Cybersecurity: from Cost Center to Strategic Investment

Once seen as a cost center, cybersecurity is increasingly understood as a business driver and strategic investment.  Both external and internal forces are at work. The pace and audaciousness of cybercrime, increasingly brazen intellectual property theft (which IBM estimates cost business $4.35 million per breach), and the actions of a few nations have much to do with the changes now underway.

It’s not simply the quantity, but also the quality of cyberattacks and the effect on the bottom line that has made cyber liability emerge as a critical concern for executives. And when it comes to dealing with risk, cybersecurity insurance can’t do it alone. There are now evolving sets of best practices that executives must engage with.

In the wake of a series of high profile breaches, shareholder lawsuits have become more commonplace as parties seek to recover for losses following cyber attacks. These lawsuits very often are smartly keyed into attacks that were either reasonably foreseeable or, once known to leadership, mismanaged. 

Consider that just in the last six months alone we learned that SolarWinds has agreed to pay $26 million to settle a shareholder lawsuit following the massive breach they, and their clients, suffered in 2020. Coming fast on the heels of that settlement, Solarwinds is also expecting to be hit with an enforcement action by the Securities and Exchange Commission (“SEC”). 

Attacks against critical infrastructure have become a feature of today’s news and national cybersecurity strategies are taking such attacks into account. In the United States, cybercrime against critical infrastructure is now judged a threat to national security. Organizations are on the hook to improve their cybersecurity posture, with mandates coming in fast. 

Just last March, the SEC announced proposed rules on cybersecurity risk management, strategy, governance, and incident disclosure. The rules are meant to address concerns of increasingly significant cybersecurity hazards for public companies. 

Among the key elements, the proposed rules would require public companies to disclose material cybersecurity risks and incidents. The SEC stated that “materiality” for purposes of the proposed rules would be consistent with applicable case law and precedents. Further, publicly traded companies would be required to report cybersecurity incidents on Form 8-K within four days of determining that the incident is material.

With these rapid changes top of mind for executives and boards, cybersecurity should be embedded into everything that we do and organizations will be challenged to plan and prepare, regularly reporting and continuously monitoring risks. Are you ready?

PUBLISHED BY

Sean Costigan

28 Mar. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more
Email

Navigating the “SubdoMailing” attack: How Red Sift proactively identified and remediated a…

Rebecca Warren

In the world of cybersecurity, a new threat has emerged. Known as “SubdoMailing,” this new attack cunningly bypasses some of the safeguards that DMARC sets up to protect email integrity.  In this blog we will focus on how the strategic investments we have made at Red Sift allowed us to discover and protect against…

Read more
Email

Where are we now? One month of Google and Yahoo’s new requirements…

Rebecca Warren

As of March 1, 2024, we are one month into Google and Yahoo’s new requirements for bulk senders. Before these requirements went live, we used Red Sift’s BIMI Radar to understand global readiness, and the picture wasn’t pretty.  At the end of January 2024, one-third of global enterprises were bound to fail the new…

Read more