Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/15/2019
03:30 PM
Jordan Blake
Jordan Blake
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

Introducing the Digital Transformation Architect

Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.

For companies today, digital transformation poses a "do-or-die" proposition — in many cases, literally.

Two-thirds of organizations are actively pursuing a transformation, as annual worldwide spending on the technologies and services that drive these transformations will reach nearly $2 trillion by 2022, up from $1.25 trillion this year, according to separate research reports from TechTarget and IDC.

The stakes are high because established companies are being pressured by startups that seek to disrupt markets by exclusively promoting mobile apps — instead of physical stores/locations — to target customers. In response, large brands are inventing immersive apps and online services to deliver new features and redefine the customer experience.

They're doing so because they feel they have no choice, as staying on the sidelines could result in their eventual demise: Nearly two-thirds of C-suite, IT, and business decision-makers feel that a failure to launch new digital services will lead to reduced revenue, and 55% say it will eliminate their company's competitive differentiation, according to research from Oracle. Half say a lack of these services will cause both a loss of customers and brand perception/relevance. It's no wonder, then, that 85% believe that the launch of new digital services is critical to their business strategy.

What's more, they're in a hurry to get into the game: Nine of 10 prioritize speed to market, with half of decision-makers believing they should be able to launch a new digital service in just a few days, according to the Oracle findings. Subsequently, the entire commerce landscape has evolved to the point where three-quarters of companies either offer "inherently" digital subscription services (like Netflix or Airbnb) or digital subscription services positioned around physical products (such as connected cars, home security systems, or Internet of Things-connected services).

Although consumers benefit from the intensified competition, the bet-the-company nature of these transformations demands alignment and leadership across executive, IT, security, and other functions. To address this need, a job role called "digital transformation architect" is emerging as a business reality — a senior professional who performs as a hub interface for CISOs, CIOs, CEOs, the C-suite, marketers, and developers. This architect objectively weighs these experts' input in pursuing the transformation mission while making sure that overarching strategies and execution are not tripped up by unexpected security and risk issues.

For certain, acting as the prime ambassador for digital strategic goals while seeking to minimize cyber threat issues requires a skillful balancing act. Here are two core areas on which the architects must focus to lead their organizations to a digital transformation that is not only successful but secure.

1. Enforce Access and Identity
In the online world, trust is too often broken, such as when cyber thieves swipe user credentials and hijack accounts for their own gain. By deploying effective identity and access management (IAM) programs, transformation architects put a stop to the exploitation of their customer-facing digital presence and offerings. As defined by Gartner, IAM is the security discipline that enables the "right individuals to access the right resources at the right times for the right reasons." It ensures appropriate access to resources across increasingly heterogeneous technology environments while meeting increasingly rigorous compliance standards, according to Gartner.

Digital transformation architects play a prime role in helping organizations tailor identity and access safeguards according to risk tolerance and requirements. Depending on organizations' industry, customer base, back-end security layers, and regulatory responsibilities for spotting fraud or intrusions, architects confer with security and IT team leaders to make sure new digital interfaces and investments do not stretch risk beyond what is necessary to measurably capitalize on transformation opportunities.

2. Keep the Consumer/User Engaged
Yes, organizations must invest in IAM tools so that only authorized users are accessing their products and services. It just takes one significant breach, after all, to inflict devastating brand reputational damage and the resulting lost customers and revenue.

However, if businesses set up too many authorization barriers, they risk overwhelming their users and the ensuing friction can lead to customer churn. Thus, digital transformation security architects are tasked to oversee the development of authentication requirements that are as unobtrusive as possible to eliminate the friction. They have to go beyond traditional (and often vulnerable) approaches such as enforcing password complexity, relying on tokens, captchas, and PIN codes.

Digital transformation amounts to a very big bet. It takes large investments to reinvent a company through new apps and online services — a transition that expands the attack surface and, therefore, invites greater risks. Yet, introducing too many protective measures to "tighten up" the environment will turn away the very customers who drive success. That's why the architects must work with both the security side and business units to engage users while safeguarding their experiences. With this, the path to a fully realized transformation appears much clearer and easy to navigate — for the architect, the CISO, the CEO, and everyone else with a stake in the game.

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

As VP of Products at BehavioSec, Jordan Blake is responsible for the product strategy and vision of the company's cyber safety solutions. His more than 20-year career in product management include both consumer and enterprise roles with security industry leaders such as ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9351
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. If an unauthenticated attacker makes a POST request to /tools/developerConsoleOperations.jsp or /isomorphic/IDACall with malformed XML data in the _transaction parameter, the server replies with a verbose error showing where the application resides (the a...
CVE-2020-9352
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter.
CVE-2020-9353
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) loadFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL is affected by unauthenticated Local File Inclusion via directory-traversal sequences in the elem XML ...
CVE-2020-9354
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. pat...
CVE-2020-9355
PUBLISHED: 2020-02-23
danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled.