The importance of cybersecurity in digital transformation

The cybersecurity market is constantly growing, boosted by regulations that make companies aware of the risks associated with digital transformation.

With the digital transformation, the security of the companies is questioned. Increasingly stringent regulations and technological innovations are contributing greatly to the growth of this market, which is still in its infancy.
What are the new risks brought about by digital transformation?

More than ever, business digitization is accelerating. This translates into a massive dematerialization of information systems to the cloud, the explosion of the Internet of Things, the accumulation of data from users in Big Data. In this context, cyber attacks in connection with the digital transformation are multiplying.

The main risk resulting from the digital transformation is the professionalization of cybercrime in the face of a clearly insufficient level of corporate protection. We must also mention the development of massive cyber attacks ransomware, Internet fraud, the loss of sensitive data or the risks inherent in cloud computing.

Examples of cyber attacks related to digital transformation are numerous. In the field of connected cars, a recent study has shown that almost all vehicles available on the market use wireless technologies insufficiently secure. Hackers have indicated that it is possible to infiltrate the system of these vehicles by simple SMS. In the retail sector, a large number of retailers have been the victims of customer data thefts in recent years. These were operated from devices located at the points of sale. In addition, the year 2017 was marked by the arrival of even more sophisticated ransomware. The process is simple and consists in encrypting the data of the target to obtain a ransom. Several experts note that the goal of cyber attacks has evolved since their goal is not only lucrative but also destructive. The financial impact of rising cyber attacks is phenomenal: nearly $ 12 million per business per year, according to Accenture. We must also take into account the unavailability of the website, the cessation of production, the loss of turnover or delays in delivery. The entry of companies into the digital transformation is thus accompanied by an increase in risks. To take advantage of this business model, they have every interest in making cybersecurity a priority. nearly $ 12 million per business per year, according to Accenture. We must also take into account the unavailability of the website, the cessation of production, the loss of turnover or delays in delivery. The entry of companies into the digital transformation is thus accompanied by an increase in risks. To take advantage of this business model, they have every interest in making cybersecurity a priority. nearly $ 12 million per business per year, according to Accenture. We must also take into account the unavailability of the website, the cessation of production, the loss of turnover or delays in delivery. The entry of companies into the digital transformation is thus accompanied by an increase in risks. To take advantage of this business model, they have every interest in making cybersecurity a priority.

Cybersecurity, a market in constant progression
Companies and institutions are lagging far behind in the area of cybersecurity. A study by Gartner shows that the IT protection market grew by 7.9% between 2015 and 2016 to more than $ 81 billion. In certain sectors such as telecoms, cybersecurity is a real growth driver. For example, in 2016, Orange beefed up its offer with the takeover of the consulting firm Lexi while the same year, its dedicated subsidiary, Orange Cyber-defense, had achieved a turnover of 250 million euros. Mobile and telecom provider Hub One is counting on this buoyant sector to double its revenue.

While large groups develop skills internally, SMEs, but especially certain sectors such as health, still have a clear technological backwardness. It must be said that for the moment the return on investment is still difficult to estimate. However, stronger regulation should encourage these companies to rethink how they protect themselves. A general recruitment campaign on the Data Protection Officer (DPO) was launched in 2017 to ensure compliance with the RGPD.
Think safe from the design

The success of digital transformation can only be guaranteed if security issues are integrated from the earliest stages of design and throughout the project cycle. We then talk about secure by design, that is, solutions designed to take into account all security issues. To gain maximum security, companies also have an interest in evaluating the reliability of their systems and networks by performing intrusion tests, server configuration audit, source code and vulnerability scanning. systems in a recurring way. The evaluation of Wifi security and the implementation of technical architectures to achieve the security objectives at the DICT level (Availability, Integrity, Confidentiality, Traceability) are just as necessary. Finally, it is essential for companies to be accompanied in the definition and implementation of a strategy to secure their information systems, enable employees to take cybersecurity training in order to be informed of the risks. It must be remembered that the protection of users is not limited to securing the IT infrastructure. Indeed, many attacks target the naivety of users (fishing, scam false president, social engineering …). New services need to be created to limit these scams and inform users of good practices.

For the time being, studies all point to the same conclusion: the cybersecurity sector is facing a shortage of talent. Today, the issue is the establishment of a true culture within companies through a multidisciplinary ecosystem bringing together expanded expertise in technical, legal and managerial areas. By following an MSc Cybersecurity course at the PSB Paris School of Business, focused on engineering, management and professional foundation, students will be able to train in the professions of tomorrow. There are many opportunities: cybersecurity auditor, cybersecurity operator, chief information security officer, Chief Digital Information Officer (CDIO).

LEAVE A REPLY

Please enter your comment!
Please enter your name here