A collaborative operating model
The time has come for utilities to adopt a more collaborative operating model for cybersecurity. This model positions the cybersecurity function as a business partner, integrating it into the broader risk management framework of the utility. It requires engaging with the business to explain threats and vulnerabilities, while also understanding the operational ramifications of security incidents.
This collaborative approach distributes the ownership of security risks across the utility. It ensures that cybersecurity considerations are integrated into digital programs from the outset, enabling secure delivery. By fostering a culture of shared responsibility, utilities can ensure that limited funds are allocated effectively, and that consensus is reached on the best strategies for mitigating risks.
The path forward
To transition to this new operating model, utilities must:
- Foster open communication between cybersecurity, IT and operations to align on strategic goals.
- Educate all stakeholders on the evolving threat landscape and the importance of cybersecurity.
- Integrate cybersecurity considerations into the planning and execution of all projects, not just IT initiatives.
- Develop a risk-based approach to cybersecurity, prioritizing resources where they will have the most significant impact.
- Ensure that cybersecurity professionals have a seat at the table in strategic business discussions, emphasizing their role as business enablers.
Cybersecurity as a business within utilities
As the cybersecurity landscape continues to change, so, too, must the approach of cybersecurity functions within utilities. These functions must evolve beyond policy enforcement, adopting a customer-centric approach that aligns with the strategic goals of the organization. With flat or declining budgets, the cybersecurity function is increasingly competing for funds against other risk management needs. The cybersecurity function needs to transform its operating model to better serve its customers — the organization — and manage resources more effectively.
1. Customer-centric collaboration
Cybersecurity functions should view the rest of the organization as their customers or clients, focusing on collaboration with business units, operating companies and other areas. The traditional view of the business as a passive entity that must comply with cybersecurity policies without question is outdated. Instead, cybersecurity should strive to understand the unique needs of each business unit and work together to find solutions that enable operations while managing risk effectively. Publishing a new standard or policy does not protect the organization — helping the business implement practices that achieve the objectives of the standard or policy does.
Implementing policies can sometimes be challenging for business units due to operational constraints or other factors. Cybersecurity teams must be willing to engage in dialogue, understand these challenges and work to find a risk-informed path forward. This approach ensures that cybersecurity measures do not hinder business operations and that the company is not exposed to undue risk. By fostering a collaborative environment, cybersecurity can build trust and demonstrate its value as a strategic partner in achieving business objectives.
2. Strategic planning management
Cybersecurity functions must embrace strong strategic planning management. In the past, these functions may have operated reactively, addressing needs as they arose without a long-term plan. However, a more strategic approach is now required. Cybersecurity teams should develop a three-to-five-year roadmap, taking into account the ever-changing threat landscape and technological advancements.
This roadmap should be assessed for progress and relevance on a quarterly basis to ensure that the cybersecurity function remains aligned with the organization’s evolving needs. By being strategic in their planning, cybersecurity functions can prioritize projects, allocate resources effectively and stay ahead of potential threats.
3. Proactive budget management
Historically, cybersecurity teams may have been granted significant latitude with their budgets, operating under the assumption that any expense was justified to protect the company. While this may have facilitated rapid response to emerging threats, it is not a sustainable approach for mature cybersecurity programs.
Cybersecurity functions must now manage their budgets proactively, aligning their financial requests with the company’s budgeting protocols. Requests for budget increases should be tied to strategically prioritized initiatives and subject to the same rigorous review by leadership as other business units. This ensures funds are managed wisely and cybersecurity initiatives deliver value for money.
By operating as a business within the business, cybersecurity functions can align more closely with the strategic goals of the utility and demonstrate their value as a key enabler of safe and reliable operations. A customer-centric approach, strategic planning and proactive budget management are the tenets of this new operating model. These practices will ensure that cybersecurity functions not only protect the company from threats, but also facilitate its growth and success in a risk-informed manner. As utilities continue to navigate the complex cybersecurity environment, adopting this business-minded approach is crucial for fostering resilience and driving innovation.