In my previous blog post, I spoke about the need to build business resilience by integrating and building cyber resilience into the business. I spoke about competition in the digital age and, here, I want to expand on this by looking at some examples of digital transformation along with the security and privacy implications.
- Digital Wallets Who carries cash nowadays? Some carry credit cards but increasingly we pay by phone. The phone is now the small screen we interact with for work, play and pay. This has a huge impact on the risks to businesses and the individual that requires a different approach. And that’s a resilient approach that enables the business to build applications to exploit this new business dynamic and embed security and analytics to secure the individual and the provider.
- Artificial Intelligence (AI) We have in the past also spoke about the rise of the machine, but machines are now more efficient and more accurate at placing online ads, saving the business money and targeting the audience more effectively. But is this an invasion of privacy as it uses personal data to achieve this accuracy? Compliance and regulations are increasingly driving best practice but are they going to negatively impact business by restricting access to this data?
- Co-living People are increasingly sharing their office and private space to reflect a mobile working world. Individuals will share with their friends who might not work in the same company as they do but they effectively share the same working and living space.
- Hyper Personalisation We all like to be treated and seen as special but how does this impact on someone’s personal privacy and the need for businesses to remain compliant? How do global businesses control access to this information in an increasingly segregated world and meet regional regulations? Digital transformation takes place on a global scale but we are being forced by governments to apply regional controls and restrictions that simply don’t align to the digital transformation that businesses need to drive to compete.
- Chatbots More than ever before, we use the spoken word to command the world around us. There was an interesting issue with this recently when a crime was committed and Alexa (Amazon’s zone services) was “listening” in the room while the crime was taking place – could or should Alexa have taken action to stop the crime? Also who is now liable? Could action have been taken to stop the crime? Can evidence be gathered to prosecute and again how does this affect a person’s privacy?
What’s clear is that these digital transformation initiatives require a very different approach to cybersecurity – one that embeds and integrates controls but enables the business to compete and grow. This digital disruption requires business resilience that looks at every aspect of the business and doesn’t bolt on controls that restrict innovation. We don’t talk about a safe car and SRS (Supplementary Restraining System, SIPS Side Impact Protection System) etc; we expect these security and safety controls to be integrated and embedded into the car we buy. So what should we call secure IT in five years’ time? Simple – we call it IT!
Here's how the right approach to digital infrastructure can accelerate your digital business Making the most of your data means more than collecting, storing, and processing bits and bytes. A reliable flow of data across a secure, stable network will help to turn data into actionable information. By unlocking your organisation’s data, you can change the way it operates and accurately steer its transformation.