2014 Cybersecurity Forecast

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9
Next Next

Corporate board audit committees will take a greater interest in cybersecurity risks and the organization’s plans for addressing them. 

With more and more data breaches – from theft of trade secrets to loss of customer information – in the headlines, corporate audit committees are beginning to focus on the connection between cybersecurity and an organization’s financial well-being. As such, they will expand their attention beyond the financial audit process to the organization’s strategic plans for protecting non-public information and risk mitigation plans for responding to a possible breach. CIOs and IT leadership should prepare accordingly.

“Organizations recognize that it’s their duty to protect against the loss of information and its associated risks,” said Brill. “As corporate boards carry out their fiduciary responsibilities, they must also protect the company from possible shareholder lawsuits that allege the company's cybersecurity wasn't at a level that could be reasonably viewed to be ‘commercially reasonable’ and that incident response plans weren't in place to mitigate the risk. The challenge they face is determining what is a reasonable level of security and response, and who should make that call – is it their IT team, an industry expert, an independent third party?”

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

Kroll, a global leader in risk mitigation and response solutions, recently released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights seven trends identified by Kroll and suggests that a changing tide in cyber standards, both social and legal, will require organizations to take stronger actions and safeguards to protect against reputational, financial and legal risks.

 

More Slideshows

Security41-190x128 Cybersecurity Grades Released for Key Industries

Looking at cyber data through a business intelligence lens ensures that security-related trends and potential impacts to organizations can be understood and effectively addressed. ...  More >>

Security40-190x128 Five Ways Encryption Has (or Hasn't) Changed Since Snowden

Findings from a new study take a closer look at the evolution of encryption, analyzing adoption rates of the technology and the evolution of privacy awareness. ...  More >>

1EVacationTips0x Six Tips for CIOs Preparing for Vacation

With summer officially in full force, it’s not always easy to disconnect from the office, especially if you’re running the IT department. Here are tips that can help provide peace of mind while you're away. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.