Cybersecurity Should Create Business Growth Strategies (£)

Boards, IT Management and CEOs are under pressure from from commercial and government regulators to monitor and secure their company’s cyber security. 

Cybersecurity should be an essential part of your Board’s longer term future strategy and should of course include cyber-security lessons learnt and future risk reduction but it should also include data analysis for the future and the opportunities offered by deep data reviews.

Understanding the implications and opportunities offered by digital analysis is now essential for grasping the potential of the markets and client understanding and requirements. The implications of not engaging with the deeper issues that cyber-security offers has enormous negative effects on any organisation’s ability to understand and grow in their market-place.
 
Two years ago in 2014, at the New York Stock Exchange on June 10, 2014, Commissioner Luis A. Aguilar declared that “board oversight of cyber risk management is critical to ensuring that companies are taking adequate steps to prevent, and prepare for, the harms that can result from such attacks. There is no substitution for proper preparation, deliberation, and engagement on cybersecurity issues.”

Cybersecurity has become an important topic in both the private and public sectors, and for good reason. Law enforcement and financial regulators have stated publicly that cyber-attacks are becoming both more frequent and more sophisticated. 

Indeed, according to one survey, US companies experienced a 42% increase between 2011 and 2012 in the number of successful cyber-attacks they experienced per week.  

Recently there have also been a series of well-publicized cyber-attacks that have generated considerable media attention and raised public awareness of this issue. A few of the more well-known examples include:

-    The October 2013 cyber-attack on the software company Adobe Systems, Inc., in which data from more than 38 million customer accounts was obtained improperly;

-    The December 2013 cyber-attack on Target Corporation, in which the payment card data of approximately 40 million Target customers and the personal data of up to 70 million Target customers was accessed without authorization;

-    The January 2014 cyber-attack on Snapchat, a mobile messaging service, in which a reported 4.6 million user names and phone numbers were exposed;

-    The sustained and repeated cyber-attacks against several large U.S. banks, in which their public websites have been knocked offline for hours at a time;

-    The numerous cyber-attacks on the infrastructure underlying the capital markets, including quite a few on securities exchanges.   

One of the ways of countering this understanding is to have secure hack attacks, or Penetration Testing, on different executives and management through-out the year and to report these white hacks back to the Board and especially when they are also attacked. 

An idea that is now being discussed is the Cyber Audit a white hack group that cyber-attack your organisation at different times during the year and report back the results on an on-going basis.
  
And another concept is to delve deeper into your data and to come up with the commercial results of your organisation verses the competition in your markets.

This strategy should be used to understand different elements of your business; 

  • From Public Relations, to employee company ratings; 
  • From customer understanding and comments to employee’s understanding and market analysis considerations; 
  • From product and services changes and enhancements taking place in the market to client requirements and changing uses.

In some organisations there is some growth and profit optimism in the cyber growth arena however others do not believe that big data analysis easily leads to growth and profit. There exists a real diversity in the understanding and engagement with the big data arena which, has been around for some decades now, ever since the concept and realty of big data has existed. 

 

« UK Parliamentary Committee Wish To Penalise CEOs for Cyber Breaches (£)
Taiwan Police Catch ATM Gang For $2.5m Bank Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

CertiK

CertiK

CertiK uses rigorous Formal Verification technology to provide hacker-resistant smart contract and blockchain audits, thorough penetration testing, and customized security integrations.

Com Laude

Com Laude

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.

RecoLabs

RecoLabs

Reco’s proprietary AI technology dynamically maps business interactions within your collaboration tools to identify sensitive assets shared and uncover incidents that are relevant to your business.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.