Page 62 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 62
the cost of a data breach is rising. The average cost of a data breach has increased by 60% in the past
five years.
While the risk we knew before used to be around Information Systems and Services with a focus on loss
of data, service or finance, it has grown much bigger now. With the adoption of smart devices and new
digital methods, however, the risk has increased to include the loss of human life.
Unfortunately, this cannot be addressed or contained within the three Tenets of the traditional “CIA Triad"
– Confidentiality, Integrity, and Availability. When faced with such a reality as this, there is only one way
out: the pragmatic introduction of a new dimension and Tenet “T – Trust” which focuses on building trust
across digital interactions.
Understanding the New Dimension “T – Trust” and Digital Trust
Trust is the foundation of any successful relationship, and it's no different when it comes to human-
computer interactions in cybersecurity. When we trust our systems and our data, we're more likely to use
them safely and securely. In order to redefine cybersecurity, we need to focus on building trust.
For instance, creating systems that are secure, reliable, and transparent and educating users about
cybersecurity risks and how to protect themselves will not only build trust, but will also save lives because
of risk awareness. By focusing on trust, we can create a more secure and resilient cyber environment
and security posture.
Just like the conventional CIA triad for Information Systems, digital trust is the foundation for any digital
business and helps build confidence in the consumption of digital services and other digital interactions.
Digital trust is built on factors such as security, privacy, transparency, and accountability. From integrated
risk management, performed and measured in real time, to factual and data driven insights validated on
a continuous basis with automation, the importance of digital trust in Cybersecurity cannot be over
emphasized.
Let’s consider some of the following supporting pillars for a new “T-Trust” tenet in cybersecurity:
Integrated Risk Management:
Digital trust in integrated risk management ensures the provision of integrated insights on an
organization’s security posture, how it manages threats, security risks, and all other aspects of
operations, including its physical and information security, as well as its people and processes.
Continuous Monitoring:
When trust becomes a priority, continuous monitoring is the only way to track progress or failure. This
concerns the collection, analysis, and constant tracking of digital assets to avoid security breaches.
62