Cybersecurity

Four key challenges for cybersecurity leaders

A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel   July 8, 2019.

Cybersecurity must be a fundamental feature of every product and system Image: REUTERS/Ronen Zvulun

Ken Xie
Founder, Chairman of the Board and Chief Executive Officer, Fortinet
Share:
Our Impact
What's the World Economic Forum doing to accelerate action on Cybersecurity?
The Big Picture
Explore and monitor how Digital Communications is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:

Cybercrime

  • Cybersecurity must be built-in to every product and system.
  • Achieving this will pose four challenges for business leaders.
  • By overcoming them, we can create a truly protected digital world.

In business and society today, we are too often focused on bolting on cybersecurity in a hyphenated manner. We want “security-enabled” this, “security-enhanced” that. But cybersecurity cannot be an add-on. Rather it must be built into every product and system from the moment it is conceived. To achieve such integration, we need to address four fundamental leadership challenges:

1) Real-time information sharing

The pace of the digital world continues to increase exponentially. To keep up, security professionals have to address threats and security weaknesses rapidly, before cybercriminals strike. Speed is fundamental to an effective cybersecurity strategy; cybersecurity systems must keep up with the increasing speed and volume of internet traffic. Speed of reaction is vital as well. Too often, there are long lag times in addressing cybersecurity problems. Criminals can – and do – take advantage of this.

But speed requires visibility. To act fast, we must share threat information in near real-time. Cybercrime has no borders. In a world that is so deeply interconnected by digital technology, cybersecurity and global security are the same thing. No single organization, public or private, can have a complete view of the entire cyber landscape. Senior leadership must insist organizations share information to put the pieces of the puzzle together. Otherwise, we will be flying blind.

Have you read?
2) Widespread collaboration in cybersecurity

Effective cybersecurity must be deeply and widely collaborative. Collaboration enables the good guys to create a hive mind, to learn rapidly, constantly expanding our competency and capacity. If organizations or states do not learn from one another, the same attacks will needlessly take down countless entities.

Wide collaboration means including everyone in a broader conversation about cybersecurity. Deep collaboration means making everyone smarter and creating knowledge repositories that are part of our operational systems. It means collaborating on threat intelligence sharing and it means collaborating on education.

The more we talk about the importance of cybersecurity and its fundamental role, and the more education is shared, the more we will educate and nurture the future generations of cybersecurity professionals we very much need. The estimated cost of damage caused by hackers, malware and data breaches is projected to reach $6 trillion by 2021. To empower leadership to meet these challenges, technological experts and top-level decision-makers across the public and private sectors must work together. This takes time. Senior leaders should make it clear that such collaboration is time well-spent.

Working together, we could see tangible results very fast. More than 92% of malware is delivered via email. With the right awareness campaigns and policies, as well as diligence in practice, we could eliminate more than 90% of malware simply by teaching new skills that overcome ingrained behaviours.

Discover

How is the Forum tackling global cybersecurity challenges?

3) Creating and promoting a common vision for integrated cybersecurity

Public and private sector leaders must commit to creating a common vision for integrated cybersecurity - something akin to NATO, which is based on clearly defined fundamental principles.

This vision for integrated cybersecurity must be comprehensive and inclusive, anticipating the next actions of cybercriminals rather than solely reacting to them. Just like NATO has well-trained armies and constantly evolving battlefield strategies, the common vision must be operational and must look at how best to address the technical challenges of effective cybersecurity, including the skills gaps I focused on in a previous piece.

Cybersecurity competency must be embraced by individuals and organizations. Cybersecurity education and training should be part of everyone’s educational development. Without such efforts, we will not have enough experienced soldiers to fight this war.

Cybercrime is high on business' agenda
Cybercrime is high on business' agenda Image: World Economic Forum 2019 Regional Risks for Doing Business report
4) Promoting the technology platform we need to make this work

Cybersecurity was not part of the design of most of the world’s current infrastructure. This must change.

Making cybersecurity work requires computing power. From now on, most products, devices and infrastructure should have this additional computing power designed in. Furthermore, the cybersecurity capabilities inside the devices must fit into an integrated platform that distributes workloads over the layers of a system.

An example of such a larger vision for cybersecurity where all parts of the network participate together is security-driven networking, which changes traditional assumptions of networking. Instead of looking only for the fastest path, security-driven networking takes the risk of each path into account and moves traffic over the fastest safe path. To make this work, the networking devices all need to share information about the speed and the risk of each network path.

The ability to offer robust security across the network with low latency and high performance is a critical functionality that organizations are seeking, especially with the deployment of 5G networks. A centralized approach is no longer tenable.

An integrated, optimized platform won’t emerge in a perfect form, but it won’t emerge at all unless we realize that it is needed. Organizations like the World Economic Forum's Centre for Cybersecurity must continue to educate product designers around the world about the need to build cybersecurity into their products, and and best practices in doing so. In some cases, this may lead to a product refresh while in others it will lead to a redesigned ecosystem. In many cases, both changes will be required. We also need more widely accepted standards and protocols and public discussion about the topic to encourage trust.

A way forward

Given these four challenges, it is only once we have true integration, both across national and geographic borders, and also within our own businesses, that cybersecurity will achieve its full potential of creating a truly protected world.

Regardless of industry, vertical market, and geography, industry and government leaders have a responsibility to guide us toward a safer world. In a climate permeated by lack of trust and poor cooperation between established industry leaders, the only winners are cybercriminals. As leaders of important global organizations, members of the WEF and its Centre for Cybersecurity, and as an individual deeply aware of the importance of this imperative, I believe that cybersecurity is a responsibility we must all take on.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Share:
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

Quantum computing could threaten cybersecurity measures. Here’s why – and how tech firms are responding

Simon Torkington

April 23, 2024

About Us

Events

Media

Partners & Members

  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum