., & Elbasir, M. (2013). Challenges of computer crime investigation in North Africa’s countries. The 14th International Arab Conference on Information Technology (ACIT’2013).
- Siddique, M., & Rehman, S. (2011). Impacts of electronic crime in Indian banking sector. India: ACADEMIA.
Abstract Views: 208
PDF Views: 0