Wednesday, 01 Dec, 2021




Building the Next-Gen Cyber Security Operating Model in a Digital Eco-System

Telecom Business Review

Volume 13 Issue 1

Published: 2020
Author(s) Name: Niladri Shekhar Dutta | Author(s) Affiliation: Director, TMT and Digital.
Locked Subscribed Available for All


The business of today are fast changing from a pipeline based model to a platform based model. The Digital businesses of today are focussed on this simple strategy which makes them use and rely more on technology enablers. These companies create new value and experiences that differentiate them with a competitive edge over their peers. New value is created in business models, customer experiences and the internal capabilities that support core operations of an organization. Thereby in the tech space, organizations transforming the programs to become digital business enablers, is very crucial in order to create an exponential value in this era. A core entity due to this rapid transformation is Cyber Security and the blueprint which one needs to adapt within this ecosystem of devices, applications and interfaces. Due to requirement of enabling digital business, during digital transformation and afterwards organizations are exposed to different risk factors and situations which cannot be handled and detected by utilizing the conventional and existing security practices for IT. This paper essentially focusses on stitching the various capabilities that entails the need and desire of a winning proposition which stands in front of CxOs to start thinking of Risk management and Cyber Security in a very different light and how one can leverage this function to show its direct and indirect benefits. It must address a new reality in which IT organizations have little direct infrastructure, and their biggest security concerns will come from services outside their control eg. using cloud services. That is why it is required to build a Security operational model architecture in the Digital Business World. A Security operational model will integrate all required crucial capabilities along with the security operational processes, skills, infrastructure, security enablers and drivers of customer/ user experience followed by the next gen DNA which need to exist within the whole organization set up. This will eventually ensure better performance and even overcoming pitfalls of the processes by complementing each other and also adding value in terms of providing better customer experience, optimizing cost price, reducing time of operation and other conveniences compared to earlier individually existing conventional security methodologies. In order to create an effective and secured blueprint which will provide fruitful results due to transformation to digital business approach should be initiated by considering having a proper vision as the first and initial step, followed by changes in objectives, embracing principles to ensure trust resilience and developing an adaptive, Context Aware Security Architecture. Ensuring security is very crucial in different real world scenarios such as remote management of IT resources, shared cloud services, encrypting data in motion and rest, effective management of BYOD devices etc.

Keywords: Cybersecurity, Digital Business, Digital Transformation, Risk Management

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback ©, All rights reserved