Puleng Insights: Breakthrough report
"There are only two types of companies, those that have been hacked and those that will be." – Robert Mueller, former FBI Director.
A quick conversation with almost anyone in the corridors of companies today will reveal a level of concern over their privacy, phishing attacks, data breaches, malware, misuse of personal credentials, identity theft and much more.
McAfee estimated the damages associated with cyber crime now stands at over $400 billion, up from $250 billion two years ago.
Universally, there is an acknowledgement that a higher level of maturity of protection currently on offer is needed. Last year alone, Gartner reported that $114 billion was spent on cyber security solutions in the private sector. Highly specialised categories such as privileged account management (PAM) alone is seeing a 23% year-on-year growth rate. Yet the successful management of these threats remains concerningly low.
This fact is certainly not lost on the majority of CISOs, who must deal with a multitude of moving parts within a company, such as people, culture, legacy systems, access management, privileges, politics, transactions, stakeholders, etc. The list goes on. Even though the CISOs of today are more empowered than ever to keep the organisation "safe", their success is only as good as the level of awareness and buy-in from the rest of the organisation, from board level to the admin person on the ground floor.
Breakthrough attempts to provide guidelines for CISOs to break through some of the internal barriers to cyber security awareness and adoption at all levels of an organisation.
"This report outlines the importance we place on our deep interactions with our customers and our employees: smart work leads to successful projects, long-term reward, personal growth and potential industry-wide respect. But, never rest on your laurels, as tomorrow's changes can bring even bigger challenges, and potentially with an even greater opportunity," said Steve James, Executive Director of Puleng Technologies.
Use the link below to download the full report: