• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

CTOvision.com

Context for the CTO, CIO, CISO and Data Scientist

  • About
    • Company
    • CTO
    • Events
    • Entertainment
    • Government
    • News
    • Tech Advice
    • Tech Careers
    • The Boardroom
    • Training and Education
    • Quotes
    • Members Only
      • Sign in
  • Tech Guide
    • CTOvision Guide To Technology
    • CTOvision Guide To The Cybersecurity Technology Marketplace
    • National Security Technology
    • Cloud Computing
    • Artificial Intelligence
    • Mobile
    • Blockchain and Cryptocurrency
    • Robots
    • Internet of Things
    • Cyber War
  • Contact Us
  • Newsletters
  • OODA LLC
Home » Cyber War » Cyber Security » CTO Guide To The Business of Cybersecurity

CTO Guide To The Business of Cybersecurity

Bob Gourley June 5, 2019

Identity-SecurityThis is the CTOvision guide to the megatrend of Cybersecurity. This post provides a high level overview of key factors in cybersecurity that we recommend any technology professional should be familiar with, as well as insights that can help assess the near future of cybersecurity solutions. The report also captures insights from recent reporting done on the topic as well as information on cybersecurity vendors we track in the CTOvision solutions directory.

The Megatrend of Cybersecurity

We can make a prediction with absolute certainty: In the future, there will be times when adversaries will surprise even the most well defended organizations. History just makes that totally clear.

Said another way, cybersecurity in the future, like cybersecurity today, is a bit like a rodeo. Sometimes the rider will ride and sometimes the rider will be thrown.

We can also say this about the future of cybersecurity: When organizations are led by leaders that care they can make a huge impact in mitigating risks. Cybersecurity professionals know how to configure existing technology in ways that raise costs for adversaries and can also engineer things to make it easier to spot when an adversary has been successful. Experienced professionals know how to mitigate risks in ways that reduce risks, but what is sometimes missing is support from the most senior executive and/or peers to the security leadership. If the executive team does not really care, the security program will be sub-optimized. That is just a fact.

Cybersecurity In Relation To Other Tech Trends

Cybersecurity is especially important because of the newfound complexity arising in our systems. All the megatrends we review here, and everything we see in doing assessments in the market, point to dramatically enhanced complexity. And all indications are that tricking future systems will become easier not harder. Said another way, every trend we track, including Cloud Computing, Artificial Intelligence, Mobility, Bigdata, Robotics and IoT, all require more focus on cybersecurity. Without enhanced cybersecurity, none of those can be optimized.

A key factor in Cybersecurity

Bottom line: No organization should think they can handle their security needs by themselves. We will all need help.

A snapshot of the Cybersecurity trend right now indicates:

  • Some of humanity’s greatest thinkers, business leaders and computer scientists have struggled to enhance cyber security. Their approaches are not working.
  • Cybersecurity will have to advance or none of the other megatrends we review will be optimized.
  • Cybersecurity is especially important because of the newfound complexity arising in our systems.
  • Behavioral analytics is seen as a promising approach to enhancing our response
  • Machine learning and advanced analytics are also seen as promising approaches.

Open Cybersecurity questions decision-makers should track include:

  • Is humanity sleepwalking into a preventable catastrophe?
  • Will it be easier to trick future systems?
  • Will any organization be able to defend itself without help?
  • What is the role of behavioral analytics?

Cybersecurity and Due Diligence:

Due Diligence in Cybersecurity is one of the most important aspects of M&A.

  • On the sell side: Firms should take every effort to ensure they are in solid shape from an information security perspective before being offered for sale or seeking growth investment. Review and pre-sale diligence can make a massive difference in how well a firm will be valued.
  • On the buy side: Buyers should pay particular attention to how well the target understands their digital risks and how well they are governing their risk mitigation efforts. External and independent verification and validation of security policies and practices should include a review of the technical architecture, as well as the degree that the target is complying with appropriate compliance regimes.

Strategically, the acquisition of cybersecurity technology firms is also an art requiring assessment of how unique the capability is and how much in demand it will be in the market. We provide due diligence consulting in the cybersecurity domain via our parent company, OODA LLC.

Other Cybersecurity Reporting at CTOvision:

    • Leader of U.S. Intelligence Community delivers warning of cyber threat
    • Recorded Future Posts Assessment on Geopolitical and Supply Chain Risks From Huawei
    • The Internet has a problem: Repeating random numbers
    • It is not my fault if your WiFi Signals Are Hitting My Laptop and Phone Antennas
    • Back to the future – Moonlight Maze
    • Senators Mark Warner and Cory Gardner announce creation of Senate Cybersecurity Caucus
    • Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
    • A common language for computer security incidents
    • Quantum Computing for Everyone
    • Gain Insights Into How Bad Guys Are Manipulating You Via YouTube
    • Protecting against Malvertising
    • Lessons Learned From a Career of Technology Due Diligence
    • Technology Due Diligence Services: There is no substitute for experience

