Four key challenges for cybersecurity leaders

cybersecurity_

(Credit: Unsplash)

This article is brought to you thanks to the collaboration of The European Sting with the World Economic Forum.

Author: Ken Xie, Founder, Chairman of the Board and Chief Executive Officer, Fortinet


  • Cybersecurity must be built-in to every product and system.
  • Achieving this will pose four challenges for business leaders.
  • By overcoming them, we can create a truly protected digital world.

In business and society today, we are too often focused on bolting on cybersecurity in a hyphenated manner. We want “security-enabled” this, “security-enhanced” that. But cybersecurity cannot be an add-on. Rather it must be built into every product and system from the moment it is conceived. To achieve such integration, we need to address four fundamental leadership challenges:

1) Real-time information sharing

The pace of the digital world continues to increase exponentially. To keep up, security professionals have to address threats and security weaknesses rapidly, before cybercriminals strike. Speed is fundamental to an effective cybersecurity strategy; cybersecurity systems must keep up with the increasing speed and volume of internet traffic. Speed of reaction is vital as well. Too often, there are long lag times in addressing cybersecurity problems. Criminals can – and do – take advantage of this.

But speed requires visibility. To act fast, we must share threat information in near real-time. Cybercrime has no borders. In a world that is so deeply interconnected by digital technology, cybersecurity and global security are the same thing. No single organization, public or private, can have a complete view of the entire cyber landscape. Senior leadership must insist organizations share information to put the pieces of the puzzle together. Otherwise, we will be flying blind.

 

2) Widespread collaboration in cybersecurity

Effective cybersecurity must be deeply and widely collaborative. Collaboration enables the good guys to create a hive mind, to learn rapidly, constantly expanding our competency and capacity. If organizations or states do not learn from one another, the same attacks will needlessly take down countless entities.

Wide collaboration means including everyone in a broader conversation about cybersecurity. Deep collaboration means making everyone smarter and creating knowledge repositories that are part of our operational systems. It means collaborating on threat intelligence sharing and it means collaborating on education.

The more we talk about the importance of cybersecurity and its fundamental role, and the more education is shared, the more we will educate and nurture the future generations of cybersecurity professionals we very much need. The estimated cost of damage caused by hackers, malware and data breaches is projected to reach $6 trillion by 2021. To empower leadership to meet these challenges, technological experts and top-level decision-makers across the public and private sectors must work together. This takes time. Senior leaders should make it clear that such collaboration is time well-spent.

Working together, we could see tangible results very fast. More than 92% of malware is delivered via email. With the right awareness campaigns and policies, as well as diligence in practice, we could eliminate more than 90% of malware simply by teaching new skills that overcome ingrained behaviours.

What is the World Economic Forum doing on cybersecurity

The World Economic Forum Platform for Shaping the Future of Cybersecurity and Digital Trust aims to spearhead global cooperation and collective responses to growing cyber challenges, ultimately to harness and safeguard the full benefits of the Fourth Industrial Revolution. The platform seeks to deliver impact through facilitating the creation of security-by-design and security-by-default solutions across industry sectors, developing policy frameworks where needed; encouraging broader cooperative arrangements and shaping global governance; building communities to successfully tackle cyber challenges across the public and private sectors; and impacting agenda setting, to elevate some of the most pressing issues.

Platform activities focus on three main challenges:

Strengthening Global Cooperation for Digital Trust and Security – to increase global cooperation between the public and private sectors in addressing key challenges to security and trust posed by a digital landscape currently lacking effective cooperation at legal and policy levels, effective market incentives, and cooperation between stakeholders at the operational level across the ecosystem.Securing Future Digital Networks and Technology – to identify cybersecurity challenges and opportunities posed by new technologies and accelerate solutions and incentives to ensure digital trust in the Fourth Industrial Revolution.Building Skills and Capabilities for the Digital Future – to coordinate and promote initiatives to address the global deficit in professional skills, effective leadership and adequate capabilities in the cyber domain.

The platform is working on a number of ongoing activities to meet these challenges. Current initiatives include our successful work with a range of public- and private-sector partners to develop a clear and coherent cybersecurity vision for the electricity industry in the form of Board Principles for managing cyber risk in the electricity ecosystem and a complete framework, created in collaboration with the Forum’s investment community, enabling investors to assess the security preparedness of target companies, contributing to raising internal cybersecurity awareness.

For more information, please contact info@c4c-weforum.org.

3) Creating and promoting a common vision for integrated cybersecurity

Public and private sector leaders must commit to creating a common vision for integrated cybersecurity – something akin to NATO, which is based on clearly defined fundamental principles.

This vision for integrated cybersecurity must be comprehensive and inclusive, anticipating the next actions of cybercriminals rather than solely reacting to them. Just like NATO has well-trained armies and constantly evolving battlefield strategies, the common vision must be operational and must look at how best to address the technical challenges of effective cybersecurity, including the skills gaps I focused on in a previous piece.

Cybersecurity competency must be embraced by individuals and organizations. Cybersecurity education and training should be part of everyone’s educational development. Without such efforts, we will not have enough experienced soldiers to fight this war.

Cybercrime is high on business' agenda
Cybercrime is high on business’ agenda
Image: World Economic Forum 2019 Regional Risks for Doing Business report

4) Promoting the technology platform we need to make this work

Cybersecurity was not part of the design of most of the world’s current infrastructure. This must change.

Making cybersecurity work requires computing power. From now on, most products, devices and infrastructure should have this additional computing power designed in. Furthermore, the cybersecurity capabilities inside the devices must fit into an integrated platform that distributes workloads over the layers of a system.

