This article is part of the Cybersecurity Strategy Management Framework documentation. You can read more about the framework in this article.
Purpose
Objectives
-
Allow secure organizational changes
Identify sources of change for the organization and ensure that cyber security helps to respond to market trends, execute business strategy in line with the risk appetite and adopt emerging technologies.
-
Ensure compliance with regulations
Ensure that cyber security strategy helps to comply with existing and upcoming regulations relevant to information security.
Activities
-
1. Select key environment areas
Select groups of environmental factors that can impact cybersecurity strategy.
-
2. Identify market trends
Analyze societal, cultural, and socioeconomic trends. Review global market conditions.
-
3. Identify technology trends
Analyze important trends that can influence your technology landscape.
-
3. Identify technology trends
Analyze important trends that can influence your technology landscape.
-
4. Identify cyber trends
Analyze trends in the cybersecurity market to ensure the adoption of modern solutions.
-
5. Identify regulatory trends
Analyze existing and upcoming laws that cover information security requirements.
-
6. Document external factors
Document and prioritize all external factors that should be addressed by cyber strategy.
1. Select key environment areas
During the definition of business strategies, their designers frequently start with mapping the business environment. Alexander Osterwalder describes this process well in his “Business Model Generation” book. He proposes mapping four areas for business strategy definition:
Market forces. They cover market issues, major market segments, market needs and demands, switching costs, and revenue attractiveness.
Industry forces. They concentrate on your company’s competition and include competitors, new entrants, substitute products and services, suppliers and stakeholders.
Key trends. They include technology trends, regulatory trends, societal, cultural, and socioeconomic trends.
Macroeconomic forces. They include global market conditions, capital markets, commodities, and economic infrastructure.
These areas affect your organization, and their understanding helps define the business strategy. But to define cybersecurity strategy, I found that the most value comes from the following key groups that cover essential items from the list above:
Market trends. Key market trends encompassing societal, cultural, and socioeconomic trends. Global market conditions.
Technology trends. They will influence your technology landscape in the future. The purpose of the cybersecurity strategy is to prepare the organization for the secure adoption of new technologies. Helping business leaders to achieve this objective presents cyber teams as proactive and cybersecurity as a business enabler.
Cybersecurity trends. Trends observed in the cybersecurity market help to identify modern approaches supported by actively developed technologies. The purpose is to outsmart cyber criminals, which cannot be achieved using outdated solutions.
Regulatory requirements. Key trends and existing regulations affecting cybersecurity. Noncompliance with laws leads to regulatory actions and financial losses because of legal proceedings and fines.
If you desire to look at other essential factors for your business, include them. However, check if they have a tangible impact on the cyber area.
2. Identify market trends
To examine market trends, start with what your firm already has. Companies complete such analysis as part of the design or update of the business strategy. If this data is not accessible, evaluate market reports and studies. Look at the following details:
Societal and cultural trends. Societal and cultural trends affecting your industry may have technological implications. For example, they influence how the clients use your company’s products or services. They may also affect the digital communication and distribution channels that require adequate cyber protection.
Socioeconomic trends. Socioeconomic trends cover demographics, your clients’ income, spending patterns and their way of living. They also affect how they perceive the importance of cybersecurity and data privacy.
Global market conditions. Overall market conditions influence the entire economy, including your clients and the financial health of your business. As a result, they may also affect the budget available for cybersecurity and your approach to cyber investments.
To identify the key market trends, you can use the following sources:
World Economic Forum. It is one of the richest information sources bringing insights into market trends and global issues. World Economic Forum website and their digital membership give you access to reports, articles and podcasts on artificial intelligence, blockchain, cybersecurity, digital economy, workforce and employment, climate change, economy and many more. One of the most valuable tools on their website is their Strategic Intelligence tool. It presents interactive maps depicting relationships between almost 300 topics and links to articles describing recent developments.
EY Megatrends. EY Megatrends report provides business leaders with observations on crucial topics they need to track to keep up with the competition. Their framework focuses on the following areas:
- primary forces that are the source of disruption,
- megatrends created by the interaction of primary forces,
- future working worlds,
- weak signals with potential impacts further in the future.
Forrester Predictions. Forrester issues annual Forrester Predictions reports tailored to North America, Europe, and Asia. Market, industry and macroeconomic aspects are what they concentrate on. They provide observations on possible market disruptions and support many of them with statistics showing the probable impacts. They are accessible after registration.
Other reports. Many companies in the Financial Services Industry and consulting firms issue other studies on the market trends they observe. Additional Internet research with the “megatrends” keyword should yield multiple results.
However, the information sources mentioned above should be sufficient for this exploration. The more data you analyze, the more convoluted the overall picture becomes and the more time you require to complete your analysis.
For each identified trend, decide if it applies to your organization and the business landscape you analyzed in step “1b. Review internal factors”. If the trend is relevant, include it and try to weigh the level of its impact on cybersecurity strategy. You will use this information later to prioritize your security areas.
You can document each of the trends in the way proposed in the “6. Document external factors” section of this article.
3. Identify technology trends
Technology trends are linked to recent technological advancements. They may introduce new threats, but they may help to improve your business or enable new business models. Eventually, your business stakeholders may want to adopt new technologies. Therefore, it is better to be prepared for them to ensure that business leaders perceive cybersecurity as the business enabler and not a show-stopper.
