SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
1 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
The Digital Economy and Cybersecurity
Introduction
As we enter the digital economy, companies will quickly realize that the differentiator in the digital
economy is information and information being a valuable resource is subject to theft, hacking, phishing
and a host of other issues which compromise a company’s ability to participate in the digital economy.
Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the
digital economy. It is up to every company to ensure that the information shared with them is
protected to the best of their ability and proactively notify persons and organizations who entrust their
information necessary to transact business (any personal identity information including but not limited
to addresses, credit card information, social security numbers, account information, credit information,
medical records, etc.) with any potential compromises which can yield harm to them by that information
either being used maliciously or shared with others.
This purpose of this writing is to cover some of the core requirements for implementing cybersecurity,
the accountabilities for cybersecurity risks and the information used to manage a viable cybersecurity
program.
A word about information and the digital economy
In past phases of the information revolution, physical security was important. This is the first phase of
the industrial revolution where digital security is important as a component of the value chain. We will
show in this writing multiple examples of cyber security lapses which have had reputational
consequences to the company whose guard was let down for even a moment. The willingness of
consumers and businesses to consume digital content is a major component of the value chain in the
digital economy. In cases where there have been digital security lapses, the willingness of consumers to
participate in consuming digital content is lessened, often with changes in capitalization changes to the
offended organization.
Figure 1 | The four phases of the Information Revolution, Fortune, InfoSight Partners, 2016
2 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
In the digital economy, cybersecurity results in information consumption resistance, either through
reputational damage or through concerns of businesses and consumers participating in the value chain
hindering their consumption of content provided by your organization.
Some recent security misfires
3 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
Figure 2 | Recent Cyber-security misfires, Graphic News Daily, December, 2016
All these examples have had significant consequences to the attacked organization.
• Most recently, the records from Yahoo were sold on the dark web for $300 million dollars. The
valuation of Yahoo as part of an acquisition plan has been reduced and has been brought into
question.
• There are many governmental hacks which have made the news recently, one such hack
currently under investigation is the hack of the democratic caucus during the 2016 election.
This series of hacks will be under investigation and will take precedence in the national attention
for a significant period.
It is not hard to find examples of cybersecurity lapses in the marketplace. It is incumbent for
organizations to have proactive strategies to find and eradicate these lapses in cyber security before
they can cause injury to the organization.
Figure 3 | The State of Cybersecurity, 2016, RSA
It is important to note that security professionals have less confidence in their ability to protect their
networks from attacks in 2016 than they have been any time in the past. This is partially due to the
ability to easily monetize hacked information. For example, the hacked emails from Yahoo were
4 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
marketed on the dark web for $300M, illustrating that for those who are successful, finding and
infiltrating information through cybersecurity is a lucrative and very illegal opportunity.
Common approaches to cybersecurity are introduced through the following means:
• Redirecting a web, mobile, IOT device or email session to a malicious web page which gives
access to information behind the firewall.
• Injecting code into a web, mobile, IOT device or email session to perform malicious activities.
• Attacking insufficient web, mobile, IOT device or email management controls, thereby capturing
passwords, session ids or other key information through cookies and other means.
• Writing files on the computer utilizing a web, mobile or email session that collects information
and transmits it through an application loaded on the computer.
• Executing remote code which collects information via the remote code loaded into a mobile,
email or web session.
• Requesting information by promising false claims, which is commonly returned through email.
• Introducing malicious code into a web cache.
• Capturing control of a router, computer or collection of IOT devices to deny service.
These methods of security breaches leave an audit trail which should be a proactive defense in an
organization’s information arsenal. Companies who do not make cybersecurity a major component of
their information arsenal will find themselves appearing in the list of companies shown on figure 2.
There are a number of startups with intentions to deal with the increased threat of cybersecurity lapses.
The following picture depicts 224 startups with a total investment of $2.5B in 2015.
An example of a proactive program is being implemented at the security and exchange commission,
where a $500 million computer system dubbed the Consolidated Audit Trail, or CAT, aims to help
regulators better monitor stock and options orders and quickly zero in on manipulators by creating
some 58 billion records a day and maintaining details on more than 100 million customer accounts.
While many companies prioritize the protection of their mobile and web based digital ecosphere, the
internet of things (IOT) is becoming a large component of the digital presence and needs to be included
in the overall cybersecurity program. IOT devices integrate with the digital ecosphere with in many
cases minimal human intervention.
5 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
Figure 4 | Market Penetration of the Internet of Things, 2015, Altimeter
It is incumbent upon all chief risk officers to have a proactive plan to protect the organization from cyber
security intrusions and include an early warning program to identify and eradicate cyber security
intrusions before they can do their intended harm.
Figure 5| Recent Cyber-security venture capital investments, CB Insights, September, 2015
6 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
About the Author
Mark Albala is the President of InfoSight Partners, LLC, a business consultancy which provides
financial and technology advisory services devised to facilitate focus into the value of information
assets. InfoSight Partners is led by Mark Albala, who has served in technology and thought
leadership roles and serves as an advisor to analyst organizations and Lynn Albala, an officer of
the NJ State Society of CPAs (who leads the financial advisory services offered by InfoSight
Partners, LLC). Mark can be reached at mark@infosightpartners.com.

