CIO Influence
CIO Influence News Security

Digitalization Requires a Shift From Generic Security Frameworks to Business-Centric Solutions

Digitalization Requires a Shift From Generic Security Frameworks to Business-Centric Solutions,

In an era driven by digital transformation, the significance of a robust, business-aligned security program has become paramount. As online threats evolve, so must the defenses that safeguard an organization’s assets and data. However, aligning security measures with unique business requirements is often challenging for security leaders and their teams. Recognizing the need for a shift from conventional security frameworks that focus primarily on operational controls, global research and advisory firm Info-Tech Research Group has published its latest research blueprint, Design and Implement a Business-Aligned Security Program.

Recommended: CIO Influence Interview with Ivan Lee, CEO and Co-founder at Datasaur

“Security leaders often tout their choice of technical security framework as the first and most important program decision they make,” says Michel Hébert, research director at Info-Tech Research Group. “While the right framework can help take a snapshot of the maturity of a security program and produce a quick strategy and roadmap, it won’t help align, modernize, or transform the program to meet emerging business requirements.”

The firm’s blueprint explains that common security frameworks offer limited guidance on implementation and focus on operational controls over business value generation, which can be challenging to articulate to stakeholders. While a security strategy can present an overview of a program, it might not facilitate its modernization, transformation, or alignment to meet emerging business needs. Importantly, no universal security solution fits every organization, as each entity boasts its unique identity and distinguishing characteristics.

The new resource outlines Info-Tech’s recommended approach that will allow security leaders and their teams to tailor a security program that focuses on business value first and the security services that enable it. The approach phases are broken down below at a high level:

  1. Security Program Design: This phase will help security teams understand the enterprise strategy and goals of the organization, enabling them to define and refine the initial design of the security program.


  2. Capabilities and Accountabilities: In this phase, security teams will identify program capabilities and accountabilities to build strong foundations, including organizational culture and security incident response and recovery.


  3. Tailored Security Governance Input: This phase enables the security leaders to define the security program’s target state and build a roadmap to continue the design of the program, which includes governance, strategy, and the architectural work required to progress.

Recommended: CIO Influence Interview with Francesco Brenna, Global VP & Senior Partner, Microsoft Practice at IBM Consulting

Info-Tech advises that by following this business-aligned approach, security leaders and their teams can identify what makes their organizations unique and design a security program with the right capabilities and accountabilities.

To learn more about how security leaders can design a security program with capabilities that create business value, download the complete Design and Implement a Business-Aligned Security Program blueprint.

Latest ITechnology News: CIO Influence Interview with Craig Hinkley, Chief Executive Officer at CloudBolt

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

GA of CloudNatix Platform Brings Industry First ‘Planet-Scale Cluster Manager’ to Market, Solving Problem of Operating Diverse Fleets of Cloud and Kubernetes Deployments

CIO Influence News Desk

Edgecore Networks Launches Open Wi-Fi Access Points Preinstalled with the TIP OpenWiFi Image

CIO Influence News Desk

PCTEL Launches Compact, Future-Proof Gflex Scanning Receiver for 5G Network Testing and Government Applications

CIO Influence News Desk