EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
Explore our Offerings
-
Discover how EY's cybersecurity, strategy, risk, compliance & resilience teams can help your organization with its current cyber risk posture and capabilities.
Read more -
Discover how EY's Cybersecurity Transformation solution can help your organization design, deliver, and maintain cybersecurity programs.
Read more
The risks of moving on without addressing the issues are, however, very real and increasingly urgent. More than three in four (77%) respondents to this year’s GISS warn that they have seen an increase in the number of disruptive attacks, such as ransomware, over the last 12 months. By contrast, just 59% saw an increase in the prior 12 months.
Yet CISOs are struggling to make themselves heard. Most respondents (56%) admit that cybersecurity teams are not consulted, or are consulted too late, when leadership makes urgent strategic decisions. While some maintain that this happens “not very often,” it only needs to happen once for a flaw in the defenses to be exploited by threat actors.
The result is anxiety about what the future holds. “We strive for security as an enabler,” says Richard Watson. “But there are still organizations that throw projects to security just before they go live.”
At worst, CISOs find their warnings are ignored. In this year’s GISS, 43% say they have never been as concerned as they are now about their ability to manage the cyber threat. But it does not have to be this way.
TikTok – Security by design, at speed
Roland Cloutier, Global Chief Security Officer (CSO) at short-form video and entertainment platform TikTok, is deeply involved in strategic decision-making on an iterative, week-by-week basis. “It may range from a strategy for user growth to a new type of monetization or music product,” he says. “All involve the construction and distribution of new technology. I focus on understanding the implications of existing and unknown threats, and then add speed, security, and privacy by design into the product as it's built. Then I prepare the organization for the new information coming through. How do we do that at both the speed of the internet and the speed of culture? That’s what makes this job so much fun.”
Threat actors have hit a new level of maturity
Over the last year, threat actors have increasingly adopted new strategies, whether by targeting businesses with phishing campaigns containing malicious software that is forwarded by employees, or by embedding backdoor code that enables them to exploit commercial software after it has been procured by customers.
The stakes could not be higher. The hackers who shut down the US Colonial Pipeline in May 2021 used ransomware-as-a-service that others can attain via the dark web, posing risks to critical organizations throughout the economy and society at large. At the same time, the individuals who infiltrated SolarWinds over several months in 2020 did so via a sophisticated supply chain attack that was largely unfamiliar to security teams.
Attackers are targeting a growing surface area and their tactics are increasingly unpredictable. Just one in three respondents is confident in their ability to make the supply chain suitably robust or water-tight, highlighting the importance of working closely with colleagues in procurement and operations. Less than half (47%) say they understand and can anticipate the strategies attackers use, an issue that has been illustrated by incidents in which threat actors infiltrate software that is later sold on to customers.
It is not as though the need for rapid transformation has passed. At the time of writing, significant progress has been made in responding to COVID-19, but the crisis will pass through several stages before businesses return to “normal” – whatever that may be.
Employers are, for example, looking to support hybrid working models while unlocking growth in a recovering economy. A recent EY study, Work Reimagined 2021, found that 54% of respondents would consider resignation if their employers refused them the flexibility they were looking for. CISOs should also be aware that half of employees (48%) want investment in new home-office technology, which opens the possibility for yet more exposure if businesses cannot address security by design.
All eyes are on the CISO
CISOs face a critical moment. If they can support digital transformation from the planning stage – at a time when 68% of CEOs are planning a major data and technology investment in the next 12 months, according to the EY CEO Imperative Study 2021 – they will truly become a strategic enabler of growth. If they can’t play a more active role in transformation, the security threats will accelerate and their standing in the boardroom will decline.
The senior leadership team is already concerned about the security function’s ability to protect the organization. More than half (55%) of respondents say cybersecurity is coming under more scrutiny today than at any other point in their careers. Four in 10 (39%) organizations put cybersecurity on their board agendas quarterly, up from 29% in 2020.
And yet, in the EY Global Board Risk Study 2021, just 9% of boards declared themselves extremely confident that the cybersecurity risks and mitigation measures presented to them can protect the organization from major cyber-attacks – down from 20% last year.
An opportunity in crisis
The CISOs that can mitigate risk, while enabling their businesses’ growth and technology ambitions, have a bright future. Most recognize this: 57% believe the crisis provides an opportunity for cybersecurity to raise its profile.
Dave Burg urges CISOs to capitalize on their increased visibility. “I know of many security officers who were viewed as superstars, and we want those superstars to be brought to the front of innovation,” he says.
So, are CISOs ready to seize the opportunity of a new growth-enabling role? Can they embed resilience ahead of the next major business disruption? The answer must be yes – but only if they can first address three critical and interrelated challenges that are standing in their way:
- The cybersecurity organization is severely underfunded – at a time when it needs funding and flexible support more than ever before.
- Regulatory fragmentation is a growing headache, creating additional work and new resourcing problems.
- Cybersecurity’s relationships with other functions are deteriorating – exactly when stronger connections are needed most.