Brand Reputation Includes Cyber Safety

To gather and pass on cyber intelligence, I interviewed Joseph Schramm, VP of Strategic Alliances at Beyond Trust, a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks.

How has Cyber Security Become Marketing’s Responsibility?

Marketing collects tons of Big Data and, in the simplest terms, if malicious actors get to your data, your brand can be tarnished.

“CMOs are tasked with brand management, and a brand’s reputation is likely to be the most visibly damaged asset in the aftermath of a breach. Likewise, data-driven marketing is fueled by customer trust. Preparation, protection and responsiveness are key to containing the damage and preserving that trust.

The cyber stakes are higher than ever before, and we’re not just talking about personal information and identity theft any more. High-level corporate secrets, vital infrastructure and brand image are constantly under attack.” Steve Durbin, Managing Director, Information Security Forum (ISF).

You might have heard by now that the majority of security threats come from the inside. Your own employees are most likely to jeopardize your cyber security, either due to naiveté or because they are bad apples.

A recent study by Trend Micro found that “around 3 percent of employees would give up [private company] information for only $155”.

Security Intelligence via IBM

Of course, the list of external malicious attacks (counting for about ¼ of all breaches) is increasing, including phishing, hacking, mimicking, click fraud, malvertising and the next thing you haven’t heard of yet.

To quote Steve Durbin, Managing Director at ISF once more:
“With the increased use, integration and interconnection of mobile devices, the network perimeter is blurry and porous, complicating security efforts. Marketers must incorporate security frameworks into their strategic marketing plans and determine how to solicit and deliver valuable customer insights safely.”

Hence, I call Brand and Reputation Management one of marketing’s key responsibilities in 2016. Protect your customer data and don’t end up in the news for the wrong reasons.

So What Can Be Done?
Of course, appointing a Chief Security Information Officer (CSIO) is great if you have the resources, and collaboration between executive functions is a must. But companies of any size can create a security culture by educating their employees about (ever evolving) cyber threats and limiting admin privileges to sensitive data.

Data-driven marketing has been a key driver of competitive differentiation via improved customer experience but it also means that marketers are collecting, storing and accessing more data than ever before. Marketing has become a big hacker attack target.

Personally, I don’t see a way forward without using technology and services to protect a brand’s reputation, even though that might be a daunting prospect for many companies. If anything, I see the cyber threat growing.

B2C: 

« Data Security Puts Innovation At Risk
Why Do We Fall For Online Scams? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Paraben

Paraben

Paraben provides digital forensics solutions for mobile devices, smartphones, email, hard drives, and gaming system.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.