Digital transformation may involve IT and application
development but it isn’t an IT process.
It’s a broader business process in which IT and application expose additional
value to the business.
As a cyber leader, you’ll have to support and secure this transformation
from wherever your legacy systems are now into this new world. Unfortunately, you’ll
won’t be able to hand wave away your legacy issues. Legacy systems are the
transformation portion of all this.
So how to proceed into this brave new world?
A good first step may surprise you. Read.
Read everything you can about digital transformation in
business. This seems to be an under-valued attribute in cyber leaders. There is no shortage of free content out there. You’ll need to become
as fluent in digital transformation as your business counterparts. You can’t
plan to secure something if you don’t understand the strategies and approaches
behind it. Ask questions of your leadership until you understand and have
internalized their strategy.
You’ll also need to ensure the right skillsets and training
on your team. Digital transformation isn’t about traditional endpoints. It’s
about nimble automated and scalable cloud governance supporting a dev pipeline
and APIs that quickly deliver value to customers on all sorts of devices and mobile
apps. Can you support that today? You
can’t rely on a single college, conference, or employee training to guide you
here. You aren’t alone though. You also have the collective wisdom of your
team, mentors, and vendors.
Identify your governance gaps. Do you have the right
standards and policy in place? Right
representation on the governance and steering committees? Right process and people to support tools?
Plan. Execute. Measure. These requirements won't ever change.
Remember that digital transformation is relatively new to
everyone. The broader plans will change so assess frequently and be flexible.
You have this.
Follow me on Twitter
for discussion and the latest blog updates: @Opinionatedsec1. Or, start your
own discussion using #crazygoodcyberteams on twitter or Linkedin and I'll read
it.
SEE ALSO
Framing Data Security Conversations To Executives
Blue Team Building In Cyber Programs
No comments:
Post a Comment