Cybersecurity: More a People Than a Tech Challenge?

When it comes to cybersecurity strategies, the human angle needs to be brought to the fore, according to BT and KPMG.

Ray Le Maistre, Editor-in-chief

July 11, 2017

5 Min Read

With so many high-profile attacks impacting companies, governments and organizations around the world, awareness of cybersecurity threats has never been higher -- but that doesn't mean companies have a suitable security strategy, or even feel they need one at all, according to experts at BT Group plc (NYSE: BT; London: BTA) and consultancy KPMG LLP. (See Petya Ransomware Takes the World by Storm and Unknown Document 734444.)

The two companies have just issued a report, entitled "The cyber security journey -- from denial to opportunity," which aims to highlight some of the key challenges facing all types of enterprises and institutions in the modern era and make suggestions about how to overcome those challenges. (See Unknown Document 734444.)

The report identifies five steps on the cybersecurity maturity journey -- Denial, Worry, False Confidence, Hard Lessons and becoming a True Leader -- and digs into each of those with examples and recommendations. That might sound a bit corny, but the stages are well explained (and will likely resonate with many) and the recommendations are clear and simple without being patronizing. They also highlight that the major cybersecurity challenges are related to people, not technology.

A couple of key messages stand out from the report.

First, that any company, of any size and in any sector, is under threat –- "it won't happen to us" is the cry of the deluded. "A lot of CEOs don't realize that cybersecurity threats are commoditized … Even if your company is not being specifically targeted by cyber criminals, you still need to defend against the commoditized threats" such as the recent extensive ransomware attacks, noted David Ferbrache, technical director at KPMG's cybersecurity practice, during a recent media briefing at BT's cybersecurity facility in Sevenoaks, UK.

Second, for those organizations that identify the need to protect themselves against cybersecurity threats (some, amazingly, still believe they are immune), simply investing in security technology such as firewalls is not enough. "Security technology is not a silver bullet," said the CEO of BT Security, Mark Hughes. (No, not THAT Mark Hughes…)

"Don't start [a cybersecurity strategy] with the technology!" he advised.

In fact, throwing money at the latest security tech can lead to unwelcome attention, including, the two companies noted in their official announcement of the report, from "over-zealous IT salespeople." (Editor's note: That's the first time I have laughed at a press release in 20 years…)

What is needed before any action is taken, according to Hughes and Ferbrache, is a rational assessment of existing security procedures and a decision about what it is that matters most to a company -- what needs to be protected above all else. "It's possible that companies can spend a lot of money and not actually secure what is valuable to them," noted the KPMG man.

All of which requires agreement from all levels within a company or organization, particularly from the top management, that cybersecurity is actually important and strategic. The research conducted for the report suggests this is not currently the case: BT's Hughes noted that 68% of CEOs surveyed don't regard security to be part of their digital transformation processes, "which is surprising," he noted.

BT Security CEO Mark Hughes: 'Don't start with the technology!'

BT Security CEO Mark Hughes: "Don't start with the technology!"

A more favorable scenario would involve a senior executive -- a chief information security officer (CISO) if the company is large and well resourced enough -- taking responsibility for a security strategy and, importantly, engaging with the rest of the business or organization and not working in isolation. "Too often I hear chief security officers refer to 'the business' as if they are not part of it… but they are a key part of the business and all the moving parts need to work together," stated Hughes.

And to be truly effective, that security officer needs to not only engage internally and clearly communicate a security strategy (including what to do when security defenses are compromised), but also engage and learn from the broader community, from others that are also implementing a strategy and may have been subject to attacks and breaches. "There are lots of hard lessons to be learned," stated Hughes.

That, of course, applies to Hughes as it does any other head of security: He says he talks with his peers from other major telcos, such as AT&T, Deutsche Telekom, Orange and Verizon, about best practices, current threats and the future. Current conversations include the impact of 5G on security procedures, noted the BT man.

Both BT and KPMG have skin in this game, of course -- KPMG offers security strategy consultancy and BT provides a range of security services built upon its own network security capabilities -- but the two companies have managed to produce a report that is useful without coming across as a sales pitch. The report can be downloaded here. (See Unknown Document 734444 and Unknown Document 734444.)

— Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, International Group Editor, Light Reading, for Security Now

Read more about:

Security Now

About the Author(s)

Ray Le Maistre

Editor-in-chief

Don't be fooled by the weird cod-French surname: Ray's as British as corned beef and bad teeth, despite affecting a sheen of Continental sophistication by his constant references to fancy-dan "proper" coffee. He's even trained as a barista, for god's sake.

Ray joined Light Reading in 2002 shortly after being shown the door and a very long corridor at Total Telecom. He has been in technology journalism since 1988, having worked at Computer Weekly, Communications WeekInternational and Communications International.

A slave to fashion, Ray is never seen in the same outfit twice. When not trawling the malls of Epsom, U.K., for the latest in skinny jeans and what-have-you, Ray is often to be heard banging on about SPIT (Service Provider Information Technology), which is also known as TATRTCA (The Acronym That Refuses To Catch On).

As a soccer nut, Ray likes nothing better than cheap jibes about Manchester United. If you bump into him at a trade show, be sure to make some remark about prawn-sandwich-eating supporters or similar – he'll love it!

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights