Cyber Magazine November 2022 | Page 19

“ In judo , you learn that you don ’ t oppose the movement of the opponent , you embrace it , to ensure things keep moving in a desirable and frictionless direction . We can apply this to the deployment of our cybersecurity strategies ”

briefing at the beginning , all we ’ re exposed to for the remainder of the flight is their hospitality . We ’ re only then informed of other security updates when absolutely necessary . The same applies to the cybersecurity industry .
How does Performanta help these organisations become more resilient ? Currently , a misalignment exists between what a business wants and what security organisations are providing . Many claim that the answer is to ‘ educate the board ’. We take a different stance .
Working closely alongside the CISO or CIO , we help bring relevant data to the board so they can be directly involved in the decisions being made to keep the business safe . This approach is backed by tools and methodologies that were built to achieve this purpose and put the client at the centre of everything we do . Our solution starts at one end of the chain of command and seamlessly works its way across all levels , giving everyone access to consistent , accurate and relevant data . It allows our clients to run an effective cyber department backed entirely by the decision makers .
Furthermore , with our solution , companies can prepare well in advance for operational disruptions caused by breaches , such as downtime . This transparency allows organisations to focus on their own strategy and business successes , whilst maintaining up-to-date security data in real-time , knowing that they will be made aware of any threats when necessary .
What would be your tips for cyber security professionals looking to shift strategy in the latter half of the year ? My top tips would be :
• Adopt data-based decision making
• Look for relevant data for your own business
• Gain as much visibility of your security tools and network as possible
• Understand the customer-specific client context to provide effective cybersecurity
• Seek business outcomes and measure against those as opposed to cyber outcomes Once the above is achieved , you can provide the necessary tools and methods to key decision makers which allows them to identify the risks towards their business objectives moving forwards .
cybermagazine . com 19