The 5th Dimension - Cybersecurity
PABLO AMARGO FOR THE BOSTON GLOBE

The 5th Dimension - Cybersecurity

To respond to what is perhaps the most potent threat today to a country's future, many nations have launched the 5th dimension of warfare, CYBER - in addition to land, air, sea and space. But this new theatre of war is like none we have experienced. For one you don't need billions of dollars or many years to develop a weapon, or even a large people force to gain superiority. A few really smart women or men can wreak havoc on a nation’s infrastructure. Another is that a cyber attack transcends our normal notions of geographical boundaries. And increasingly cyber attacks are directed not only at nations but at its people and its companies, with little rules of engagement governing such warfare. In this article I spend some time discussing Cybersecurity in the context of companies.

 A breach of a company’s cyber perimeter can have the following negative consequences:

  1. Material – for example loss of information like trade secrets, or the crippling of an organizations business due to attack on its network or websites
  2. Reputational – loss of reputation and trust from customers and partners, eventually leading to loss of business
  3. Legal – exposing an organization to lawsuits, which result in legal fees and possible punitive damages. This is especially true when a breach has resulted in loss of PII (Personally Identifiable Information)

Cyber attacks on an organization can be classified under three broad categories:

  1. Information - the objective of criminals is to steal secure and non-public information, for example credit card numbers, which they can resell later
  2. Availability - the purpose is to impact the availability of an organization’s infrastructure. This is typically done through a DoS (denial of service) or DDoS (Distributed Denial of Service) attack, by which cyber criminals inundate a company's network (example: website) with requests, placing a severe out of the ordinary burden, making the network inoperable
  3. Integrity - the objective here is to destroy information assets, or create malware / viruses that damage the companies computers or network

It is also important to note that a cyber attack can come from both within the organization and from outside. And a typical cyber intrusion is detected months after the fact, thus exposing any organization to a prolonged breach before the intruders can be thwarted. Another nuance, for consulting and services organizations, is the possibility of an employee compromising the information security of a clients infrastructure, which in turn can result in severe reputational, material or legal damages. 

So how can companies prepare for this new normal of cyber attacks? A few suggestions are below:

  • Culture – Many cyber intrusions are made possible by criminals exploiting the ignorance of a firm’s employees. Emails purporting to be official and authentic, known as phishing, lure the unsuspecting employee in sharing information like user ids and passwords or clicking on links that pass information along without the employees knowledge. However organizations have been slow to build awareness amongst employees, partly because they have yet to experience a devastating cyber incident. The need to build awareness, drive behavior and build culture is paramount and needs to be done in a structured manner
  • Third Party Risk Management (TPRM) - What do the following attacks have in common: Target where 40 million customer accounts were compromised, JPMC where 70 million households and 7 million small business’s information was compromised and Home Depot where 56 million credit / debit card information was stolen? All these attacks were conducted using vulnerabilities in these organization’s third parties. By some estimates, large financial institutions in the US have on an average 20,000 third party relationships thereby exposing them to 20,000 points of weakness. TPRM , also referred as vendor risk management, is one of the most potent sources of vulnerabilities and therefore an organization must have a very clear policy and procedure, on how information and network access is shared with its third parties
  • Detection and not just Prevention - There are only two kinds of organizations: Those that have been hacked and those that don’t know yet that they have been hacked. Such paranoia is definitely helpful when it comes to cybersecurity. For example, the Home Depot breach happened in April 2014 but was only detected in September 2014! Therefore periodic vulnerability tests should not only focus on breaking the firms cyber perimeter but also on detecting a breach that may have already happened and it yet to be discovered
  • Elevate the conversation to the boardroom - This is no laughing matter. The Target hack resulted in the resignation of their then CEO. A cybersecurity incident can result in severe reputational and legal damages, that can possibly put the company out of business very quickly. Therefore cybersecurity needs to be part of every Board’s agenda and an organization must put in the right leadership to effectively manage its cybersecurity

The world we live in is evolving at a very rapid pace and so are the cyber threats we face. The exponential growth in the Internet, Cloud, Internet of Things, Mobile and other smart technologies is enabling firms to make more profits, from more avenues but at the same time it is dramatically increasing the interconnectedness of these firms, with other firms and people. This creates an dramatic growth in the probability of a cyber attack with increasingly dire consequences. Therefore there is an even greater urgency to address Cybersecurity and address it with deep rigor.

