SlideShare a Scribd company logo
1 of 6
Download to read offline
1 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
The Digital Economy and Cybersecurity
Introduction
As we enter the digital economy, companies will quickly realize that the differentiator in the digital
economy is information and information being a valuable resource is subject to theft, hacking, phishing
and a host of other issues which compromise a company’s ability to participate in the digital economy.
Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the
digital economy. It is up to every company to ensure that the information shared with them is
protected to the best of their ability and proactively notify persons and organizations who entrust their
information necessary to transact business (any personal identity information including but not limited
to addresses, credit card information, social security numbers, account information, credit information,
medical records, etc.) with any potential compromises which can yield harm to them by that information
either being used maliciously or shared with others.
This purpose of this writing is to cover some of the core requirements for implementing cybersecurity,
the accountabilities for cybersecurity risks and the information used to manage a viable cybersecurity
program.
A word about information and the digital economy
In past phases of the information revolution, physical security was important. This is the first phase of
the industrial revolution where digital security is important as a component of the value chain. We will
show in this writing multiple examples of cyber security lapses which have had reputational
consequences to the company whose guard was let down for even a moment. The willingness of
consumers and businesses to consume digital content is a major component of the value chain in the
digital economy. In cases where there have been digital security lapses, the willingness of consumers to
participate in consuming digital content is lessened, often with changes in capitalization changes to the
offended organization.
Figure 1 | The four phases of the Information Revolution, Fortune, InfoSight Partners, 2016
2 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
In the digital economy, cybersecurity results in information consumption resistance, either through
reputational damage or through concerns of businesses and consumers participating in the value chain
hindering their consumption of content provided by your organization.
Some recent security misfires
3 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
Figure 2 | Recent Cyber-security misfires, Graphic News Daily, December, 2016
All these examples have had significant consequences to the attacked organization.
• Most recently, the records from Yahoo were sold on the dark web for $300 million dollars. The
valuation of Yahoo as part of an acquisition plan has been reduced and has been brought into
question.
• There are many governmental hacks which have made the news recently, one such hack
currently under investigation is the hack of the democratic caucus during the 2016 election.
This series of hacks will be under investigation and will take precedence in the national attention
for a significant period.
It is not hard to find examples of cybersecurity lapses in the marketplace. It is incumbent for
organizations to have proactive strategies to find and eradicate these lapses in cyber security before
they can cause injury to the organization.
Figure 3 | The State of Cybersecurity, 2016, RSA
It is important to note that security professionals have less confidence in their ability to protect their
networks from attacks in 2016 than they have been any time in the past. This is partially due to the
ability to easily monetize hacked information. For example, the hacked emails from Yahoo were
4 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
marketed on the dark web for $300M, illustrating that for those who are successful, finding and
infiltrating information through cybersecurity is a lucrative and very illegal opportunity.
Common approaches to cybersecurity are introduced through the following means:
• Redirecting a web, mobile, IOT device or email session to a malicious web page which gives
access to information behind the firewall.
• Injecting code into a web, mobile, IOT device or email session to perform malicious activities.
• Attacking insufficient web, mobile, IOT device or email management controls, thereby capturing
passwords, session ids or other key information through cookies and other means.
• Writing files on the computer utilizing a web, mobile or email session that collects information
and transmits it through an application loaded on the computer.
• Executing remote code which collects information via the remote code loaded into a mobile,
email or web session.
• Requesting information by promising false claims, which is commonly returned through email.
• Introducing malicious code into a web cache.
• Capturing control of a router, computer or collection of IOT devices to deny service.
These methods of security breaches leave an audit trail which should be a proactive defense in an
organization’s information arsenal. Companies who do not make cybersecurity a major component of
their information arsenal will find themselves appearing in the list of companies shown on figure 2.
There are a number of startups with intentions to deal with the increased threat of cybersecurity lapses.
The following picture depicts 224 startups with a total investment of $2.5B in 2015.
An example of a proactive program is being implemented at the security and exchange commission,
where a $500 million computer system dubbed the Consolidated Audit Trail, or CAT, aims to help
regulators better monitor stock and options orders and quickly zero in on manipulators by creating
some 58 billion records a day and maintaining details on more than 100 million customer accounts.
While many companies prioritize the protection of their mobile and web based digital ecosphere, the
internet of things (IOT) is becoming a large component of the digital presence and needs to be included
in the overall cybersecurity program. IOT devices integrate with the digital ecosphere with in many
cases minimal human intervention.
5 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
Figure 4 | Market Penetration of the Internet of Things, 2015, Altimeter
It is incumbent upon all chief risk officers to have a proactive plan to protect the organization from cyber
security intrusions and include an early warning program to identify and eradicate cyber security
intrusions before they can do their intended harm.
Figure 5| Recent Cyber-security venture capital investments, CB Insights, September, 2015
6 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y
About the Author
Mark Albala is the President of InfoSight Partners, LLC, a business consultancy which provides
financial and technology advisory services devised to facilitate focus into the value of information
assets. InfoSight Partners is led by Mark Albala, who has served in technology and thought
leadership roles and serves as an advisor to analyst organizations and Lynn Albala, an officer of
the NJ State Society of CPAs (who leads the financial advisory services offered by InfoSight
Partners, LLC). Mark can be reached at mark@infosightpartners.com.

