{"id":1395,"date":"2018-01-22T03:40:20","date_gmt":"2018-01-22T03:40:20","guid":{"rendered":"http:\/\/54.151.235.32\/?p=1395"},"modified":"2019-04-08T09:39:36","modified_gmt":"2019-04-08T02:39:36","slug":"who-should-be-responsible-for-cybersecurity","status":"publish","type":"post","link":"https:\/\/renovacloud.com\/en\/who-should-be-responsible-for-cybersecurity\/","title":{"rendered":"WHO SHOULD BE RESPONSIBLE FOR CYBERSECURITY?"},"content":{"rendered":"<h4><span style=\"color: #808080;\"><em>By\u00a0<span class=\"fn\"><a style=\"color: #808080;\" href=\"https:\/\/www.csoonline.com\/author\/Andrew-Douthwaite\/\" rel=\"author noopener\">Andrew Douthwaite<\/a><\/span>,\u00a0Contributor,\u00a0<span class=\"publisher\">CSO<\/span>\u00a0<span class=\"divider break\">|<\/span>\u00a0<span class=\"pub-date\">JAN 16, 2018 6:20 AM PT.<\/span><\/em><\/span><\/h4>\n<h3>Clearly, cybersecurity is everybody\u2019s problem. It&#8217;s high time this truth was recognized, starting with the executive suite on down.<\/h3>\n<p>The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout become increasingly familiar: broken trust, ruined brands, class-action lawsuits, and prolonged periods of finger pointing.<\/p>\n<p>In September 2017, news broke that consumer credit reporting agency Equifax had suffered a catastrophic breach the preceding May. Hackers gained access to the personal data of nearly 150 million American citizens \u2013 roughly two thirds of the country\u2019s population \u2013 including full names, Social Security numbers, addresses, and dates of birth. The swiftly unfolding scandal sent the company\u2019s stock plummeting 33%, a market value loss of approximately ten billion dollars. Currently, three Equifax C-Suite managers are under federal investigation for allegedly dumping stock prior to disclosing the breach.<\/p>\n<p>The digital sphere has always been rife with pathogens. Elk Cloner ravaged Apple IIs by way of contaminated floppy disks in 1981, and Brain infected IBM PCs in 1986. Initially little more than nuisances concocted to spread chaos and frustration, today malware is a primary tool of lucrative (if fragmented and decentralized) criminal enterprises whose foremost goal is financial gain through extortion and embarrassment.<\/p>\n<p>The high-profile nature of certain attacks \u2013 Equifax, Anthem, Home Depot, Yahoo, Sony, and Uber, to name a few \u2013 obscures the fact that while the form, scale, and intent of attacks tend to vary, the threat looms over organizations of every stripe and size \u2013 private, public, and not-for-profit alike \u2013 in every corner of the globe. Colleges and universities have fallen prey to costly ransomware attacks, havoc has been wreaked on banks in Italy, Canada, and Bangladesh, and Russian hackers hijacked the 2016 federal election through a simple phishing scam. Such attacks are alarmingly easy to design and deploy. Phishing, for example, requires only a single distracted click on a link in an email or text. Once the automated malware has gained a toehold, systems and networks can be crippled in a matter of minutes.<\/p>\n<aside id=\"\" class=\"nativo-promo nativo-promo-1 smartphone\"><\/aside>\n<p>Standing vulnerabilities are being exacerbated by the growing centrality of digital media in our day-to-day lives. The proliferation of devices means a multiplication of exploitable entry points, as does data stored across networked, hardware and cloud-based platforms. The more sprawling the company or organization, the more exposed it may be, necessitating cyber-security strategies that cover partners, manufacturers, and suppliers. Not only are new dangers always emerging, but they can occur because of easy to make mistakes such as forgetting to update your OS, or through portals as unlikely as an IOT enabled\u00a0<a href=\"http:\/\/money.cnn.com\/2017\/07\/19\/technology\/fish-tank-hack-darktrace\/index.html\" rel=\"nofollow noopener\">fish tank<\/a>.<\/p>\n<p>The crisis is as widespread as it is confounding to combat. Perpetrators not only employ an ever-expanding suite of tools and tactics, and target bounties ranging from consumer data to proprietary assets, but they are driven by mercurial motives. Some hackers espouse anti-corporatist ideologies, some are astutely transactional, and others still \u2013 Anonymous for example \u2013 are first and foremost retaliatory. Add to these slippery intentions a lack of territorial affiliation, and one can see how present-day cyber-foes are diabolically tricky to identify, much less apprehend and prosecute.<\/p>\n<p>All indications are that cyber-crime is in its infancy, a phenomenon that will only intensify.\u00a0<a href=\"https:\/\/www.cnbc.com\/2017\/09\/20\/cyberattacks-are-surging-and-more-data-records-are-stolen.html\" rel=\"nofollow noopener\">CNBC recently reported<\/a>\u00a0that in the first half of 2017, the number of attacks spiked 164% compared to the same period in 2016, entailing 918 disclosed data breaches resulting in nearly two billion compromised records. The report suggests that this increase is partly attributable to new regulations pertaining to corporate transparency, including the EU\u2019s GDPR and the UK\u2019s Data Protection Bill. This legislation coincides with the establishment of government agencies tasked with policing these fraught digital landscapes, such as the Cyber Threat Intelligence Integration Center in the U.S.<\/p>\n<p>Yet the urgency with which governments are working to enforce transparency and security stands in stark contrast to the reluctance demonstrated by businesses to recognize and react to so significant a threat. One need only look at the typical IT budget to recognize how little the gravity of the crisis has sunk in. Even though companies across all sectors rank cyber-security as their most pressing issue, and despite an upward trend in spending, the typical cyber-security budget is profoundly underfunded. According to Steve Vintz of the\u00a0<em>Harvard Business Review<\/em>, \u201cIT budgets are typically 3-7% of a company\u2019s revenue, and security budgets are typically 5% of IT spend.\u201d In other words, the average company allocates just over 1% of revenue safeguarding against potentially catastrophic attacks.<\/p>\n<p>This lopsided spending reflects, perhaps, a longstanding disinterest exhibited by financial stewards toward IT issues. It\u2019s the number crunches versus the nerds, the former obsessed with spending and bottom lines, the latter always on the lookout for shiny new toys to tinker with. The VP Finance or CFO, therefore, assumes the attitude of a parent reining in an indulgent child, rather than a collaborator working toward mutual goals. Fissures such as these have the unfortunate effect of relegating cyber-security to the IT silo, with the CFO punting the ball to (often already overtaxed) technical divisions and managers, then washing their hands of further responsibility.<\/p>\n<p>C-suite abdication reveals a central but oft-overlooked error, one baked into the term \u201ccyber-security\u201d itself: though traditionally tucked away under the IT umbrella as a\u00a0<em>security\u00a0<\/em>concern, many if not most of the consequences of cyber-attacks are\u00a0<em>monetary<\/em>, with severe and long-lasting financial implications. Though difficult to tally, a 2017 study by Centrify and the Ponemon Institute pegged the average cost of a data breach at $4 million, the average stock price drop at 5%, and the average revenue decline at $3.4 million. And this is to say little of the embarrassment of suffering an attack \u2013 looking weak and ill prepared, the erosion of consumer trust and confidence, and a tarnished reputation and brand \u2013 much less lawsuits. Target paid $18.5 million after a cyber-attack put the data of sixty million of its customers in peril, and Anthem was slapped with a $115 million penalty.\u00a0<em>Fortune\u00a0<\/em>magazine writer Jeff Roberts predicts that Equifax will pay out approximately a billion dollars to settle suits resulting from its attack.<\/p>\n<p>Moving forward, a chief concern must be not only how CFOs can participate in the design and implementation of cost-effective cyber-security systems and protocols, but more importantly how they can take the lead in fostering company-wide cultures of cyber-awareness, vigilance, and preparedness. Clearly cybersecurity is everybody\u2019s problem. High time this truth was recognized starting with the executive suite on down.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Andrew Douthwaite,\u00a0Contributor,\u00a0CSO\u00a0|\u00a0JAN 16, 2018 6:20 AM PT. Clearly, cybersecurity is everybody\u2019s problem. It&#8217;s high time this truth was recognized, starting with the executive suite on down. The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout [&#8230;]\n","protected":false},"author":7,"featured_media":1396,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[37,30],"class_list":["post-1395","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-and-analytics","tag-cybersecurity","tag-security"],"_links":{"self":[{"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/posts\/1395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/comments?post=1395"}],"version-history":[{"count":0,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/posts\/1395\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/media\/1396"}],"wp:attachment":[{"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/media?parent=1395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/categories?post=1395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/tags?post=1395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}