TechBizWebTechBizWeb

    Subscribe to Updates

    Get the latest news about Technology and Business from all around the web..

    What's Hot

    Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

    November 7, 2022

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022
    Facebook Twitter Instagram
    • About Us
    • Privacy Policy
    • Guest Post
    • Terms
    • Contact
    Facebook Twitter Instagram
    TechBizWebTechBizWeb
    Subscribe
    • Home
    • Technology

      Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

      November 7, 2022

      Devialet brings its sci-fi design aesthetics to a $790 portable speaker

      November 7, 2022

      Elon Musk’s response to fake verified Elon Twitter accounts: a new permanent ban policy for impersonation

      November 7, 2022

      The iPhone 14 Pro and Pro Max will come with ‘longer wait times’ due to factory lockdown

      November 6, 2022

      Meta’s reportedly planning to lay off ‘thousands’ of workers this week

      November 6, 2022
    • Business
    • Cyber Security
      National Security News

      List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

      September 24, 2022

      Cybersecurity ranked most serious enterprise risk in 2022

      August 31, 2022

      Registration open for CISA virtual summit on K-12 school safety

      August 31, 2022

      What do the Trickbot leaks reveal about Russian cybercrime?

      August 31, 2022

      What cybersecurity measures do CISOs outsource?

      August 30, 2022
    • Blockchain
    • Vulnerabilities
    • Social Engineering
    • Malware
    • Cyber Security Alerts
    TechBizWebTechBizWeb
    Home»Cyber Security»The Geopolitical Influence on Business Risk Management
    Cyber Security

    The Geopolitical Influence on Business Risk Management

    January 22, 2019Updated:January 22, 2019No Comments7 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Have you been attacked? Digitpol the global investigation firm can help you, visit Digitpol’s website to learn more.


    Report Maps Out Ten Major Geopolitical Risks That Businesses Will Face in 2019

    When cybersecurity first emerged as a discrete profession, it was siloed. It was a black box profession outside of the day-to-day running of the business: its purpose was simply to protect the business. Security is now better integrated with IT. It started with a brief to protect the existing infrastructure, but is now — through SecOps — involved in building security-by design into new applications.

    At the business level, security now has the ear of the board, and sometimes has a seat on the board. This is all progress, but it mustn’t stop there. Business is increasingly global in nature. That takes it into different cultures and different jurisdictions and different geopolitical risks. The CISO now needs to be included in the geopolitics of business.

    VerSprite is one of the few companies that combines geopolitical risk with cybersecurity. In a newly published report, it maps out ten major geopolitical risks that businesses will face in 2019. Some of these will directly concern the security team, some obliquely, and some will more concern other departments.

    The five subjects with direct cybersecurity relevance comprise: government restrictions on hardware sourcing; expanding regulatory control that differs between jurisdictions; increasing fines from GDPR; blockchain in the supply chain; and death by malware.

    The five remaining risks that have minimal or no direct relevance to the security team comprise: global economic slowdown; trade wars; problems with China’s Belt and Road initiative; natural disasters/climate change; and moral hazard (such as the #MeToo movement).

    The potential for government restrictions on hardware sourcing can apply both at home and abroad. China has an increasing preference for locally sourced hardware. Western governments are increasingly banning China’s Huawei from telecommunications projects. In the UK, where Huawei has long been used by BT, and where the UK government has special access to Huawei source code at ‘the Cell’, BT has nevertheless banned the use of Huawei equipment for their 5G rollout and is phasing Huawei out of its core networks.

    The security team needs a geopolitical risk understanding when helping to source new purchases, and must be ready to source and test alternatives whenever and wherever necessary.

    Increasing data and privacy regulations throughout the world, differing from one jurisdiction to the next, need to be closely monitored. “Already,” states the report, “more than 80 countries regulate data, and dozens more are considering legislation, increasing the burden on companies that tend to operate in dozens of countries and will be forced to comply with dozens of sometimes competing regulations.”

    While the security team is rarely solely responsible for such compliance requirements, it is responsible for ensuring that security controls can deliver compliance. This requires an understanding of the global geopolitical climate to ensure that the company does not heavily invest in a technology that might be inadequate in some regions within a short period of time. “Vendors and third parties who currently use a banned technology or product, or which fail to abide by demands to use or refrain from using certain technology,” warns VerSprite, “will be forced to transition or risk going out of business.”

    GDPR is a specific threat: it is changing the nature of risk management. In the past, large companies could afford to ignore data privacy regulations where maximum fines were limited to less than a day’s (sometimes far less) profit. By linking fines to a percentage of a year’s global revenue, the financial risk can no longer be ignored. The potential fines for big companies like Facebook and Google have suddenly leapt from a few hundred thousand dollars to billions of dollars.

