Security Recommendations 2020: What To Focus On

Our team of security and risk analysts spent the past few months brainstorming and curating tactical and strategic advice designed to improve your security programs for 2020 and beyond . . . and then along came the COVID-19 global pandemic. In the midst of this, firms are undergoing a shuffle of priorities to accommodate a new normal, including work-at-home protocols and changing economic conditions. But no matter the current stress, history assures us that we will recover, and when we do, the rest of the challenges will still be there waiting for us.

 

Even before COVID-19 changed our priorities, we themed 2020 recommendations around preparing for externalities (those threats that are out of our direct control). Some of the recommendations for 2020 are that you:

  • Make pandemic risk planning part of your new normal. Very few companies were ready for COVID-19. Implement any security measures you had to make on an emergency basis in a more permanent way to implement work-from-home thinking. Recovery will likely be staged with frequent or even permanent working from home for employees. And augment your pandemic risk management metrics to include more than the number of positive tests. This will help you identify and react to flare-ups should they occur.
  • Prioritize product security to gain a competitive differentiator. More product launches mean additional complex attack surfaces for the security pros to cover. To de-silo yourself in these efforts, push product security as a differentiator that can drive new business.
  • Adapt to climate change. Map out which risks pose the most eminent threats and follow that with a business impact analysis to understand short- and long-term impacts. This will enable business longevity against harsh climate conditions, help the firm align with the regulatory environment, and keep the company attractive to increasingly climate-conscious consumers.
  • Evaluate your third parties as a cascading risk. As third parties become more integral to your value chain, and as highlighted by COVID-19, it’s imperative to acknowledge their vulnerabilities and how to mitigate the risk. Start by cataloging your third-party relationships, implementing fifth- and sixth-party governance, and managing access of third parties to your systems as part of your Zero Trust strategy.

 

While adapting to the new normal, be visionary, as well: Look beyond the immediate crisis and incorporate the long view into your annual planning initiatives. Check out our 2020 top recommendations report and webinar to help you do this.

 

Categories
Blog

Where High-Performance IT Meets Digital Sovereignty: Security, Privacy, And Resilience

Dario Maisto April 9, 2024
High-performance IT rests on a foundation of security, privacy, and resilience that is necessary to build trust. Having a digital sovereignty strategy can help. Learn three key digital sovereignty considerations to keep in mind.
Blog

The New Chief Artificial Intelligence Officer Role Balances AI Champion And Risk Manager

Alla Valente April 3, 2024
US federal agencies must now have a chief artificial intelligence officer responsible for operationalizing the safe use of AI. Learn more about this move and the implications in this blog post.

Get The Insights At Work Newsletter

Thanks for signing up.

Stay tuned for updates from the Forrester blogs.