SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
1 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
The Digital Economy and Cybersecurity
Introduction
As we enter the digital economy, companies will quickly realize that the differentiator in the digital
economy is information and information being a valuable resource is subject to theft, hacking, phishing
and a host of other issues which compromise a company’s ability to participate in the digital economy.
Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the
digital economy. It is up to every company to ensure that the information shared with them is
protected to the best of their ability and proactively notify persons and organizations who entrust their
information necessary to transact business (any personal identity information including but not limited
to addresses, credit card information, social security numbers, account information, credit information,
medical records, etc.) with any potential compromises which can yield harm to them by that information
either being used maliciously or shared with others.
This purpose of this writing is to cover some of the core requirements for implementing cybersecurity,
the accountabilities for cybersecurity risks and the information used to manage a viable cybersecurity
program.
A word about information and the digital economy
In past phases of the information revolution, physical security was important. This is the first phase of
the industrial revolution where digital security is important as a component of the value chain. We will
show in this writing multiple examples of cyber security lapses which have had reputational
consequences to the company whose guard was let down for even a moment. The willingness of
consumers and businesses to consume digital content is a major component of the value chain in the
digital economy. In cases where there have been digital security lapses, the willingness of consumers to
participate in consuming digital content is lessened, often with changes in capitalization changes to the
offended organization.
Figure 1 | The four phases of the Information Revolution, Fortune, InfoSight Partners, 2016
2 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
In the digital economy, cybersecurity results in information consumption resistance, either through
reputational damage or through concerns of businesses and consumers participating in the value chain
hindering their consumption of content provided by your organization.
Some recent security misfires
3 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
Figure 2 | Recent Cyber-security misfires, Graphic News Daily, December, 2016
All these examples have had significant consequences to the attacked organization.
• Most recently, the records from Yahoo were sold on the dark web for $300 million dollars. The
valuation of Yahoo as part of an acquisition plan has been reduced and has been brought into
question.
• There are many governmental hacks which have made the news recently, one such hack
currently under investigation is the hack of the democratic caucus during the 2016 election.
This series of hacks will be under investigation and will take precedence in the national attention
for a significant period.
It is not hard to find examples of cybersecurity lapses in the marketplace. It is incumbent for
organizations to have proactive strategies to find and eradicate these lapses in cyber security before
they can cause injury to the organization.
Figure 3 | The State of Cybersecurity, 2016, RSA
It is important to note that security professionals have less confidence in their ability to protect their
networks from attacks in 2016 than they have been any time in the past. This is partially due to the
ability to easily monetize hacked information. For example, the hacked emails from Yahoo were
4 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
marketed on the dark web for $300M, illustrating that for those who are successful, finding and
infiltrating information through cybersecurity is a lucrative and very illegal opportunity.
Common approaches to cybersecurity are introduced through the following means:
• Redirecting a web, mobile, IOT device or email session to a malicious web page which gives
access to information behind the firewall.
• Injecting code into a web, mobile, IOT device or email session to perform malicious activities.
• Attacking insufficient web, mobile, IOT device or email management controls, thereby capturing
passwords, session ids or other key information through cookies and other means.
• Writing files on the computer utilizing a web, mobile or email session that collects information
and transmits it through an application loaded on the computer.
• Executing remote code which collects information via the remote code loaded into a mobile,
email or web session.
• Requesting information by promising false claims, which is commonly returned through email.
• Introducing malicious code into a web cache.
• Capturing control of a router, computer or collection of IOT devices to deny service.
These methods of security breaches leave an audit trail which should be a proactive defense in an
organization’s information arsenal. Companies who do not make cybersecurity a major component of
their information arsenal will find themselves appearing in the list of companies shown on figure 2.
There are a number of startups with intentions to deal with the increased threat of cybersecurity lapses.
The following picture depicts 224 startups with a total investment of $2.5B in 2015.
An example of a proactive program is being implemented at the security and exchange commission,
where a $500 million computer system dubbed the Consolidated Audit Trail, or CAT, aims to help
regulators better monitor stock and options orders and quickly zero in on manipulators by creating
some 58 billion records a day and maintaining details on more than 100 million customer accounts.
While many companies prioritize the protection of their mobile and web based digital ecosphere, the
internet of things (IOT) is becoming a large component of the digital presence and needs to be included
in the overall cybersecurity program. IOT devices integrate with the digital ecosphere with in many
cases minimal human intervention.
5 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
Figure 4 | Market Penetration of the Internet of Things, 2015, Altimeter
It is incumbent upon all chief risk officers to have a proactive plan to protect the organization from cyber
security intrusions and include an early warning program to identify and eradicate cyber security
intrusions before they can do their intended harm.
Figure 5| Recent Cyber-security venture capital investments, CB Insights, September, 2015
6 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
About the Author
Mark Albala is the President of InfoSight Partners, LLC, a business consultancy which provides
financial and technology advisory services devised to facilitate focus into the value of information
assets. InfoSight Partners is led by Mark Albala, who has served in technology and thought
leadership roles and serves as an advisor to analyst organizations and Lynn Albala, an officer of
the NJ State Society of CPAs (who leads the financial advisory services offered by InfoSight
Partners, LLC). Mark can be reached at mark@infosightpartners.com.

