Defending Your Company's Reputation in Cyberspace
Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
Businesses must manage risks beyond those traditionally handled by the information security function, including cyber-attacks on reputation and technology.
Be Prepared for the Inevitable
With the speed and complexity of the threat landscape changing on a daily basis, all too often we’re seeing businesses being left behind, sometimes in the stormy wake of reputational and financial damage. Organizations need to ensure they are fully prepared to deal with ever-emerging cyber-challenges. By adopting a realistic, broad-based, collaborative approach to cyber-security and resilience, senior executives and information security professionals will be best able to understand the nature of cyber-threats and respond appropriately.
Businesses of all sizes must better equip themselves to deal with an attack on reputation and brand value. The faster that they can respond, the more they know about the issues being raised by their attackers, and their ability to say credibly what their position is, all of this will make the impact less severe. But it means organizations will need clear ways of internal collaboration. They have to have established methods of using social media feeds and an understanding of the data within their own organizations.
There is a major opportunity for security and business departments to join forces within organizations to understand how they will deal with the important issue of reputational risk because it's very real. We've seen some great examples of it already this year and expect it to continue.
About the Author
Steve Durbin is global vice president of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, cyber-security, BYOD, the cloud and social media across both the corporate and personal environments. Previously, he was senior vice president at Gartner.
You can read his previous CIO Insight article, “Managing the Risks of Cyberspace,” by clicking here.