SASE PART 1: POTENTIAL AND LIMITS
SASE DECRYPTED, PART 1 LEARN MORE ABOUT THE ADVANTAGES AND DISADVANTAGES OF SASE (SECURE ACCESS SERVICE EDGE) AND HOW COMPANIES CAN DEAL WITH THE...
3 min read
Martin Buck
:
Jun 18, 2025 3:05:43 PM
We all agree that having a security strategy makes sense. Yet, we rarely take the time to create a formal version or update an existing one. However, there are specific triggers that mean you really shouldn’t put it off any longer.
In this interview, you’ll learn about the concrete situations that require action—and how to proceed most effectively.
_A common trigger is an “aha moment” affecting multiple stakeholders—such as surprising audit results, whether from a penetration test or a certification audit. New business requirements can also necessitate a strategic reassessment— for example, when especially sensitive data is newly processed or when processes are being automated.
Automation of processes with new IT and OT systems
Use of artificial intelligence in decision-making processes
Handling of sensitive data such as health or location information
New business area or business model
Change in leadership
Mergers and acquisitions
_Yes, significant events in the company’s environment are also reasons to reassess—such as:
Media reports about cyberattacks on competitors
New regulatory frameworks (e.g., nDSG, ISG, NIS2, CRA)
External threats like terrorist attacks, pandemics, or supply chain disruptions
Major cyber incidents (e.g., ransomware, data breaches)
And last but not least: technological progress.
_Some strategies simply become outdated. New technologies or paradigms fundamentally change the requirements for security architecture. Examples from recent years include:
The rise of AI-powered tools
Zero Trust Enterprise Architecture
Consolidation towards SASE
Advances in quantum computing
But attackers also use new technologies. This calls for strategic responses such as:
Phishing-resistant authentication methods
Privileged Access Management
Security for OT and IoT environments
Business Continuity Planning
_As a CISO or CIO, of course, I have a vision for the next three to five years. But strategies that exist only in people’s heads rarely work in practice, because they’re not aligned across the team. The firewall expert has different priorities than the backup specialist, and executive management or the board have yet other expectations.
A formal, documented, and approved information and ICT security strategy brings everyone to the table. It fosters consensus, enables coordinated action, and prevents conflicting goals. A good strategy prioritizes measures based on legal requirements, risks, technical dependencies, as well as time and budget constraints—and places them on a realistic timeline.
_There’s no fixed time frame—a good strategy should be dynamic and adaptable. But planning for just one year is usually not enough.
In practice, a planning horizon of 3 to 7 years has proven effective. Strategic goals are set for this period, along with an annual action plan. Detailed planning then takes place each year, aligned with the specific project streams to be implemented.
After earning his degree in Computer Science and Business Administration in Germany, Martin Buck became a partner at AVANTEC AG and worked hands-on as an IT Security Engineer. He later held roles in sales and served as a Senior ICT Architect at Sidarion AG. In 2018, he joined BNC as Sales Director for Zurich and subsequently became Head of the Competence Center Security.
Today, as CISO and Head of Consulting Services at BNC AG, Martin Buck leads engaging, hands-on workshops focused on security – including at this year’s Rethink IT event.
Interested in attending? Free tickets available on request: marketing@bnc.ch
A formal security strategy is more than a “nice-to-have” – it’s the foundation for coordinated, purpose-driven action across the organization. As Martin Buck explains, strategic planning shouldn’t just be reactive, but also proactive and forward-looking. After all, security doesn’t happen by chance – it’s the result of smart decisions based on clear priorities.
For more in-depth insights into security strategy, check out our whitepaper:
SASE DECRYPTED, PART 1 LEARN MORE ABOUT THE ADVANTAGES AND DISADVANTAGES OF SASE (SECURE ACCESS SERVICE EDGE) AND HOW COMPANIES CAN DEAL WITH THE...
ISO/IEC 27001:2022 and BNC - Building Trust in the Digital Era Addressing the Constant Threat of Data Breaches through Common Standards In the...
How IoT, AI, and Robotics are Revolutionizing Industries Efficiency Enhancement, Automation, and Digitalization as Central Elements for the Future...