Contenu connexe

Similaire à The digital economy and cybersecurity

12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfVikashSinghBaghel1
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 

Similaire à The digital economy and cybersecurity (20)

12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 

Plus de Mark Albala

A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)Mark Albala
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacyMark Albala
 
Analytics, business cycles and disruptions
Analytics, business cycles and disruptionsAnalytics, business cycles and disruptions
Analytics, business cycles and disruptionsMark Albala
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to businessMark Albala
 
The business model canvas adapted for the digital economy
The business model canvas adapted for the digital economyThe business model canvas adapted for the digital economy
The business model canvas adapted for the digital economyMark Albala
 
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy AssuranceWelcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy AssuranceMark Albala
 
Prepare to be disrupted
Prepare to be disruptedPrepare to be disrupted
Prepare to be disruptedMark Albala
 
Information's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligenceInformation's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligenceMark Albala
 
Personal Data Privacy Assurance
Personal Data Privacy AssurancePersonal Data Privacy Assurance
Personal Data Privacy AssuranceMark Albala
 
Disruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumersDisruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumersMark Albala
 
Introducing the information valuation estimator
Introducing the information valuation estimatorIntroducing the information valuation estimator
Introducing the information valuation estimatorMark Albala
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyMark Albala
 
Deploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economyDeploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economyMark Albala
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of valueMark Albala
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of valueMark Albala
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economyMark Albala
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economyMark Albala
 
Charting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovationsCharting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovationsMark Albala
 
Information's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping pointsInformation's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping pointsMark Albala
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big dataMark Albala
 

Plus de Mark Albala (20)

A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacy
 
Analytics, business cycles and disruptions
Analytics, business cycles and disruptionsAnalytics, business cycles and disruptions
Analytics, business cycles and disruptions
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to business
 
The business model canvas adapted for the digital economy
The business model canvas adapted for the digital economyThe business model canvas adapted for the digital economy
The business model canvas adapted for the digital economy
 
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy AssuranceWelcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
 
Prepare to be disrupted
Prepare to be disruptedPrepare to be disrupted
Prepare to be disrupted
 
Information's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligenceInformation's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligence
 
Personal Data Privacy Assurance
Personal Data Privacy AssurancePersonal Data Privacy Assurance
Personal Data Privacy Assurance
 
Disruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumersDisruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumers
 
Introducing the information valuation estimator
Introducing the information valuation estimatorIntroducing the information valuation estimator
Introducing the information valuation estimator
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
Deploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economyDeploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economy
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of value
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of value
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economy
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economy
 
Charting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovationsCharting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovations
 
Information's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping pointsInformation's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping points
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
 

Dernier

Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 

Dernier (20)

Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

The digital economy and cybersecurity

  • 1. 1 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y The Digital Economy and Cybersecurity Introduction As we enter the digital economy, companies will quickly realize that the differentiator in the digital economy is information and information being a valuable resource is subject to theft, hacking, phishing and a host of other issues which compromise a company’s ability to participate in the digital economy. Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the digital economy. It is up to every company to ensure that the information shared with them is protected to the best of their ability and proactively notify persons and organizations who entrust their information necessary to transact business (any personal identity information including but not limited to addresses, credit card information, social security numbers, account information, credit information, medical records, etc.) with any potential compromises which can yield harm to them by that information either being used maliciously or shared with others. This purpose of this writing is to cover some of the core requirements for implementing cybersecurity, the accountabilities for cybersecurity risks and the information used to manage a viable cybersecurity program. A word about information and the digital economy In past phases of the information revolution, physical security was important. This is the first phase of the industrial revolution where digital security is important as a component of the value chain. We will show in this writing multiple examples of cyber security lapses which have had reputational consequences to the company whose guard was let down for even a moment. The willingness of consumers and businesses to consume digital content is a major component of the value chain in the digital economy. In cases where there have been digital security lapses, the willingness of consumers to participate in consuming digital content is lessened, often with changes in capitalization changes to the offended organization. Figure 1 | The four phases of the Information Revolution, Fortune, InfoSight Partners, 2016
  • 2. 2 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y In the digital economy, cybersecurity results in information consumption resistance, either through reputational damage or through concerns of businesses and consumers participating in the value chain hindering their consumption of content provided by your organization. Some recent security misfires
  • 3. 3 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y Figure 2 | Recent Cyber-security misfires, Graphic News Daily, December, 2016 All these examples have had significant consequences to the attacked organization. • Most recently, the records from Yahoo were sold on the dark web for $300 million dollars. The valuation of Yahoo as part of an acquisition plan has been reduced and has been brought into question. • There are many governmental hacks which have made the news recently, one such hack currently under investigation is the hack of the democratic caucus during the 2016 election. This series of hacks will be under investigation and will take precedence in the national attention for a significant period. It is not hard to find examples of cybersecurity lapses in the marketplace. It is incumbent for organizations to have proactive strategies to find and eradicate these lapses in cyber security before they can cause injury to the organization. Figure 3 | The State of Cybersecurity, 2016, RSA It is important to note that security professionals have less confidence in their ability to protect their networks from attacks in 2016 than they have been any time in the past. This is partially due to the ability to easily monetize hacked information. For example, the hacked emails from Yahoo were
  • 4. 4 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y marketed on the dark web for $300M, illustrating that for those who are successful, finding and infiltrating information through cybersecurity is a lucrative and very illegal opportunity. Common approaches to cybersecurity are introduced through the following means: • Redirecting a web, mobile, IOT device or email session to a malicious web page which gives access to information behind the firewall. • Injecting code into a web, mobile, IOT device or email session to perform malicious activities. • Attacking insufficient web, mobile, IOT device or email management controls, thereby capturing passwords, session ids or other key information through cookies and other means. • Writing files on the computer utilizing a web, mobile or email session that collects information and transmits it through an application loaded on the computer. • Executing remote code which collects information via the remote code loaded into a mobile, email or web session. • Requesting information by promising false claims, which is commonly returned through email. • Introducing malicious code into a web cache. • Capturing control of a router, computer or collection of IOT devices to deny service. These methods of security breaches leave an audit trail which should be a proactive defense in an organization’s information arsenal. Companies who do not make cybersecurity a major component of their information arsenal will find themselves appearing in the list of companies shown on figure 2. There are a number of startups with intentions to deal with the increased threat of cybersecurity lapses. The following picture depicts 224 startups with a total investment of $2.5B in 2015. An example of a proactive program is being implemented at the security and exchange commission, where a $500 million computer system dubbed the Consolidated Audit Trail, or CAT, aims to help regulators better monitor stock and options orders and quickly zero in on manipulators by creating some 58 billion records a day and maintaining details on more than 100 million customer accounts. While many companies prioritize the protection of their mobile and web based digital ecosphere, the internet of things (IOT) is becoming a large component of the digital presence and needs to be included in the overall cybersecurity program. IOT devices integrate with the digital ecosphere with in many cases minimal human intervention.
  • 5. 5 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y Figure 4 | Market Penetration of the Internet of Things, 2015, Altimeter It is incumbent upon all chief risk officers to have a proactive plan to protect the organization from cyber security intrusions and include an early warning program to identify and eradicate cyber security intrusions before they can do their intended harm. Figure 5| Recent Cyber-security venture capital investments, CB Insights, September, 2015
  • 6. 6 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y About the Author Mark Albala is the President of InfoSight Partners, LLC, a business consultancy which provides financial and technology advisory services devised to facilitate focus into the value of information assets. InfoSight Partners is led by Mark Albala, who has served in technology and thought leadership roles and serves as an advisor to analyst organizations and Lynn Albala, an officer of the NJ State Society of CPAs (who leads the financial advisory services offered by InfoSight Partners, LLC). Mark can be reached at mark@infosightpartners.com.