Fujitsu_Customer_First_Security_Whitepaper
Fujitsu_Customer_First_Security_Whitepaper
White paper
Customer-first security: What it is and best
practices for success
It’s always been important for Chief Information Security Officers (CISOs) to deliver value to the company’s
bottom line. But new demands are raising the bar much higher for CISOs.
Page 1 of 5 www.fujitsu.com
White paper Customer-first security: What it is and best practices for success
Page 2 of 5 www.fujitsu.com
White paper Customer-first security: What it is and best practices for success
2. Then think about how security enables these goals. What data is By considering many different aspects of security and risk
used or generated in the course of pursuing these objectives? How management, these steps pave the way for better, more insightful
does that data need to be protected? What systems and practices and more business-aligned security. They also underscore how
are needed to make this happen? Be sure to consider not only data security in the digital age is about much more than technology alone.
provided by customers but data that’s produced and used during To be sure, CISOs following this roadmap for transformation also need
development, manufacturing and shipping, as well as during daily to watch for gaps that need fixing. But building a security culture
operations. It’s also important to think about how the customer that’s always watching for risks and ways to manage them is vital.
experience relates to data security and privacy concerns. Once these objectives and measures are in place, it’s also important
to continually assess whether they are still right as the security
3. Building on this, identify your security objectives to enable the
landscape and business needs change, to avoid these measures
larger business goals. Think about the new capabilities you’ll need,
becoming irrelevant.
and what kind of governance will be necessary to ensure new
processes are properly managed. Pay attention to data
requirements for regulatory compliance, too. These can vary, It’s critical that all relevant stakeholders are
depending on the markets and regulatory regimes in which your
involved, because their trust – whether it’s
business operates.
shareholders, employees, consumers or someone
4. You should also think about other projects, programs and
applications that could come into play. For example, if one of your else – is essential to business success.
organization’s goals is to become more mobile-friendly for
customers, how could the introduction of new user apps affect
What’s in it for you? How business-aligned security helps CISOs
compliance with data privacy and protection regulations in
Aligning security strategies to wider business objectives makes life
different markets?
better for CISOs in many ways. It builds greater awareness of the
5. Another key step is to identify potential stakeholders who might importance of security across the business and can help pave the way
have a say in your security transformation. Who needs to be for the creation of security champions across the organization by
consulted or informed? Whose support is needed? Who will be linking effective security to business success as a whole.
responsible and/or accountable? These could include everyone from
internal marketing teams to outside technology partners, Among the benefits you’ll discover:
equipment manufacturers and app stores. It’s critical that all
relevant stakeholders are involved, because their trust – whether • Wider organizational support – Better, big-picture understanding
it’s shareholders, employees, consumers or someone else – is also makes it easier to communicate concerns with other business
essential to business success. stakeholders, which improves the potential for cooperation. This
provides better context on how security issues affect different parts
6. Then think about what other actions are needed to ensure your
of the business. In addition, wider support for security matters
security goals are met. For instance, the rollout of a new customer
makes it easier to get buy-in for awareness campaigns, training
app in regions covered by the EU’s General Data Protection
and prevention programs… and other investments. There’s a
Regulation might require your organization to designate a Data
mistaken notion that CISOs alone are responsible for organizational
Protection Officer if you don’t already have one, or to set up new
security, when in fact everyone in the company must play a part.
consent mechanisms for app users.
• Simplified security – Many businesses deploy far more security
7. From there, establish the specific outcomes you’d like to achieve
technologies than they need because of siloes across different
while working toward your business and security goals. For
departments, business units and office locations. Approaching
example: 50,000 active app users with the right levels of privacy,
security holistically allows for businesses to determine the best
safety and security by the end of the fiscal year.
approach that fits with their enterprise architecture, but it can do
8. As you follow this roadmap, be sure to consider how achieving more than streamline technology, too: it can also pave the way for
your goals and outcomes might affect the maturity of your automation, freeing people to concentrate on more rewarding,
security operation. For instance, driving rapid adoption of a new innovation-focused activities to drive competitive advantage. While
consumer app could require the hiring of additional developers and transforming security operations can be complex and challenging,
the adoption of faster development cycles. the longer-term result is simpler, smarter and more efficient
security.
9. Finally, decide how your security organization will track and
measure progress toward achieving business goals. By linking • Better insights for planning – A more business-focused approach
security KPIs to wider company objectives, you ensure that security to security also makes it easier to fine-tune strategies for an
and business strategies are well aligned. Say your business is organization’s unique needs. This enables security to become more
launching a new B2B e-commerce site and aims to sign up 1,000 mature and forward thinking, rather than ad hoc. Setting targets –
new clients over the next 12 months – the security team could “We want to be here in three to five years” – is an essential part of
monitor a related metric, for example, by tracking how many of this. Of course, circumstances will change over time, so this process
those users opt to use biometrics instead of passwords to log in. must remain flexible and adaptable for continuous development.
