The Cybersecurity Bridge: A Necessary Connection for IT and Communications

With the increasing unpredictability and sophistication of cyber threats, IT and communications departments must align and build a joint cybersecurity strategy to protect client information and stakeholders from costly negative impacts.
To further understand what may be causing a disconnect between IT and communications departments on prioritizing cybersecurity, Hahn and Silent Quadrant interviewed senior-level communication executives and IT professionals across the U.S. Among the majority of participants, the findings showed the current level of cyber attack preparedness is low with unclear implementation.
Most of the communications executives admitted never seeing a rapid response plan, or if they did, it was confusing.
In terms of prioritization, out of eight items, cybersecurity was ranked fifth overall.
All participants mentioned their companies prioritized other goals over cybersecurity, such as client satisfaction and business growth.
Most participants agreed cybersecurity should be a higher priority because of its potential to affect core business operations.
It's often unclear what steps a company can take to persuade leadership on the importance of cybersecurity and effectively build and communicate a plan.
Following the survey, three key solutions emerged on how to bridge the cybersecurity gap between IT and communications departments.
Oftentimes, leadership can't visualize how cybersecurity can impact the bottom-line or think cybersecurity insurance is enough to cover damages.
Companies can appoint a Chief Information Security Officer to oversee cybersecurity initiatives and ensure it's integrated and communicated throughout an organization.
The Hahn team undergoes quarterly cybersecurity reviews with Silent Quadrant to ensure proper security controls are in place and operating effectively.
Cybersecurity is an ongoing investment and requires time and funds for regular updates and maintenance.
Many companies believe the chances for a data breach are low or their current security measures are sufficient.
Hahn's information security program is built upon the Silent Quadrant Cybersecurity Framework, which exceeds National Institute of Standards and Technology standards.
With the help of a cybersecurity experts and rapid response workshops, companies can build a functional plan and continually assess one's current security posture by testing for vulnerabilities.
Hahn, with Silent Quadrant's support, teaches clients to make security best practices instinctual by inviting internal stakeholders - from legal and human resources to procurement and environment, health & safety - to the training table.
Having an aligned, companywide cyber rapid response plan will help companies respond more quickly to cyber attacks, deliver consistent communication to all stakeholders and take timely remedial actions.
This is a necessary responsibility as gatekeepers of client information to provide that level of security and trust.
He is a crisis communication expert with 30 years experience in communications and public relations.
With a particular focus on infrastructure security and data protection, he's assisted many clients, including foreign sovereignties, ensure brand and profile security.


This Cyber News was published on www.cyberdefensemagazine.com. Publication date: Sun, 04 Feb 2024 07:13:05 +0000


Cyber News related to The Cybersecurity Bridge: A Necessary Connection for IT and Communications

The Cybersecurity Bridge: A Necessary Connection for IT and Communications - With the increasing unpredictability and sophistication of cyber threats, IT and communications departments must align and build a joint cybersecurity strategy to protect client information and stakeholders from costly negative impacts. To further ...
9 months ago Cyberdefensemagazine.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
6 months ago Feeds.fortinet.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
10 months ago Securityzap.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
11 months ago Securityzap.com
CVE-2021-28671 - Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 ...
3 years ago
CVE-2021-28672 - Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 ...
3 years ago
CVE-2021-28673 - Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 ...
3 years ago
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
10 months ago Securityzap.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
4 months ago Techtarget.com
Developing Cybersecurity Awareness Programs for Schools - Schools are increasingly becoming targets for cyberattacks, necessitating the development of robust cybersecurity awareness programs. Ultimately, a comprehensive cybersecurity awareness program is essential for schools to mitigate risks, enhance ...
10 months ago Securityzap.com
CVE-2021-47222 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
CVE-2024-26837 - In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload Before this change, generation of the list of MDB events to replay would race against the creation of new group ...
7 months ago Tenable.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
9 months ago Legal.thomsonreuters.com
Leveraging a digital twin with machine learning to revitalize bridges - In this blog, we will explore how Thomas Braml, Professor of Civil Engineering and the team at the University of the Bundeswehr Munich have used Cisco technology to implement a repeatable solution for bridges that reduces the cost of bridge ...
10 months ago Feedpress.me
Gamification in Cybersecurity Education - Gamification has become increasingly prevalent in numerous domains, including cybersecurity education. Gamification presents a promising approach to meet this challenge, making cybersecurity education both effective and enjoyable. One way to ...
10 months ago Securityzap.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
11 months ago Feeds.dzone.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
9 months ago Securityzap.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
10 months ago Securityzap.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
10 months ago Securityintelligence.com
Empowering Women in Cybersecurity: Bridging the Gender Gap - On the occasion of the International Day of Women and Girls in Science, it is crucial to address the gender disparity that still persists in the cybersecurity sector. While the field has seen significant growth over the years, women continue to be ...
9 months ago Blog.checkpoint.com
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
10 months ago Darkreading.com
Key cybersecurity skills gap statistics you should be aware of - As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in ...
10 months ago Helpnetsecurity.com
CVE-2023-52578 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
How to Avoid Falling Below the Cybersecurity Poverty Line - The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy ...
1 year ago Csoonline.com
Cybersecurity Curriculum Development Tips - In this article, we will explore essential tips for developing a comprehensive and up-to-date cybersecurity curriculum. By staying abreast of the latest industry trends, educational program developers can ensure that their curriculum remains relevant ...
10 months ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)