Logo Header Menu

ISO 27001: the cyber security standard that organisations should strive for across the supply chain

Mark Darby, founder and chief executive at Alliantist, explores the importance of ISO 27001 –– the cyber security standard that organisations should strive for ISO 27001: the cyber security standard that organisations should strive for image

The current cyber security landscape is one of confusion, but also one of recognition that things need to change.

This is best demonstrated in the government’s introduction of initiatives, such as Cyber Essentials. But, even this is under review and it is unclear what that will be moving to in early 2020 — more confusion!

In the face of a cyber security crisis, there’s a huge amount of certifications, accreditations and models out there that organisations are advised or even, compelled to adopt.

The pinnacle of these is ISO 27001 — the only information security management system standard that can be independently certified with a level of authority. Even NIST Cyber Security does not have that ‘certification’ so it’s another reason why smarter and more powerful buyers are pushing for ISO 27001

On top of this, the regulatory landscape is catching up with things like the updated Data Protection Act and the GDPR.

The comprehensive IT security guide for CIOs and CTOs

Information Age’s IT security guide for CIOs, covering everything from how to implement an effective cyber security strategy to how to respond to the security skills crisis. Read here

“Doing nothing is not an option”

Leaders and businesses are starting to recognise that “doing nothing is not an option” but they’re unsure on what to do, according to Mark Darby, founder of Alliantist, the company behind ISMS.online — which helps organisations demonstrate that they can be trusted for information security management.

Why the change of heart? Darby points to the increasing risks and consequences of suffering a breach as the main reason. And, because of this and regulations like GDPR, much larger organisations — the powerful ones in the supply chain, who can dictate to their suppliers what they do — are seeking recognised certification.

“The easiest one is perhaps Cyber Essentials, but that only goes so far,” says Darby. “A better, more recognised one by smarter organisations that want to see physical security as well as cyber security and secure product development, instead of just router protection and so on, is ISO 27001.”

This new way of approaching security is still emerging and the landscape is still fractured and confused.

“Somebody needs to drive a bit more of a wedge through it to make it easier for organisations that are starting to recognise that they’re consciously incompetent, instead of unconsciously incompetent,” he continues.

Tech Nation’s cyber security cohort: ISMS.online company profile

Trust in an organisation’s information security will help businesses retain and attract new customers. But, how to achieve this? ISMS.online can help. Read here

Moving from unconscious to conscious to proactive

Admitting the problem in cyber security is the first step. Then it’s a case of proactively addressing the security gap in an organisation.

Embracing Cyber Essentials is a good start, but as Darby has alluded to, it’s not enough.

“What, hopefully, the likes of the UK’s National Cyber Security Centre (NCSC) and others will do is that they’ll start to coalesce around a recognised standard, like ISO 27001,” he hopes. “Rather than all these organisations trying to bring their own flavour of something out, it will be far better if there were efforts made to help organisations across key areas.

“I think we will move towards that over the course of time, but what organisations can do themselves is perhaps start to educate their supply chain.”

AI in cyber security: predicting and quantifying the threat

Jonathan Pope, CEO and co-founder at UK cyber security company, Corax, explains how AI in cyber security can predict and quantify the threat. Read here

Secure the supply chain

Failures across the supply chain are one of the biggest security hurdles to overcome.

It’s time for organisations to embrace what Darby calls “responsible customer, responsible supplier programmes”.

“Let’s imagine that you are a large bank and you’ve got a very significant supply chain, instead of just sending down that supply chain a contract that says you will achieve ISO 27001, why not help them do it? Why not equip them with the capability to do it? So they’re actually building capacity and capability in their supply chains and making supply chains more resilient? There’s a lot that larger organisations could do to help the smaller, less wealthy, less experienced organisations.”

Collaboration is key. It always has been. But, it’s been frustrated by a natural business reaction to keep best practices or ways of working a secret.

It’s now about embracing a smarter way of working and adopting products that help organisations look up and down their supply chain; find out where are the risks, the consequences and the opportunities, and then look in that base to be saying has anyone already solved these problems and if so, how?

Tech Nation’s cyber security cohort: Corax company profile

What if your organisation could predict the likelihood of a data breach and how that breach would impact your business? Corax might have the answers. Read here

Cost challenge

Cyber security skills are a scarce commodity.

And, because of this, specialist prices are going through the roof — which means that it makes the topic of security unaffordable for smaller organisations to achieve; they can’t afford very significant consulting support.

To combat this, Alliantist have asked: “how do we codify scarce resource? How do we start to use automation, machine learning and things like that and build it into a product,” asks Darby?

