Utility Game-Changers: Solar, Wind, Hydro and Fintech
Transformations in Financial Technologies
Global Access to Real-Time Data
Banks and Fintechs- A Better Value Proposition
Making the Most of Exponential Technologies in Financial Reporting
Tadd Morganti, MD, Finance & Enterprise Performance, Deloitte Consulting LLP
Digital Transformation in Financial Services: An Inflection Point...
Mitch Siegel, Strategy Leader, Financial Services, KPMG LLP
Compete or Partner: Banks See Rise of FinTech Solutions
Christopher Kennedy, VP-Quantitative Finance Manager, BankUnited [NYSE:BKU]
Thank you for Subscribing to CIO Applications Weekly Brief
Making the Right Investment
By Brad Peterson, EVP & CIO, NASDAQ
The vector is still up on spending. CEOs and boards have to give their tech leadership the notion and impression of carte blanche: “What can you trade off to make room in the budget?” It was a trend in the past — that new vendors will lower your costs and that technology costs can go down. That’s not the case with information security. There is much more capability, but the overall spend is going up.
There are a number of reports available today that quantify the average cost of a cybercrime breach. For example, the latest report commissioned by IBM pegged the 2015 consolidated average cost at 3.8 million dollars. There are a few law firms that specialize in supporting boards and companies that have been breached and they believe the number is higher than the number stated in IBM report. For example one law reported the average to be 7 million dollars.
The long-term brand or reputation costs from a breach seem to be the most difficult to quantify and model
Orion is right, and in addition to knowing the number of endpoints, you have to have the tools to be able to understand what is happening on those endpoints. What software versions are installed, what is changing, what is being added. So to assess risk, the board should be satisfied that the management team has the tools and team to inventory and monitor the company’s dynamic set of end points. The final area to assess is the management team’s ability to respond to an emerging risk to the environment. How quickly can it remediate once any vulnerability is known?
We primarily manage response with internal resources. I think third party vendors are a valid resource when you buy a company — you need help quickly understanding the risk of a potential acquisition. Otherwise, you have to be careful that you don’t over-rely on outsiders because you think you’re better protected than you actually are. Nasdaq has a 24/7, co-located security operations center with global network operations center.
I think the act of buying cyber insurance is a worthwhile exercise for management to engage in and report back to the board. It is proactive and opens a healthy dialogue about the potential costs of a breach and forces a company to understand their specific types of risks from a breach. As with any type of insurance, the level of the deductible and the limitations on coverage can illuminate better uses of the funds, such as improved cyber security tools and staff. Whether the answer is more insurable or more investable in the information security function, assessing the level of insurance protection should be recurring annual process.
There isn’t a perfect solution, but better solutions. They may be expensive, but most companies have underinvested and they are playing catch up. We all know what we’re supposed to be doing. Unmanaged assets, inventory….we were supposed to be doing this the whole time.
We are unique because we’re regulated and considered critical infrastructure, so Nasdaq coordinates very closely with government partners like the Department of Homeland Security, FBI and other government agencies. We also subscribe to the leading commercial threat vulnerability notification services to round out our intelligence.