Main menu

Pages

Coexistence of DX and cyber security


Coexistence of DX and cyber security

This report is a translation of "Cyber ​​and fraud incidents: looking beyond the obvious challenges of embedding security in agile development." published by KPMG International in 2020. In the event of any discrepancy between the translation and the original English text, the original English text shall prevail.

Cybersecurity professionals have recently been put to the test in unexpected ways. Thousands of consumer web applications, cloud facilities, and internal collaboration tools to facilitate remote work have sprung up in a short period of time, pushing productivity and customer support efforts while security takes a back seat. It's been done.
The lack of security built into the design of new cloud environments is not the only problem. In the unlikely event that a vulnerability is exploited, the problem is that the security team will have to respond to the incident in an unfamiliar work environment with limited access to resources and necessary tools.
“Transparency” is one of the most powerful stances an organization can take on incidents. During the pandemic, sharing, collaboration and trust within organizations are the silver lining. A culture of trust allows everyone to learn from each other's experiences and improve. It is important to nurture such an environment even after the pandemic is over.

analyze the cause

After a major incident occurs, it is important to analyze the cause. Rather than just quickly drawing lessons from the events at hand, we need a broader and more thoughtful analysis, including:
・Why couldn't the attack be prevented as an organization or community?
・Did you assume the “worst case scenario” when testing?
• What was the target of the attack?
Have you analyzed the stolen data in detail?
• What parts were exploited?
Was the problem a basic configuration error, or was it a software vulnerability? Were there deeper problems?
• Why was the attack successful and why did it take so long to identify and respond to the attack?
Were there any ways to survive the attacks?

A cross-functional incident response team should consider:
Why couldn't the attack be stopped?
・Why did you misunderstand the overall picture of the incident and what did you do wrong?
・Did the person in charge overlook the signs of the problem, or did they not know how to deal with it (although they sensed the signs)?

In practice, a variety of teams such as IT, digital, data analytics, robotics automation, technology, fraud management, revenue assurance, customer service, risk management, finance, audit, and security can contribute to addressing an attack. increase. Security gets a lot of attention, but you may be missing the bigger picture.

Hybrid world where “traditional business” and “digital business” coexist

Organizations around the world face increased competition, regulatory scrutiny, and pressure to improve profitability and cost efficiency. In response, a rational operating model is required to quickly transition to a digital business model. However, hybrid operating models that mix traditional and digital business models run the risk of creating new silos within organizations. It can be said that a situation in which there is a mixture of traditional and digital processes rooted in each, and a lack of coordination, consistency, and communication makes it an easy target for cyberattacks.
Surprisingly, 2019 saw a number of cyber incidents targeting new digital channels, with similar methods used to attack traditional channels. Moreover, the faster and wider the attack, the greater the scale of the damage.

Next-level security management

Embedding cybersecurity into this new digital realm requires reinventing traditional management practices for new technologies, environments and partners.
However, this approach doesn't always work. Sometimes traditional management methods cannot be integrated with new technologies that work in different environments. Enterprises will need to build next-tier security controls that are agile, scalable, and anticipate future updates and technology adoption.

Comments