• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • The Complete Google Go Programming Language for Beginners Course for $13

    The Complete Google Go Programming Language for Beginners Course for $13
  • The 2022 Ultimate Project Managers Toolkit Bundle for $39

    The 2022 Ultimate Project Managers Toolkit Bundle for $39
  • Voicetapp Speech to Text Transcription: Lifetime Subscription for $59

    Voicetapp Speech to Text Transcription: Lifetime Subscription for $59
  • PDF Reader Pro Smart PDF Editor & Converter Tool: Premium License (For Windows) for $39

    PDF Reader Pro Smart PDF Editor & Converter Tool: Premium License (For Windows) for $39
  • Microsoft Office Pro for Windows 2021 + HP EliteBook + Certificate Course Bundle for $666

    Microsoft Office Pro for Windows 2021 + HP EliteBook + Certificate Course Bundle for $666
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How CIOs and CISOs can collaborate for success in the new cloud era

Jun 28, 2022 by iHash Leave a Comment


The rapid adoption of multicloud IT environments and the transition to hybrid workforces demand a new dynamic in the C-suite: a closer alliance between CIOs and CISOs. 

By joining forces, CIOs and CISOs can strike a healthy balance between pushing the pace of tech innovation and mitigating risk. Moving to the cloud — especially to more complex multicloud environments — can occur more quickly and efficiently. DevSecOps teams can reduce the risks of onboarding new software applications. With greater collaboration, CISOs and CIOs can jointly assess the operational challenges and security risks when bringing on new technologies.

However, achieving all that requires the two executives to take on an agenda of shared goals. For example, CIOs must aspire to embed security into all new technology investments, while CISOs can’t let risk aversion slow the pace of digital transformation. For many organizations, it’s a tricky dance, but one that can only be accomplished with a common understanding that innovation and security are inextricably intertwined. 

“You’ve got to navigate lots of landmines,” says Tressa Springmann, CIO of LifeBridge Health, a nonprofit healthcare organization. Adds Rick Miller, LifeBridge’s CISO: “Usually, you meet in the middle to achieve the right balance between security and operations.”

See how a global telecom provider realized a 283% ROI on their Elastic investment.

Making smart tradeoffs

At LifeBridge, which employs more than 12,000 people and operates six hospitals in and around Baltimore, Maryland, investments in new information technology — electronic health records, virtual telemedicine tools, and genomic diagnostic solutions — can also come with added security risks. Cybersecurity in the healthcare sector is already a critical matter, as cyberattacks have crippled hospital networks and impacted patient care. More than 40 million patients’ health records were exposed in data breaches last year, according to federal reports. 

How are top technology leaders addressing rising threats?

Despite the risks, “budgets in healthcare are not necessarily designed to invest in the very expensive tools needed to protect data,” Miller says. 

This can force tough tradeoffs. When Miller proposed segmenting the hospital’s IT network to reduce the chance of a breach, it became clear that the change would be costly and demand more IT support. Springmann challenged Miller to provide more data about the project to justify the expense. “When CISOs and CIOs work together to ensure the economics work for an organization, instead of clashing, you can realize significant value,” Miller says.

In another instance, Springmann and Miller collaborated in assessing the IT systems of a recent acquisition. Springmann’s main responsibility was to survey the acquired company’s hardware and software, while Miller’s role was to conduct a security-risk assessment. But instead of defaulting to an adversarial process common in other organizations, Miller says, the two worked together to ensure that the purchase went forward and the risks were mitigated. 

“This allowed a very principled view of the acquisition,” Springmann says. Adds Miller: “The security function is built into everything we do here at LifeBridge Health.”

Discovering joint payoffs of DevSecOps

Implementing DevSecOps — an organizational practice that shares responsibility for security among development, security, and IT operations teams when creating new software applications — is a logical place for CIOs and CISOs to beef up working relationships. For both, ensuring that software is resistant to cyberattacks is just as important as getting them up and running quickly. 

DevSecOps as a practice is growing, according to survey data from 451 Research, part of S&P Global Market Intelligence, which found that 48% of development teams used application security tools in 2020, compared to just 29% in 2015.

“Imagine the potential benefits if these teams and processes were more collaborative,” says Gagan Singh, product marketing VP at Elastic. “Observability data could add more context for security teams as they work to quickly detect and respond to threats. At the same time, developers who are cross-literate in security technology could reduce friction in development by securing from the start.”

