Digital Transformation Must Start with Security

Ed Moyle, Director-Thought Leadership & Research, ISACA
Ed Moyle, Director-Thought Leadership & Research, ISACA

Ed Moyle, Director-Thought Leadership & Research, ISACA

If you’re a technology leader, chances are you’ve been hearing a steady drumbeat in the industry about the importance of “digital transformation”. You’ve probably seen it in trade media, from analyst firms, at conferences and events, and in the marketing materials from suppliers and partners. It’s officially “a thing”.

I’ll confess that I was initially skeptical when I first heard about digital transformation as a new trend. It seemed to me like a given: show me a company that hasn’t transformed because of technology and I’ll show you a company that’s either out of business or on its way to becoming so. For example, can you imagine a company that doesn’t use email or computers? It’s possible that one or two niche companies like this still exist, but for the most part, the workplaces of today would be literally unrecognizable (because of technology) from the workplaces of just a few decades ago. When viewed that way, discussion about the importance of digital transformation seemed akin to two employees of an online bookseller advocating the virtues of the Gutenberg printing press: not only is it obvious given the circumstances, but the conversation itself seems like a solid waste of time.

As I started to learn more about the “digital transformation” trend though, I started to understand that it’s not about how organizations transform (i.e. when, if, or the specific mechanics of doing so) but instead it refers to a shift in mindset in which organizations embrace a willingness to adapt–where they employ technology rapidly, flexibly, and make changes to incorporate it on a continuous basis. Under this model, technology is not static or incorporated piecemeal; it’s instead an evolving, changing, adaptable fabric that’s continually evolving. From that angle, the hype makes a lot more sense–it also changes how we manage it.

Why security matters for transformation

There are a few implications of this shift that aren’t immediately obvious, but are absolutely critical to success. First among them is security. Not only must security be viewed differently, it also must be practiced differently: under a model of continuous adaptation, security itself needs to be flexible and continuous. This bears saying because many of the legacy models we have for governing and securing technology are neither.

  The mindset of security teams must change to incorporate flexibility and adaptability  

For example, consider a risk management process that starts with annual review of an environment. How useful is that when new technologies are introduced on a continuous basis? If this year’s environment is unrecognizable from last year’s (because of the pace at which the underlying environment adapts), an annual review cycle just won’t cut it. New models must instead be introduced to ensure that the same goals are met (i.e. systematic and workman-like analysis and mitigation of risk) in a way compatible with the new mindset.

While that might seem obvious to some, it bears saying explicitly for two reasons: first, because it will take a bit of legwork to get existing security teams (and individual practitioners) to embrace that, and second because the specific mechanisms of security will require modification to support the new paradigm.

“Adaptable” security?

Specifically, the mindset of security teams must change to incorporate flexibility and adaptability. While this is certainly doable, it can be a larger “ask” from a security team than it might seem on the surface. Why? Because answering the question “Is something safe to operate?” is harder (requiring more research and supporting data) than answering “How do I use it?”

As an example of what I mean, consider an automobile. What do you need to know to operate a car? At a minimum you need to know how to drive (e.g., how to steer and operate the brakes) and the rules of the road. Compare that to the data you need to answer, “Is this particular car safe to operate?” To answer that question, you need to know the rules of the road and the basics of driving, but in addition you also need to know a bunch of other information as well: the vehicle’s maintenance history, the status of safety mechanisms (seatbelts, airbags, anti-lock brakes), the weather conditions in which it will be driven, the route that the driver will take, the tire pressure, the condition of the brake pads, along with a whole host of other details too numerous to list individually.

The bottom line is that some security teams will (perhaps justifiably) find the digital transformation mindset daunting. This doesn’t mean that they can’t or won’t come around, but it does mean that for them to do their job well, they’ll need to work in lock-step with business teams and technology partners to be maximally efficient in how they spend their time. It may also mean that the organization might choose to bolster the resources spent in this area to help bolster this internal skill set.

In addition, the mechanics of how security is implemented will likely need some refinement as well. There are absolute strategies that are advantageous for the implementation of security under this paradigm: for example, intelligence-driven strategies that rely on a solid and workman-like understanding of the threat environment (i.e. attacker motivation and tradecraft) and that marry that to detailed knowledge of internal business processes. Techniques like active defense that use attackers’ actions against them to assist in attribution or to divert their attention from high value targets.

The key to harnessing these techniques isn’t rocket science. It starts with setting the expectation with internal security resources about the need for creativity. By explaining to them– candidly and openly–about the changing expectations, their role in the transformation process, and the “new normal”. Note that it is about getting them to espouse any particular approach to securing the environment; each environment is different, so there are a near-infinite array of strategies that could be employed (the most appropriate of which will vary according to organization-specific factors). Instead, the goal is to make sure that those tasked with securing the environment in the organization are kept in the loop, and understand what is expected of them, so that they can support you.

Read Also

Today's Threat Landscape Requires Adaptive Security

Today's Threat Landscape Requires Adaptive Security

Dan Joe Barry, VP Positioning and Chief Evangelist, Napatech
Staying Abreast of Application Development and Delivery

Staying Abreast of Application Development and Delivery

James F. Bal, CISSP, GICSP ,CISO, Western Area Power Administration
This Is How Your Computer Gets Hacked!

This Is How Your Computer Gets Hacked!

Mustapha A. Obeid, Information Systems Operations Manager, Illinois Institute of Technology