In New Zealand, Hacking Is A Serious Business

The concerns of New Zealand's leading chief executives vary but if there is anything close to a consensus, it is that cybersecurity is major one. 

On a scale of one (equaling no concern) to 10 (extreme concern) respondents to the Mood of the Boardroom survey rated cybersecurity 7.16/10 out of a list of 16 international factors.

To underline the scale of their concern, almost twice as many chief executives rated cybersecurity at 9/10 or 10/10 as they did the next most concerning issue, the outcome of the November 8 US presidential election.

Scott Bartlett, CEO of Kordia, the Government's broadcast and telecommunications network operator, believes we need to get serious about the threat posed by cybersecurity vulnerabilities. "As a country, we are immature when it comes to understanding and coping with the risks associated with cybersecurity," he said. He ranks it as one of the top three issues facing the nation.

Though acknowledgement of the risks may not be as widespread as it could be, it is certainly at the forefront of the minds of many New Zealand business leaders. "Seeing that our technology is robust from cyber-attacks is a key priority," said Cathy Quinn, chair of Minter Ellison Rudd Watts. "Failure to successfully manage this risk has the potential to fundamentally threaten the viability of our business.

"Cybersecurity is something we take seriously and we are grateful for the quality of the team we have who are focused on preventing attacks and responding to cyber threats."

Facilitating that response can sometimes mean internal and external frustrations, such as when email might be blocked because it appears suspicious to firewalls.

But that's a cost Quinn sees as well worth bearing: "We trust, though, that our people and clients will accept the occasional frustration given that the objective is to protect confidential client and business information."

When asked for their business priorities for the year ahead, many other executives also pointed to addressing cybersecurity risks. A retail sector CEO identified "enhancing the risk environments across the business, especially cyber risk," as a major focus. Z Energy CEO Mike Bennetts ranked risk management as a key priority -- two examples of the diversity of risks on his radar were cyber security and climate change.

The fact that cybersecurity now ranks alongside what have long been seen as the world's greatest challenges is telling. A real estate director said, "Both terrorism and cybersecurity are always cause for concern of the highest level, as we do not know when and where it will next hit."

In light of the increasing acknowledgement of the risk, there are opportunities for the businesses that help address it. Kordia acquired Aura Information Security, a leading cybersecurity company, for just over $10m in late 2015.

Bartlett sees addressing cybersecurity threats as a potential selling point for New Zealand.

"We are small enough to make our little country a stand-out example of how to get it right," he said. "If we can, our cyber-safe brand will be as important as, and more credible than, 100 per cent Pure New Zealand."

According to a report cited in the Government's National Plan to Address Cybercrime, released in 2015, the annual cost of cybercrime to the global economy has been estimated at US$400 billion.

Notable examples of cyber-attacks in recent times include the 2015 server breach of VTech, a children's toy manufacturer, and Anthem, a health insurance company.

The former resulted in the theft of 4.8 million parents' records, and over 6.8 million children's records. The hack on Anthem saw almost 80 million personal health records exposed.

After Sony was the victim of a well-publicised hack in 2014, thought to be linked to North Korea, the company had to put aside US$15m in the following quarter alone to beef up its cybersecurity systems. Some estimates suggested the true cost of the hack may have been closer to US$100m.

With fallout like that, it's little wonder that New Zealand's CEOs are beginning to take note.

NZ Herald:          Insurance & Cyber Vulnerability - Get Your Report for 2016
 

« Surprise: FBI Say US Political Hacks ‘Probably Was Russia’
Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

Core4ce

Core4ce

Core4ce is a mission-oriented company that serves as a trusted partner to the national security community.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Gleam Cloud Security Solutions (GCSS)

Gleam Cloud Security Solutions (GCSS)

GCSS Security is an information security firm providing cyber security protection with a highly skilled and experienced team focused on technology that creates best-in-class customer experiences.