More Related Content

What's hot

Digital 101 MCQ (1).pdf
Digital 101 MCQ (1).pdfDigital 101 MCQ (1).pdf
Digital 101 MCQ (1).pdfrajkumar234953
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives Eurotech
 

What's hot (6)

Iot
IotIot
Iot
 
Digital 101 MCQ (1).pdf
Digital 101 MCQ (1).pdfDigital 101 MCQ (1).pdf
Digital 101 MCQ (1).pdf
 
Simple Internet Of Things (IoT) PPT 2020
Simple Internet Of Things (IoT) PPT 2020 Simple Internet Of Things (IoT) PPT 2020
Simple Internet Of Things (IoT) PPT 2020
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives
 
Applications of iot
Applications of iotApplications of iot
Applications of iot
 

Similar to The digital economy and cybersecurity

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfVikashSinghBaghel1
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 

Similar to The digital economy and cybersecurity (20)

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 

More from Mark Albala

A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)Mark Albala
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacyMark Albala
 
Analytics, business cycles and disruptions
Analytics, business cycles and disruptionsAnalytics, business cycles and disruptions
Analytics, business cycles and disruptionsMark Albala
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to businessMark Albala
 
The business model canvas adapted for the digital economy
The business model canvas adapted for the digital economyThe business model canvas adapted for the digital economy
The business model canvas adapted for the digital economyMark Albala
 
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy AssuranceWelcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy AssuranceMark Albala
 
Prepare to be disrupted
Prepare to be disruptedPrepare to be disrupted
Prepare to be disruptedMark Albala
 
Information's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligenceInformation's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligenceMark Albala
 
Personal Data Privacy Assurance
Personal Data Privacy AssurancePersonal Data Privacy Assurance
Personal Data Privacy AssuranceMark Albala
 
Disruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumersDisruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumersMark Albala
 
Introducing the information valuation estimator
Introducing the information valuation estimatorIntroducing the information valuation estimator
Introducing the information valuation estimatorMark Albala
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyMark Albala
 
Deploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economyDeploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economyMark Albala
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of valueMark Albala
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of valueMark Albala
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economyMark Albala
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economyMark Albala
 
Charting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovationsCharting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovationsMark Albala
 
Information's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping pointsInformation's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping pointsMark Albala
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big dataMark Albala
 

More from Mark Albala (20)

A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)A case for intelligent autonomous ai (iai)
A case for intelligent autonomous ai (iai)
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacy
 
Analytics, business cycles and disruptions
Analytics, business cycles and disruptionsAnalytics, business cycles and disruptions
Analytics, business cycles and disruptions
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to business
 
The business model canvas adapted for the digital economy
The business model canvas adapted for the digital economyThe business model canvas adapted for the digital economy
The business model canvas adapted for the digital economy
 
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy AssuranceWelcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
Welcome to the Algorithmic Age and the need for Analytic Accuracy Assurance
 
Prepare to be disrupted
Prepare to be disruptedPrepare to be disrupted
Prepare to be disrupted
 
Information's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligenceInformation's value is enhanced when curated for adaptive intelligence
Information's value is enhanced when curated for adaptive intelligence
 
Personal Data Privacy Assurance
Personal Data Privacy AssurancePersonal Data Privacy Assurance
Personal Data Privacy Assurance
 
Disruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumersDisruptive outcomes are determined by consumers
Disruptive outcomes are determined by consumers
 
Introducing the information valuation estimator
Introducing the information valuation estimatorIntroducing the information valuation estimator
Introducing the information valuation estimator
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
Deploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economyDeploying and monetizing content in the digital economy
Deploying and monetizing content in the digital economy
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of value
 
The pillars of value
The pillars of valueThe pillars of value
The pillars of value
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economy
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economy
 
Charting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovationsCharting your course for surviving disruptive innovations
Charting your course for surviving disruptive innovations
 
Information's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping pointsInformation's role in disruption cycles and the exploitation of tipping points
Information's role in disruption cycles and the exploitation of tipping points
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
 

Recently uploaded

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 

Recently uploaded (20)

