What is a “Cyber Risk Opportunity”?

Can there be any doubt that cyber attacks have become one of the great dif­fi­cul­ties for orga­ni­za­tions every­where?

Here’s a great quote attrib­uted to Win­ston Churchill:

A pes­simist sees the dif­fi­cul­ty in every oppor­tu­ni­ty; an opti­mist sees the oppor­tu­ni­ty in every dif­fi­cul­ty.

"Churchill V sign HU 55521" by British Government - This is photograph HU 55521 from the collections of the Imperial War Museums.. Licensed under Public Domain via Wikimedia Commons - https://commons.wikimedia.org/wiki/File:Churchill_V_sign_HU_55521.jpg#/media/File:Churchill_V_sign_HU_55521.jpg

CFO mag­a­zine recent­ly pub­lished an arti­cle enti­tled For CFOs, Cyber­se­cu­ri­ty Risk Is Like an Ice­berg.

I real­ly liked how author Jef­frey Burchill high­light­ed the com­pet­i­tive oppor­tu­ni­ty avail­able to com­pa­nies who are pre­pared for a data breach. They will either avoid mas­sive busi­ness dis­rup­tion or bounce back quick­ly from exploit­ed cyber vul­ner­a­bil­i­ties:

Although a sup­ply chain dis­rup­tion may not be your fault per se, that fact doesn’t pro­tect you from the reper­cus­sions. Smart com­pa­nies will shore up risks through­out their sup­ply chain so that they can sail through poten­tial dis­rup­tions or bounce back before com­peti­tors. These are the com­pa­nies whose rep­u­ta­tions grow – as does their mar­ket share, rev­enue and share­hold­er val­ue – dur­ing tur­bu­lent times. Unpre­pared com­pa­nies suf­fer the oppo­site fate.

Want more details about crimes that are actu­al­ly being com­mit­ted to steal per­son­al­ly iden­ti­fi­able infor­ma­tion (PII)? Vis­it the Dat­aLoss­DB.