Wednesday, November 27, 2019

Building A Digitally Transformed Cyber Program


Digital transformation may involve IT and application development but it isn’t an IT process.  It’s a broader business process in which IT and application expose additional value to the business. 



As a cyber leader, you’ll have to support and secure this transformation from wherever your legacy systems are now into this new world. Unfortunately, you’ll won’t be able to hand wave away your legacy issues. Legacy systems are the transformation portion of all this. 

So how to proceed into this brave new world?


A good first step may surprise you.  Read. 

Read everything you can about digital transformation in business. This seems to be an under-valued attribute in cyber leaders. There is no shortage of free content out there. You’ll need to become as fluent in digital transformation as your business counterparts. You can’t plan to secure something if you don’t understand the strategies and approaches behind it. Ask questions of your leadership until you understand and have internalized their strategy. 

You’ll also need to ensure the right skillsets and training on your team. Digital transformation isn’t about traditional endpoints. It’s about nimble automated and scalable cloud governance supporting a dev pipeline and APIs that quickly deliver value to customers on all sorts of devices and mobile apps. Can you support that today?  You can’t rely on a single college, conference, or employee training to guide you here. You aren’t alone though. You also have the collective wisdom of your team, mentors, and vendors. 

Identify your governance gaps. Do you have the right standards and policy in place?  Right representation on the governance and steering committees?  Right process and people to support tools? 

Plan. Execute. Measure. These requirements won't ever change.

Remember that digital transformation is relatively new to everyone. The broader plans will change so assess frequently and be flexible. 

You have this.

Follow me on Twitter for discussion and the latest blog updates: @Opinionatedsec1. Or, start your own discussion using #crazygoodcyberteams on twitter or Linkedin and I'll read it.

SEE ALSO

The Rest Of Cyber Security


Framing Data Security Conversations To Executives

Blue Team Building In Cyber Programs 

No comments:

Post a Comment