Latest Entries in the CTOvision Directory of Cybersecurity Firms:

Eclypsium: Defending the hardware attack surface

Company, Endpoint Detection and Response, Security Companies

RiskIQ: Providing actionable data to map your digital attack surface

Cyber Threat Intelligence, Security Companies

Garrison: Ultra-secure isolation technology protecting against cyber attacks

Company, Security Companies

OPSWAT protects critical infrastructure and orgs that require advanced threat prevention

Company, Endpoint Detection and Response, Network Traffic and Analysis, News, Security Companies

Elevate Security: A data-driven and personalized approach to security changes behaviors and helps you measure and communicate efficacy of your programs

Company, Security Companies

Scythe: The most advanced attack emulation platform on the market

Company, Security Companies, Security Scanning And Testing

Wickr: The Most Trusted and Secure Messenger in the World

Company, Encryption, Security Companies

Centrify: Control, secure and audit access to cross-platform systems via zero trust architecture

IAM, Security Companies

Imperva: Protecting the Data that Drives Business

Network Traffic and Analysis, Security Companies

Koolspan: Encryption, Authentication, and Key Management in a Single Hardware-Based Solution

Cyber Security, Encryption, Mobile

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity.

  • About
  • Latest Posts
Connect Here
Bob Gourley
Co-Founder and CTO at OODA
Bob Gourley is the CTO and Co-Founder of the due diligence and cybersecurity consultancy OODA LLC , which publishes CTOvision.com and OODAloop.com. Bob's background is as an all source intelligence analyst and an enterprise CTO.
Connect Here
Latest posts by Bob Gourley (see all)
  • Miracle on Ice: Business, Technology and National Security Leadership Lessons from the 1980 Olympics USA Hockey Team - February 24, 2021
  • ElasticON Public Sector US Federal on April 13: For any organizations with a desired to optimize data - February 22, 2021
  • This One Little Configuration Change Will Make It Harder For People To Steal Your Information - February 21, 2021

Share this:

  • LinkedIn
  • Facebook
  • Twitter
  • Reddit
  • Email

Related

Filed Under: Cyber Security, Featured

Gain Decision Advantage With Innovative Enterprise Software

It is a Meme World: Bitcoin and Ethereum ‘seem high’, says Elon Musk after his ‘less dumb form of cash’ tweet drives up rates

Quantum Physics Enables the Next Cryptographic Keys

From CIO Spotlight: Eddie Garcia of Cloudera

Costly Meme: Elon Musk Loses World’s Richest Tag As One Tweet Costs Him $15 Billion

DeFi Tips: Investing In The Graph (GRT) – Everything You Need to Know

Making a Difference: Balbix Lauded by Frost & Sullivan for Automated Cybersecurity Posture Management for Enterprises

Update: Defending against cyberattacks with actionable Threat Intelligence

Helpful: Top 5 SIEM trends of 2021 and how Elastic Security solves them

Automating Key Business Functions: Big data firm Palantir partners with Akin Gump on new compliance tool

Continued Progress: Chainlink integrates with Danal Fintech to support retail Bitcoin payments

About Bob Gourley

Bob Gourley is the CTO and Co-Founder of the due diligence and cybersecurity consultancy OODA LLC , which publishes CTOvision.com and OODAloop.com. Bob's background is as an all source intelligence analyst and an enterprise CTO.

Primary Sidebar

Search

Hot News

It is a Meme World: Bitcoin and Ethereum ‘seem high’, says Elon Musk after his ‘less dumb form of cash’ tweet drives up rates

Quantum Physics Enables the Next Cryptographic Keys

From CIO Spotlight: Eddie Garcia of Cloudera

Costly Meme: Elon Musk Loses World’s Richest Tag As One Tweet Costs Him $15 Billion

DeFi Tips: Investing In The Graph (GRT) – Everything You Need to Know

Making a Difference: Balbix Lauded by Frost & Sullivan for Automated Cybersecurity Posture Management for Enterprises

Update: Defending against cyberattacks with actionable Threat Intelligence


OODAcast OODA cast

OODA

Disruptive IT finder

CTOevents

Featured Content

CTO Guide To The Business of the Internet of Things

CTO Guide To The Business of Robotics

CTO Guide To The Business of Bigdata

CTO Guide To The Business of Mobility

Learn things your competitors wish you did not know

CTO Guide To The Business of Cloud Computing

CTO Guide to the Business of Artificial Intelligence

RSS CTO Events

  • An error has occurred, which probably means the feed is down. Try again later.

Footer

Free Newsletters and Tech Reports

CTOs on Facebook
CTOs on LinkedIn

CTO Events
Tech Guide

OODA LLC Technology Due Diligence
OODAloop.com

CTOVision Pro: Exclusive Content

Reports
Crucial Point LLC

Copyright © 2021 CTOvision.com·

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.