Be Safe. Be Secure and May the Force be with you!

Kunal Kumar, PMP?

LinkedIn Top Voice | Associate Director-KPMG | Business Consulting | Digital Transformation Program Manager GRC | MBA IIM Calcutta | PMP | CSM, SAFe Certified | Consulting Expert (Views are on personal capacity)

8 å¹´

Nice blog Gaurav... Good read

赞
回复
Brinda Murty

A driven and passionate leader with belief in the power of transformation and managed disruption, balancing a results driven approach with a collaborative style.

8 å¹´

Nice blog post Gaurav !

赞
回复
Gaurav Chakravorty

Software Engineer (Leadership) @ Meta | Writing about recommender systems

8 å¹´

Very nice post Gaurav Agrawal. In the industry I have specialized in, Machine Learning based Trading, even though it is only tangentially exposed to outsiders, I have known of instances of security failures. On a larger scale, we have started seeing high security failures, like the billion dollar heist last month involving the Federal Reserve System. The problem is also that covering all the holes of a system is not as easy as it sounds. We are not hardwired to think in terms of failures. I remember how Mansi Singhal used to construct a trade by looking at all the ways it can fail. It seemed like such a pessimist way of looking at things. But as a trader one knows that only by enumerating all the risks and making sure one is covered, can one truly be convinced on the bet.

要查看或添加评论,请登录

Gaurav Agrawal的更多文章

  • The Metamorphosis of Financial Services

    The Metamorphosis of Financial Services

    Financial services and banking is transforming and it is happening now! 2020 has accelerated this transformation and I…

    3 条评论
  • ETHICS in AI

    ETHICS in AI

    Here is a thought experiment. You are driving a car which is about to get into an accident.

    6 条评论
  • The Future of Banking

    The Future of Banking

    What would Banking look like in 2030? One possible scenario is the Banking industry performing the role of a Life…

    6 条评论
  • On Cloud 9 - Declutter your IT to make room for organizational growth

    On Cloud 9 - Declutter your IT to make room for organizational growth

    Acknowledgement: My colleagues Himanshu Sahni and Vinod Gopinathan gave me valuable input for this article. Their…

    2 条评论
  • The Digital Practitioner's Almanac - 2

    The Digital Practitioner's Almanac - 2

    In Part 1, I discussed three points digital practitioner's should keep in mind, to successfully adopt Digital. The…

    1 条评论
  • The Digital Practitioner's Almanac -1

    The Digital Practitioner's Almanac -1

    As firms think about leveraging Digital to create competitive advantage, there are different perspectives and points of…

    2 条评论
  • THE FRICTIONLESS ECONOMY

    THE FRICTIONLESS ECONOMY

    There are many reasons why Amazon, Uber, Air bnb, Netflix and Google have built such successful business models. A key…

    11 条评论
  • The Tower of Babel: Will Humans supersede God, before AI supersedes Humans?

    The Tower of Babel: Will Humans supersede God, before AI supersedes Humans?

    For those of you unfamiliar with the story of The Tower of Babel, it appears in Genesis 11:1-9, stating that after the…

    2 条评论
  • FUTURE SHOCK – in Year 2050 A.D.

    FUTURE SHOCK – in Year 2050 A.D.

    What does life in Year 2050 A.D.

  • Of Monkeys and Men: The trials and tribulations of the Asset Management industry

    Of Monkeys and Men: The trials and tribulations of the Asset Management industry

    The world of investing is complicated. I suspect the phrase ‘It’s all Greek to me’ originated here – between all the…

    1 条评论

社区洞察

其他会员也浏览了