Table of Contents Table of Contents
Previous Page  54 / 60 Next Page
Information
Show Menu
Previous Page 54 / 60 Next Page
Page Background

50

Cybersecurity in ASEAN: An Urgent Call to Action

AppendixA: SecurityMaturityModel

Note: SDLC is systems development life cycle.

Sources: International Data Corporation; A.T. Kearney analysis

Digital

transformation

strategy

Digital transformation

initiated at function or line

of business level, but

uncoordinated with

enterprise strategy.

Digital transformation

initiatives are tied to

enterprise strategy but

with short-term focus and

tactical solutions.

Integrated, continuous

enterprise wide digital

transformation innovation

in place.

Digital initiatives transforms

market and customers by

creating new business

models and services.

Security business

objectives

Objectives, leadership,

cross-function,

culture

Business-level planning

focused on meeting

external or internal

compliance and legal

requirements.

Cybersecurity planning

is reactive and highly

tactical.

Cybersecurity planning

focused on protecting

core business assets and

processes. Security is

treated as a silo function

and perceived as a barrier

to digital transformation

initiatives.

Cybersecurity planning

aligned with digital

transformation objectives

to prioritize cybersecurity

as a business concern,

leveraging accreditation

to improve external

con†idence.

Continuously review

and optimizes digital

transformation initiatives

in alignment with risk

assessment. Processes in

place for business to

govern execution of

security throughout

business lifecycle.

Digital risk

management

Strategy, management,

governance,

compliance,

data protection

Risk management seen as

a legal issue for meeting

external or internal

compliance requirements.

Risk management

framework employed to

baseline risk estimation

and guide the application

of appropriate security

controls. Risk is treated

in technical terms.

Economic and external

assurance framework and

organizational processes

applied to continuous risk

management. IT risk is seen

in context of business risk

and a part of strategic

requirements.

Data-driven performance

metrics in risk estimation

and cost-beneit model

for use across the

business and programs.

Risk treated in business

opportunity terms.

Security program

Policy, architecture,

operations, monitoring,

controls, SDLC,

metrics

Cybersecurity handled

by IT, focusing on basic

authentication,

perimeter-based security,

and standard threat

protection mechanisms.

Cybersecurity program

build around protection

of users, data, and

applications through

application of essential

security controls.

Cybersecurity program

aligned with risk strategy

and employs capabilities

to continuously monitor

for and respond to threats.

Cybersecurity program

implements processes

and technical

architecture across

enterprise. Cybersecurity

capabilities enable

business processes.

Digital platform

Virtualization, cloud,

network, mobile, IoT

Basic cybersecurity and

asset management

solutions for digital

platforms to conform

with external and internal

compliance requirements.

Distinct cybersecurity

controls across applied

across physical, virtual,

internal, and external

digital platform

environments.

Cybersecurity controls

augmented for threat

monitoring and response

across digital platforms

and employ risk model for

external services.

Integrated, automated

security controls across

digital platforms based

on a distributed security

model that focuses on

securing users, data,

and applications.

Minimal

to comply

Security controls

focused

Threat focused

toprotect

Agility to grow

the business