Refreshingly authentic: HEINEKEN chief says it’s vital just to be yourself
Dolf van den Brink, CEO of HEINEKEN talks to Jean-François Manzoni about early influences in his career that have helped him excel as a leader....
May 13, 2022 • by Öykü Işık in Leading in Turbulent Times
The pressure of digital transformation and geopolitical tensions are making organizations more vulnerable to cyberattacks. In this webinar, Professor Öykü Isik explained how companies can anticipate threats and execute best practices....
The pandemic has accelerated our digital transformation and made organizations a lot more vulnerable to cyberattacks. The World Economic Forum cites cyberattacks as one of the top risks facing the world today, along with extreme weather, natural disasters, and biodiversity loss. In an IMD webinar, more than third of participants said their organization had experienced a cyber attack in the past two years.
I have identified six trends – artificial intelligence, blockchain, third-party risk, cloudification, cyber criminal supply chains and the war in Ukraine – that will shape cybersecurity in the near future. These trends, spanning technology, organizational processes and societal changes, will pose both opportunities and risks when it comes to cybersecurity.
In the world of cybersecurity, AI is a double-edged sword.
On the one hand, there has been a proliferation of new AI tools that can raise our cyber defenses by detecting fraud, malware and other intruders in a company network. Financial institutions have deployed machine learning to aid fraud detection by analyzing user habits and locations, so they can catch out of the ordinary things. For example, If the AI starts seeing unusual data flows that don’t fit within an organization’s overall traffic patterns or sees users accessing systems to which they don’t usually have access, the software can raise a red flag.
Digital payment company PayPal has managed to reduce its fraud rate to less than 1% using a sophisticated deep learning system that analyzes transactions in real time. And ISFM, a European autonomous shuttle company, uses an AI-based behavior profiling and access control to guard the electronic control systems of its autonomous vehicles against hacking.
On the other hand, hackers are exploiting AI to breach organizations. Former US President Barack Obama famously raised the concern that AI could hack America’s nuclear weapons.
Cybercriminals are using AI to conceal malicious codes in benign applications, while machines are now capable of generating emails that mimic the writing style of an employee to launch phishing attacks.
We asked participants in the webinar whether their organizations were using AI and machine learning for cybersecurity, and just 22% of respondents said that these tools were used for security purposes. While there has been a lot of attention on how AI can add value to organizations, using the technology to improve security could be an equally valuable addition for many companies.
As we rely more and more on data, we need to make sure that we can trust the information and that malicious actors have not tampered with it. Blockchain provides an effective tool to protect the confidentiality, integrity, and availability of data. By design, blockchain is an encrypted, shared immutable ledger that is stored across different systems and creates an irreversible timeline of data. The fact that the data is available through different nodes means that there is no single point of failure, because if one computer system fails, there is a copy elsewhere.
But the drive by some companies to jump on the craze for cryptocurrencies means that some organizations put out badly designed and tested code that compromises security and places too much reliance on infrastructure.
Ronin Network, a platform powering the popular mobile game Axie Infinity, loosened its security features to cope with an influx of new players. But then it forgot to retighten its security. Hackers took advantage of the left-open backdoor to steal $615 million.
Ask yourself: are you protecting your AI or machine-learning powered products or services? Do you have the monitoring, detection and intervention capabilities for malicious tampering of your AI? Next to the technical capabilities, do you also have the necessary legal, ethical and process infrastructure to govern AI security?
Alongside technological trends, there are also risks within your organization and supply chain. Hackers targeting your company will increasingly go after your weak and small-scale suppliers, breach them and then use their credentials to infiltrate your digital systems. A 2021 Cyberthreat Defense Report by the Cyberedge Group found third-party risk management was the least secure area of IT security.
U.S. retailer Target was breached through their air conditioning maintenance company. A hack on U.S. technology firm Kaseya, which makes software used to remotely manage a company’s IT networks and devices, flooded hundreds of its customers with ransomware.
To increase their protection levels, companies should consider asking vendors about their technical prevention measures and how data is protected on servers as well as in transit. It is also worth asking whether your vendor has implemented multi-factor authentication? Are employees and contractors required to attend security training? What due diligence is performed on contractors and vendors before and after the contract stage? And is there a formal incident management program in place?
More and more organizations are moving business critical information to the cloud as companies gain trust in the external suppliers. The dominant providers, including Amazon Web Services, Google Compute Platform and Microsoft Azure, are investing in their capabilities and providing remote support, making it more affordable and practical for many firms to migrate their services to a public cloud. Yet this doesn’t mean it is without risk.
In March 2021, Arts-and-crafts retailer Hobby Loft left 138 gigabytes of sensitive information open to the public internet because of a cloud misconfiguration in its Amazon Web Services (AWS) cloud database.
Other blind spots include misunderstanding on the part of end users about shared responsibility models. For example, even organizations that use software-as-a-service will still be responsible for user access and data.
To minimize the risk, companies should invest in encryption capabilities, access management, logging practices, audits, and strong security policies.
