David Schiffer is CEO of RevBits and was previously CEO of Safe Banking Systems (SBS). RevBits We develop cybersecurity software for organizations.
Getty
Inevitably, politics seems to be a never-ending news topic. I am always up to date on political candidates and their policies, but the impact on my personal life and the lives of my family and friends is important, so I do not want my political beliefs to influence important business decisions. I find it difficult to understand when to give.
In the process of choosing candidates, voters constantly face the challenge of deciphering perceptions and reality. Candidates are sometimes successful in convincing the public that they can achieve everything they promise in their campaigns. Unfortunately, failing to deliver on these pie-in-the-sky promises is often part of the post-election political climate.
We see this in business as well. Technology vendors are often guilty of overcommitting and underdelivering. Then there is the political struggle within the company. Staff prefer one product brand over another, and businesses unwittingly become a playing field for political maneuvering. Political tactics often result in a few individuals gaining power and control, with the aim of obtaining the best solutions and the best products to get the job done in the most effective way. It is forgotten in
Keep politics out when it comes to cybersecurity decisions
Today’s enterprise digital environment is so critical to the success of virtually every organization that there is no room for politics. There are too many important decisions to make when it comes to digital infrastructure. Whether deciding on a cloud service type, ZTNA, VPN, or a comprehensive cybersecurity platform, these important decisions should be considered together.
Today’s digital infrastructure is integrated into virtually every business function. For the sake of business and clarity, all stakeholders affected by a product or solution should seek truthful information and evaluations, whether or not it supports their predisposition.
These decisions sometimes create conflicts of interest, as in the case of Suffolk County, New York, which hired consultancy Redland Strategies to respond to ransomware attacks. On September 8th, hackers carried out a massive cyberattack that ultimately caused millions of dollars in damage to Suffolk County. Further complicating matters is that the founder of the consulting firm was also a consultant for Suffolk cybersecurity and a lobbyist for his firm.
The consulting firm also happens to be a lobbyist for cybersecurity vendor Palo Alto Networks, and currently does business in Suffolk County, where Palo Alto’s firewall services are deployed. Suffolk County has since decided to terminate its contract with the consulting firm. But internal conflicts continue as her IT Commissioner in Suffolk and his MPs engage in heated budget debates over the costs associated with future breach prevention.
The Case for a Unified Cybersecurity Approach
Fighting cybercrime requires a team effort with a level playing field that encourages knowledgeable input from all investment stakeholders. All stakeholders should have an interest in and participate in efforts to protect critical corporate data and assets. Cybersecurity leaders must implement strong cybersecurity policies that support ongoing security education, training, and communication across the enterprise. Internal factions that do not endorse or endorse a particular security perspective, action, or product create a cohesive security defense posture that integrates data sharing and capabilities while increasing visibility into successfully defending the organization It may interfere with your efforts.
By integrating security products into a fully integrated system, every member of the cybersecurity team will have streamlined workflows and increased productivity. Rapid and effective data sharing and enterprise-wide visibility enable real-time event clarity and response. Security orchestration and automation across a multi-function security stack accelerates detection and remediation of anomalous activity.
Security personnel were overwhelmed with countless false positives and other low-priority events. Seamless integration with a single view enables analysts to conduct rapid forensics with detailed analysis and context to quickly mitigate threats. Leveraging diverse analytics and automation, a multi-layered and integrated cybersecurity infrastructure can make a greater impact by proactively protecting business resources and data.
When we consider political candidates and technological solutions, we make choices with the hope that they will not only solve today’s problems, but improve the future. As we evolve and technology advances, the choices we make with the people and technology we introduce today must also be relevant tomorrow, and no political games or manipulations will be involved in these decisions.
The Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. am i eligible?