In 2017, the venerable British defense and security company BAE Systems surveyed a globally diverse group of more than 1,200 C-Suite executives and IT Decision Makers (ITDMs). Their survey focused on the key areas of attitudes toward cyber risk, understand the cyber adversaries, and how the organization’s resources affect cyber defense. The opinions of the C-Suite and ITDM personnel were pretty far apart on the three topics. The only thing they could agree on was this gem: Both groups believe the other is responsible in the event of a breach.
This is not an entirely unexpected outcome as the priorities and perspectives of executives and ITDMs are quite different, and necessarily so. C-Suites tend to focus on the loss of sensitive information and customer private data; the IT personnel were concerned with the theft of intellectual property, fraud, and general disruption. Further, the executives assessed the average cost of incident response to be $11.6 million (over 40% said such an incident would cost the business less than $1.5 million) while the propeller heads in IT put it much higher, at $19.2 million.
Clearly, that chasm needs to be bridged. We can do better. We must.
Since 2017 when that report was published, the incidence of cyber-attacks has only increased and data breaches seem to make a regular appearance in the news. Later that year, in September 2017, the Equifax data breach affected over 140 million people. We’ve since learned that the attack vector was due to a software bug for which a patch was publicly available for approximately two months before Equifax was breached – but Equifax did not install it. That’s a technical failure. But Equifax also had technology that could have provided a compensating control by intelligently blocking network requests targeted at this vulnerability, effectively mitigating the risk before the underlying software was patched. The problem was that while this control was purchased, it hadn’t yet been deployed to protect the company’s vulnerable applications. That’s a process and management failure. The business damage to Equifax was severe. The company reportedly incurred over $240 million in the year after the breach – while their cybersecurity insurance coverage was roughly half that amount. That’s a storm a $3bn+ company can endure – can yours?
Fast forward to present day. March 22, 2019 – Capital One suffers a breach affecting the personal information of over 100 million customers and applicants. While we don’t yet know the cost to the business of this incident, there is no doubt it will be significant.
From these examples, and other incidents, we can infer a few salient things:
1. A cybersecurity incident is very expensive
2. Cybersecurity incidents aren’t going away
3. Consequences of such an event, both financial and in terms of customer goodwill to the affected organization, can and do persist long after the attack itself is over
We believe that an effective cybersecurity program needs to include some key recommended practices to foster a deeper interlock between ITDMs and executives, ultimately developing a robust, best of breed cybersecurity posture.
Are there opportunities to improve your cybersecurity program? Not sure where to start? Enter your information below and we’ll share a copy of our 5 Cybersecurity Recommended Practices at no cost to you!