Cybersecurity Is A Competition Issue For Business

20141125152439-competitors-should-collaborate-more-cyber-security.jpeg

The current environment around cybercrime is quickly becoming a forcing function that’s causing businesses to begin evaluating how they’re doing cybersecurity across the board. 

Most importantly of all, it’s forcing companies to start thinking about how to measure and prepare for the real, business impacts of cyber threats lest they be held legally accountable by, say, the fine folks at the FTC. Or any number of voracious civil suit-seeking lawyers closely monitoring their failings and foibles.
But words and phrases like “begin evaluating” and “start thinking about” don’t equate to decision-making or “doing” anything real about it at all. 

In fact, despite a cyber and business “pop culture” zeitgeist brimming with signs and indicators that people really are starting to notice cyber insecurity an alarming number of companies put some very considerable roadblocks in front of themselves for not getting started on the same sorts of “competitive intelligence” programs for cyber that have become widely used and benefited from across industry.  
 
Some of my favorite excuses that I’ve heard from companies who want to avoid engaging in cyber intelligence functions?
• We’re not ready; we’re just not mature enough to make use of it.
• What would I do with this information anyway?
• How can I justify the expense and time if I can’t measure the benefits?
• I don’t have the right people and processes to handle it.
Absurd as this sounds, could you imagine a company being told one of their products presents a choking hazard saying, “Meh, we’re not mature enough to make use of this information.” Shockingly, this is pretty much exactly what’s happening when it comes to equally risky cyber threat information.
But it seems most just don’t see that cyber intelligence needs to become a prioritized, resourced part of what they’re already doing.
Now, in fairness, most of these excuses are actually quite real and tangible for the companies making use of them. In other words, most companies are, in what has become a stark reality, very immature when it comes to cyber defense.
Companies really don’t have the cyber expertise on hand in the right numbers. They don’t have well-developed processes in place internally (and externally to partners and customers) to deal well with even known threats, nor or the right tools on hand or a budget commensurate with the problem. Most companies don’t even know how big their cyber problem is, much less what to do with information about any one threat or the other.
But let’s apply this same set of excuses to, say, product development.
Would a company that wants to be successful in their marketplace not try to establish - and very quickly - all the necessary means to gather and use intelligence on what the customer wants, what their competitors are up to, how their products compare, what they’re doing better or worse, etc.?
Not a chance.
And that’s what is so confusing - and telling - about the reaction businesses have to even getting started gathering this sort of information about their cybercrime competition:
What these excuses say about most organizations is that most simply don’t have a real corporate strategy for cyber defense complete with focused objectives for how they want to defend themselves across the board from exploit.
And most are in fact lethargic, lazy and reluctant when it comes to doing anything about it.
In other words, unlike with products or sales, companies are not devoting time, energy, focus and a long-term commitment to what they want to be and achieve with their cybersecurity. There’s no plan, no blueprint developed for and bought into (and nurtured) by corporate leadership from the lowest rungs of cybersecurity management and all the way up to the board of directors.
In short, there’s just no cyber business plan - and few who care enough to develop it.
Cyber Security Strategy is Becoming Corporate Strategy
When a company develops its products or services for market, it develops an overall plan - a shared strategy that everyone in the organization can see and support by virtue of their part to play in it.
Whether you’re in product development, R&D, finance, marketing or sales, you depend on a cohesive, clear and cared-for map of where you’re going.
In all cases, these plans are highly dependent on data. Research is performed and insights are shared in a collaborative way as key players work together from all parts of an organization to develop ideas into marketable things.
Over time, the process by which companies stay competitive by evolving, pivoting and fixing is rooted in this continual and disciplined data collection and analysis. It forms the basis for refining raw ideas into initial offerings, then supports the perfection of those ideas through a product or service lifecycle.
Most importantly, a clear plan not only provides a unique vision of where you’re going, it governs day-to-day operations. Without it, resiliency and continuity of operations isn’t possible.
As well, it helps companies and their individual organizations avoid:
• Getting complacent across the board
• Becoming disorganized, inefficient and stovepiped 
• Being surprised by disruptions in the market 
• Wasting precious talent and expertise 
• Failing to deliver on continuous improvement, evolution
• Failing to satisfy customers
• Losing money to waste, fraud, abuse and litigation
• Conducting risk management and mitigation 
All of these things lead to a quickly tarnished brand. Like a shark, a business must keep moving and eating or die. And data and analysis is the energy that propels this motion.

Right now, too many businesses across the globe are operating without a proper cyber intelligence function that makes it possible to develop this data-driven plan in the first place.

Without it, they have nothing that tells them, quite simply, what their specific cyber risks are based on who they are as a company, including their:
• Customers and suppliers 
• Technologies used
• Internal business organizations
• Products manufactured and sold
• Data stored
• Overall brand and reputation
Under these circumstances, a clear plan and shared strategy is impossible.
Sadly, even with more coverage of breaches, more executives losing their jobs, more companies taking major brand hits… many companies are still putting cybersecurity squarely as a problem for the geeks. The engineers. The people (like me) who are awkward to be alone with in an elevator. As such, cyber is their problem. A technical problem that’s far too “in the weeds” for management to care about.

They get their hour in the quarterly staff meeting, you get some slides and spreadsheets and request for more money.
Until cybersecurity is seen and treated just like any other critical business problem with the same needs for intelligence gathering, tools and analysis to support decision-making, companies will continue to lose. Lose in bottom line revenue, lose customers and lose lots of cash to legal expenses in tough litigation that could also cost them brand and reputation. 
“Cyber intelligence” is “competitive intelligence” by any other name. Kinda the same way “cyber attack” or “data breach” has become just another alias for “legal fees.” 
Security Week:http://http://bit.ly/1VZRf4V

 

« Tor Gets Help to Anonymise Users of 'dark web'
A New Design for Cryptography’s Black Box »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Cambray Solutions

Cambray Solutions

Cambray Solutions LLC., is a leading technology consulting and software solutions company.

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

tietoEVRY

tietoEVRY

TietoEVRY creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

Virtual Solution

Virtual Solution

Virtual Solution security solutions enable user-friendly, secure mobile working environments.

CyberOwl

CyberOwl

CyberOwl's early warning system uses a probabilistic framework to systematically aggregate uncertain and disparate security events to provide real-time visibility of threats to every asset.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

Department of Justice - Office of Cybercrime (DOJ-OOC)

Department of Justice - Office of Cybercrime (DOJ-OOC)

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Distributed Ledger Inc (DLI)

Distributed Ledger Inc (DLI)

Distributed Ledger is a blockchain integrator and service provider helping businesses integrate blockchain technology into their existing systems and processes.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

NI Cyber Security Centre

NI Cyber Security Centre

NI Cyber Security Centre works to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.