A Cyber Compliance Economy

A recent article from the The Economist on how the Internet of Things (IoT) will change the world is astonishing. According to the report, as microchips become progressively cheaper they are being built in to almost everything.

The decline in prices of a megabyte of data storage is impressive.  In 1956 it would cost around U$ 85,000 (in today’s prices) now it is only U$ 0.00002 and it is decisive for an IoT World. Another example of connected decreasing prices is the cost of a sensor normally used in an IoT device which fell from U$ 1.30 to U$ 0.60 between 2004 and 2014.

The “cheap as chips” generates the popularization of IoT devices and many advantages which can be applied in the health care, market intelligence and industry productivity-increasing.  On the other hand, a connected world is a playground for hackers and we have dangers related to the hyperconnectivity.

Companies are growing more concerned with the question of corporate liability in case of cyber attacks, digital frauds and data breaches. Governance, risk and compliance are, therefore, top concerns in the corporate environment.

According to the U.S. Department of Homeland Security, manufacturing is the second most targeted industry based on the number of reported cyberattacks. Further, cybercriminals view small and medium-sized manufacturers (SMMs) as prime targets because many of these companies do not have adequate preventative measures in place.

The fear of breaches and cyber-attacks is founded in the financial cost of attacks, which is no longer a hypothetical number. Breaches cause real economic damage to organizations, damage that can take months or years to resolve. According to CISCO’s research respondents, more than half (53 per cent) of all attacks resulted in financial damages of more than US$500,000, including, but not limited to, lost revenue, customers, opportunities, and out-of-pocket cost.

New regulations and norms are expected to solve new problems. As Professor of European Law at Groningen University Sofia Ranchordás, says: “Legislators — like scientists — can be nevertheless conceived as ‘problem-solvers’ that instead of pretending to know what the world is like based on theoretical knowledge, should also gather information and evidence to support their legislative choices”.

So, Compliance rules have a special place in this new world and companies have to be prepared for that.

The global dialogue on cybersecurity regulation is evolving from a conceptual discussion about nation-states’ rights and responsibilities toward an articulation of norms of state, industry behaviour and corporate liability legal framework. According to a recent Microsoft report, stakeholders from governments, the private sector, academia, and civil society are putting forward myriad norms proposals, addressing a range of challenges caused by the exploitation of information and communications technology (ICT) systems. 

Thus, for a really healthy cyber economy and sustainable development of technology we have to avoid cyber-surveillance, misuses of computer science and punish hardily cybercrimes. It will happen with cybersecurity measures, risk assessment, compliance and governance.

Private and Public sectors have to work together on new regulations, which will come from both nation-states and public authorities and a compliance culture wil have to be adopted by companies and entrepreneurs.

Joao Paro is a regulatory consultant at Compliance and Risks       Image: Nick Youngson 

You Might Also Read:

Easy Cyber Knowldege Ch.4 The Internet of Things ( £)

The EU's New Cybersecurity Certification Framework:

 

« Hackers Invade Routers To Steal Payment Card Details
Over 2 Million Magecart Detections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.