    VerSprite expects GDPR prosecutions to rise in 2019, and for non-European countries to adopt legislation similar to GDPR. This presents multiple threats. Many companies still do not understand GDPR, and/or erroneously believe they are not subject to it. Secondly, it is possible that some countries with GDPR-like legislation will use the huge fines as a way of suppressing foreign companies to promote indigenous companies. All of this will need to be known and understood by the security team in order to ensure compliance wherever these laws are found.

    Blockchain, particularly in the supply chain Mitigating Risk of Supply Chain Attacks, is also considered to be a geopolitical risk — primarily because its applicability is poorly understood. A primary problem is that while blockchain can be used to secure what we can call the ‘chain of custody’, it does not secure the product itself. But it might provide a false sense of security. 

    Furthermore, VerSprite questions one of the primary arguments for the use of blockchain technology — financial savings. These savings through much lower transaction costs need to be judged against “the slow pace of transactions, the increased costs of running multiple nodes, and repeated forks, as well as major hacks.” VerSprite believes that a thorough understanding of the geopolitical threats to international supply chains is necessary before a business can decide between blockchain or more traditional methods of mitigation.

    The final security-relevant geopolitical threat is the ultimate: death by malware. It is only a matter of time before malware such as ransomware is directly attributable for someone’s — or many people’s — death. SamSam has made millions out of attacking healthcare institutions. So far, it has not caused the death of any patients; but it could. SamSam has been delivered by two Iranian citizens. It is not currently known whether these hackers were affiliated to the Iranian government, but their targets were certainly in ideologically opposed countries.

    Iran is also believed to be behind wiper attacks against Saudi Arabia, while the destructive NotPetya outbreak is confidently believed to have been started by Russian military hackers. Whether politically motivated or not, ransomware has the potential to cause death — and potentially multiple deaths if it gets into the critical infrastructure.

    “Businesses that fail to take the threat seriously will find themselves unable to operate if targeted by ransomware demands that exceed available funds,” warns VerSprite. “Lawsuits may devastate even those who manage to pay the ransom, if injuries or deaths occur while the facility is incapacitated and incapable of fulfilling its responsibilities.”

    Modern business is global, encompassing multiple jurisdictions and countries that may not be politically aligned with local attitudes. Policies and laws in these foreign countries can change rapidly — and it is VerSprite’s contention that only a geopolitical understanding can ensure the continued smooth-running of large multi-national companies.

    Related: The United States and China – A Different Kind of Cyberwar 

    Related: The Increasing Effect of Geopolitics on Cybersecurity 

    Related: Understanding Geopolitics Key to Analyzing Cyber Espionage

    Related: AT&T Backs Away From Deal to Supply China Made Huawei Phones 

    Related: Pessimism Pervades World Economic Forum Annual Survey 

    view counter

    Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

    Previous Columns by Kevin Townsend:
    Tags:



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    National Security News

    List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

    September 24, 2022 Cyber Security

    Cybersecurity ranked most serious enterprise risk in 2022

    August 31, 2022 Cyber Security

    Registration open for CISA virtual summit on K-12 school safety

    August 31, 2022 Cyber Security

    What do the Trickbot leaks reveal about Russian cybercrime?

    August 31, 2022 Cyber Security

    What cybersecurity measures do CISOs outsource?

