We need to talk.
Digital transformation has forced an entire generation of non-IT business leaders to become conversational, if not fluent, in the language of Information Technology. The relentless pace of digital transformation over the last 20 years—the advent of e-commerce, the sudden ubiquity of mobile apps and the routine integration of artificial intelligence into business processes—has permanently torn down the walls between “the business line” and IT departments. Product development, manufacturing processes, sales and service delivery, and customer retention, every last element of business is now deeply intertwined with, and reliant on, IT and the interpretation of data. Close collaboration between non-IT leaders and their IT peers has become commonplace as they work to drive the business toward achieving its goals.
But collaboration between non-IT business leaders and their organizations’ cybersecurity teams (long derided in some circles as “the Department of Saying ‘No’”) remains a pain-point for many organizations. The EY Global Information Security Survey 2020 reported that 59% of surveyed organizations stated, “the relationship between cybersecurity and the lines of business is at best neutral, to mistrustful or nonexistent.” Furthermore, “cybersecurity is involved right from the planning stage of a new business initiative” in only 36% of surveyed organizations.
These survey results are troubling and are not dissimilar to the findings of many other surveys and industry reports that examined this dynamic.
Nonetheless, non-IT executives have become keenly aware that the confidentiality of sensitive information, the integrity of data and the systems where that data resides and the uninterrupted availability of both internal and customer-facing applications are as important to them as their balance sheets and profit-and-loss statements. But if the security team isn’t getting involved at the start of a business initiative, or if the department has a “neutral” (or worse) relationship with the security team, it’s unlikely that the organization as a whole will achieve its strategic objectives.
Security data, when presented to stakeholders in an actionable business context, is key to closing the communication/relationship gap between program stakeholders and the CISO’s team.
But what kind of data, exactly?
Data, data everywhere
There is no shortage of data to be found in the realm of cybersecurity. Each time an employee logs in to the network, connects to an external website or attempts to access a database or shared file, or even when a suspicious inbound e-mail gets quarantined, those actions create data that tells part of a bigger security story. Even the smallest of organizations is swimming in security data, simply by being open for business from 9 to 5.
But not all data is created equally, at least not as far as security-program stakeholders and influencers are concerned.
Some security data, such as raw event logs collected from security tools like e-mail filters, firewalls, antivirus systems and web proxy devices, is rich in tactical, operational value. A 24/7 team working in a company’s security operations center (SOC) may oversee the analysis of tens of millions of security events every year, with the assistance of complex analytical tools such as security information and event management (SIEM) systems. This type of data helps security analysts hunt for hackers, identify system vulnerabilities and calibrate cyber defenses accordingly. But this data is of little immediate strategic value to stakeholders. It’s when the CISO and his or her team start analyzing individual data points that they begin to extract information that’s actionable and relevant to program stakeholders. Here’s a simple but illustrative example: Explosive growth in the number of security alerts after a recent acquisition creates more issues than the CISO and his or her team has time to manage every day since a recent acquisition, merger or major project was initiated, the CISO seeks funding for additional headcount or asks the Board for additional capital investments to scale their (SOC)/SIEM operations.
That’s the kind of synthesized, contextualized data that security-program stakeholders—especially those overseeing the budget—should ask for and expect, instead of a big black binder bulging with raw metrics.