Organisations will have to be looking at different ways of working to firm up the supply chain. But, crucially, even if they had the money, the resources don’t always exist.

Governments, businesses, universities and other educational establishments are starting to address this talent shortage and build future capacity. But, it doesn’t exist entirely at the moment.

Cyber security and IoT: skills shortage hampering development

The cyber security skills shortage is hampering Internet of Things development, according to new research from Experis. Read here

Strategise information security

As with most technology-related initiatives, security has got to start from the top; “not least because of the threats and risks around GDPR and loss of valuable IP is a serious issue,” says Darby.

In today’s media-first environment, breach scandals and data misuse are damning; potentially costing organisation’s millions or billions depending on their market cap. Shareholders and wider stakeholders are going to be really cued in as a result.

If an organisation can’t be trusted then it’s not going to go out and win business and it’s not going to strategically be able to grow in the areas that it wants to — a key consideration of those in charge.

Referring to his own background in business and strategy, Darby said: “Information security was affecting my ability to grow, so we had to get inside and understand that, because we were a technology company delivering software services that held valuable data inside them for our customers.

“Anyone who is a data processor on behalf of another organisation, is going to need to demonstrate that they can be trusted, and that’s a board level challenge. So if you’re in a large bank or you’re in a two-person organisation, that’s a significant growth challenge.”

“We couldn’t have grown our organisation without having a strategic approach to information security” — Darby

Leading the cyber security charge

In the largest organisations, the CEO or board is not likely to lead the charge on cyber security.

However, this responsibility will fall on the shoulders of the CIO, CTO or CISO — individuals of that calibre, given the importance of the subject.

“At a strategic level where you’re joining up organisations across the supply chain, and it affects every employee and every supplier, the senior management should handle that,” says Darby.

“In larger organisations, you typically encounter the DPO, the CISO, the CTO, the CIO or a senior level person sponsor,” he continues. “But, in the small to mid-size organisations, you’re talking director level, owner level, founder level.

“It’s a tricky challenge that you can’t delegate to the most junior of people; it needs that level of leadership and engagement.

“Even though it’s not an expensive problem to solve with tools like ours, it’s a remarkably expensive problem when it goes wrong or you fail to win that new business without it.”

Alliantist, the company behind ISMS.online is part of Tech Nation Cyber — the UK’s first national scaleup programme for the cyber security sector. It is aimed at ambitious tech companies ready for growth.

Latest news

divider
Cybersecurity
Protecting your business from phishing scams

Protecting your business from phishing scams

19 July 2019 / The recent announcement of British Airways’ record-breaking £183 million GDPR fine has put phishing scams [...]

divider
Telecoms
AI is saving telcos money but at the expense of customer service

AI is saving telcos money but at the expense of customer service

19 July 2019 / The rollout of commercial 5G networks is rapidly gathering pace. Both the US and South [...]

divider
Media & Marketing
How are AI and data-driven campaigns changing sales and marketing?

How are AI and data-driven campaigns changing sales and marketing?

19 July 2019 / Think of sales and marketing campaigns in a traditional sense and you may well dream [...]

divider
Technology
How “skippers” disrupt the market and become aspiring unicorns

How “skippers” disrupt the market and become aspiring unicorns

19 July 2019 / Skippers are disrupting the market on their way to becoming the fabled unicorns. Luxury fashion [...]

divider
Cybersecurity
Silent Cyber: The need to define cyber insurance policies 

Silent Cyber: The need to define cyber insurance policies 

19 July 2019 / Business across all industries are now more aware than ever of the importance of employing [...]

divider
AI & Machine Learning
AI and understanding semantics — the next stage in the evolution of NLP is close

AI and understanding semantics — the next stage in the evolution of NLP is close

18 July 2019 / AI is a misnomer, or so it is often suggested. The first letter — artificial [...]

divider
News
The backlash against tech: can the tech giants survive populism?

The backlash against tech: can the tech giants survive populism?

18 July 2019 / The idea that tech destroys jobs is misleading. Innumerable studies show that it often creates [...]

divider
Construction & Civil Engineering
Digital transformation in the construction industry: is an AI revolution on the way?

Digital transformation in the construction industry: is an AI revolution on the way?

18 July 2019 / The majority of industries have begun their digital transformation journeys. Digital transformation in the construction [...]

divider
IoT and M2M
Protecting the edge of IoT as adoption rates grow

Protecting the edge of IoT as adoption rates grow

18 July 2019 / Protecting the edge of IoT is increasingly important as IoT adoption grows. During this evolution, [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest