Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Cybersecurity Must Evolve to Be a Business Enabler
Innovation & Leadership

Why Cybersecurity Must Evolve to Be a Business Enabler

John SiefertBy John SiefertApril 19, 2023Updated:April 19, 20234 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
AE Leadership

In episode 40 of the Growth Swarm podcast, John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan discuss cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective. In particular, they discuss how practitioners need to both embrace the “cybersecurity as a business enabler” premise and also follow the rules that go along with it, in order to, in John’s words, “make sure that those things actually come to life.”

To hear practitioner and platform insights on how solutions such as ChatGPT will impact the future of work, customer experience, data strategy, and cybersecurity, make sure to register for your on-demand pass to Acceleration Economy’s Generative AI Digital Summit.

Highlights

01:49 — John asks Scott to discuss access control and governance in the context of frameworks.

02:02 — While customers and partners need access to it, we still have to be careful who can get in and have a plan to control it, Scott says. The data is only useful if it’s accessed by the right people at the right time. The framework for this has evolved; it’s not just about protection anymore, but also offense, and it needs to be built in from the get-go rather than adding it on later.

03:17 — John asks Tony to comment on some ideas raised by Rob Wood in recent reports about connecting the dots among chief data officers (CDOs), chief information officers (CIOs), and chief information security officers (CISOs).

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

04:23 — Tony says that cybersecurity has moved from defense to offense, providing secure access to customers and employees with the aim of growing business, and CEOs need to understand this. The attack surface has expanded with cloud-based apps and third-party applications, which can create cybersecurity risks, but a smart cybersecurity strategy that broadens the purview to consider new areas of risk can help businesses grow, while still protecting data.

07:10 — John references Frank Domizio’s recent analysis on starting the journey to develop a zero trust architecture that takes data priority and access into account. Constant monitoring and analyzing of the setup is important, and this can be addressed with automation and AI tools. Bob is asked for his thoughts on the topic.

09:16 — In 2023, Bob says, C-suite leaders will have to identify the top three areas of cybersecurity risk and show what they’re doing to address them, not just leave it to IT or security teams. Non-tech executives need to fully understand the issues and the way they weave together on both the defense and offense side, and likely we’ll be seeing more of that this year. Those who can’t adapt don’t deserve to be top business executives in a data-driven business.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

11:01 — As a senior executive, it’s important to know and tier what the most critical data is, and comply with federal regulations based on the industry you’re in. John agrees, and references recent analyses by Frank Domizio, Rob Wood, and Chris Hughes that emphasize this.

11:49 — Scott talks about how the TikTok CEO recently referenced playing defense and the importance of cybersecurity, given that there are more than nine million apps on Chinese servers. Cybersecurity needs a proactive plan, strategy, and framework, just like ESG.

12:51 — John cites some recent research from security provider Lookout on phishing attacks, which are becoming more sophisticated and commonplace, even in everyday activities like scanning a restaurant’s QR code. Employees using the same device for critical financial data and everyday no-security-required activities can increase business exposure. To get out in front and make cybersecurity a business enabler, it’s important to pay attention to research and best practices. John asks each person on the team to share their one tip for cybersecurity.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

14:31 — When it comes to cybersecurity, leaders should shape, not just define, the culture of their organization, says Bob. Taking an active interest in the topic will encourage the team to be more prepared and ready to handle potential breaches. Slogans alone won’t suffice; people like what you do, not what you say.

15:13 — Business technology buying committees are broadening, with non-tech C-level titles actively engaging. As such, says Tony, C-level executives can’t assume others are taking care of cybersecurity and therefore must take responsibility as sponsors and actively involved leaders.

Securing Multi-Cloud Ecosystems Guidebook
Guidebook: Securing Multi-Cloud Ecosystems Guidebook

17:10 — Scott recommends that IT and data ladders use seminal moments like the TikTok CEO’s recent comments to elevate and drive conversations across business and technology leaders. These moments can be used to show the ramifications and translate what they mean for the business.


Want more tech insights for the top execs? Visit the Leadership channel:

AE Leadership

Interested in Lookout?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

C-Suite CEO CIO CISO CXO Cyber Attack Cybersecurity data featured framework leadership Lookout multi-cloud phishing podcast Practitioner Roundtables security zero trust
Share. Facebook Twitter LinkedIn Email
Analystuser

John Siefert

CEO
Cloud Wars, Dynamics Communities

Areas of Expertise
  • AI
  • Cloud
  • LinkedIn

John Siefert is the CEO of Dynamics Communities and Cloud Wars, where he leads the strategic direction, business, and community-based focus of the organization by collaborating with colleagues, customers, partners, and friends. Prior to DCI, Siefert has worked in multiple leadership positions, including President roles at Questex and Informa, SVP at UBM, CMO at STYR Labs, and CEO at Virgo, LLC. Siefert’s passion for creating unique content, community, and event-based programming has helped to build some of the largest media brands in the B2B market, serving the business technology and health/nutrition categories. In his personal life, Siefert is a father of two, married to the love of his life, and digs beaches, barbecues, boats, astrophysics, and road-tripping.

  Contact John Siefert ...

Related Posts

Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators

June 20, 2025

Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure

June 20, 2025

The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster

June 19, 2025

Inside Rabbit’s Strategy to Automate Cloud Cost Optimization for Engineering Teams with Balazs Molnar | Cloud Wars Live

June 19, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators
  • Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure
  • The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster
  • Inside Rabbit’s Strategy to Automate Cloud Cost Optimization for Engineering Teams with Balazs Molnar | Cloud Wars Live
  • Microsoft Showcases Real-World Use of Model Context Protocol (MCP) In Vertical Industry App

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.