Tackle Tomorrow’s Digital Business Security Risks

As cybersecurity risks increase in digital business, organizations continue to struggle in attracting, retaining and, most critically, developing security talent.

Security and risk management leaders responsible for information security must evolve their practices and organizational cultures to keep pace with the digital business era.

“Risk management, governance, business continuity and people — the most important asset — are critical elements of a successful risk and security program,” says Earl Perkins, Vice President, Analyst at Gartner says. “When allocating resources and selecting products and services this year, security and risk management leaders should consider three important strategic planning assumptions.”

Read more: Digital Business Requires Integrated Risk Management

By 2022, 40% of business continuity management (BCM) programs will be integrated into the digital business risk management structure rather than exist as separate practices.

The momentum of digital transformation projects within digital business will outpace the ability of organizations to accommodate changes related to security. Concurrently, the growing need to provide 24/7 technology services to support digital business and customer-facing services is changing the way that organizations interact internally and externally. These changes, as well as the constant threat of cyberattacks, will lead organizations to formalize the relationship between BCM and digital information security functions.

“Stakeholders should be urged to accept BCM as part of the organizational structure,” says Perkins. “Managers within the digital business who oversee the delivery of critical activities will need to gain the necessary skills to engage with resilience planning as a business-as-usual function.”

Rethink the Security & Risk Strategy

Why leaders must embrace modern cybersecurity practices

Download Free eBook

Through 2022, 30% of large enterprises will build a security skills management program including experimental recruiting and talent development practices.

Cybersecurity risks are increasing despite the efforts of trained security professionals. Organizations continue to struggle with attracting, retaining and developing security talent.

Organizations must change their talent development and recruiting practices to be able to address missing skills. Start by building and developing a list of new competencies and skills required to support digital business initiatives. Then adapt short-term skills management practices by outsourcing security functions to managed security service providers (MSSPs) and/or delegating responsibilities to other internal staff.

Read more: Beat the Cybersecurity Skills Shortage

By 2022, 75% of organizations that outsource email and collaboration tools won’t meet their critical recovery objectives during a supplier outage.

Email and collaboration applications are considered mission-critical resources for most organizations. Conducting business without them can impede production, result in lost transactions and hamper crisis management activities. When an organization outsources these applications, many suppliers do not provide recovery with short timeframes.

“It’s imperative for the organization to maintain internal control and governance over all applications used in the delivery of products and services,” says Perkins. “It is also crucial to understand your vendor’s recovery commitments and communication protocols for outages to ensure they meet recovery requirements.”

Gartner clients can read more about the top predictions facing security and risk management in Predicts 2019: Security and Risk Management Programs by Earl Perkins. More predictions for all aspects of the IT industry can be found in the Gartner Trend Insight Report, “Predicts 2019: Leadership Means Expanding Options, Not Limiting Them,” a collection of research aimed at helping CIOs and IT leaders focus on how the landscape is shifting for individuals, businesses and IT organizations.

Get Smarter

Gartner Security & Risk Management Summits

Attend a global Gartner Security & Risk Management Summits.

Explore Gartner Events

2019 Planning Guide Overview: Architecting Your Digital Ecosystem

Technical professionals are confronting increasingly complex technology ecosystems. They must overcome this complexity to create solutions...

Read Free Research
Array ( [url] => http://aem-solr-prod.emt.aws.gartner.com/solr/emt/search [content_type] => application/json;charset=utf-8 [http_code] => 200 [header_size] => 87 [request_size] => 340 [filetime] => -1 [ssl_verify_result] => 0 [redirect_count] => 0 [total_time] => 0.067219 [namelookup_time] => 0.029671 [connect_time] => 0.044567 [pretransfer_time] => 0.044613 [size_upload] => 133 [size_download] => 6576 [speed_download] => 97829 [speed_upload] => 1978 [download_content_length] => 6576 [upload_content_length] => 133 [starttransfer_time] => 0.067195 [redirect_time] => 0 [redirect_url] => [primary_ip] => 10.108.24.74 [certinfo] => Array ( ) [primary_port] => 80 [local_ip] => 10.121.2.30 [local_port] => 49858 [request_header] => POST /solr/emt/search HTTP/1.1 Host: aem-solr-prod.emt.aws.gartner.com Accept: */* Content-Type: application/json X-dynaTrace: FW3;-987853115;4;639661907;27693721;0;412549582;181 Content-Length: 133 )

As Audiences Scatter, Digital Marketing Hubs Converge

Know more how to define the functional requirements of a digital marketing hub and understand build, buy or partner, find the right path.

Start Watching