2014 Cybersecurity Forecast

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9
Next Next

Corporate board audit committees will take a greater interest in cybersecurity risks and the organization’s plans for addressing them. 

With more and more data breaches – from theft of trade secrets to loss of customer information – in the headlines, corporate audit committees are beginning to focus on the connection between cybersecurity and an organization’s financial well-being. As such, they will expand their attention beyond the financial audit process to the organization’s strategic plans for protecting non-public information and risk mitigation plans for responding to a possible breach. CIOs and IT leadership should prepare accordingly.

“Organizations recognize that it’s their duty to protect against the loss of information and its associated risks,” said Brill. “As corporate boards carry out their fiduciary responsibilities, they must also protect the company from possible shareholder lawsuits that allege the company's cybersecurity wasn't at a level that could be reasonably viewed to be ‘commercially reasonable’ and that incident response plans weren't in place to mitigate the risk. The challenge they face is determining what is a reasonable level of security and response, and who should make that call – is it their IT team, an industry expert, an independent third party?”

Kroll, a global leader in risk mitigation and response solutions, recently released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights seven trends identified by Kroll and suggests that a changing tide in cyber standards, both social and legal, will require organizations to take stronger actions and safeguards to protect against reputational, financial and legal risks.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security62-290x195 Seven Ways to Improve Cybersecurity Through Behavioral Analysis

No matter how advanced SIEM tools become, security pros must back up their findings with data rooted in the company's daily IT activities in order to glean valuable insights. ...  More >>

LogicalisSecurityBizEnabler0x Beyond Protection: Security as a Business Enabler

What if security tools could do more? What if they could enable the business by providing deeper visibility and a better understanding of how corporate compute resources are being used? ...  More >>

infra44-190x128 Six E-Signature Security Requirements for Digital Transactions

Taking a broader view of e-signature security will help companies strengthen their legal and compliance position while ensuring maximum adoption. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date