An example of such a larger vision for cybersecurity where all parts of the network participate together is security-driven networking, which changes traditional assumptions of networking. Instead of looking only for the fastest path, security-driven networking takes the risk of each path into account and moves traffic over the fastest safe path. To make this work, the networking devices all need to share information about the speed and the risk of each network path.

The ability to offer robust security across the network with low latency and high performance is a critical functionality that organizations are seeking, especially with the deployment of 5G networks. A centralized approach is no longer tenable.

An integrated, optimized platform won’t emerge in a perfect form, but it won’t emerge at all unless we realize that it is needed. Organizations like the World Economic Forum’s Centre for Cybersecurity must continue to educate product designers around the world about the need to build cybersecurity into their products, and and best practices in doing so. In some cases, this may lead to a product refresh while in others it will lead to a redesigned ecosystem. In many cases, both changes will be required. We also need more widely accepted standards and protocols and public discussion about the topic to encourage trust.

A way forward

Given these four challenges, it is only once we have true integration, both across national and geographic borders, and also within our own businesses, that cybersecurity will achieve its full potential of creating a truly protected world.

Regardless of industry, vertical market, and geography, industry and government leaders have a responsibility to guide us toward a safer world. In a climate permeated by lack of trust and poor cooperation between established industry leaders, the only winners are cybercriminals. As leaders of important global organizations, members of the WEF and its Centre for Cybersecurity, and as an individual deeply aware of the importance of this imperative, I believe that cybersecurity is a responsibility we must all take on.

the sting Milestones

Featured Stings

Can we feed everyone without unleashing disaster? Read on

These campaigners want to give a quarter of the UK back to nature

How to build a more resilient and inclusive global system

Stopping antimicrobial resistance would cost just USD 2 per person a year

Mobile 360 Africa 11-13 July 2017

M360 Security for 5G: Security for 5G Predictions 2020, in association with The European Sting

What India’s route to universal health coverage can teach the world

New EU rules cut red tape for citizens living or working in another Member State as of tomorrow

Russia: EU Presidents condemn Russian sanctions against EU nationals

What will higher education in Africa look like after COVID-19?

Make the internet safer: stop using passwords

Can the EU assume the mantle of global leadership?

Refugee crisis update: EU still lacks solidarity as Hungary and Slovakia refuse to accept EU Court’s decision

CDNIFY @ TheNextWeb 2014

Swiss vote approves nationwide paternity leave

Parliament elects the von der Leyen Commission

COVID-19: National authorities should do more to raise awareness of EU action

Here’s why the world’s recovery from COVID-19 could be doughnut shaped

The Commission favours the cultivation of more GMOs in Europe

How COVID-19 and ‘work from anywhere’ can build the city of the future

Civil protection: Parliament strengthens EU disaster response capability

Women in Iceland have walked out of work to dispute the gender pay gap

Stop illegal trade in cats and dogs, says European Parliament

Economic policy priorities for a post-pandemic recovery

Rights of ‘gilets jaunes’ protesters in France, ‘disproportionately curtailed’, say UN independent experts

Commission to decide definitely on genetically modified Maize 1507 seed

Coronavirus: Commission proposes to extend 2020 European Capitals of Culture into 2021

Europe should make voice ‘more heard’ in today’s ‘dangerous world,’ says UN chief

Linking HIV prevention with SRHR

Where does our food come from? Here’s why we need to know

Youth Entrepreneurship Issue of the month: JEN, organisers of JADE October Meeting, on why JEs should come together

MEPs want the EU to play a stronger role in improving public health

‘Worst devastation I have seen,’ says UN refugee envoy Angelina Jolie, as she visits West Mosul

How technology will transform learning in the COVID-19 era

As conflicts become more complex, ‘mediation is no longer an option; it is a necessity’, UN chief tells Security Council

China is adding a London-sized electric bus fleet every five weeks

Neelie Kroes at the European Young Innovators Forum: Unconvention 2014

This is how we can make a global green recovery – that also boosts the economy

Disease slashing global meat output, cereals boom, bananas under watch: FAO

The Commission tries to stop the ‘party’ with the structural funds

Combatting terrorism: EP special committee calls for closer EU cooperation

EU budget 2020: Commission focuses its proposal on jobs, growth and security

EU Parliament shows its teeth in view of 2014 elections

State aid: Commission approves €1.1 billion Polish scheme to further support companies affected by coronavirus outbreak

For climate policies to stay on track we must prepare for transition risks

Towards Responsible #AIforAll in India

These countries are pioneering hydrogen power

Yemen bus attack just the latest outrage against civilians: UN agencies

UN chief lauds Fijians as ‘natural global leaders’ on climate, environment, hails ‘symbiotic relationship’ with land and sea

Don’t believe the hype: offices are here to stay

Help prevent children ‘from becoming victims in the first place’, implores Guterres at campaign launch

Commission proposes to purchase up to 300 million additional doses of BioNTech-Pfizer vaccine

MEPs spell out priorities for the European Central Bank and on banking union

Palliative care and Universal Health Coverage: Do not leave those suffering behind

Every bite of burger boosts harmful greenhouse gases: UN Environment Agency

In a state of war: COVID-19 and psychiatric support

Quantum technologies can transform innovation and mitigate climate change – here’s how

EU Summit/Migration: Parliament calls for joint solutions based on solidarity

Trump to run America to the tune of his business affairs

Financial support for workers affected by no-deal Brexit

Commission welcomes the political agreement on the Common Provisions Regulation for shared management funds

Heat stress spike predicted to cost global economy $2,400 billion a year

We can’t wait to act on emissions. Here’s how to get to net zero

More Stings?

Speak your Mind Here

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s