Skip to main content
Perspectives on transforming cybersecurity
Back to Our Insights

Perspectives on transforming cybersecurity

Our experience working to protect some of the world’s largest and most sophisticated companies, and our proprietary research, have revealed three broad mandates that can help organizations transform their cybersecurity efforts.

Building a holistic program

Article

Hit or myth? Understanding the true costs and impact of cybersecurity programs

– Cybersecurity is a critical but often misunderstood aspect of companies’ technology infrastructures. Here’s how business and technology leaders can ensure that important corporate assets remain safe.
Article

A new posture for cybersecurity in a networked world

– As the dangers mount, current approaches aren’t working. Cyberrisk management needs a root-and-branch overhaul.
Article

Protecting your critical digital assets: Not all systems and data are created equal

– Top management must lead an enterprise-wide effort to find and protect critically important data, software, and systems as part of an integrated strategy to achieve digital resilience.
Article

Insider threat: The human element of cyberrisk

– Cyber programs often miss the significant portion of risk generated by employees, and current tools are blunt instruments. A new method can yield better results.
Article

To survive in the age of advanced cyberthreats, use ‘active defense’

– Anticipating attacks, responding to them in real time, setting traps to contain them, and protecting assets according to their value can help companies stop sophisticated cybercriminals.
Article

Making a secure transition to the public cloud

– As enterprises scale up their use of the public cloud, they must rethink how they protect data and applications—and put in place four critical practices.
Article

Cyber risk measurement and the holistic cybersecurity approach

– Comprehensive dashboards can accurately identify, size, and prioritize cyberthreats for treatment. Here is how to build them.
Article

Cybersecurity and the risk function

– Are your information technology, cybersecurity, and risk professionals working together as a championship team to neutralize cyberthreats and protect business value?

Engaging stakeholders

Article

A framework for improving cybersecurity discussions within organizations

– Clear and frequent communication is essential but often lacking in companies’ cybersecurity programs. Here’s how security professionals can create tighter bonds with some critical stakeholders.
Article

Asking the right questions to define government’s role in cybersecurity

– There is no one-size-fits-all approach for governments to manage cybersecurity. But asking some key questions can help leaders get started.

Integrating cybersecurity with business strategy

Article

Six ways CEOs can promote cybersecurity in the IoT age

– Billions of devices are being brought online as the Internet of Things develops, creating new vulnerabilities. Here’s how leaders can regain control.
Article

Shifting gears in cybersecurity for connected cars

– To secure products across the supply chain, the automotive sector must develop new ways to collaborate.
Article

Critical resilience: Adapting infrastructure to repel cyberthreats

– As the digital world becomes increasingly connected, it is no longer possible for infrastructure owners and operators to remain agnostic in the face of evolving cyberthreats. Here’s what they can do to build an integrated cyberdefense.