Brand Reputation Includes Cyber Safety

To gather and pass on cyber intelligence, I interviewed Joseph Schramm, VP of Strategic Alliances at Beyond Trust, a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks.

How has Cyber Security Become Marketing’s Responsibility?

Marketing collects tons of Big Data and, in the simplest terms, if malicious actors get to your data, your brand can be tarnished.

“CMOs are tasked with brand management, and a brand’s reputation is likely to be the most visibly damaged asset in the aftermath of a breach. Likewise, data-driven marketing is fueled by customer trust. Preparation, protection and responsiveness are key to containing the damage and preserving that trust.

The cyber stakes are higher than ever before, and we’re not just talking about personal information and identity theft any more. High-level corporate secrets, vital infrastructure and brand image are constantly under attack.” Steve Durbin, Managing Director, Information Security Forum (ISF).

You might have heard by now that the majority of security threats come from the inside. Your own employees are most likely to jeopardize your cyber security, either due to naiveté or because they are bad apples.

A recent study by Trend Micro found that “around 3 percent of employees would give up [private company] information for only $155”.

Security Intelligence via IBM

Of course, the list of external malicious attacks (counting for about ¼ of all breaches) is increasing, including phishing, hacking, mimicking, click fraud, malvertising and the next thing you haven’t heard of yet.

To quote Steve Durbin, Managing Director at ISF once more:
“With the increased use, integration and interconnection of mobile devices, the network perimeter is blurry and porous, complicating security efforts. Marketers must incorporate security frameworks into their strategic marketing plans and determine how to solicit and deliver valuable customer insights safely.”

Hence, I call Brand and Reputation Management one of marketing’s key responsibilities in 2016. Protect your customer data and don’t end up in the news for the wrong reasons.

So What Can Be Done?
Of course, appointing a Chief Security Information Officer (CSIO) is great if you have the resources, and collaboration between executive functions is a must. But companies of any size can create a security culture by educating their employees about (ever evolving) cyber threats and limiting admin privileges to sensitive data.

Data-driven marketing has been a key driver of competitive differentiation via improved customer experience but it also means that marketers are collecting, storing and accessing more data than ever before. Marketing has become a big hacker attack target.

Personally, I don’t see a way forward without using technology and services to protect a brand’s reputation, even though that might be a daunting prospect for many companies. If anything, I see the cyber threat growing.

B2C: 

« Data Security Puts Innovation At Risk
Why Do We Fall For Online Scams? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tech Industry Forum (TIF)

Tech Industry Forum (TIF)

Tech Industry Forum is a not-for-profit, membership driven trade body. We bring together end users and some of the UK’s leading cloud, software, platform, infrastructure, and service providers.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Blockchain Reactor

Blockchain Reactor

Blockchain Reactor is a blockchain consultancy and implementation company providing cutting-edge blockchain solutions for start-ups and enterprises.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.

Options Technology

Options Technology

Options is a global leader in financial technology, specialising in Capital Markets technology and enterprise-grade solutions.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.

Cylerian

Cylerian

Cylerian is a Next Generation SaaS Security Platform - One unified cloud platform to achieve your security, compliance, and operational objectives.

SKADI Cyber Defense

SKADI Cyber Defense

At SKADI Cyber Defense, we specialize in enterprise-grade cybersecurity solutions tailored for small to medium businesses.