Beef Up Cybersecurity or Risk Bottom Line

April 2, 2010
Contrary to popular belief, cybersecurity is not solely an IT problem. Cybersecurity today requires an enterprise-wide approach that includes C-level involvement and any organizations that doesn't have that kind of system in place is risking its bottom ...

Contrary to popular belief, cybersecurity is not solely an IT problem.

Cybersecurity today requires an enterprise-wide approach that includes C-level involvement and any organizations that doesn't have that kind of system in place is risking its bottom line, according to a new report, titled "The Financial Management of Cyber Risk: An Implementation Framework for CFOs."

The 76-page report, released yesterday by the Internet Security Alliance (ISA) and the American National Standards Institute (ANSI), was developed by a cross-sector task force of more than sixty industry and government experts. (A free download is available here. Registration required.)

The report approaches the financial impact of cyber risks from an holistic perspective, including relevant chapters that touch upon the core business functions of all organizations, no matter the size or industry sector.

And the financial impact is significant. A White House Cyberspace Policy Review reported that, between 2008 and 2009, American business losses due to cyber attacks had grown to more than $1 trillion of intellectual property. According to the report, a typical breach of 10,000 personal records held by an organization would be about $2 million.

"Business is currently on the front lines of a raging cyber war that is costing trillions of dollars and endangering our national security," says Larry Clinton, president of the ISA. "Effective, low-cost mechanisms are already in place to shield against many elements of the cyber threat. But too often executive leaders wait until they are compromised to develop a plan of action, damaging their company's reputation and incurring additional cost. The guide we are releasing today provides a practical and easy-to-understand framework for executives to assess and manage their cyber infrastructure."

Complicating matters even more, employees are increasingly bringing personal mobile devices smart phones, flash drives, media players to work. Remember: These personal data storage devices represent yet another level of risk for the flow of business information to and from your organization.

Popular Sponsored Recommendations

Four Common OT Cybersecurity Pitfalls for Manufacturers

April 4, 2023
For the last six years, Dragos has leveraged their Professional Services team to develop an on-the-ground understanding of the realities facing the industrial community and to...

The Realist Guide to Sustainable Supply Chains

Sept. 28, 2023
A ‘roll up your sleeves’ guide to driving green line performance at your organization. Learn with this easy-to-understand ebook how to implement green supply chain management ...

Legacy Phone Lines Are Draining Your Profits

Oct. 30, 2023
Copper wire phone line expenses that support emergency devices could be costing your company millions of dollars in wasteful overhead expenses. Rates have been skyrocketing while...

2022 ICS/OT Cybersecurity Year in Review

March 13, 2023
The annual Dragos ICS/OT Cybersecurity Year in Review Report is the most comprehensive source for the latest cyber threat intelligence, vulnerabilities, and lessons learned from...

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!