Cybersecurity Should Create Business Growth Strategies (£)

Boards, IT Management and CEOs are under pressure from from commercial and government regulators to monitor and secure their company’s cyber security. 

Cybersecurity should be an essential part of your Board’s longer term future strategy and should of course include cyber-security lessons learnt and future risk reduction but it should also include data analysis for the future and the opportunities offered by deep data reviews.

Understanding the implications and opportunities offered by digital analysis is now essential for grasping the potential of the markets and client understanding and requirements. The implications of not engaging with the deeper issues that cyber-security offers has enormous negative effects on any organisation’s ability to understand and grow in their market-place.
 
Two years ago in 2014, at the New York Stock Exchange on June 10, 2014, Commissioner Luis A. Aguilar declared that “board oversight of cyber risk management is critical to ensuring that companies are taking adequate steps to prevent, and prepare for, the harms that can result from such attacks. There is no substitution for proper preparation, deliberation, and engagement on cybersecurity issues.”

Cybersecurity has become an important topic in both the private and public sectors, and for good reason. Law enforcement and financial regulators have stated publicly that cyber-attacks are becoming both more frequent and more sophisticated. 

Indeed, according to one survey, US companies experienced a 42% increase between 2011 and 2012 in the number of successful cyber-attacks they experienced per week.  

Recently there have also been a series of well-publicized cyber-attacks that have generated considerable media attention and raised public awareness of this issue. A few of the more well-known examples include:

-    The October 2013 cyber-attack on the software company Adobe Systems, Inc., in which data from more than 38 million customer accounts was obtained improperly;

-    The December 2013 cyber-attack on Target Corporation, in which the payment card data of approximately 40 million Target customers and the personal data of up to 70 million Target customers was accessed without authorization;

-    The January 2014 cyber-attack on Snapchat, a mobile messaging service, in which a reported 4.6 million user names and phone numbers were exposed;

-    The sustained and repeated cyber-attacks against several large U.S. banks, in which their public websites have been knocked offline for hours at a time;

-    The numerous cyber-attacks on the infrastructure underlying the capital markets, including quite a few on securities exchanges.   

One of the ways of countering this understanding is to have secure hack attacks, or Penetration Testing, on different executives and management through-out the year and to report these white hacks back to the Board and especially when they are also attacked. 

An idea that is now being discussed is the Cyber Audit a white hack group that cyber-attack your organisation at different times during the year and report back the results on an on-going basis.
  
And another concept is to delve deeper into your data and to come up with the commercial results of your organisation verses the competition in your markets.

This strategy should be used to understand different elements of your business; 

  • From Public Relations, to employee company ratings; 
  • From customer understanding and comments to employee’s understanding and market analysis considerations; 
  • From product and services changes and enhancements taking place in the market to client requirements and changing uses.

In some organisations there is some growth and profit optimism in the cyber growth arena however others do not believe that big data analysis easily leads to growth and profit. There exists a real diversity in the understanding and engagement with the big data arena which, has been around for some decades now, ever since the concept and realty of big data has existed. 

 

« UK Parliamentary Committee Wish To Penalise CEOs for Cyber Breaches (£)
Taiwan Police Catch ATM Gang For $2.5m Bank Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Security IT Summit

Security IT Summit

The Security IT Summit is a unique one-day event which allows senior IT & Cyber security professionals to meet with innovative and competitive suppliers to the industry.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Port443

Port443

Port443 specialises in providing Security Orchestration, Automation and Remediation (SOAR) "as a service".