Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Managing cyber risks while company scales

By Taylor Hersom
cybersecurity-finger-pointing.jpg

Image via Pixabay

May 18, 2023

Scaling can be an intense and stressful experience. And with the addition of new business considerations, risks and responsibilities increase. Whether witnessing a growth in demand, meeting new clients and creating new business opportunities, or investing to conquer new markets, keeping track of everything that comes with scaling can be extremely tricky. 

For the first time, the 2023 World Economic Forum Global Risks Report included “Widespread cybercrime and cyber insecurity” as a new entrant to the top rankings of global threats. But with all the factors that come with expansion, such as new products and services, budgets, ROI, marketing, sales and more, it's easy to lose sight of the one element that a company has to secure its posture: cybersecurity. In this report, be inspired by three simple tactics to scale business and security side by side without compromising budgets. 

If it isn’t broke, don't fix it: Pentest the expansion 

The 2023 Technology Spending Intentions Survey of ESG Global says that more than half (52%) of organizations are planning to increase their IT spending. 41% of organizations surveyed assure they have leveled up their ransomware preparedness. As a business scales, security leaders might feel the urge to follow the crowd and increase investments, bringing in a new flashy cybersecurity vendor. 

However, if the current security system has been working so far, there is no need to rock the boat. In fact, switching away from an architecture that is proven effective can be a waste of time and resources. Additionally, it will likely bring unexpected new risks. 

On the other hand, while security leaders can easily scale up cloud, edge and on-premises using the system they are already operating, it's paramount to focus on the security of the new digital assets. Most companies expanding will add new websites, new digital services, new apps, IoT devices or new workforce endpoints. These additions represent business-critical assets to the organization’s plan and are the most significant risk. An innovative and out-of-the-box approach to guarantee their safety is penetration testing. 

While penetration testing can be exhaustive, they are usually laser-focused, making them ideal for testing the strengths and weaknesses of the organization’s new apps, endpoints and assets. Pentests are the only way of running realistic simulations of attacks, which include phishing simulations that reveal how awake new workers are to fake email, SMS, voice and other black hat hacker tricks. 

Pentesters will employ the same techniques modern cybercriminals use. The most professional services will scan the new assets, test their code, ensure it complies with standards, and identify bugs, weaknesses, misconfigurations and errors before cybercriminals can exploit them. They will also present organizations with guidance to remediate the problems they discovered. 

When a company’s security team is operating at 100%, and doesn’t need to make drastic changes, penetration tests will give insight into new additions before adding them under the umbrella of the company’s cybersecurity framework. Remember, only move a new digital asset from testing to operational once it has been double-checked. 

Vendor consolidation and the layered approach  

In contrast, if and organization is scaling and the cybersecurity posture leaves many unanswered questions regarding its performance, security leaders should consider vendor consolidation and the layered security approach.

Nothing can make a business expansion lose momentum as running out of budget. Economic uncertainty and inflation check all the right boxes and ensure 2023 will be a rough year to navigate. But how can security leaders make sure their cybersecurity investments stay within the new business targets? 

Vendor consolidation is reducing the number of solutions, technologies and companies which security leaders are in business with to consolidate their compliance, governance and security. Not only is vendor consolidation a refreshing simplification for security teams and a welcomed budget cut for the accounting department, but it also increases the ability to perform better. 

In September 2022, a Gartner survey revealed that 75% of organizations were pursuing security vendor consolidation, with more than half (65%) consolidating to improve risk posture. Only 29% of organizations surveyed said they consolidated to cut down spending on licenses. 

When a company’s digital footprint grows, it might go in new directions where its security systems have never operated. Therefore security leaders may need to bring in new security technologies, processes and people to cover new assets. The best way to keep performance up while safeguarding resources is to add security solutions tailored to business needs. From endpoint security to IoT risk management, or next-generation firewalls, when consolidating vendors, ensure to include new layers of protection that meet the expectations and demands of the business expansion plan. 

Finally, the new layers must not be siloed and work under the cybersecurity umbrella. The umbrella should be consolidated, layered and integrated, giving security leaders complete visibility of the whole system in real time. Additionally, neglecting to include compliance and governance in this approach can have devastating consequences, especially if out to conquer new markets, customers or partners. 

There is no business without compliance and governance 

Just like sensor-to-edge-to-cloud autonomous solutions can help companies monitor and reduce carbon footprint — working the “E” in ESG — there are new compliance and governance technologies that companies can leverage. Cloud, hybrid and on-premises compliance and governance tools are fully automated, highly customizable, scalable and, more importantly, cost-efficient. 

If wondering whether the return on investment for these platforms will pencil out, consider the costs of wandering into new territories without proper compliance and governance frameworks. As Diligent explains, the cost of breaching, for example, a law like the GDPR, can cost up to $847 million, while violating the Health Insurance Portability and Accountability Act (HIPAA) carries a $1.5 million penalty per year for each violation. 

Additionally, executives who knowingly certify financial reports that don’t comply with SOX requirements face fines of up to $1 million, alongside 10 years imprisonment, and violating anti-money laundering regulations can translate into up to 20 years for each violation. Furthermore, data privacy and security laws that protect consumers have become a growing trend for court cases costing companies millions in fines and leading to business havoc and extensive reputation damages. 

Compliance and governance are all about data management. From where and whom organizations collect or generate data to what they do with it, the entire lifecycle of the data is essential. Additionally, scaling may imply attracting new customers, hiring talent, setting up new business relationships with new partners or expanding the supply chain. How a company manages compliance and governance will open or close doors and shape the brand perception. 

While it's no secret that the ever-evolving legal and ethical landscape is becoming more complex to navigate, moving into new markets and regions will sure have security leaders shoulder-to-shoulder with new regulations to comply. Fortunately, innovation is on their side. Compliance and governance tools are embedded into all top cloud vendors; they are easy to operate, automate most of the compliance checks, are efficient and cost-effective. 

How do they work? These automated technologies will depend on the type of workloads an organization hosts and the compliance rules the business needs to meet. Once they have identified the regulatory requirements and assets, they are defined as rules within the solutions. For example, a rule may be that all the data stored in the cloud is encrypted, or be more detailed and, for example, list as mandatory all the requirements set by regulations like the General Data Protection Regulation (GDPR).  

Once rules are defined, the technologies can perform automatic audits, identify errors and suggest solutions. Furthermore, the tech can go beyond once-and-done audits, integrate risk management programs, set priorities, eliminate redundancy and monitor and execute planning and remediation.

Scaling and growth are born from business leaders' visions. Despite the current state of the global cybersecurity landscape, the ambition can be guided to success. Test the new digital assets before they go live, consolidate vendors, layer security and keep compliance and governance in check to reach milestones. Keeping security efforts clear and straightforward while accelerating performance without compromising budget is an achievable reality.   

KEYWORDS: Black Hat compliance cyber risk cybercriminal framework pen testing Penetration test penetration testing vendor risk workforce

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taylor Hersom is the Founder and CEO of Eden Data.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • identity theft, fraud prevention, cybersecurity, data theft

    80% of internal auditors face barriers while getting involved in fraud risks management

    See More
  • Managing Thumb Drive Security Risks

    See More
  • login information

    Managing the cybersecurity risks of ungoverned accounts

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing