A Cyber Compliance Economy

A recent article from the The Economist on how the Internet of Things (IoT) will change the world is astonishing. According to the report, as microchips become progressively cheaper they are being built in to almost everything.

The decline in prices of a megabyte of data storage is impressive.  In 1956 it would cost around U$ 85,000 (in today’s prices) now it is only U$ 0.00002 and it is decisive for an IoT World. Another example of connected decreasing prices is the cost of a sensor normally used in an IoT device which fell from U$ 1.30 to U$ 0.60 between 2004 and 2014.

The “cheap as chips” generates the popularization of IoT devices and many advantages which can be applied in the health care, market intelligence and industry productivity-increasing.  On the other hand, a connected world is a playground for hackers and we have dangers related to the hyperconnectivity.

Companies are growing more concerned with the question of corporate liability in case of cyber attacks, digital frauds and data breaches. Governance, risk and compliance are, therefore, top concerns in the corporate environment.

According to the U.S. Department of Homeland Security, manufacturing is the second most targeted industry based on the number of reported cyberattacks. Further, cybercriminals view small and medium-sized manufacturers (SMMs) as prime targets because many of these companies do not have adequate preventative measures in place.

The fear of breaches and cyber-attacks is founded in the financial cost of attacks, which is no longer a hypothetical number. Breaches cause real economic damage to organizations, damage that can take months or years to resolve. According to CISCO’s research respondents, more than half (53 per cent) of all attacks resulted in financial damages of more than US$500,000, including, but not limited to, lost revenue, customers, opportunities, and out-of-pocket cost.

New regulations and norms are expected to solve new problems. As Professor of European Law at Groningen University Sofia Ranchordás, says: “Legislators — like scientists — can be nevertheless conceived as ‘problem-solvers’ that instead of pretending to know what the world is like based on theoretical knowledge, should also gather information and evidence to support their legislative choices”.

So, Compliance rules have a special place in this new world and companies have to be prepared for that.

The global dialogue on cybersecurity regulation is evolving from a conceptual discussion about nation-states’ rights and responsibilities toward an articulation of norms of state, industry behaviour and corporate liability legal framework. According to a recent Microsoft report, stakeholders from governments, the private sector, academia, and civil society are putting forward myriad norms proposals, addressing a range of challenges caused by the exploitation of information and communications technology (ICT) systems. 

Thus, for a really healthy cyber economy and sustainable development of technology we have to avoid cyber-surveillance, misuses of computer science and punish hardily cybercrimes. It will happen with cybersecurity measures, risk assessment, compliance and governance.

Private and Public sectors have to work together on new regulations, which will come from both nation-states and public authorities and a compliance culture wil have to be adopted by companies and entrepreneurs.

Joao Paro is a regulatory consultant at Compliance and Risks       Image: Nick Youngson 

You Might Also Read:

Easy Cyber Knowldege Ch.4 The Internet of Things ( £)

The EU's New Cybersecurity Certification Framework:

 

« Hackers Invade Routers To Steal Payment Card Details
Over 2 Million Magecart Detections »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

63Sats Cybertech

63Sats Cybertech

63SATS is the cybersecurity business unit of 63 Moons Technologies, a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.