Moving to the cloud 

Cloud migration is another area where organizations benefit from closer CIO-CISO collaboration. The cloud offers substantial business value in how organizations use and share information — and significantly changes the nature of cyber risks. This can be especially true when it comes to multicloud environments, which can lower some threat levels while adding to the burden of monitoring all that occurs in the cloud and keeping track of multiple controls and permissions.

Even as organizations benefit from greater collaboration between the CIO and CISO, the two roles continue to have separate priorities and responsibilities. That further raises the importance of regular communication between the two positions. Springmann and Miller, for instance, meet regularly every two weeks and reach out almost daily by text or phone.

“A lot of [our partnership] is about communication and personal relationships, and if you don’t tend to those two things, things can go awry,” says Mark Settle, a former CIO and author of Truth from the Valley. “People who are good at communicating and anticipating other people’s issues and needs can avoid most of the friction that can occur between two groups.”

Greater C-suite collaboration between the chief information officer and the chief information security officer is essential for enterprises that want to speed technological innovation while reducing security risks. Such blurring of roles can be difficult, but with shared goals, a commitment to communication, and organizational support, CIOs and CISOs can help ensure their companies safely accomplish their digital transformation. 

Read this next: The multicloud advantage: scalability, reliability, flexibility



Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: News Tagged With: CIOs, CISOs, cloud, collaborate, Era, Success

Special Offers

  • The Complete Google Go Programming Language for Beginners Course for $13

    The Complete Google Go Programming Language for Beginners Course for $13
  • The 2022 Ultimate Project Managers Toolkit Bundle for $39

    The 2022 Ultimate Project Managers Toolkit Bundle for $39
  • Voicetapp Speech to Text Transcription: Lifetime Subscription for $59

    Voicetapp Speech to Text Transcription: Lifetime Subscription for $59
  • PDF Reader Pro Smart PDF Editor & Converter Tool: Premium License (For Windows) for $39

    PDF Reader Pro Smart PDF Editor & Converter Tool: Premium License (For Windows) for $39
  • Microsoft Office Pro for Windows 2021 + HP EliteBook + Certificate Course Bundle for $666

    Microsoft Office Pro for Windows 2021 + HP EliteBook + Certificate Course Bundle for $666

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

ÆPIC and SQUIP Vulnerabilities Found in Intel and AMD Processors

Aug 16, 2022 By iHash

Heard on the Street – 8/15/2022

Aug 15, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

The Biggest Challenges When Adopting Data and AI Technologies

With the right technical infrastructure and data-literate work culture, the challenges with the adoption of data science and machine learning technologies can be easily addressed. Successful companies today need to be data driven. A survey by NewVantage Partners found that 92% of organizations are increasing their investments in data and artificial intelligence (AI) capabilities. On […]

Dotan Horovits

Improving DevOps Performance with DORA Metrics

Everyone in the software industry is in a race to become more agile. We all want to improve the performance of our software development lifecycle (SLDC). But how do you actually do that? If you want to improve your performance, first determine what KPI you’d like to improve. DORA metrics offer a good set of […]

Credential Theft Is (Still) A Top Attack Method

Credential theft is clearly still a problem. Even after years of warnings, changing password requirements, and multiple forms of authentication, password stealing remains a top attack method used by cyber criminals. The latest report from the Ponemon Institute shares that 54% of security incidents were caused by credential theft, followed by ransomware and DDoS attacks. […]

eBook: Unlock Complex and Streaming Data with Declarative Data Pipelines 

Gartner predicts that global cloud revenue will be up by $66 billion this year, and by 2025, more than 95% of new digital workloads will be deployed on cloud-native platforms.  As companies ingest more and more data, it becomes more challenging to make it useful due to rapid increases in data volume, velocity, and variety. […]

Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users

A pair of reports from cybersecurity firms SEKOIA and Trend Micro sheds light on a new campaign undertaken by a Chinese threat actor named Lucky Mouse that involves leveraging a trojanized version of a cross-platform messaging app to backdoor systems. Infection chains leverage a chat application called MiMi, with its installer files compromised to download […]

Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders

A security feature bypass vulnerability has been uncovered in three signed third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypass of the UEFI Secure Boot feature. “These vulnerabilities can be exploited by mounting the EFI System Partition and replacing the existing bootloader with the vulnerable one, or modifying a UEFI variable to load […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT