blog post

What is the Goal of Cybersecurity?

In digital security, the foundational question looms large: What exactly is the goal of cybersecurity? This question, seemingly straightforward, strikes at the heart of a critical challenge facing corporations globally. Despite decades-long efforts to fortify digital defenses, cybersecurity threats persist with alarming regularity.

Consider the staggering statistic from 2022 alone: over 4,100 data breaches were publicly reported, exposing approximately 22 billion records.

This occurred in a year following an unprecedented $150 billion global expenditure on cybersecurity measures. Moreover, the software landscape itself is undergoing a transformation, with the advent of artificial intelligence (AI) and, more specifically, generative AI, reshaping software utilization and subsequently, amplifying vulnerabilities.

So, what steps should organizations take to safeguard their digital assets?

The response is multifaceted. Far from suggesting that cybersecurity endeavors are futile, it’s imperative for organizations to recalibrate their security objectives to align with the evolving digital and data utilization landscape. It’s time for a paradigm shift in cybersecurity strategies.

To adapt to the digital world’s increasing insecurities, organizations should consider three pivotal adjustments in their cybersecurity approach:

Redefining the Objective of Cybersecurity Programs

Traditionally, cybersecurity efforts have focused on preventing failures.

However, given the inherent complexity and fragility of software systems and AI, failure is an inevitable aspect, not a flaw, of these systems. AI’s probabilistic nature means it will occasionally err, albeit ideally less frequently than humans. As software becomes more complex, its vulnerabilities multiply.

Cybersecurity strategies, therefore, should pivot from trying to avert every potential incident to enhancing capabilities in detecting and responding to incidents when they inevitably occur.

Embracing zero-trust architectures, which operate under the assumption that breaches are not just possible but likely, represents a strategic move toward acknowledging and addressing these realities.

Beyond adopting zero trust, organizations need to bolster their incident response frameworks, conduct comprehensive simulations of potential failures, and enhance internal planning for both traditional and AI-driven systems.

Expanding the Definition of “Failure”

Digital failures now encompass a broader spectrum than mere security breaches, including performance glitches, privacy infringements, and ethical concerns, among others.

The rapid integration of AI complicates the definition of a security incident. For example, the leak of Meta’s AI model LLaMA not only raised security questions but also sparked debates over intellectual property rights and privacy implications.

Cybersecurity initiatives can no longer be confined to preventing security breaches. They must be integrated into a broader risk management strategy that anticipates and mitigates a wide array of potential failures, whether they stem from adversarial actions or not.

Prioritizing Failure Monitoring

Currently, the detection and containment of breaches are alarmingly slow, often relying on third-party notifications. This reactive stance highlights a critical gap in proactive monitoring strategies.

Each software system and database requires a tailored monitoring plan, a practice gaining acceptance in AI risk management. For instance, the National Institute of Standards and Technology’s AI Risk Management Framework advocates for mapping potential AI system harms and devising plans to manage them.

While third parties play a valuable role in identifying risks, primary responsibility for detecting digital failures should rest with the organizations themselves.

Easy to Talk About, but Hard to Do.

These recommendations represent just the beginning of a comprehensive overhaul needed in cybersecurity practices. As digital systems evolve, so too must the strategies to protect them. This includes ensuring continuous data integrity, integrating security throughout the development lifecycle via DevSecOps, and dedicating more resources to risk management, especially as AI becomes more prevalent.

Acknowledging failure as an inherent aspect of digital systems is not an admission of defeat but a pragmatic approach to cybersecurity. By embracing this reality, organizations can better prepare for and respond to the digital challenges that lie ahead.

Regardless, unless we continue to learn more and get smarter, technology solutions alone will never save the day.

Author

Steve King

Managing Director, CyberEd

King, an experienced cybersecurity professional, has served in senior leadership roles in technology development for the past 20 years. He began his career as a software engineer at IBM, served Memorex and Health Application Systems as CIO and became the West Coast managing partner of MarchFIRST, Inc. overseeing significant client projects. He subsequently founded Endymion Systems, a digital agency and network infrastructure company and took them to $50m in revenue before being acquired by Soluziona SA. Throughout his career, Steve has held leadership positions in startups, such as VIT, SeeCommerce and Netswitch Technology Management, contributing to their growth and success in roles ranging from CMO and CRO to CTO and CEO.

Get In Touch!

Leave your details and we will get back to you.