A Cyber Compliance Economy

A recent article from the The Economist on how the Internet of Things (IoT) will change the world is astonishing. According to the report, as microchips become progressively cheaper they are being built in to almost everything.

The decline in prices of a megabyte of data storage is impressive.  In 1956 it would cost around U$ 85,000 (in today’s prices) now it is only U$ 0.00002 and it is decisive for an IoT World. Another example of connected decreasing prices is the cost of a sensor normally used in an IoT device which fell from U$ 1.30 to U$ 0.60 between 2004 and 2014.

The “cheap as chips” generates the popularization of IoT devices and many advantages which can be applied in the health care, market intelligence and industry productivity-increasing.  On the other hand, a connected world is a playground for hackers and we have dangers related to the hyperconnectivity.

Companies are growing more concerned with the question of corporate liability in case of cyber attacks, digital frauds and data breaches. Governance, risk and compliance are, therefore, top concerns in the corporate environment.

According to the U.S. Department of Homeland Security, manufacturing is the second most targeted industry based on the number of reported cyberattacks. Further, cybercriminals view small and medium-sized manufacturers (SMMs) as prime targets because many of these companies do not have adequate preventative measures in place.

The fear of breaches and cyber-attacks is founded in the financial cost of attacks, which is no longer a hypothetical number. Breaches cause real economic damage to organizations, damage that can take months or years to resolve. According to CISCO’s research respondents, more than half (53 per cent) of all attacks resulted in financial damages of more than US$500,000, including, but not limited to, lost revenue, customers, opportunities, and out-of-pocket cost.

New regulations and norms are expected to solve new problems. As Professor of European Law at Groningen University Sofia Ranchordás, says: “Legislators — like scientists — can be nevertheless conceived as ‘problem-solvers’ that instead of pretending to know what the world is like based on theoretical knowledge, should also gather information and evidence to support their legislative choices”.

So, Compliance rules have a special place in this new world and companies have to be prepared for that.

The global dialogue on cybersecurity regulation is evolving from a conceptual discussion about nation-states’ rights and responsibilities toward an articulation of norms of state, industry behaviour and corporate liability legal framework. According to a recent Microsoft report, stakeholders from governments, the private sector, academia, and civil society are putting forward myriad norms proposals, addressing a range of challenges caused by the exploitation of information and communications technology (ICT) systems. 

Thus, for a really healthy cyber economy and sustainable development of technology we have to avoid cyber-surveillance, misuses of computer science and punish hardily cybercrimes. It will happen with cybersecurity measures, risk assessment, compliance and governance.

Private and Public sectors have to work together on new regulations, which will come from both nation-states and public authorities and a compliance culture wil have to be adopted by companies and entrepreneurs.

Joao Paro is a regulatory consultant at Compliance and Risks       Image: Nick Youngson 

You Might Also Read:

Easy Cyber Knowldege Ch.4 The Internet of Things ( £)

The EU's New Cybersecurity Certification Framework:

 

« Hackers Invade Routers To Steal Payment Card Details
Over 2 Million Magecart Detections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Alliance for Cyber Security (ACS)

Alliance for Cyber Security (ACS)

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Leadcomm

Leadcomm

Leadcomm is a Brazilian company focused on the distribution and integration of IT systems and security solutions for large companies.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Novacoast

Novacoast

Novacoast helps organizations find, create & implement solutions for a powerful security posture through advisory, engineering, development & managed services.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.