The biggest threat facing organizations in coming times, according to participants of the IMD webinar, is the rise of the cybercriminal supply chain. This is partly due to the fact that it is invisible and something we have little control over.
While we may imagine a hacker to be an 18-year-old working from his parents’ basement, the reality is that cybercriminals today are highly professionalized and operate in a value chain.
The perpetrators are the masterminds who pay developers to create malware. Distributors will then sell these applications to whoever wants to breach a certain organization, while cybercriminals will use stolen data of unsuspecting users to make money in cybercriminal activities online. Some hackers will also sit on data for several months and then sell it to affiliates for further exploitation. It takes on average 200 days for an organization to become aware of an attack, according to IBM.
As an organization, we need to focus on improving our response capability. Reputational damage is not caused by being hacked, but rather from how well we respond to cyberattacks.
Ask yourself: are you aware of the threat landscape, your weaknesses and how to respond?
Many organizations do not invest enough in their threat intelligence. Yet it is clear that certain types of attack are more common in certain geographies and industries. A significant proportion of attacks also happen because of unpatched vulnerabilities. Leaders should decide long before they are breached, how they will respond to a cyberattack and whether they will pay up.
Russia has for a while now been one of the leading active countries in cyber capabilities. According to a report by Microsoft, Russia has conducted hundreds of cyber operations against Ukraine throughout its invasion, and believes cyber risks will continue to escalate as the conflict grinds on.
While it remains difficult to attribute attacks, companies should keep the conflict’s online front in mind and think about how they will prepare if and when it spills beyond Ukraine’s digital borders.
Digital activists have also claimed to have unleashed a wave of hacking attacks on government websites and leaked more than 900,000 emails from Russian state media to anti-secrecy activists abroad.
Organizations need to alert and educate users about the increased cyber risks, make sure systems, network devices and apps are updated with the latest security, secure remote access accounts and devices and make and verify backups.
Given the increasingly risky and evolving threat landscape, here are five questions to ask your company’s CISO:
Professor of Digital Strategy and Cybersecurity at IMD
Öykü Işık is Professor of Digital Strategy and Cybersecurity at IMD, where she leads the Cybersecurity Risk and Strategy program and co-directs the Generative AI for Business Sprint. She is an expert on digital resilience and the ways in which disruptive technologies challenge our society and organizations. Named on the Thinkers50 Radar 2022 list of up-and-coming global thought leaders, she helps businesses to tackle cybersecurity, data privacy, and digital ethics challenges, and enables CEOs and other executives to understand these issues.
December 10, 2024 • by Jean-François Manzoni in CEO Dialogue Series • 9 min read
Dolf van den Brink, CEO of HEINEKEN talks to Jean-François Manzoni about early influences in his career that have helped him excel as a leader....
September 24, 2024 • by Jean-François Manzoni in CEO Dialogue Series • 7 min read
Rio Tinto CEO, Jakob Stausholm emphasizes relationship-building and empathy to restore Rio Tinto's social license and guide its decarbonization efforts....
August 20, 2024 in CEO Dialogue Series • 6 min read
CEO of International SOS Arnaud Vaissié explains to IMD President Jean-François Manzoni how the business has survived 40 years by overcoming obstacles like COVID-19 and navigating financial crises....
June 18, 2024 • by Jean-François Manzoni in CEO Dialogue Series • 9 min read
Margherita Della Valle tells IMD President Jean-François Manzoni how she is delivering radical change to reenergize Vodafone and paving the way for greater diversity in leadership...
May 21, 2024 in CEO Dialogue Series • 10 min read • Podcast available
Lars Fruergaard Jørgensen, CEO of the company which makes game-changing obesity drugs Ozempic and Wegovy, explains how its culture and long-term view underpin its recent turnaround....
April 30, 2024 in CEO Dialogue Series • 9 min read
The RWE CEO tells Jean-François Manzoni how he is reshaping the power company to drive the energy transition and why leaders need to always keep something in the tank to remain resilient....
March 26, 2024 in CEO Dialogue Series • 9 min read
A year into the job, Marco Arcelli, CEO of ACWA Power, tells IMD President Jean-François Manzoni how the Saudi company plans to triple assets to $250 billion in six years by expanding...
February 27, 2024 in CEO Dialogue Series • 9 min read • Podcast available
Henkel CEO Carsten Knobel tells IMD President Jean-François Manzoni why he has remained laser focused on implementing its purposeful growth agenda and why the company decided to exit Russia....
January 23, 2024 in CEO Dialogue Series • 9 min read
Anticipating rising raw material costs, Tata Steel’s CEO & Managing Director TV Narendran tells IMD President Jean-François Manzoni how he introduced a change management process to instill a culture of future readiness...
December 12, 2023 in CEO Dialogue Series • 8 min read
Jessica Sibley, CEO of TIME, explains to Jean-François Manzoni how she is transforming the 100-year-old media brand into a company that can remain relevant in the digital age....
Explore first person business intelligence from top minds curated for a global executive audience