Special Reports
A special report is content that is edited and produced by the special reports unit within The Irish Times Content Studio. It is supported by advertisers who may contribute to the report but do not have editorial control.

Big-picture view offers a path to strong cyber defence

Being prepared to tackle a cyberattack head on can reduce the impact it has on your business

Dr Jonny Milliken, PhD, senior security manager, Ekco: 'Return on investment isn’t static, it should be reassessed regularly to ensure ongoing value'
Dr Jonny Milliken, PhD, senior security manager, Ekco: 'Return on investment isn’t static, it should be reassessed regularly to ensure ongoing value'

The best defence is often a good attack and that tends to be true in cybersecurity, where being ready to tackle malicious actors head on can significantly reduce the impact they have on business operations.

The key to this, according to VimalRaj Sampathkumar, technical head (UK & Ireland) at ManageEngine, is preparation.

VimalRaj Sampathkumar
VimalRaj Sampathkumar

“Start with a risk-based approach rather than a tool-first mindset,” says Sampathkumar. “Organisations should begin by identifying their most critical assets, threat vectors and compliance obligations, and then select technologies that directly mitigate those risks.

“Too often, decisions are driven by market hype or feature checklists rather than fit-for-purpose utility. A practical way to navigate the noise is to map tools to specific outcomes, whether that’s visibility, threat prevention, incident detection, responses or audit readiness.”

Mapping the outcomes is only the beginning of the journey. Working out how consistently you meet these outcomes is just as important.

“Make sure there’s a plan in place to measure effectiveness over time. That means tracking not just usage or uptime, but whether the tool is materially reducing risk, improving visibility, or helping the team respond faster. Return on investment isn’t static, it should be reassessed regularly to ensure ongoing value,” says Dr Jonny Milliken, senior security manager at Ekco.

“It’s not about choosing a basic or advanced [approach], it’s about choosing what fits. A well-deployed and maintained basic control will always beat a poorly implemented advanced one. Prioritise what your current operations teams can support and sustain going forward, ahead of anything flashy or complex. Build it into operations, keep it tuned and make sure it evolves with the environment.”

Recognising that there’s no one-size-fits-all approach to building up a good security plan can help a company shape a defence structure that best fits its needs.

Brian Martin, director of product management, Integrity360
Brian Martin, director of product management, Integrity360

“The key is to start by developing a security strategy and architecture tailored to the organisation’s unique structure, risk appetite and budget. Industry benchmarks for cybersecurity spend, often calculated as a ratio of IT spend, company turnover, or employee headcount, can provide a useful starting point for budget considerations,” says Brian Martin, director of product management at Integrity360.

“Many organisations today are experiencing vendor sprawl fatigue, where a multitude of disparate tools creates complexity and integration challenges. As a result, there’s a strong trend toward vendor and platform consolidation. Consolidating vendors can improve security outcomes by eliminating integration gaps and reducing the potential for cracks in the system. It also simplifies support overhead and can free up budget to invest in other areas of defence.”

The risk of that fatigue has only increased since artificial intelligence (AI) entered the security conversation, both as a tool for attackers and to protect against them.

“AI and automation are set to transform defence mechanisms in the coming years. AI-driven solutions can sift through vast amounts of threat data with far greater speed and accuracy than traditional systems, enabling earlier detection of subtle attacks, and rapid response,” says Brian Honan, chief executive of BH Consulting.

“Automated response technologies reduce the dwell time attackers spend inside networks, containing breaches before they have a chance to spread. That said, organisations shouldn’t view these technologies as silver bullets. These tools will augment, not replace, strong fundamentals and a security-minded culture.”

With new developments like AI changing the cybersecurity landscape, it’s easy to get lost in working out what the best approach is. Taking a step back and looking at the broader impact on the business can help to clear things up.

Vaibhav Malik, partner, cybersecurity and resilience, Deloitte Ireland
Vaibhav Malik, partner, cybersecurity and resilience, Deloitte Ireland

Vaibhav Malik, partner in cybersecurity and resilience at Deloitte Ireland recommends following his three Es – effectiveness, efficacy, and efficiency – to enhance a company’s security posture.

“These three principles work synergistically: effectiveness ensures you’re solving the right problems; efficacy confirms your solutions work, and efficiency maximises your security investment returns,” says Malik.

“Start by assessing current tools against these criteria, prioritise fundamental security controls, and gradually introduce advanced technologies only when they demonstrably improve your specific risk profile.”

Whatever approach a company takes to its security posture, remembering the human element is critical to success.

“Many organisations also underestimate the importance of people and processes. Even the best tools fail if there’s no plan to train users, align with workflows, or ensure executive support,” says Sampathkumar

“Organisations should conduct pilots, define success criteria upfront, train staff adequately and adopt a mindset of continuous improvement rather than viewing security as a one-time project.”

Emmet Ryan

Emmet Ryan

Emmet Ryan writes a column with The Irish Times