Cybersecurity Grades Released for Key Industries

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
Next Cybersecurity Grades Released for Key Industries-14 Next

In closing

The traditional cybersecurity approach is to drill down into packet data, logs and other technical data streams, but this information is not easily consumed by most employees in an organization and only provides one angle to look at. With a business intelligence approach to cybersecurity, organizations can drill deeper into the data to:

  • understand cyber risk trends over time
  • perform graph-style analysis to isolate connections not easily seen
  • conduct predictive analysis
  • link insights to key actions that the business can take

Armed with this level of cyber risk intelligence, the C-suite and board members can more effectively allocate resources and make more informed risk mitigation decisions.

Traditionally, the complex world of cybersecurity has been left solely to information security professionals to defend the organization's sensitive information and systems. But the recent spate of high-profile data breaches and warnings from regulators has caught the attention of C-level executives and board members. Cybersecurity is no longer just a technical issue, as a breach can have a major impact on the viability of an organization – loss of brand reputation, jobs, customers and partners, and most importantly a negative impact on the bottom line.

Now that execs recognize the need to prioritize cybersecurity, where do they begin? Understanding the cyber risks an organization faces and extrapolating the potential business impact is tough using traditional cybersecurity solutions, which produce volumes of low-level, machine-based data. This method requires significant effort and resources to understand whether a threat is relevant to the business, how big an impact it could have, and how to address it.

Translating the fire hose of threat data into information that can be easily understood and used to educate the rest of the organization is an approach taken by SurfWatch Labs, a provider of cyber risk intelligence solutions. Looking at cyber data through a business intelligence lens ensures that security-related trends and potential impacts to organizations can be understood and effectively addressed. This slideshow contains a high-level view of cyber risk analysis contained in SurfWatch Cyber Risk Reports, which aggregate, standardize and analyze cyber-related information for the top four most active industries.

Jason Polancich, founder and chief architect, SurfWatch Labs, is a serial entrepreneur focused on solving complex Internet security and cyber-defense problems, with more than 20 years of experience as an intelligence analyst, software engineer, systems architect and corporate executive. Prior to founding SurfWatch Labs, Mr. Polancich co-founded Novii Design, which assisted the U.S. intelligence community and Department of Defense in building some of the largest data warehouse and analysis systems ever put into operation within the government and defense contracting sectors.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.