The Point: What used to be a problem only for organizational information officers (primarily Chief Information Officers or CIO’s), now the leadership challenge of cyber security spans the horizon for organizations. In doing so, cyber security is every leader’s responsibility regardless of function performed. In this post, we’ll examine the threats associated with cyber security for the leader of today/tomorrow… Enjoy!
Cyber Breach… You’re Fired!
The well-publicized cyber breach associated with Target in 2014 should have served as a warning alarm for leaders everywhere (Here’s an article to refresh your memory: “Target CEO Fired – Can You Be Fired If Your Company Is Hacked?“ http://www.forbes.com/sites/ericbasu/2014/06/15/target-ceo-fired-can-you-be-fired-if-your-company-is-hacked/#5df21d7f7bc1). Once upon a time, cyber security was the role/responsibility of those residing exclusively in IT (Information Technology) or Information Systems, and leaders therein (CIOs in particular) were typically focused on for blame (Keep in mind, few were/are actually released due to this sensitive role in organizations). However with the advent of “leadership-less” organizations and other human resource strategies now leaders residing anywhere within an organization have the opportunity to breach exposure (See my previous post on the concept of “Holacracy” like at Zappos here: https://tipofthespearventures.com/leadership-challenge-holacracy-like-zappos-5-tips/)
So regardless of your leadership position (elevation within the org chart) or primary department affiliation (IT, Finance, Marketing, etc.), you too could be called on the carpet for information systems security failures which occur within your organization.
Cyber Breach Solutions
With the advent and implementation of all this technology, leaders today need to do it the “right” way. What is the “right” way? You have to have the right protocols in place. You need to insure that you have a full-robust set of controls in place. But how do you as a leader insure that you have the right solutions?
Analysis of exactly what your cyber strategy (How do you want to interact with your clients? What’s your technology that allows you to do so? What are your operational components going to look like?) can lead to diverse approaches so as to safeguard data.
The development of a cyber security program that allows you to be in control, have the right types of messaging and protocols in place if (when?) there is a breach so as to remediate them very quickly is imperative. For example, right now when you examine current breaches that take place, what is their source (Could be individuals, rogue nations, etc. that are responsible). But moving away from the “Who?” that is doing it and identifying the “Why?” they are doing it will allow you to focus/create appropriate security strongholds around such data.
Cyber security isn’t just business as usual anymore. Regardless of where you work within an organization, keeping in mind cyber breach issues will allow you to more thoroughly manage your business and keep cyber under control. In this post we’ve examined the leadership challenge of cyber security. Knowing what you know now, there should be greater focus placed on keeping organizational information safeguarded and career paths plotted and progressed.