{"id":693995,"date":"2019-08-05T09:00:42","date_gmt":"2019-08-05T07:00:42","guid":{"rendered":"https:\/\/www.ie.edu\/insights\/?post_type=articles&#038;p=693995"},"modified":"2019-09-04T13:23:19","modified_gmt":"2019-09-04T11:23:19","slug":"digital-security-not-cybersecurity","status":"publish","type":"articles","link":"https:\/\/www.ie.edu\/insights\/articles\/digital-security-not-cybersecurity\/","title":{"rendered":"Digital Security, Not Cybersecurity"},"featured_media":693997,"template":"","meta":{"_has_post_settings":[]},"schools":[29,33,35],"areas":[16,25,26],"subjects":[],"class_list":["post-693995","articles","type-articles","status-publish","has-post-thumbnail","hentry","schools-business-school","schools-human-sciences-and-technology","schools-university","areas-competitiveness-growth","areas-talent","areas-technology"],"custom-fields":{"wpcf-article-leadin":["Cybersecurity is now a central issue for all organizations. As such, it requires strategic planning and a single agenda that comes from the top. However, it makes sense to shift our understanding towards the concept of \u201cdigital security.\u201d In today\u2019s hyperconnected context, risk management depends not only on the technical skills of engineers, but on a series of additional competencies ranging from stress resistance to efficient crisis management."],"wpcf-article-body":["The current context of constant change and evolution has had a notable effect on what we call cybersecurity. Indeed, cybersecurity has become yet another element that business managers must take into account in their decision-making. This issue requires a specific agenda subjected to constant supervision, as well as a fully defined <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/strategy\/all\/all\/\" target=\"_blank\" rel=\"noopener\">strategy<\/a> shared by all of the organization\u2019s top brass. Companies lacking a clear approach to cybersecurity are at a considerable disadvantage and less likely to survive in today\u2019s highly <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/competitiveness-growth\/all\/all\/\" target=\"_blank\" rel=\"noopener\">competitive<\/a> world.\r\n\r\nWhat are the consequences of neglecting cybersecurity? Just think of the effects that a cyberattack would unleash on any digital area of an organization. If the attack were to damage the company\u2019s reputation, its share price would take a hit. Revenue would fall, sending the company into a tailspin. The best solution is to stop this cycle before it begins. Executive directors need to understand that they are even more invested in this <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/strategy\/all\/all\/\" target=\"_blank\" rel=\"noopener\">strategic<\/a> area than the technical professionals in the cybersecurity department. Many organizations are learning this lesson the hard way: Equifax, Turner, and Sony are among the firms where top executives have lost their jobs in the wake of a cybersecurity attack.\r\n\r\nThe term <em>cybersecurity<\/em> is bit of a misnomer; in reality, this issue has more to do with digital security in the broadest sense of the term. Every organization needs a <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/strategy\/all\/all\/\" target=\"_blank\" rel=\"noopener\">strategic<\/a> vision, not just a technical approach. Management, policies, investment, and <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/innovation\/all\/all\/\" target=\"_blank\" rel=\"noopener\">innovation<\/a> have a direct impact on all departments. Today\u2019s ecosystem is one of digital transformation. In these hybrid environments, the borders between the physical world and cyberspace have become blurred. <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/technology\/all\/all\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a> has torn down what were once robust walls.\r\n<blockquote>Cybersecurity requires a specific agenda subjected to constant supervision, as well as a fully defined strategy shared by all of the organization\u2019s top brass.