    August 30, 2022 Cyber Security

    SIA announces Women in Security Forum scholarship recipients

    August 30, 2022 Cyber Security
    Editors Picks

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022

    Google Cloud Says Running Validator on Solana Blockchain

    November 7, 2022

    European stocks rise as investors boosted by China speculation

    November 7, 2022
    Trending Now

    Evergrande creditors sell ‘Versailles mansion’ plot in Hong Kong

    By techbizweb

    OpenSea Creates Tool for NFT Creators to Enforce Royalties On-Chain

    By techbizweb

    FTSE chairs warn of declining relations with institutional investors

    By techbizweb

    https://www.nationalsportsacademy.com

    slot gacor hari ini

    http://www.inadesfo.org/

    http://www.eueomgbissau.org/

    http://www.congo-mai-mai.net/

    http://www.angelesdelafrontera.org/

    http://fifaworldcup2018schedule.com/

    http://tony4gtrmcr.co.uk/

    http://www.standrewsagreement.org/

    http://www.bob-russell.co.uk/

    http://davidmulholland.co.uk/

    http://railwayhotelenniskillen.com/

    http://www.fantasysportstrades.com/

    http://www.rainleaf-flooring.com

    http://mothersagainstguns.org/

    http://ma-coc.org/

    slot online

    http://www.paradoxmag.com/situs-judi-slot-online-gampang-menang-2021/

    http://www.paradoxmag.com/situs-judi-slot-online-terbaru-2021/

    http://slot-terbaru.net/

    Slot Gacor

    Slot Online

    Situs Slot Gacor

    http://www.appdexterity.com/

    https://cars4kids-deutschland.de/

    https://www.stretchingculture.com/

    https://www.b-123-hp.com/slot-gacor/

    https://denzstaffing.nl/

    https://ezbbqcooking.com/slot-gacor/

    https://www.mbahelp24.com/slot-gacor

    https://minhtanstore.com/slot-jackpot-terbesar/

    https://njbpusupplierdiversity.com/slot-gacor-gampang-menang/

    https://www.floridaspecialtycropfoundation.org/slot-gampang-menang/

    https://childrenscornerpreschool.org/slot-gacor-gampang-menang/

    https://cryptoquoter.com/slot-online-terbaik/

    https://alorkantho24.com/slot-gacor/

    https://ellas.xyz/slot-gacor/

    https://it.dougamatome.xyz/slot-online/

    https://www.daltercume.com/slot-gacor/

    https://josi-ana.dougamatome.xyz/slot88/

    https://josi-ana.dougamatome.xyz/slot-gacor/

    https://fastobserver.com/slot-jackpot-terbesar/

    https://www.planetexperts.com/slot-gacor/

    https://bfsolution.group/slot-bet-kecil/

    https://rustleva.co/slot/

    https://bfsolution.group/slot-bet-kecil/

    https://www.hotelcalimareal.com/togel-online/

    https://anime-game.dougamatome.xyz/slot-gacor-gampang-menang/

    https://anime-game.dougamatome.xyz/togel-online/

    https://bourbonbarrelfoods.com/slot/

    http://suneo39.wp.xdomain.jp/slot/

    https://techbizweb.com/slot-gacor/

    https://www.generalcatalyst.com/18-daftar-slot-gacor-terbaik-gampang-menang-jackpot-hari-ini/

    https://www.hotelcalimareal.com/slot-online/

    https://www.blockgates.io/slot-gacor/

    https://l12.com.br/slot-gacor/

    slot paling gacor

    https://www.donalds-hobby.com/slot-online/

    https://thecryptodirt.com/slot-gacor-hari-ini/

    http://iseta.edu.ar/aulavirtual/app/upload/users/1/1205/my_files/sbobet.html

    http://escuelavirtual.mincit.gov.co/app/upload/users/1/194/my_files/slot.html

    https://www.dev.medecinesfax.org/courses/JUDICASINO/document/slot.html

    http://www.e-archivos.org/cursos/courses/JUDICASINO/document/slot-gacor.html

    http://iesma.com.br/ead/main/upload/users/4/447/my_files/slot.html

    https://www.fundacoop.org/chamilo/app/upload/users/1/1185/my_files/slot.html

    https://fata-aatf.org/eskola/main/upload/users/3/31/my_files/slot.html

    https://uancv.edu.pe/ofinvestigacion/app/upload/users/3/328/my_files/slot-terlengkap.html

    https://micost.edu.my/EL/app/upload/users/2/209/my_files/slot-gacor.html

    https://www.academiacoderdojo.ro/elearningdev/app/upload/users/2/2442/my_files/slot-online.html

    http://campus-cidci.ulg.ac.be/courses/JUDICASINO/document/slot-termurah.html

    https://www.escueladerobotica.misiones.gob.ar/aula-ste/courses/LIVECASINO/document/slot-tergacor.html

    http://ccdipeepccqqfar.usac.edu.gt/chamilo/app/upload/users/3/358/my_files/slot-online.html

    https://cunori.edu.gt/campus/app/upload/users/7/7334/my_files/slot-online.html

    http://u-rus.com.ar/aula/app/upload/users/1/1322/my_files/slot.html

    http://icrodarisoveria.edu.it/chamilo/app/upload/users/1/1855/my_files/slot.html

    https://iestpliliagutierrez.edu.pe/clarolgm/courses/CASINO/document/slot.html

    http://pva.cobach.edu.mx/app/upload/users/7/7379/my_files/slot.html

    http://www.imb-pc-online.edu.gt/PL/app/upload/users/3/373/my_files/slot.html

    http://avcs.upeu.edu.pe/main/upload/users/3333/my_files/slot.html

    https://chamilo.fca.uas.edu.mx/app/upload/users/1/11186/my_files/slot-online/

    TechBizWeb
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Guest Post
    • About Us
    • Privacy Policy
    • Our Authors
    • Terms and Conditions
    • Contact
    © 2023 Tech Biz Web. Developed by Sawah Dev.

    Type above and press Enter to search. Press Esc to cancel.