Google Creates Its Cyber Security Action Team

By the end of 2021, cyber crime is expected to cost the world $6 trillion and by 2025, this figure will climb to $10.5 trillion, according to Cybersecurity Ventures. They expect the cost of  global cyber crime to grow by 15 percent per year over the next five years, reaching $10.5 trillion USD annually by 2025. If cyber crime were a country it would be the world’s third largest economy after the US and China.

As a response to the cyber crime crisis Google has assembled a group of in-house experts to create a new cyber security advisory team. The initiative is aimed at supporting governments, critical infrastructure organisations, enterprises and small businesses in their cycles of security transformation.

Google claim its new Google Cybersecurity Action Team will have "the singular mission of supporting the security and digital transformation of governments, critical infrastructure, enterprises, and small businesses." In pursuit of this mission, the team will provide services in four key areas:

  • Strategic Advisory.
  • Trust and Compliance.
  • Security Customer and Solutions Engineering.
  • Threat Intelligence and Incident Response. 

The costs of cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, fraud, disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.

"Cybersecurity is at the top of every C-level and board agenda, given the increasing prominence of software supply chain exploits, ransomware, and other attacks.... To address these unprecedented security challenges facing organisations in every industry today, we are announcing the creation of the Google Cybersecurity Action Team," said Thomas Kurian, CEO of Google Cloud. 

The Google Cybersecurity Action Team is part of a company commitment to be the 'best partner' for enterprise and government customers along their security transformation journey. 

  • One of the new team's jobs will be to advise customers on their security strategies, including educational content and transformation workshops. 
  • Another role of the team will be to simplify customers' "compliance journey" through trust and compliance services that map Google's global compliance certifications to industry control frameworks.
  • The team will also be involved with the delivery of threat briefings, preparedness drills, incident support, and rapid response engagements.  

The program is being launched during a very difficult year in cyber security, with both government and private sector groups being hit by attacks.

These have included the SolarWinds hack, discovered in December, which allowed Russian government-backed hackers to compromise at least nine US federal agencies, along with ransomware attacks on Colonial Pipeline in May that disrupted critical supply chains. 

Infosecurity Magazine:     PR Newswire:        HealthcareITNews:   The Hill:     Venturebeat:   

You Might Also Read: 

US Tech Giants To Spend Billions On National Cyber Security:

Don’t let your Boardroom be the weakest cyber security link. For more information relevant to your operation, advice qnd recommendations, please contact Cyber Security Intelligence.

« US Cyber Security ‘Kindergarten’ Compared To China
Blockchain Can Secure Autonomous Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Naval Dome

Naval Dome

Naval Dome provides the first maritime multilayer cyber defense solution for mission critical onboard systems.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.