Cybersecurity: from Cost Center to Strategic Investment

Once seen as a cost center, cybersecurity is increasingly understood as a business driver and strategic investment.  Both external and internal forces are at work. The pace and audaciousness of cybercrime, increasingly brazen intellectual property theft (which IBM estimates cost business $4.35 million per breach), and the actions of a few nations have much to do with the changes now underway.

It’s not simply the quantity, but also the quality of cyberattacks and the effect on the bottom line that has made cyber liability emerge as a critical concern for executives. And when it comes to dealing with risk, cybersecurity insurance can’t do it alone. There are now evolving sets of best practices that executives must engage with.

In the wake of a series of high profile breaches, shareholder lawsuits have become more commonplace as parties seek to recover for losses following cyber attacks. These lawsuits very often are smartly keyed into attacks that were either reasonably foreseeable or, once known to leadership, mismanaged. 

Consider that just in the last six months alone we learned that SolarWinds has agreed to pay $26 million to settle a shareholder lawsuit following the massive breach they, and their clients, suffered in 2020. Coming fast on the heels of that settlement, Solarwinds is also expecting to be hit with an enforcement action by the Securities and Exchange Commission (“SEC”). 

Attacks against critical infrastructure have become a feature of today’s news and national cybersecurity strategies are taking such attacks into account. In the United States, cybercrime against critical infrastructure is now judged a threat to national security. Organizations are on the hook to improve their cybersecurity posture, with mandates coming in fast. 

Just last March, the SEC announced proposed rules on cybersecurity risk management, strategy, governance, and incident disclosure. The rules are meant to address concerns of increasingly significant cybersecurity hazards for public companies. 

Among the key elements, the proposed rules would require public companies to disclose material cybersecurity risks and incidents. The SEC stated that “materiality” for purposes of the proposed rules would be consistent with applicable case law and precedents. Further, publicly traded companies would be required to report cybersecurity incidents on Form 8-K within four days of determining that the incident is material.

With these rapid changes top of mind for executives and boards, cybersecurity should be embedded into everything that we do and organizations will be challenged to plan and prepare, regularly reporting and continuously monitoring risks. Are you ready?

PUBLISHED BY

Sean Costigan

28 Mar. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail…

Francesca Rünger-Field

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail Check users With the NCSC discontinuing key features of its Mail Check service, including DMARC aggregate and TLS reporting, after March 2025, UK public sector organisations must prepare for this change by transitioning to alternative email security solutions. To support this shift,…

Read more
DMARC

Mail Check is changing: What UK public sector organisations must know about…

Jack Lilley

The National Cyber Security Centre (NCSC) has suggested a change to Mail Check services starting on 24 March 2025. This change mainly involves ending DMARC aggregate reporting. This change comes as a measure to expand the services provided by Mail Check to any UK based organisation, while also limiting the cost and complexity of…

Read more
DMARC

Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene

Red Sift

Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched,  services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…

Read more
DKIM

First look at DKIM2: The next generation of DKIM

Red Sift

In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…

Read more