Cookies & Privacy

We use essential cookies to make our site work. With your permission, we’ll also use analytics and marketing cookies to improve your experience. You can change your choice anytime.

See our Privacy Policy for details.

Manage preferences
Cookie preferences
Back to Industry News
General

Dagens industri:

Summary generated with AI, editor-reviewed
Heartspace News Desk
Source: Dagens industri

Key takeaways

  • Swedish companies face escalating cyber risks due to insufficient cybersecurity leadership and defined ownership
  • According to Thomas Öberg, Principal Architect Cybersecurity at itm8, the absence of a dedicated Chief Information Security Officer (CISO) in many medium-sized businesses results in fragmented cybersecurity responsibilities
  • These duties are often distributed among executives, such as CIOs, CFOs, or CEOs, who may lack specialized expertise
Swedish companies face escalating cyber risks due to insufficient cybersecurity leadership and defined ownership. According to Thomas Öberg, Principal Architect Cybersecurity at itm8, the absence of a dedicated Chief Information Security Officer (CISO) in many medium-sized businesses results in fragmented cybersecurity responsibilities. These duties are often distributed among executives, such as CIOs, CFOs, or CEOs, who may lack specialized expertise. This ambiguity exposes vulnerabilities exploited by cybercriminals, particularly as companies navigate increasing regulatory pressures like NIS2 and heightened scrutiny from insurance providers and investors, Öberg asserts. He cautions against the misconception that only entities handling critical data are targeted, emphasizing that revenue-generating businesses are inherently at risk. Without clearly defined accountability, cybersecurity efforts risk becoming superficial and inadequately integrated into core business operations. Many organizations struggle to formulate a robust security strategy and demonstrate effective oversight to their boards. Öberg recommends that businesses initiate a proactive approach encompassing heightened awareness, strategic prioritization, and a comprehensive risk analysis tailored to their specific operations. This involves identifying key assets, determining necessary protection measures, and understanding the potential ramifications of security breaches. He advises prioritizing fundamental security practices over pursuing elusive "perfect" solutions.

Related Topics

cybersecurityCISONIS2risk analysisdata protectionSwedenitm8

Share Your Thoughts

(0 comments)

Be the first to share your thoughts on this article!

Stay Updated

Create alertsRead original