Page 62 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 62

the cost of a data breach is rising. The average cost of a data breach has increased by 60% in the past
            five years.

            While the risk we knew before used to be around Information Systems and Services with a focus on loss
            of data, service or finance, it has grown much bigger now. With the adoption of smart devices and new
            digital methods, however, the risk has increased to include the loss of human life.

            Unfortunately, this cannot be addressed or contained within the three Tenets of the traditional “CIA Triad"
            – Confidentiality, Integrity, and Availability. When faced with such a reality as this, there is only one way
            out: the pragmatic introduction of a new dimension and Tenet “T – Trust” which focuses on building trust
            across digital interactions.



            Understanding the New Dimension “T – Trust” and Digital Trust

            Trust is the foundation of any successful relationship, and it's no different when it comes to human-
            computer interactions in cybersecurity. When we trust our systems and our data, we're more likely to use
            them safely and securely. In order to redefine cybersecurity, we need to focus on building trust.

            For instance, creating systems that are secure, reliable, and transparent and educating users about
            cybersecurity risks and how to protect themselves will not only build trust, but will also save lives because
            of risk awareness. By focusing on trust, we can create a more secure and resilient cyber environment
            and security posture.
            Just like the conventional CIA triad for Information Systems, digital trust is the foundation for any digital
            business and helps build confidence in the consumption of digital services and other digital interactions.
            Digital trust is built on factors such as security, privacy, transparency, and accountability. From integrated
            risk management, performed and measured in real time, to factual and data driven insights validated on
            a  continuous  basis  with  automation,  the  importance  of  digital  trust  in  Cybersecurity  cannot  be  over
            emphasized.

            Let’s  consider  some  of  the  following  supporting  pillars  for  a  new  “T-Trust”  tenet  in  cybersecurity:



            Integrated Risk Management:

            Digital  trust  in  integrated  risk  management  ensures  the  provision  of  integrated  insights  on  an
            organization’s  security  posture,  how  it  manages  threats,  security  risks,  and  all  other  aspects  of
            operations, including its physical and information security, as well as its people and processes.

            Continuous Monitoring:

            When trust becomes a priority, continuous monitoring is the only way to track progress or failure. This
            concerns the collection, analysis, and constant tracking of digital assets to avoid security breaches.









                                                                                                              62
   57   58   59   60   61   62   63   64   65   66   67