• About Us
  • Mission
  • Media
  • Blog
  • Contact Us
  • @Asymmetrica_
AsymmetricaAsymmetrica
AsymmetricaAsymmetrica
  • Home

Assessing Cyber’s Risks

Assessing Cyber’s Risks

Assessing Cyber’s Risks

April 7, 2015 1 Comment

Insurance companies are hawking the factoid that “nearly half of US companies have experienced a cyber attack.” Of course, they are also selling you insurance against the cyber attacks.

But cyber attack insurance is a bit like K&R (kidnap and ransom) insurance: by the time you need it, it’s too late. Your competitive advantage is gone, and you are likely facing a slew of lawsuits from customers and employees.

The problem has gotten so dire and so pervasive that on March 31st, President Barack Obama declared cyber attacks a “national emergency” and signed an executive order expanding his administration’s ability to respond to malicious cyber attacks by allowing financial penalties to be inflicted on foreign actors who engage in them.

But the greatest threat are privateers. They can be in house personnel even.

While rapidly changing technology makes it impossible to eliminate all threats, every company needs to protect its data by implementing a risk mitigation strategy. The first step is a thorough vulnerability assessment by a qualified subject matter expert (SME).

Do you have a clear picture of how your company’s vulnerabilities can be manipulated?

 

 

 

Loading

Tags: cyberrisk mitigationvulnerability assessment
1 Comment
0
Share

1 Comment

Leave your reply.
  • Lawrence Husick
    · Reply

    April 8, 2015 at 2:01 AM

    Every organization over a certain size (I personally recommend that threshold be around $5 million annual revenue) should have a Chief Security Officer or Chief Information Security Officer (CSO/CISO) who reports to the CEO directly (and NOT to the CIO or CFO). Cyber as well as physical security needs to be a C-suite priority in modern organizations, because much of their value resides in their intellectual capital, and it is this value that is a prime target of cybercriminals and cyberspies. No amount of after-the-fact recovery will bring back that value once it has been exfiltrated, so in this case, a pound of prevention is preferable to any cure. Boards must take steps to get management to focus proactively on this area, as it is not glamorous, and expenditures are painful.

Leave a Reply

Cancel Reply

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message

© 2015 · www.asymmetrica.com

  • About Us
  • Mission
  • Media
  • Blog
  • Contact Us
  • @Asymmetrica_
Prev Next