Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    5 Lessons Cyber-Security Chiefs Can Learn From Warren Buffett

    By
    Chris Preimesberger
    -
    January 4, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      15 Lessons Cyber-Security Chiefs Can Learn From Warren Buffett

      5 Lessons Cyber-Security Chiefs Can Learn From Warren Buffett

      In 2017, organizations invested $86.4 billion in technologies designed to protect their data—a figure that is double what it was less than five years ago. Meanwhile, it seems like nearly every other week, there’s a new wave of headlines reporting on the latest major security attack. This breakdown has security leaders posing the question: Are my security investments working? Alan Cohen, chief commercial officer of Illumio, has been having a lot of these types of conversations with chief information security officers (CISOs) and IT leaders. Over time, he’s come to realize that there are parallels between best practices for security and finance. In fact, security leaders can learn a lot from the way Warren Buffett protects his financial investments. This eWEEK slide show offers some of those perspectives.

      2Buffett: ‘What we learn from history is that people do not learn from history.’

      Buffett: 'What we learn from history is that people do not learn from history.'

      Faced against an increasingly perilous threat landscape, most security teams are doubling down on traditional security technologies and management practices. But this is a failing strategy. Just as IT infrastructure has evolved, and with it the nature of cyber-attacks, the security tools that worked well a decade ago are no longer effective in today’s distributed and dynamic world.

      3Advice for CISOs: Regularly measure the performance of your investments

      Advice for CISOs: Regularly measure the performance of your investments

      Evaluate the ROI of your security technology portfolio like Buffett evaluates his financial investments portfolio. Create a framework that measures the performance of your investments in people, processes and technologies on a regular basis, be it quarterly or annually. Defining metrics around things such as incident reduction, speed of application deployment, cost savings in overall IT spend, time to compliance and customer acceptance equips you with data on which security tools are working and which ones aren’t so that you can make adjustments accordingly.

      4Buffett: ‘Risk comes from not knowing what you are doing.’

      Buffett: 'Risk comes from not knowing what you are doing.'

      While many security leaders are terrified about “flying blind”—the inability to spot malware on their organization’s devices—the reality is that most CISOs don’t actually have visibility into their data centers and cloud environments. They lack the basic understanding of how their applications are communicating over networks and which channels are most vulnerable. As a result, CISOs blanket their systems with threat detection technologies that inundate them with alerts, many of which are false positives and can distract them from responding to real threats.

      5Advice to CISOs: Know where you’re most vulnerable

      Advice to CISOs: Know where you're most vulnerable

      Build a map of how your applications, users and networks communicate so that you have visibility into your attack surface and where your greatest points of vulnerability lie. Similar to how doctors rely on MRIs to see the connections in a patient’s body and make informed decisions for treatment, security leaders should make sure they understand the connections within their data centers and cloud environments so that they know all of the potential attack vectors and where they’re most vulnerable. Armed with this intelligence, they can curate their security investment strategy to prioritize sensitive areas, effectively manage alerts and focus on responding to real threats.

      6Buffett: ‘I don’t look to jump over seven-foot bars: I look around for one-foot bars that I can step over.’

      Buffett: 'I don’t look to jump over seven-foot bars: I look around for one-foot bars that I can step over.'

      Three fundamental requirements to reduce the risk and spread of security threats are basic, yet often neglected, best practices: a) patching, i.e., update operating systems and applications with the latest software; b) multifactor authentication, i.e.,require multifactor authentication for corporate networks, systems and applications; and c) micro-segmentation, i.e., segment high-value assets from lower-value assets. Investing in these simple security techniques is the cyber equivalent of investing in bonds: The benefits are easily understood and consistent.

      7Advice to CISOs: Don’t overlook the basics

      Advice to CISOs: Don't overlook the basics

      Instead of getting caught up buying the hottest new security technology, cover the basics first. If you aren’t already investing in patching, multifactor authentication (MFA) and micro-segmentation across your devices, data centers and cloud environments, then you’re missing out on three of the most fundamental security best practices that will have the greatest returns for keeping your organization safe.

      8Buffett: ‘Berkshire Hathaway, like most corporations, nets considerably more from a dollar of dividends than it reaps from a dollar of capital gains.’

      Buffett: 'Berkshire Hathaway, like most corporations, nets considerably more from a dollar of dividends than it reaps from a dollar of capital gains.'

      Rather than looking to create additional dividends from existing security investments (be them technologies, people or processes), most organizations are quick to adopt new technologies. Security and IT leaders should work together to ensure that security investments align with their organization’s broader IT strategy. As your organization moves more workflows, applications and data to the cloud, ensure that your security solutions not only keep pace but actually enable you to get there faster.

      9Advice to CISOs: Make sure your security investments align with your broader IT strategy

      Advice to CISOs: Make sure your security investments align with your broader IT strategy

      Security should be a business enabler, not an inhibitor. Make sure that security investments for the legacy business can provide the cover you need as your organization moves to the cloud and adopts new technologies and workflows.

      10Buffett: ‘If you’re smart, you’re going to make a lot of money without borrowing.’

      Buffett: 'If you're smart, you're going to make a lot of money without borrowing.'

      Organizations spent an estimated $3.5 trillion on IT in 2017, with security accounting for less than 3 percent of that total. But as we’ve witnessed from the high-profile attacks of the last year, a hack can cripple a business’s market cap. Or in the words of Warren Buffett: “It takes 20 years to build a reputation and five minutes to ruin it.” If security is an underpinning of a business, then organizations should allocate investment dollars and resources accordingly.  

      11Advice to CISOs: Frame security as an investment, not a cost center

      Advice to CISOs: Frame security as an investment, not a cost center

      Make sure security receives the adequate funds and resources necessary to ensure your investments are effective. Use the performance metrics of your security investments to demonstrate clear ROI to your board and other decision-makers so that security is viewed as an integral resource that supports the company’s revenue stream and overall business value, rather than as a cost center.

      12Conclusion

      Conclusion

      In today’s hostile threat landscape, the stakes involved in protecting your organization have never been higher. Yet, with the massively crowded vendor landscape, it’s easy for security professionals to get stymied—but it doesn’t have to be that way. Security leaders can look to Warren Buffett’s investment philosophy for wisdom on how to approach their security strategy to ensure they’re getting the biggest returns on their investments.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.