Cybersecurity Should Create Business Growth Strategies (£)

Boards, IT Management and CEOs are under pressure from from commercial and government regulators to monitor and secure their company’s cyber security. 

Cybersecurity should be an essential part of your Board’s longer term future strategy and should of course include cyber-security lessons learnt and future risk reduction but it should also include data analysis for the future and the opportunities offered by deep data reviews.

Understanding the implications and opportunities offered by digital analysis is now essential for grasping the potential of the markets and client understanding and requirements. The implications of not engaging with the deeper issues that cyber-security offers has enormous negative effects on any organisation’s ability to understand and grow in their market-place.
 
Two years ago in 2014, at the New York Stock Exchange on June 10, 2014, Commissioner Luis A. Aguilar declared that “board oversight of cyber risk management is critical to ensuring that companies are taking adequate steps to prevent, and prepare for, the harms that can result from such attacks. There is no substitution for proper preparation, deliberation, and engagement on cybersecurity issues.”

Cybersecurity has become an important topic in both the private and public sectors, and for good reason. Law enforcement and financial regulators have stated publicly that cyber-attacks are becoming both more frequent and more sophisticated. 

Indeed, according to one survey, US companies experienced a 42% increase between 2011 and 2012 in the number of successful cyber-attacks they experienced per week.  

Recently there have also been a series of well-publicized cyber-attacks that have generated considerable media attention and raised public awareness of this issue. A few of the more well-known examples include:

-    The October 2013 cyber-attack on the software company Adobe Systems, Inc., in which data from more than 38 million customer accounts was obtained improperly;

-    The December 2013 cyber-attack on Target Corporation, in which the payment card data of approximately 40 million Target customers and the personal data of up to 70 million Target customers was accessed without authorization;

-    The January 2014 cyber-attack on Snapchat, a mobile messaging service, in which a reported 4.6 million user names and phone numbers were exposed;

-    The sustained and repeated cyber-attacks against several large U.S. banks, in which their public websites have been knocked offline for hours at a time;

-    The numerous cyber-attacks on the infrastructure underlying the capital markets, including quite a few on securities exchanges.   

One of the ways of countering this understanding is to have secure hack attacks, or Penetration Testing, on different executives and management through-out the year and to report these white hacks back to the Board and especially when they are also attacked. 

An idea that is now being discussed is the Cyber Audit a white hack group that cyber-attack your organisation at different times during the year and report back the results on an on-going basis.
  
And another concept is to delve deeper into your data and to come up with the commercial results of your organisation verses the competition in your markets.

This strategy should be used to understand different elements of your business; 

  • From Public Relations, to employee company ratings; 
  • From customer understanding and comments to employee’s understanding and market analysis considerations; 
  • From product and services changes and enhancements taking place in the market to client requirements and changing uses.

In some organisations there is some growth and profit optimism in the cyber growth arena however others do not believe that big data analysis easily leads to growth and profit. There exists a real diversity in the understanding and engagement with the big data arena which, has been around for some decades now, ever since the concept and realty of big data has existed. 

 

« UK Parliamentary Committee Wish To Penalise CEOs for Cyber Breaches (£)
Taiwan Police Catch ATM Gang For $2.5m Bank Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

CyberInt

CyberInt

CyberInt’s Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

PT Netmarks Indonesia

PT Netmarks Indonesia

PT Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.