<\/blockquote>\r\n<strong>A profession with a very bright future<\/strong>\r\n\r\nStudies have estimated that about 200,000 cybersecurity jobs are currently available in Europe. Zooming out to the <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/global-affairs-law\/all\/all\/\" target=\"_blank\" rel=\"noopener\">global<\/a> level, the number of cybersecurity job openings may be as many as 4\u00a0million. The scarcity of candidates to fill these jobs augurs a highly promising future for anyone trained in this field. However, the profile required is not merely technical. Skills typical of consultants, analysts, and managers are also required, so opportunities extend to these professionals, as well. Digital transformation without adequate risk management leads to a digital jungle. This challenge requires a multifaceted skill set comprising everything from legislative changes to the implementation of cloud architectures.\r\n\r\nProfessionals working in digital security must encompass multiple profiles. Given the challenges associated with finding the optimal profile, organizations must adapt their selection processes. Indeed, classical frameworks make little sense in today\u2019s context. Discretion, resistance to stress, immediate availability, trust, sangfroid, crisis management, and commitment are essential characteristics for anyone who aspires to work in this field. These are the capacities that companies must look for. Candidates are obviously in short supply, so human resources professionals and headhunters must expand their search\u2014as difficult as this may seem.\r\n\r\nCurrent <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/technology\/all\/all\/\" target=\"_blank\" rel=\"noopener\">technological<\/a> developments provide clues about what organizations are looking for (even if they don\u2019t always find it). Cyberwarfare, hyperconnectivity, and the proliferation of devices such as drones reveal an environment where the risks have multiplied. <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/smart-society\/all\/all\/\" target=\"_blank\" rel=\"noopener\">Robotics<\/a> and self-driving cars are also making great headway. The digital transformation is real and the race is well underway. Meanwhile, the management of the risks associated with all this <a href=\"https:\/\/www.ie.edu\/insights\/topics\/all\/technology\/all\/all\/\" target=\"_blank\" rel=\"noopener\">technology<\/a> is still in its infancy. The data suggest that cybersecurity\u2014or better yet, <em>digital security<\/em>\u2014will be a crucial profession in every organization. It\u2019s not too late to change course, face this issue head on, and give it the importance it deserves.\r\n\r\n&nbsp;\r\n\r\n\u00a9 IE Insights."],"wpcf-article-extract-enable":["1"],"wpcf-article-extract":["By <strong>Gianluca D\u2019Antonio<\/strong>. Cybersecurity is now a central issue for all organizations. As such, it requires strategic planning and a single agenda that comes from the top. However, it makes sense to shift our understanding towards the concept of \u201cdigital security.\u201d"],"wpcf-article-summary-enable":["1"],"wpcf-article-summary":["Cybersecurity deserves high-level attention in every organization. With the digital transformation well underway, the importance of this area is entirely clear. However, we ought to shift our understanding of the concept from \u201ccybersecurity\u201d to \u201cdigital security,\u201d since the skills required in this field are not merely technical. Discretion, resistance to stress, immediate availability, trust, sangfroid, crisis management, and commitment are essential characteristics for workers in this area. The scarcity of qualified candidates makes it more time-consuming to find the right person for the job. Recruiters should broaden the selection process to consider other factors beyond technical and technological skills."]},"_links":{"self":[{"href":"https:\/\/www.ie.edu\/insights\/wp-json\/wp\/v2\/articles\/693995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ie.edu\/insights\/wp-json\/wp\/v2\/articles"}],"about":[{"href":"https:\/\/www.ie.edu\/insights\/wp-json\/wp\/v2\/types\/articles"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ie.edu\/insights\/wp-json\/wp\/v2\/media\/693997"}],"wp:attachment":[{"href":"https:\/\/www.ie.edu\/insights\/wp-json\/wp\/v2\/media?parent=693995"}],"wp:term":[{"taxonomy":"schools","embeddable":true,"href":"https:\/\/www.ie.edu\/insights\/wp-json\/wp\/v2\/schools?post=693995"},{"taxonomy":"areas","embeddable":true,"href":"https:\/\/www.ie.edu\/insights\/wp-json\/wp\/v2\/areas?post=693995"},{"taxonomy":"subjects","embeddable":true,"href":"https:\/\/www.ie.edu\/insights\/wp-json\/wp\/v2\/subjects?post=693995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}