Intelligent CIO Middle East Issue 33 | Page 23

LATEST INTELLIGENCE In all these cases, customer service, reputation and operations were severely disrupted. Smaller companies too, are targeted as part of the supply chain of larger organisations or for having less sophisticated defences, and often the attacks are not targeted, just aimed at those that can be penetrated. Reported breaches are now 60 times what they were a decade ago, while Lloyds of London estimates a serious cyberattack poses a financial risk to the global economy equivalent to that of a superstorm such as Hurricane Katrina. Cybersecurity cannot remain the concern of the Chief Information Security Officer (CISO) alone. Business leaders must rather move to work with their CISO and overall security resources to actively gauge their new dependencies and the investment in risk treatments that are warranted. To begin the process, we offer five action points to follow: 1. Accept cyber-risk is a business risk 2. Align cyberspend to your risk 3. Create a culture that prevents vulnerability 4. Get control of data 5. Ensure security and privacy are ‘baked in’ to processes. n Download whitepapers free from www.intelligentcio.com/me/whitepapers/ www.intelligentcio.com INTELLIGENTCIO 23