Cyber, Culture and the Cloud
How I think I am on the left, how others perceive me on the right.

Cyber, Culture and the Cloud

The cyber security industry is poised for strong growth in the coming years, as the increased threats and cyber security expectations of users and governments drive a new wave of need. Whilst this poses good news to those providers who are delivering a modern cyber security capability, many CISOs are identifying a desire for change in the way cyber security is being delivered.  The pandemic has meant we’ve reached the cyber breaking point and we need to facilitate that change in order to deliver better cyber security outcomes.

Whilst I am a cyber security CTO and Master Inventor, I also have the unusual distinction of being a trained and certified Culture Coach at IBM (under a program delivered by Human Synergistics). Many people I talk to about this program are familiar with the colours - blue referring to a constructive engagement style - green being passive/defensive - red being aggressive/defensive styles. In the journey to a culture coach, one learns about the behaviours that individuals and teams exhibit in delivering positive (and negative) outcomes. For interest, my charts are above - how I feel about the way I engage VS the way others feel that engagement. On the back of so many meetings in the past three year, with clients, partners and industry, I wanted to consider what the culture in cyber security feels like today and what fundamentals could help to enable the change being asked for. On a wet and cold December weekend in Australia, I decided to put thoughts to print...

Any client I speak to recognises that the way cyber security has been done in the past decade cannot be sustained under the current pressures. Unfortunately, it's human nature for people to work within their comfortable and conventional ways, such an approach makes us predictable. This is not exactly a good thing when you're fighting to defend your environment against growing threats. 

Whilst we are in the middle of a skills crisis (and a pandemic!), organisational dependency on the few has left many lacking confidence in considering cyber security transformation change. Suppliers and individuals providing services are then in a power position to drive oppositional behaviours – which ultimately smothers any desire for change. The passive/defensive mindset may be supported by a fear that failed change programs will be fodder in the case of an organisation being breach.

Compliance programs themselves have good intentions in rising the water line across the industry but leaves room for a rewards program for innovative change. After all, in a compliance driven environment, a positive compliance result is not just a governance mandate - but is also insurance in the case of a breach.  In an environment where breaches are almost certain (even at the best cyber security companies), innovative advances need to find new ways of working to deliver demonstrable incremental advances whist maintaining any compliance obligations. Herein lies the opportunity. 

Over the past 5 years, digital transformation has delivered widespread, and often exponential, commercial benefits at a lower cost. Adoption of modern practices has changed the way that information technology is delivered through the cloud. Although the cloud started out being a place where applications were hosted and run, people soon realised it was the adopted practices that delivers that accelerated value. We are now at the point where micro services-oriented solutions can respond and recover to operational challenges, scale up and down automatically and run anywhere across an open environment at lower cost. Incredible, we are now considering how these workloads can be moved to compute at the edge. It is in the combination of how compute is delivered, the architectural flexibility, and the way that developer and operations (devOps) engage that has fundamentally shifted the financials in delivering better IT. 

Information security programs are thirsting for this kind of transformational change. Whilst change is hard, avoidance has made monolithic practices an acute pain point in terms of cost. Modern cloud practices have delivered clear cost efficiencies in IT, why not across cybersecurity? In one example, it seems inconceivable to a modern devOps professional that best practice security detection relies on copying, moving and analysing security data in a central place.  It’s simply unsustainable to rely on practices that the IT landscape divorced years ago to drive cyber security threats out of information technology environments.   We also need to recognise that compute will need to run in multiple clouds and we need to move towards proactive cyber threat identification, hunting and remediation.

This is all easy to say, but where do we start. The good news is that modern cyber security platforms are emerging to help facilitate this change, and organisations are now considering how to introduce new modern practices into working environments. Like digital programs, with a constructive mindset applied, it'll be the combination of the two that will imagine, design and deliver agile, incremental examples of the possible. That’s where my personal support of the need for cross organisational skills in cyber security lies – diversity will lead to breakthrough moments. We just need to find the right point to get started and executive support and strong affiliation across programs - after all cyber is a team sport.

What I have learnt, what I have felt in the client meetings over the past 12-18 months is that the desire for change is upon us. As an industry, clients and vendors alike, we need to work together strategically to define incremental change programs to deliver the lower cost, higher value outcomes whilst delivering compliance demands. We need to recognise that the cultural change is a critical part of this – and that individuals should be convinced that re-skilling to modern will only help to accelerate their value over time - and that every organisation will need these transformational skills moving forward. If skills and competencies from affiliated vendors are not demonstrating this change to you – it’s time to make the investment yourself. 

In some ways, this is the architectural battle that IBM's CEO talks about. Whilst the RedHat OpenShift platform might not be known to everyone in cyber security, it is the foundation of our strategic approach to modernising IT Security. This open, cloud-oriented platform is designed to help clients get the most out of their existing tools, leave the data where it lies, and allows customers to design their own devOps oriented threat management and zero trust programs.  As workloads move more and more to hybrid/multi cloud, IBM wants to help clients openly connect the data, the workflows so they can orchestrate use cases that deliver to their specific needs. But taking on this journey will require a constructive discussion within your organisation – something to ponder as we close out 2020.

Until I meet you all again, I wish everyone a safe and joyous holiday season. 

 

 

 

Sunil Kumar Nair

Service Delivery Manager | Driving IT Excellence & Innovation | Customer-Centric Leadership | Strategic Client Partnerships | Artificial Intelligence (AI) & Digital Transformation

6 个月

Thanks for sharing such a thoughtful post. Chris Hockings Your perspective on the cultural aspects of cybersecurity, particularly the passive/defensive and oppositional behaviors that can hinder transformation, truly resonates.

Ian Markram

IT Professional Services Coach @ Loading Growth | Coaching IT Entrepreneurs

4 年

Great article Chris, you've outdone yourself!

Denny Wan

A global thought leader in Reasonable Security and data-driven Risk Decision. A Cyber Security Risk Expert, podcast host and Public Speaker. CISSP, ISO 27001LA, PCI Professional, Open-FAIR, Open Group Security Forum

4 年

Chris Thanks for your insights. As an ex-IBMer, I resonate with the colour coding of blue symbolising a constructive engagement style. An important trait of this engagement style is the focus on fostering consensus and improving human communications particularly between the business and cyber risk leaders. It is not always possible to arrive at a consensual position. But merely 'agreeing to disagree' is an important stepping stone by highlight these areas of disconnect. This is where The Open Group FAIR cyber risk quantification framework helps in bridging these areas of disconnect by providing a consistent and transparent methodology to express cyber risk in dollars value. The NISTIR 8286 standard, connecting cybersecurity to Enterprise Risk Management (ERM), is a blueprint for connecting enterprise Risk Register items with operational cyber risk management decisions and driving fine-grain investment thresholds. The recent global partnership between IBM and RiskLens is a testimony of IBM's global security leadership in plugging this important communication gap in the security cultural transformation journey pivoting from compliance to risk-based approach.

回复
Adrian Bole

Director at IdentityXP | Identity strategy, architecture and implementation

4 年

Brilliant piece Chris - I read it twice!

Sarah G.

Counsel @ IBM Australia (Complex Technology Deal Negotiation; Regulatory Compliance; Privacy and Data Security; Fintech)

4 年

What an insightful article Chris Hockings !

要查看或添加评论,请登录

Chris Hockings的更多文章

社区洞察

其他会员也浏览了