Weitere ähnliche Inhalte

Ähnlich wie The digital economy and cybersecurity

12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
superintendingengine17
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 

Ähnlich wie The digital economy and cybersecurity (20)

12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 

Mehr von Mark Albala

A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)
Mark Albala
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacy
Mark Albala
 
Analytics, business cycles and disruptions
Analytics, business cycles and disruptionsAnalytics, business cycles and disruptions
Analytics, business cycles and disruptions
Mark Albala
 
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy AssuranceWelcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Mark Albala
 
Prepare to be disrupted
Prepare to be disruptedPrepare to be disrupted
Prepare to be disrupted
Mark Albala
 
Information's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligenceInformation's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligence
Mark Albala
 
Personal Data Privacy Assurance
Personal Data Privacy AssurancePersonal Data Privacy Assurance
Personal Data Privacy Assurance
Mark Albala
 
Disruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumersDisruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumers
Mark Albala
 
Introducing the information valuation estimator
Introducing the information valuation estimatorIntroducing the information valuation estimator
Introducing the information valuation estimator
Mark Albala
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
Mark Albala
 
Deploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economyDeploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economy
Mark Albala
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of value
Mark Albala
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economy
Mark Albala
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
Mark Albala
 

Mehr von Mark Albala (20)

A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacy
 
Analytics, business cycles and disruptions
Analytics, business cycles and disruptionsAnalytics, business cycles and disruptions
Analytics, business cycles and disruptions
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to business
 
The business model canvas adapted for the digital economy
The business model canvas adapted for the digital economyThe business model canvas adapted for the digital economy
The business model canvas adapted for the digital economy
 
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy AssuranceWelcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
 
Prepare to be disrupted
Prepare to be disruptedPrepare to be disrupted
Prepare to be disrupted
 
Information's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligenceInformation's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligence
 
Personal Data Privacy Assurance
Personal Data Privacy AssurancePersonal Data Privacy Assurance
Personal Data Privacy Assurance
 
Disruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumersDisruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumers
 
Introducing the information valuation estimator
Introducing the information valuation estimatorIntroducing the information valuation estimator
Introducing the information valuation estimator
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
Deploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economyDeploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economy
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of value
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of value
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economy
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economy
 
Charting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovationsCharting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovations
 
Information's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping pointsInformation's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping points
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
 

Kürzlich hochgeladen

Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 

Kürzlich hochgeladen (20)

Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 

The digital economy and cybersecurity

  • 1. 1 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y The Digital Economy and Cybersecurity Introduction As we enter the digital economy, companies will quickly realize that the differentiator in the digital economy is information and information being a valuable resource is subject to theft, hacking, phishing and a host of other issues which compromise a company’s ability to participate in the digital economy. Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the digital economy. It is up to every company to ensure that the information shared with them is protected to the best of their ability and proactively notify persons and organizations who entrust their information necessary to transact business (any personal identity information including but not limited to addresses, credit card information, social security numbers, account information, credit information, medical records, etc.) with any potential compromises which can yield harm to them by that information either being used maliciously or shared with others. This purpose of this writing is to cover some of the core requirements for implementing cybersecurity, the accountabilities for cybersecurity risks and the information used to manage a viable cybersecurity program. A word about information and the digital economy In past phases of the information revolution, physical security was important. This is the first phase of the industrial revolution where digital security is important as a component of the value chain. We will show in this writing multiple examples of cyber security lapses which have had reputational consequences to the company whose guard was let down for even a moment. The willingness of consumers and businesses to consume digital content is a major component of the value chain in the digital economy. In cases where there have been digital security lapses, the willingness of consumers to participate in consuming digital content is lessened, often with changes in capitalization changes to the offended organization. Figure 1 | The four phases of the Information Revolution, Fortune, InfoSight Partners, 2016
  • 2. 2 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y In the digital economy, cybersecurity results in information consumption resistance, either through reputational damage or through concerns of businesses and consumers participating in the value chain hindering their consumption of content provided by your organization. Some recent security misfires
  • 3. 3 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y Figure 2 | Recent Cyber-security misfires, Graphic News Daily, December, 2016 All these examples have had significant consequences to the attacked organization. • Most recently, the records from Yahoo were sold on the dark web for $300 million dollars. The valuation of Yahoo as part of an acquisition plan has been reduced and has been brought into question. • There are many governmental hacks which have made the news recently, one such hack currently under investigation is the hack of the democratic caucus during the 2016 election. This series of hacks will be under investigation and will take precedence in the national attention for a significant period. It is not hard to find examples of cybersecurity lapses in the marketplace. It is incumbent for organizations to have proactive strategies to find and eradicate these lapses in cyber security before they can cause injury to the organization. Figure 3 | The State of Cybersecurity, 2016, RSA It is important to note that security professionals have less confidence in their ability to protect their networks from attacks in 2016 than they have been any time in the past. This is partially due to the ability to easily monetize hacked information. For example, the hacked emails from Yahoo were
  • 4. 4 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y marketed on the dark web for $300M, illustrating that for those who are successful, finding and infiltrating information through cybersecurity is a lucrative and very illegal opportunity. Common approaches to cybersecurity are introduced through the following means: • Redirecting a web, mobile, IOT device or email session to a malicious web page which gives access to information behind the firewall. • Injecting code into a web, mobile, IOT device or email session to perform malicious activities. • Attacking insufficient web, mobile, IOT device or email management controls, thereby capturing passwords, session ids or other key information through cookies and other means. • Writing files on the computer utilizing a web, mobile or email session that collects information and transmits it through an application loaded on the computer. • Executing remote code which collects information via the remote code loaded into a mobile, email or web session. • Requesting information by promising false claims, which is commonly returned through email. • Introducing malicious code into a web cache. • Capturing control of a router, computer or collection of IOT devices to deny service. These methods of security breaches leave an audit trail which should be a proactive defense in an organization’s information arsenal. Companies who do not make cybersecurity a major component of their information arsenal will find themselves appearing in the list of companies shown on figure 2. There are a number of startups with intentions to deal with the increased threat of cybersecurity lapses. The following picture depicts 224 startups with a total investment of $2.5B in 2015. An example of a proactive program is being implemented at the security and exchange commission, where a $500 million computer system dubbed the Consolidated Audit Trail, or CAT, aims to help regulators better monitor stock and options orders and quickly zero in on manipulators by creating some 58 billion records a day and maintaining details on more than 100 million customer accounts. While many companies prioritize the protection of their mobile and web based digital ecosphere, the internet of things (IOT) is becoming a large component of the digital presence and needs to be included in the overall cybersecurity program. IOT devices integrate with the digital ecosphere with in many cases minimal human intervention.
  • 5. 5 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y Figure 4 | Market Penetration of the Internet of Things, 2015, Altimeter It is incumbent upon all chief risk officers to have a proactive plan to protect the organization from cyber security intrusions and include an early warning program to identify and eradicate cyber security intrusions before they can do their intended harm. Figure 5| Recent Cyber-security venture capital investments, CB Insights, September, 2015
  • 6. 6 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y About the Author Mark Albala is the President of InfoSight Partners, LLC, a business consultancy which provides financial and technology advisory services devised to facilitate focus into the value of information assets. InfoSight Partners is led by Mark Albala, who has served in technology and thought leadership roles and serves as an advisor to analyst organizations and Lynn Albala, an officer of the NJ State Society of CPAs (who leads the financial advisory services offered by InfoSight Partners, LLC). Mark can be reached at mark@infosightpartners.com.