All hands on deck: Key cyber considerations for a new reality

Cyber threats are mounting. Are you prepared to protect your environment?

Kyle Kappel

Kyle Kappel

Principal, Cyber Security, KPMG US

+1 949-431-7359

The world has changed dramatically in 2020. Business was already changing and the fourth industrial revolution is well underway, but COVID-19 triggered the survival instincts of businesses, who have accelerated their digitization to succeed in the new reality. The idea that data has become the lifeblood of the organization has been reinforced as boards seek to harness the potential of our digital economy, create new customer experiences, transform their services, and drive efficiencies and cost savings in the wake of the pandemic. The future is being created from a fusion of new business models, new technologies, and new partnerships.

In this changing world, there are ruthless entrepreneurs who are making money in this new economy. Unfortunately they are cyber criminals and they are on the wrong side of the law. They pose new challenges to legitimate businesses, and companies need to think differently about how to protect their competitive advantage and develop new models with a goal of becoming and remaining cyber secure.

Cyber security professionals need to demonstrate they can protect the heart of the transformed business with an agility of thought and action that recognizes the pace and speed at which cybercriminals operate.

They need to assemble the kind of collaborative talent—across the enterprise—that is able to take a proactive stance and meet these issues head on. The CISO can’t do it all. New partnerships are needed, technology is an opportunity, not a threat, and cyber security is becoming a key business enabler.

We picked eight key cyber considerations that will shape the way we approach security in the new reality beyond, and asked our professionals to share their insights and experiences to help you meet the challenges ahead.

Addressing the security deficit

Aligning business goals with security needs

Digital trust and consumer authentication

The evolving security team

The next wave of regulation

Cloud transformation

Automating the security function

Challenging assumptions around resilience