Digital transformation and cybersecurity

3
489 views

Digital transformation is one of the major trends in the Business. In the journey of transformation a lot of legacy applications, trends and approaches are modernized. What are the potential risks for the cybersecurity in a digital transformation process? And how can we make sure that digital transformation is not creating new security risks?

Digital Strategy
Cyber-security
Digital Transformation
technology
Security
Cybercrime
Hitesh Mathpal
74 months ago

10 answers

2

Any transformation creates potential risks. New technologies mean new risks as well. What we can do is to study the new security risks looking for effective security solutions and trying to anticipate the possible future threats.

Paolo Beffagnotti
74 months ago
Agreed Paolo. I also think that cybersecurity team / SME should be an active part of the strategy and project plan for digital transformation. Most of the time they come ( or invited) when everything is decided. - Hitesh 74 months ago
Agree with you, most of the time cybersecurity team becomes part of the project when is needed to patch a problem: too late! - Paolo 74 months ago
And I agree with your agreement. And to Hitesh's point, the CyberSecurity team is often invited or informed even more often after everything is done and it is now time to clean up the mess. This too must change. - Ross A. 74 months ago
Yes and after waiting too long, then the bigger the mess, the more time it takes to fix it - Paolo 74 months ago
Better late than never - Dr. David E. 63 months ago
yes sure thing, but what about the damages in the meantime? - Paolo 63 months ago
Not good - Dr. David E. 63 months ago
2

The potential risk is that the value drivers of the transformation - accessibility, agility, mobile workforce etc overwhelms the rational risk assessment and mitigation of cyberthreats - thus during the process, transition trumps security.

Often operations teams are incented to deliver on the goals of the transition, and security becomes a "we'll deal with that later" problem. Having executive sponsorship from the CSO etc helps temper that.

Simon Hunt
74 months ago
Agreed Simon. - Hitesh 74 months ago
DITTO - Dr. David E. 63 months ago
2

Few potential risks of digital transformation , but not exhaustive,

  • Next-generation devices are now deployed in potentially vulnerable environments such as vehicles, hospitals, and energy plants, vastly increasing the risks to human welfare
  • Concerns about such devices being hacked, turned into botnets, and used to attack targeted computers and organizations are growing as well.
  • Vulnerabilities in the supply chain
  • Explosion of connected environments where perimeter protection is no longer enough
  • Building Visibility on Insider Threats
  • Understanding between the organization’s cybersecurity professionals and those who provide application security
  • Protecting Open Systems

Mayank Lau
74 months ago
2

Cybersecurity should be the part of digital transformation. This is one way to address the risk before it actually occurs.

Charu Gulati
74 months ago
OK - Dr. David E. 63 months ago
1

Hitesh:

That is a big question and not enough space to list all of the potential risks. As Paolo, mentioned any transformation has a cyber security component and requires a focus on design, implementation, transformation, and operation. As an example, an organization will need to plan for compliance, downtime, and security posture. Leverage best practices, access to experts, and proven methodologies to ensure a successful outcome.

glenn gramling
74 months ago
True, Glenn. Do you think the participation of cybersecurity team should be at strategic and planning level as well? - Hitesh 74 months ago
Depends - Dr. David E. 63 months ago
1

If you wanted to list the individual risks, that would take a lot more space, indeed.  I think that chain begins with a fairly simple beginning:  secure by design, ergonomically balanced, user-enabling.  There can be no question about the functionality and user-enabling aspects - the application will not be successful without proper attention to these attributes.  But this must be achieved on balance with "security by design" - the active threat environment-agents seek to take advantage of the huge number of poorly managed websites, and are seldom disappointed.

I think companies leap ahead often blindly because they are afraid they will not be able to capitalize on an opportunity fast enough, and find themselves lost due to poor planning.  Companies that have staying power stay because they plan well and execute better.  Companies that run into serious trouble, like Uber, do so because they move too fast and never take care of the basics that make for staying power.  Our tech giants have it because they do the basics very well, and that frees them to move forward with their visions.

In our digital society, we cannot lose sight of these principles.  At the pace it tends to move, doing that gives no quarter and takes no prisoners.  My simple beginning is a beginning point precisely because the velocity we experience today will not allow us to "go back and clean up":  we either do it right the first or not at all because we will not get a second chance.  Designing your cybersecurity in is no longer the option or "do it later" item it used to be.  Things like HIPAA, FINRA, GDPR make clear that doing it from the outset is the only choice we have any more.

So, doing cybersecurity right from the beginning, as well as doing it correctly, is not only an enabler, but can be the pivotal technology that actually makes it possible to do it at all.  