To identify new technology trends, you may use many resources provided by research and consulting companies. I found the following sources most useful:
Gartner Top Strategic Technology Trends. Gartner Top Strategic Technology Trends report summarizes the strategic technology trends and describes their business value, use cases, technical profile, and critical recommended actions.
Deloitte Tech Trends. Deloitte Tech Trends report groups the trends into defined categories and shows their evolution in the previous years. The document characterizes the trends, way forward, implementation examples from selected companies, and cyber or risk perspectives.
Accenture Technology Vision. Accenture Technology Vision highlights key emerging trends that will shape the business for the next few years. They produce observations on each of the trends, what to expect, how to plan for their adoption and examples of efforts taken by companies to adopt fresh approaches.
World Economic Forum. World Economic Forum includes a section related to emerging technologies. In addition, many topics in their Strategic Intelligence tool also cover the most recent technology trends.
Web research. An additional Internet search will identify multiple websites, articles, videos and podcasts, providing predictions about emerging technologies.
For each identified trend, decide if it applies to your company and its technology landscape you evaluated in step “1b. Review internal factors”. If the trend is relevant, include it and try to determine the degree of its impact on cybersecurity strategy. You will use this information later to prioritize your security areas.
You can document each of the trends in the way proposed in the “6. Document external factors” section of this article.
4. Identify cyber trends
The arms race exists in the cyber market as well. Cybercriminals use modern technologies to conduct new types of cyber attacks. However, solution vendors and organizations use emerging technologies and current approaches to improve their cyber defenses against cyber criminals and be ahead of them.
To ensure that your cyber security strategy adopts a contemporary approach, identify the trends in the cyber market. The following resources can help you with this identification:
Gartner Planning Guide for Security. The guide issued annually outlines major information security trends for the coming year. The paper describes each trend, presents planning considerations and proposes related research to give you more details on a specific topic.
World Economic Forum. World Economic Forum website covers an array of topics in its cybersecurity area. In addition, the Strategic Intelligence tool allows you to generate advanced briefing that comprises the strategic landscape on cybersecurity, covering key challenges and directions. The organization also publishes other papers devoted to selected cybersecurity topics.
Other reports from Gartner and Forrester. These organizations publish various reports on selected cybersecurity issues. They include planning guides for chosen cyber domains, quadrants presenting the positioning of cybersecurity products, and other materials that offer observations on cyber trends.
Recognizing these trends will help you invest in solutions that support modern use cases and not rely on outdated approaches that can hinder the adoption of new technologies by the business.
As for other trends analyzed before, decide if they apply to your organization and assess their potential impact.
You can document each of the trends in the way proposed in the “6. Document external factors” section of this article.
5. Review regulatory requirements
Disruptive technologies and a growing number of data breaches provoke governments to impose new regulations. It often happens in industries that deal with client data. Many of these regulations focus on information security controls.
To ensure that your strategy helps manage regulatory requirements, you must identify the existing ones and the ones on the horizon. However, this can be daunting, especially if your company operates in multiple jurisdictions.
The most workable approach at this stage is to define a simple list of existing and forthcoming regulations with their brief description. The focus should be on the most important ones that will keep your organization busy.
Please note that studying them in detail and listing individual controls is not the purpose of this activity. It would be time-consuming and too detailed to define cyber security strategy. Instead, dedicated compliance assessment projects are a better place for this task.
You can document each of the regulations in the way proposed in the “6. Document external factors” section of this article.
6. Document external factors
To document market, technology, cyber and regulatory trends, you can use a single table in a worksheet with the following columns:
Name. Clear and short name of the trend.
Description. Brief description of the trend.
Type. Market, technology, cyber, regulatory or other classification.
Impact. The initial level of the trend’s impact on your organization and cyber security strategy based on your judgment. You can adjust it later based on your conversations with key stakeholders. You can use a 5-level rating scale to assess the impact, e.g., 1 – Very Low, 2 – Low, 3 – Medium, 4 – High, and 5 – Very High.
Cyber Implications. Brief description of the cyber implications of the trend.
Sources. Sources you used to identify the trend. Multiple and trusted sources prove your due diligence and increase stakeholder trust in your analysis.
Please note that this document should be a synthesis of your analysis. It is better to come up with a top 10 strategic trends that are a short synthesis of data from multiple sources than tenths of very similar trends or duplicates of trends from various sources.
Outputs
-
External factors
List of the market, technology, cyber and regulatory trends affecting your organization and cyber strategy, their impact and cyber implications.
References
Use the following links to deepen your knowledge about this topic.
- Freund, J., & Jones, J. (2015). Measuring and Managing Information Risk: A FAIR Approach. [Elsevier]
- Landoll, D. (2021). The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. [CRC Press]
- Talabis, M. R., & Martin, J. (2021). Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis. [Elsevier]
- Wheeler, E. (2011). Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. [Elsevier]
- Cyber Leadership Institute (2019). CISO Playbook: Protecting the Crown Jewels
- Information Security Forum (2017). IRAM2: The Next Generation of Assessing Information Risk
- Information Security Forum (2016). Protecting the Crown Jewels: How to Secure Mission-Critical Information Assets
- Information Security Forum (2016). Protecting the Crown Jewels: Implementation Guide
- ISO (2011). ISO/IEC 27005: Information Technology – Security Techniques – Information Security Risk Management
- NIST (2012). NIST SP 800-30 Rev. 1 – Guide for Conducting Risk Assessments
- NIST (2011). NIST SP 800-39 – Managing Information Security Risk: Organization, Mission, and Information System View