{"id":3540,"date":"2023-12-27T14:45:11","date_gmt":"2023-12-27T13:45:11","guid":{"rendered":"https:\/\/www.opensight.nl\/blog\/how-do-you-ensure-that-your-cyber-security-gets-the-right-attention\/"},"modified":"2023-12-27T16:00:16","modified_gmt":"2023-12-27T15:00:16","slug":"how-do-you-ensure-that-your-cyber-security-gets-the-right-attention","status":"publish","type":"post","link":"https:\/\/www.opensight.nl\/en\/blog\/how-do-you-ensure-that-your-cyber-security-gets-the-right-attention\/","title":{"rendered":"How do you ensure that your cyber security gets the right attention?"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>Every organization should invest in cyber security, it&#8217;s the job of the <a href=\"https:\/\/opensight.nl\/blog\/wat-is-een-ciso-en-waarom-is-het-zo-belangrijk-voor-gemeenten\/\" data-type=\"post\">CISO<\/a> to present a convincing business case. A case should give insight in why an investment is necessary, but also why it\u2019s <a href=\"https:\/\/opensight.nl\/blog\/de-gevolgen-van-een-cyberaanval-voor-veel-organisaties-een-fatale-nekslag\/\" data-type=\"post\">beneficial.<\/a> By adopting a \u201csecurity first\u201d perspective, compliance is often automatically covered. To properly complete this business case and help CISOs get started, we\u2019ve set out the following steps:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Conduct a full audit<\/h3>\n\n\n\n<p>First, it\u2019s important to conduct a full audit of the current security measures, the policy and any gaps or areas that need improvement. Look at where confidential and sensitive data is stored and who has access to it. Not all data have the same impact or level of risk. It\u2019s wise to investigate this properly so you can use the available budgets as efficiently as possible. Internal threats are common and the risks of possible data leaks that are caused by it through malicious or even careless employees are often underestimated. The process of an audit is time-consuming but necessary to get a full view of the safety measures that already exist.<\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer d-none d-lg-block\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-12 col-lg-5\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"623\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/aandacht-voor-cybersecurity-1024x623.webp\" alt=\"focus on cyber security\" class=\"wp-image-2369\" srcset=\"https:\/\/www.opensight.nl\/content\/aandacht-voor-cybersecurity-1024x623.webp 1024w, https:\/\/www.opensight.nl\/content\/aandacht-voor-cybersecurity-300x183.webp 300w, https:\/\/www.opensight.nl\/content\/aandacht-voor-cybersecurity-768x468.webp 768w, https:\/\/www.opensight.nl\/content\/aandacht-voor-cybersecurity-1536x935.webp 1536w, https:\/\/www.opensight.nl\/content\/aandacht-voor-cybersecurity.webp 1544w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-12 col-lg-6 offset-lg-1\">\n\t\t\t\n\n<h3 class=\"wp-block-heading\">2. Expectations should be set from the start<\/h3>\n\n\n\n<p>Cyber security is neither a product nor a service; we advise to show that protecting the organization against loss is the only way to gain financial advantage. Try to communicate with the board using numbers. For example, show that an investment of \u20ac1, &#8211; could stop an incident that could cost the organization \u20ac10, -. By creating a business case that highlights both the Return On Investment (ROI) as well as security measures that can reduce the chance or impact, you\u2019ll get the board on your side faster.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Choose de right areas for investments<\/h3>\n\n\n\n<p>To ensure that management can defend its decision to invest in security, you must first provide data that targets all threats identified in step 1. Threats like inadequate security, <a href=\"https:\/\/opensight.nl\/blog\/awareness-training-in-cybersecurity\/\" data-type=\"post\">awareness and training of employees,<\/a> process and policy that aren\u2019t adequately applied and recorded or lack of backup and patch By providing a clear insight into the costs and benefits of investments, it\u2019s easier to defend the effectiveness of the required investments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Present a strong business case to the board<\/h3>\n\n\n\n<p>After creating a robust and compelling business case for the organization, you need to share the proposal with the board. When presenting this, keep in mind any questions that may be asked, the level of knowledge regarding cybersecurity and the place of focus. Make sure you have a solid narrative with all investments so the board can make a well-considered decision.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Cybersecurity, also in the long term<\/h3>\n\n\n\n<p>When submitting a strong business case for security buy-in, it\u2019s important to align the plan with the risks, needs and compliance requirements of the organization. Every organization wants to be secure in the long term, but compliance requirements often keep them focused on the short term. In our view, this is a major pitfall. Organizations must create a connection between compliance and security if they want to protect their systems and data, especially in the long term.<\/p>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>Want to know more about how to approach this? Our experts are <a href=\"https:\/\/opensight.nl\/contact\/\">ready to answer your questions.<\/a><\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n\n<div class=\"wp-block-group has-dark-blue-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-bootstrap-blocks-container container mb-2 mb-0\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row\">\n\t\n\n<div class=\"col-12 col-md-8\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<h2 class=\"wp-block-heading has-text-align-left single-custom-group m-0 p-0 has-white-color has-text-color\">Also check out our brochure on the eCISO Service we offer. With it, you&#8217;ll always have your cybersecurity up to scratch!<\/h2>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-4\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton btn-download\" href=\"#single-post-bottom\" target=\"_self\"> Download brochure<\/a>\n  <\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Every organization should invest in cyber security, it&#8217;s the job of the CISO to present a convincing business case.<\/p>\n","protected":false},"author":1,"featured_media":2370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"How do you ensure that your cyber security gets the right attention?","_seopress_titles_desc":"Every organization should invest in cyber security, it's the job of the CISO to present a convincing business case.","_seopress_robots_index":"","footnotes":""},"categories":[45,14,34,7],"tags":[46,47,48,52],"class_list":["post-3540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current","category-security-en","category-training-en","category-uncategorized","tag-cyber-security","tag-cyber-security-en","tag-tips-en","tag-training-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/3540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/comments?post=3540"}],"version-history":[{"count":3,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/3540\/revisions"}],"predecessor-version":[{"id":3557,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/3540\/revisions\/3557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media\/2370"}],"wp:attachment":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media?parent=3540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/categories?post=3540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/tags?post=3540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}