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 

The digital economy and cybersecurity

  • 1. 1 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y The Digital Economy and Cybersecurity Introduction As we enter the digital economy, companies will quickly realize that the differentiator in the digital economy is information and information being a valuable resource is subject to theft, hacking, phishing and a host of other issues which compromise a company’s ability to participate in the digital economy. Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the digital economy. It is up to every company to ensure that the information shared with them is protected to the best of their ability and proactively notify persons and organizations who entrust their information necessary to transact business (any personal identity information including but not limited to addresses, credit card information, social security numbers, account information, credit information, medical records, etc.) with any potential compromises which can yield harm to them by that information either being used maliciously or shared with others. This purpose of this writing is to cover some of the core requirements for implementing cybersecurity, the accountabilities for cybersecurity risks and the information used to manage a viable cybersecurity program. A word about information and the digital economy In past phases of the information revolution, physical security was important. This is the first phase of the industrial revolution where digital security is important as a component of the value chain. We will show in this writing multiple examples of cyber security lapses which have had reputational consequences to the company whose guard was let down for even a moment. The willingness of consumers and businesses to consume digital content is a major component of the value chain in the digital economy. In cases where there have been digital security lapses, the willingness of consumers to participate in consuming digital content is lessened, often with changes in capitalization changes to the offended organization. Figure 1 | The four phases of the Information Revolution, Fortune, InfoSight Partners, 2016
  • 2. 2 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y In the digital economy, cybersecurity results in information consumption resistance, either through reputational damage or through concerns of businesses and consumers participating in the value chain hindering their consumption of content provided by your organization. Some recent security misfires
  • 3. 3 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y Figure 2 | Recent Cyber-security misfires, Graphic News Daily, December, 2016 All these examples have had significant consequences to the attacked organization. • Most recently, the records from Yahoo were sold on the dark web for $300 million dollars. The valuation of Yahoo as part of an acquisition plan has been reduced and has been brought into question. • There are many governmental hacks which have made the news recently, one such hack currently under investigation is the hack of the democratic caucus during the 2016 election. This series of hacks will be under investigation and will take precedence in the national attention for a significant period. It is not hard to find examples of cybersecurity lapses in the marketplace. It is incumbent for organizations to have proactive strategies to find and eradicate these lapses in cyber security before they can cause injury to the organization. Figure 3 | The State of Cybersecurity, 2016, RSA It is important to note that security professionals have less confidence in their ability to protect their networks from attacks in 2016 than they have been any time in the past. This is partially due to the ability to easily monetize hacked information. For example, the hacked emails from Yahoo were
  • 4. 4 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y marketed on the dark web for $300M, illustrating that for those who are successful, finding and infiltrating information through cybersecurity is a lucrative and very illegal opportunity. Common approaches to cybersecurity are introduced through the following means: • Redirecting a web, mobile, IOT device or email session to a malicious web page which gives access to information behind the firewall. • Injecting code into a web, mobile, IOT device or email session to perform malicious activities. • Attacking insufficient web, mobile, IOT device or email management controls, thereby capturing passwords, session ids or other key information through cookies and other means. • Writing files on the computer utilizing a web, mobile or email session that collects information and transmits it through an application loaded on the computer. • Executing remote code which collects information via the remote code loaded into a mobile, email or web session. • Requesting information by promising false claims, which is commonly returned through email. • Introducing malicious code into a web cache. • Capturing control of a router, computer or collection of IOT devices to deny service. These methods of security breaches leave an audit trail which should be a proactive defense in an organization’s information arsenal. Companies who do not make cybersecurity a major component of their information arsenal will find themselves appearing in the list of companies shown on figure 2. There are a number of startups with intentions to deal with the increased threat of cybersecurity lapses. The following picture depicts 224 startups with a total investment of $2.5B in 2015. An example of a proactive program is being implemented at the security and exchange commission, where a $500 million computer system dubbed the Consolidated Audit Trail, or CAT, aims to help regulators better monitor stock and options orders and quickly zero in on manipulators by creating some 58 billion records a day and maintaining details on more than 100 million customer accounts. While many companies prioritize the protection of their mobile and web based digital ecosphere, the internet of things (IOT) is becoming a large component of the digital presence and needs to be included in the overall cybersecurity program. IOT devices integrate with the digital ecosphere with in many cases minimal human intervention.
  • 5. 5 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y Figure 4 | Market Penetration of the Internet of Things, 2015, Altimeter It is incumbent upon all chief risk officers to have a proactive plan to protect the organization from cyber security intrusions and include an early warning program to identify and eradicate cyber security intrusions before they can do their intended harm. Figure 5| Recent Cyber-security venture capital investments, CB Insights, September, 2015
  • 6. 6 | P a g e | T h e D i g i t a l E c o n o m y a n d C y b e r s e c u r i t y About the Author Mark Albala is the President of InfoSight Partners, LLC, a business consultancy which provides financial and technology advisory services devised to facilitate focus into the value of information assets. InfoSight Partners is led by Mark Albala, who has served in technology and thought leadership roles and serves as an advisor to analyst organizations and Lynn Albala, an officer of the NJ State Society of CPAs (who leads the financial advisory services offered by InfoSight Partners, LLC). Mark can be reached at mark@infosightpartners.com.