Page 3 of 5 www.fujitsu.com
White paper Customer-first security: What it is and best practices for success
These are all concrete, real-life returns on investment for CISOs who The next generation of CISOs must move closer to business
choose to transform their organizations. management. It needs to fundamentally understand industry business
processes, regulations and risk beyond just technology.
There’s a mistaken notion that CISOs alone are Making security a priority involves not only regular training and
testing – the occasional dummy email to check for phishing
responsible for organizational security, when in fact
awareness, for example – but a constant drip-feed of information. The
everyone in the company must play a part. goal is to get people thinking about security at work as much as they
might at home, where most of them (hopefully) make a habit of
locking their doors, leaving a light on at night and avoiding letting
Overall benefits of business-focused security
strangers in.
C-suite executives have many reasons to welcome a security
transformation too. Businesses where security is everyone’s business,
Building a security culture means cultivating security champions
when it’s well aligned with company goals and customer needs, reap
across the organization, avoiding complacency and “tick-box” thinking,
clear advantages in the emerging digital environment.
and fostering an environment where people aren’t afraid to report
mistakes. It also requires nurturing a diverse security team with a
Improved security thinking means fewer breaches. When breaches do
range of abilities and talents – people skills, technology skills,
inevitably occur, it means faster response times, fewer (or less severe)
communication skills, business skills and more. So think about in-
negative impacts, better lessons learned and improved resilience.
house apprenticeships and partnerships with educational institutions
and professional associations.
This means businesses are more compliant with data privacy and
security requirements, and face fewer regulatory fines and fewer
Most of all, look for people who can step into the CISO’s shoes down
damaging news headlines.
the road and who share your vision of customer- and business-focused
security. Whatever changes the future brings, your organization will
In addition, organizations where security is baked in encounter fewer
always need to protect customers’ best interests.
stumbles in new projects and initiatives. When development of new
products and services takes security into consideration from the start,
Conclusion
there are fewer “back-to-the-drawing-board” delays. This speeds up
Today’s security demands are vastly different from those of the past –
time to market, helping businesses move faster than competitors.
and they’ll keep changing with the emergence of new technologies,
new business models, new threats and entire new industries and
Intelligence-led security ensure that customers’ needs. Nevertheless, the fundamental role of business security will
always remain the same: to ensure and retain the trust of customers
data, privacy and security are taken seriously. This
and other stakeholders so the company can stay in business and
cultivates trust and contributes to the company’s continue growing.
Page 4 of 5 www.fujitsu.com
White paper Customer-first security: What it is and best practices for success
We leverage 40-years of experience and investment in cyber security R&D to bring new ways of thinking. This means intelligence-led solutions to cyber security challenges– all
delivered to the highest security standards – helping customers build a cyber security capability that demonstrates true business value and enables business innovation.
Our wealth of intelligence and experience allows customers to be predictive and proactive, and our consultancy services and solutions keep you ahead of new and unexpected
threats. All of this means that you can be primed and ready to mitigate risks, helping your business focus on opportunities to create value – securely.
• Fujitsu has achieved recognition from Gartner, the leading independent analyst firm, as one of the global leaders in Managed Security Services
• Our holistic approach to security works to combine human intelligence, through our highly-skilled analysts, with technical intelligence using Machine Learning, advanced
analytics tools and best-of-breed security technologies to deliver 24/7 support
• Thanks to our intelligence-led approach, we provide tailored solutions, giving you the ideal response to constantly shifting security challenges
• The strength of our proven experience, vendor relationships, and global scale means that we’re well placed to optimize your approach to security, and provide real-time
intelligence and visibility on the state of your IT environment
• We offer security services that meet compliance demands and align with security policies such as PCI DSS, ISO 27001/2, SOX and ISO22301:2012.
Contact Copyright © 2019 Fujitsu. All rights reserved. Fujitsu and the Fujitsu logo
Ask Fujitsu are trademarks or registered trademarks of Fujitsu Limited registered in the
+44 (0) 123 579 7711 United States and other countries. All other trademarks referenced herein are
[email protected] the property of their respective owners. The statements provided herein are
@FujitsuSecurity for informational purposes only and may be amended or altered by Fujitsu,
Ref: 3938 without notice or liability.
www.fujitsu.com/global
Page 5 of 5 www.fujitsu.com