It's 19:20 on Tuesday night in Omaha and, no offence to Nebraska or Omaha, there is nothing usually going on. I sit down at the bar and the usual question comes when I order a drink. Where are you from? The UK, just outside London, I answer (stay with me this does have a cybersecurity message). Oh are you in town for the concert? What concert? Ed Sheeran is on in town! 

19:22 and I’m on my laptop with my favourite browser and search engine looking for tickets. This is where my cybersecurity antennae start to twitch. He is in town for one night – tonight – and there are tickets available! So I do all the things that are recommended. I look for the site cert, check the overall layout, check to see if the address matches, spelling mistakes etc, and then place my order having established a level of trust in the website. 

As a community, we should be enabling at least two factor authorisation and reviewing privacy such as the GDPR. This is especially true where a card is not present when transactions take place – reviewing the tokens of identity will be essential as we embrace the digital transformation, but that is another blog. 

19:25 and I have confirmation of my order on my mobile and an indication once payment has been validated that I will get my e-tickets. This is digital transformation in action! Five years ago, this would not have been possible. The infrastructure to support my payment, the ability for me to select the seat, the seconds it took to validate and confirm availability, to reserve those seats and respond to multiple request and all electronically was simply not in place. 

19:26 and I’m in the shuttle to the stadium and 19:29 I'm in the queue. I receive the e-tickets on my mobile and I’m in my seat (well actually standing – no one sat down all evening) ready for the show to start. Everything happened electronically with a level of trust that we can’t let the cyber criminals undermine. 

The moral of the story is that embedding security into the digital transformation is essential. Being able to trust in this infrastructure and the security that surrounds it has to be paramount. The whole process took less than 10 minutes and the security surrounding the process was transparent. But we need to continue to drive security into the digital vortex and continue to research advanced analytics and encryption along with a continued drive to ensure we are who we say we are online.