Skip to the main content.

3 min read

When is the right time to develop a security strategy?

When is the right time to develop a security strategy?

A Conversation with Martin Buck, CISO & Head of Consulting Services, BNC AG

 

Key triggers, components, and planning horizons for your security strategy

We all agree that having a security strategy makes sense. Yet, we rarely take the time to create a formal version or update an existing one. However, there are specific triggers that mean you really shouldn’t put it off any longer.

In this interview, you’ll learn about the concrete situations that require action—and how to proceed most effectively.

 

 

When should I revise my security strategy?

_A common trigger is an “aha moment” affecting multiple stakeholders—such as surprising audit results, whether from a penetration test or a certification audit. New business requirements can also necessitate a strategic reassessment— for example, when especially sensitive data is newly processed or when processes are being automated.

Examples of such triggers include:
  • Automation of processes with new IT and OT systems

  • Use of artificial intelligence in decision-making processes

  • Handling of sensitive data such as health or location information

  • New business area or business model

  • Change in leadership

  • Mergers and acquisitions

 

 

Are there also external factors?

_Yes, significant events in the company’s environment are also reasons to reassess—such as:

  • Media reports about cyberattacks on competitors

  • New regulatory frameworks (e.g., nDSG, ISG, NIS2, CRA)

  • External threats like terrorist attacks, pandemics, or supply chain disruptions

  • Major cyber incidents (e.g., ransomware, data breaches)

And last but not least: technological progress.

 

 

 

How does technological progress affect the strategy?

_Some strategies simply become outdated. New technologies or paradigms fundamentally change the requirements for security architecture. Examples from recent years include:

  • The rise of AI-powered tools

  • Zero Trust Enterprise Architecture

  • Consolidation towards SASE

  • Advances in quantum computing

But attackers also use new technologies. This calls for strategic responses such as:

  • Phishing-resistant authentication methods

  • Privileged Access Management

  • Security for OT and IoT environments

  • Business Continuity Planning

 

 

Many IT leaders say they have a strategy “in their heads”. Isn’t that enough?

_As a CISO or CIO, of course, I have a vision for the next three to five years. But strategies that exist only in people’s heads rarely work in practice, because they’re not aligned across the team. The firewall expert has different priorities than the backup specialist, and executive management or the board have yet other expectations.

A formal, documented, and approved information and ICT security strategy brings everyone to the table. It fosters consensus, enables coordinated action, and prevents conflicting goals. A good strategy prioritizes measures based on legal requirements, risks, technical dependencies, as well as time and budget constraints—and places them on a realistic timeline.

 

What time frame should a security strategy cover?

_There’s no fixed time frame—a good strategy should be dynamic and adaptable. But planning for just one year is usually not enough.

In practice, a planning horizon of 3 to 7 years has proven effective. Strategic goals are set for this period, along with an annual action plan. Detailed planning then takes place each year, aligned with the specific project streams to be implemented.

 

Martin Buck

CISO & Head of Consulting Services, BNC AG

After earning his degree in Computer Science and Business Administration in Germany, Martin Buck became a partner at AVANTEC AG and worked hands-on as an IT Security Engineer. He later held roles in sales and served as a Senior ICT Architect at Sidarion AG. In 2018, he joined BNC as Sales Director for Zurich and subsequently became Head of the Competence Center Security.

Today, as CISO and Head of Consulting Services at BNC AG, Martin Buck leads engaging, hands-on workshops focused on security – including at this year’s Rethink IT event.

Interested in attending? Free tickets available on request: marketing@bnc.ch

mb_web_500x500 Blog

Conclusion

A formal security strategy is more than a “nice-to-have” – it’s the foundation for coordinated, purpose-driven action across the organization. As Martin Buck explains, strategic planning shouldn’t just be reactive, but also proactive and forward-looking. After all, security doesn’t happen by chance – it’s the result of smart decisions based on clear priorities.

For more in-depth insights into security strategy, check out our whitepaper:

 

You might also be interested in...

 

Security is no coincidence – it’s strategy.

With over 25 years of experience, BNC supports you in building a tailored security strategy that strengthens your business goals and ensures compliance with regulatory requirements.

 

Security Architecture & Design

Whether it's Zero Trust, hybrid infrastructures, or OT protection – BNC develops robust concepts that sustainably secure your IT and your business. Discover how to future-proof your security strategy!

 

Case: Conforama

Steigern Sie Ihre Wettbewerbsfähigkeit mit zuverlässiger WLAN-Konnektivität

Ein optimiertes Kundenerlebnis, gesteigerte Mitarbeiterproduktivität und eine robuste und sichere Netzwerkinfrastruktur, erfahren Sie, wie Conforama Schweiz den Markt mit erstklassigem Service erobert hat.

SASE PART 1: POTENTIAL AND LIMITS

SASE PART 1: POTENTIAL AND LIMITS

SASE DECRYPTED, PART 1 LEARN MORE ABOUT THE ADVANTAGES AND DISADVANTAGES OF SASE (SECURE ACCESS SERVICE EDGE) AND HOW COMPANIES CAN DEAL WITH THE...

Read More
Data Breach - Trusting Partners Has Become More Than A Human Matter

Data Breach - Trusting Partners Has Become More Than A Human Matter

ISO/IEC 27001:2022 and BNC - Building Trust in the Digital Era Addressing the Constant Threat of Data Breaches through Common Standards In the...

Read More
Tech Trends 2024 for the Manufacturing & Construction Industry

Tech Trends 2024 for the Manufacturing & Construction Industry

How IoT, AI, and Robotics are Revolutionizing Industries Efficiency Enhancement, Automation, and Digitalization as Central Elements for the Future...

Read More