Ross A. Leo
74 months ago
Very well said, Ross. Strong basics always win. Your thought "Secure by Design" is a must. And as you said "go back and clean up" is always a risk. I think cybersecurity team and SME should be the part of the strategy and project planning as well. Most of the time they are called to tell "We have decided and now you see!". - Hitesh 74 months ago
Many thanks - Dr. David E. 63 months ago
1

I believe the biggest risk is privacy. Nowadays mind prisons created by some governments like China are enormous. For example they have a points system for their citizens that is based on their good and bad deeds kind of and affects their social status exponentially. There is no way to access that system, so that drives everybody to be very careful about what they do.

I don't mind credit Karma after I learned about that system.

So, back to the point. One's privacy is going to be a huge concern as people will have to buy fancy brands (e.g. Apple products) to guarantee their privacy, while normal people who buy Android devices are going to be exposed to vulnerability. Corporations need to dummy the level of explanation for their users and spread awareness on how to eliminate vulnerabilities to everybody, regardless of the attack's/vulnerabilities' sophistication calculations, cause it happens, everybody can learn anything on the web.

Amr M
74 months ago
I would add that much of what is smart and mitigative of risk frequently runs counter to the wants and pursuits of humans. This is a risk factor that amplifies the process and technology risks greatly and diminishes the effectiveness of security with equal effectiveness. When people, especially the more socially outgoing, want to share as much as these do, they are their own worst enemy. - Ross A. 74 months ago
We have seen the enemy - and he is us: POGO - Dr. David E. 63 months ago
1

Rule number one: Take Moore's Law of obsolescence into account from the start of any large digital transformation. All the gear and software you buy today will be "old" in a very short time, as far as the accountants are concerned. I think the approach is to scrutinize each purchase with Moore's Law in mind. Invest in the most flexible platforms in the market.

IT folks have to keep an eye on the horizon to see the best upgrades for operations and cyber security are identified and demonstrated before purchase. How many of us bought Kaspersky for security. In hindsight it looks silly we put our information in the hands of a Russian company. But I'm so old I remember the cold war, so I had a bit of a head start.

Careful purchases and constant examination of operations day-to-day are the answer to such a transformation.
Brian A. Cashman

Brian Cashman
74 months ago
You made some very good points Brain. Agreed. Thank you. - Hitesh 74 months ago
The notion of "planned obsolesence" was already old by the time Rich made his oberservation (not a law). This program is still employed based on a 3-5 yr. refresh plan. The problem is that Moore's posit was based on electric circuit densities/processing speeds instead of functional/economic utility. Careful purchasing is always wise, but the transformation is method not machine-based. - Ross A. 74 months ago
IRS depreciation tables - Dr. David E. 63 months ago
0

The issue with Cybersecurity is there is not be all, end all solution. What works today, is hacked tomorrow. As mentioned before, no longer can something be obsolete by a manufacturer without making that known upfront. A secure solution needs to be cared for and fed constant updates, or it starts having cracks that make it non-secure. If a product is non functional after a period of time (Say a thermostat, water sprinkler/refrigerator connected to the net, that needs to be disclosed up front. My bet is that manufacturers will have to support the product a lot longer, once lawmakers understand what to do. Cyber security is a journey, not an endpoint.

James Barry
74 months ago
YES - Dr. David E. 63 months ago
0

It is equally important to think about the risks of not going this route. That brings risks due to use of old technology (potentially not patched), but worst:

  • Rogue IT enablement of the old IT systems - quick and dirty, error ridden, full of security holes in a list so long I'm not even going to start
  • Social Engineering: for instance if these services are now going to be made available through human intervention. Entrance into systems via humans is one of the larger cybersecurity risks.


The above list are just examples, and is not intended to be exhaustive at all.

In conclusion: Doing nothing may potentially be more dangerous. Take that into consideration when you make a risk analysis.

Bart Groenewoud
63 months ago
There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. = D. Rumsfeld - Dr. David E. 63 months ago
With rogue IT there are no known knowns. Only unknown unknowns. That's what makes it so dangerous. - Bart 63 months ago
Good insights - SCARY - Dr. David E. 63 months ago
I did a project for a financial instute some years back where the business departments had organized some rogue IT to circumvent what they considered limitations in the exesting software. Result: security holes, unkown specifications and worst of all: ultimately the whole company was dependent on this rogue IT... but did not know how to fix it, deal with it and ultimately: how to replace it. - Bart 63 months ago
Now that's scary - Bart 63 months ago
Agreed; interesting story - Dr. David E. 63 months ago

Have some input?