Brand Reputation Includes Cyber Safety

To gather and pass on cyber intelligence, I interviewed Joseph Schramm, VP of Strategic Alliances at Beyond Trust, a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks.

How has Cyber Security Become Marketing’s Responsibility?

Marketing collects tons of Big Data and, in the simplest terms, if malicious actors get to your data, your brand can be tarnished.

“CMOs are tasked with brand management, and a brand’s reputation is likely to be the most visibly damaged asset in the aftermath of a breach. Likewise, data-driven marketing is fueled by customer trust. Preparation, protection and responsiveness are key to containing the damage and preserving that trust.

The cyber stakes are higher than ever before, and we’re not just talking about personal information and identity theft any more. High-level corporate secrets, vital infrastructure and brand image are constantly under attack.” Steve Durbin, Managing Director, Information Security Forum (ISF).

You might have heard by now that the majority of security threats come from the inside. Your own employees are most likely to jeopardize your cyber security, either due to naiveté or because they are bad apples.

A recent study by Trend Micro found that “around 3 percent of employees would give up [private company] information for only $155”.

Security Intelligence via IBM

Of course, the list of external malicious attacks (counting for about ¼ of all breaches) is increasing, including phishing, hacking, mimicking, click fraud, malvertising and the next thing you haven’t heard of yet.

To quote Steve Durbin, Managing Director at ISF once more:
“With the increased use, integration and interconnection of mobile devices, the network perimeter is blurry and porous, complicating security efforts. Marketers must incorporate security frameworks into their strategic marketing plans and determine how to solicit and deliver valuable customer insights safely.”

Hence, I call Brand and Reputation Management one of marketing’s key responsibilities in 2016. Protect your customer data and don’t end up in the news for the wrong reasons.

So What Can Be Done?
Of course, appointing a Chief Security Information Officer (CSIO) is great if you have the resources, and collaboration between executive functions is a must. But companies of any size can create a security culture by educating their employees about (ever evolving) cyber threats and limiting admin privileges to sensitive data.

Data-driven marketing has been a key driver of competitive differentiation via improved customer experience but it also means that marketers are collecting, storing and accessing more data than ever before. Marketing has become a big hacker attack target.

Personally, I don’t see a way forward without using technology and services to protect a brand’s reputation, even though that might be a daunting prospect for many companies. If anything, I see the cyber threat growing.

B2C: 

« Data Security Puts Innovation At Risk
Why Do We Fall For Online Scams? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

National Defense Industry Association (NDIA)

National Defense Industry Association (NDIA)

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Slovak National Accreditation Service (SNAS)

Slovak National Accreditation Service (SNAS)

SNAS is the national accreditation body for Slovakia. The directory of members provides details of organisations offering certification services for ISO 27001.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

Forward Global

Forward Global

Forward Global designs and delivers services and technologies to manage digital, economic, and information risks.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.