Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Position Cybersecurity as a Business Enabler
Cybersecurity

How to Position Cybersecurity as a Business Enabler

Frank DomizioBy Frank DomizioDecember 20, 2022Updated:April 13, 20234 Mins Read
Facebook Twitter LinkedIn Email
cybersecurity priority
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

As leaders, our calendars are loaded with priorities, but we must find the time to prioritize cybersecurity — convincing our boards of directors and executives that robust, comprehensive cybserecurity is a business enabler — or face serious, business-threatening consequences.

The question is, with limited time, how can you advance this agenda? Here are some ideas.

Track the Work

Zero in on the cybersecurity work being done, and make sure it is the right work. Projects fall behind, software ages, and people go on autopilot. (Not solely a cybersecurity thing, but I do see it happen often in our field.) This can mean money flying out the window.

Make revisiting ongoing work a priority. It is inevitable that some projects will start to lag. They may have lost momentum or been pushed aside due to other activities. Sometimes your team needs to know that you’re still interested to reinvigorate them to hit the gas pedal and push through.

Other times, it may be time to let the sun set on a project that just isn’t moving. The decision to stop work on an in-progress project can be difficult and shouldn’t be made haphazardly. It can affect staff morale, as well as set other dependencies behind schedule. But after some thought, you may discover that a project that looked like the right direction to go six months ago is just not working out, and you need to end it. You can save large swaths of time and money by making the necessary, but tough decision to move on from something you and your team once believed in.

Incident Response Plans

There’s so much planning involved in breach response, we wrote an entire series on it. That said, there are a few simple things that you can prioritize to make sure your security teams are in the right place in the event of an incident.

One is to take a few minutes to have your security team review your organization’s incident response plan with you. This will give them a little encouragement to look at what they have and make sure everything is up to date. Plus, it will provide the opportunity for you to talk through it with them to make sure their planning considers important business outcomes viewed through the proper security lens. The team will value your interest in their work and you will also help to button up your plans for what is sure to be a very stressful day in your career.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

Training Teams Outside of Security

Your information technology (IT) security team should be in a constant state of learning. That is typically some mix of reading (like Acceleration Economy), hands-on training, and lectures. But what about the leadership team? Will your business owners know who to contact in the CFO’s office? Is there anyone in the marketing department with crisis communications experience?

You can answer these and many more questions with a tabletop exercise. This type of training needn’t take all day: You can typically go through a scenario in about 30-60 minutes. Gathering your technical, communications, policy, and financial teams not only allows them to work the kinks out of the process, it also allows them to get to know each other. And the cherry on top is that spending this time will certainly communicate to the rest of your organization that cybersecurity is front of mind while also showing where you may have room for improvement.

Conclusion

Establishing a higher-level focus on cybersecurity, and enlisting partners across business functions to support this focus, will bolster the position of cybersecurity as a business enabler. We are not trying to make everyone in your organization a cybersecurity practitioner (just as when we talk about budget, we are not trying to make everyone an accountant). However, we do need to make sure that our people understand that cybersecurity is a priority that adds tangible value to our business. What other ways do you think business leaders can communicate that cybersecurity is a priority? Join the conversation on Linkedin.

click here to join the conversation on linkedin

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity featured leadership software
Share. Facebook Twitter LinkedIn Email
Frank Domizio
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

Related Posts

How One Company Added 20% to Profit with Cloud Optimization

June 27, 2025

AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare

June 27, 2025

Workday Sets the Standard for Responsible AI with Dual Governance Accreditations

June 27, 2025

The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined

June 26, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare
  • How One Company Added 20% to Profit with Cloud Optimization
  • Workday Sets the Standard for Responsible AI with Dual Governance Accreditations
  • The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined
  • Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.