Cyber Security must become more user-friendly in 2022

KPMG

Cyber security is no longer a matter of telling people what they can't do, it's about showing them what they can do securely, according to a new report from KPMG. Cyber security considerations 2022: Trust Through Security identifies eight new priorities for CISOs (Chief Information Security Officer) to better manage the escalating security landscape going forward.

The report identifies a growing demand for a frictionless experience, unencumbered by ever-changing passwords and multiple layers of digital identification. Business value and user experience will be the focus for cyber security: enabling users rather than restricting them. CISOs need to become "influencers" rather than "enforcers" as security becomes a shared responsibility model, owned by everyone.

"The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement - cyber security is no longer just about prevention," said Gordon Archibald, National Lead - Cyber Security, KPMG Australia.

AI and automation are also set to play an increasingly significant role as organisations adopt a "zero trust" mindset. This places identity at the core, with organisations able to evaluate whether a user is properly authenticated, isolate the resource they are attempting to access, determine if the request is from a trusted, stolen or third-party device, and confidently decide whether access should or should not be granted.

The report makes several recommendations for embedding zero trust mindset, including

  • Commit to creating a frictionless experience to enhance user and customer experience by streamlining authentication and identity management
  • Automate security functionality to enable highly skilled professionals to focus on more strategic activitiesAccept that adopting a zero-trust approach is a journey - it takes time to implement

Matt O'Keefe, ASPAC Cyber Leader, KPMG commented: "The emergence of zero trust represents a mindset shift in which the cyber team assumes compromise in connection with system access, and makes security decisions on the basis of identity, device, data, and context. With users demanding ever-faster access, and cloud-centric structures expanding the attack surface, existing security solutions and resources may not be formidable enough to adequately protect data as it moves through the network."

Eight key cyber security considerations for 2022

  1. Expanding the strategic security conversation. Change the conversation from cost and speed to effective security to help deliver enhanced business value and user experience.
  2. Achieving the x-factor: Critical talent and skillsets. Transform the posture of CISOs and their teams from cyber security enforcers to influencers.
  3. Adapting security for the cloud. Enhance cloud security through automation - from deployment and monitoring to remediation.
  4. Placing identity at the heart of zero trust. Put IAM and zero trust to work in today's hyperconnected workplace.
  5. Exploiting security automation. Use smart deployment of security automation to help realise business value.
  6. Protecting the privacy frontier. Move to a multidisciplinary approach to privacy risk management that embeds privacy and security by design.
  7. Securing beyond the boundaries. Transform supply chain security approaches - from manual and time consuming to automated and collaborative.
  8. Reframing the cyber resilience conversation. Broaden the ability to sustain operations, recover rapidly and mitigate the consequences when a cyberattack occurs.
/Public Release. This material from the originating organization/author(s) might be of the point-in-time nature, and edited for clarity, style and length. Mirage.News does not take institutional positions or sides, and all views, positions, and conclusions expressed herein are solely those of the author(s).View in full here.