Abstract
The connected world—where everything is based on computer technology—needs more security, not less. Otherwise, the safety of people, the security of and the trust in society are at risk. There will be certification, as well as new regulation, in this area. In organizations, the board and executive level is the right place for cyber security management. The state of maturity of the security function and the alignment to the business defines the success of digital transformation projects. Differentiating businesses through security is desired, and the IT teams should start to enable digital transformation. The deployment of security technology as an integrated platform will empower businesses to act proactively and support new processes. The constantly changing and growing threat landscape, the associated risk and regulatory requirements demand not only “state of the art”, but also the “…by design” implementation of technical security controls. For new disruptive technologies, built-in security might often be the only option anyway.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
arXiv:1707.08945v5 [cs.CR] 10 Apr 2018; https://arxiv.org/pdf/1707.08945.pdf.
De Haes, S., & Van Grembergen, W. (2015). Enterprise governance of information technology: Achieving alignment and value, featuring COBIT5. Switzerland: Springer International Publishing.
EU NIS Directive. https://ec.europa.eu/digital-single-market/en/network-and-information-security-nis-directive.
Gartner Market Share Analysis: Security Software Worldwide. (2017). https://www.gartner.com/doc/3889275?ref=mrktg-srch.
Hemker, T. (2018). Datenschutz Datensich, 42, 629. https://doi.org/10.1007/s11623-018-1014-1.
Internet Security Threat Report ISTR23 (p. 80) https://www.symantec.com/security-center/threat-report?inid=globalnav_scflyout_istr.
(ISC)2. 2018 Global Cybersecurity Workforce Study; https://www.isc2.org/News-and-Events/Press-Room/Posts/2018/10/17/ISC2-Report-Finds-Cybersecurity-Workforce-Gap-Has-Increased-to-More-Than-2-9-Million-Globally.
ISF Information Security Forum, Threat Horizon 2020. https://www.securityforum.org/research/threat-horizon-2s-start-to-shake/.
ISO/IEC 38500:2008 Corporate Governance of Information Technology, 2008—new version 2015. https://www.iso.org/standard/62816.html.
ISO/IEC 27000:2018 Information technology—Security techniques—Information security management systems. https://www.iso.org/standard/73906.html.
Knott, P. (2018). Security strategist at symantec UK at Gartner Security Summit UK.
Mirai Botnet Explained. https://krebsonsecurity.com/tag/mirai-botnet/.
NIST Cybersecurity Framework. https://www.nist.gov/cyberframework.
WIRED Magazine. https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hemker, T. (2020). Cyber Security… …by Design or by Counterplay?—Enabling and Accelerating Digital Transformation Through Managing Information Security Technology, Risk and Compliance at the Right Place. In: Feldner, D. (eds) Redesigning Organizations. Springer, Cham. https://doi.org/10.1007/978-3-030-27957-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-27957-8_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27956-1
Online ISBN: 978-3-030-27957-8
eBook Packages: Economics and FinanceEconomics and Finance (R0)