eHDF expert on building cyber-resilience during Digital Transformation
No organization functions in a zero-risk environment but digital transformation is rapidly exposing weaknesses in the cyber security fabric of an organization, prompting risk assessment and continuity planning, explains Yasser Zeineldin, CEO, eHosting DataFort

eHDF expert on building cyber-resilience during Digital Transformation

No organisation functions in a zero-risk environment but Digital Transformation is rapidly exposing weaknesses in the cybersecurity fabric of an organisation, prompting risk assessment and continuity planning, explains Yasser Zeineldin, CEO, eHosting DataFort.

For regional businesses, it appears their exposure to risk is continuously moving upwards. In the past, risks were limited to acts of nature, macroeconomic volatility and, depending on the geography of the country, possible hostilities with adjacent countries.

Today, there are additional variables that need to be brought into the assessment of risk for businesses. The exposure of an organisation to cyberthreats and the added vulnerability of an organisation due to its embarking on a Digital Transformation journey are recent variables whose risk impact needs to be added into the overall equation of resilience.   

Booz Allen Hamilton estimates that the annual global losses from exposure to cybersecurity threats is US$600 billion, bringing the average loss per cybersecurity breach to an estimated US$3.86 million. Moreover, the intensity and frequency of cyberattacks are being amplified by the adoption of Digital Transformation technologies.

Digital Transformation technologies are rapidly removing silos and barriers that used to exist due to legacy technologies and analogue industrial control systems. This is making organisations more interconnected and can contribute to a domino-like cascading effect in the case of significant breaches into regional enterprises.

The rapid adoption of digital technologies is also throwing legislation into a catch-up game and bringing information technology departments, CIOs and CISOs into the forefront in terms of interpretations and implementations of new guidelines and compliances.

All put together, the working environments of both business and information technology are becoming more complex to manage, raising the possibility of costly and unpredictable errors.  

Booz Allen states that growing complexities stemming from rapid digitalisation and changes in legislation are having a dizzying effect on businesses. Organisation heads are still grappling with the speed of Digital Transformation and the impact of growing interconnectivity on their business landscape. They have had even less time to factor in the additional challenge of their vastly exposed cybersecurity landscape, amongst all these numerous other challenges.

Lack of adequate risk management in the face of advanced cybersecurity threat attacks, growth of interconnected enterprises and rapid adoption of digital technologies are eroding 10.2% of annual profits on an average of global organisations, through unplanned errors.

So, what is the way forward now?

Organisations adopting digital technologies such as cloud, analytics, Artificial Intelligence, mobility and Internet of Things, must adopt a two-pronged approach towards building their future resilience.

No organisation can operate in a Utopian climate of zero risk and hence as the first step an organisation should perform an objective assessment like a SWOT analysis (Strengths-Weaknesses-Opportunity-Threats) or equivalent to identify the organisation’s strength and weaknesses including a rigorous cybersecurity related Threat and Vulnerability assessment. The second step is to build a recovery and continuity process through any disruption to keep the organisation functioning with minimum loss and performance.

During the first stage of planning, as a process of risk management, it is important to identify all the risks that can cause disruption to an organisation’s capability to function. This includes weaknesses in an organisation’s cybersecurity framework and the probability of their exploitation. Following this is the business impact analysis, to quantify the business loss from the impact of each of these possible cybersecurity disruptions.

This will lead to a matrix of incidents between most probable and most disruptive to an organisation’s functioning and performance. Some of the numeric metrics used at this stage are the maximum tolerable period of disruption (MTPD), the recovery time objective (RTO) and recovery point objective (RPO).

The second stage involves detailed planning on how critical processes within the organisation can continue to function and meet the expectations of MTPD, RTO and RPO objectives. However, this planning may not be of much use unless it is practiced and tested and improved, across the organisation.

Feedback and open communication across the organisation, on improvement of such continuity process planning, are an important part of building resilience during adoption of Digital Transformation, amongst others. 

Click below to share this article

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive