Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Why Security & Profitability Go Hand-In-Hand
Newest First  |  Oldest First  |  Threaded View
PaloJoel
PaloJoel,
User Rank: Apprentice
6/9/2014 | 7:02:16 PM
Security is a competitive advantage plain and simple
If your more secure than your competitors, if you do it more efficiently from a man power perspective, and you get a better investment yield on security technologies than your competitors its a competitive advantage to the business.


Better security controls, better efiiciencies, and better investment yield equals an advantage verse other companies who loose more data, see more breaches, have larger teams, and burn through ever increasing wads of cash.


The CEO of Target was fired not because their virtualization strategy was incomplete, or they lost a server, or the TCO and cost savings in reduced travel and better decision making through video conferencing did not compute.  It was not really even due to his job performance.  It was because they were less secure than Walmart, were not as efficient as Macys, and did not get a good return on their investment(s) like Kohls.  Presuming Walmart is safe, Macys is efficient, and Kohls see a good return.


Target was and may still be at a competitive disadvantage due to less relevant security controls, operational ineffiiencies, and poor investment yield in reducing risk from their legacy controls.


Bottomline- If i am robbed less, protect myself better, do it more easily, and spend less doing it than the other guy I am going to grow faster and be more profitable.


The real question business leaders should be asking security practioners is make my security a competitve advantage verse " how do i get you to stop draining my pockets."

 
Bprince
Bprince,
User Rank: Ninja
5/28/2014 | 9:23:47 PM
Ultimately though...
I agree with Randy. Once you get beyond regulatory compliance requirements, it is easy for security to be viewed a lot like medical insurance - you have to have it, but you don't necessarily need the best insurance plan being offered. At least not until you are sick. I think that's just a conundrum that security pros are going to have to deal with whenever it's budget time.

BP
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
5/22/2014 | 4:12:22 PM
Re: Why Security & Profitability Go Hand-In-Hand
It is hard to justify, but in the wake of recent events, you would think that the case is a little easier to make. The structural issue, is one that seems really out of whack with today's reality -- with the IT teams broken into application, server, infrastructure, desktop  -- none of which is directly responsible for security. 


Do you find that consistent in organizations you've worked in or that of your colleagues
Randy Naramore
Randy Naramore,
User Rank: Ninja
5/22/2014 | 9:19:20 AM
Why Security & Profitability Go Hand-In-Hand
Hard to justify security in an organization from a profitability perspective. It is definitely a necessary evil but unless you have been affected directly by breaches or such it does not mean much.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2838
PUBLISHED: 2022-08-16
In Eclipse Sphinxâ„¢ before version 0.13.1, Apache Xerces XML Parser was used without disabling processing of referenced external entities allowing the injection of arbitrary definitions which is able to access local files and expose their contents via HTTP requests.
CVE-2022-35734
PUBLISHED: 2022-08-16
'Hulu / ????' App for Android from version 3.0.47 to the version prior to 3.1.2 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
CVE-2022-36293
PUBLISHED: 2022-08-16
Buffer overflow vulnerability in Nintendo Wi-Fi Network Adaptor WAP-001 All versions allows an attacker with an administrative privilege to execute arbitrary code via unspecified vectors.
CVE-2022-36344
PUBLISHED: 2022-08-16
An unquoted search path vulnerability exists in 'JustSystems JUST Online Update for J-License' bundled with multiple products for corporate users as in Ichitaro through Pro5 and others. Since the affected product starts another program with an unquoted file path, a malicious file may be executed wit...
CVE-2022-36381
PUBLISHED: 2022-08-16
OS command injection vulnerability in Nintendo Wi-Fi Network Adaptor WAP-001 All versions allows an attacker with an administrative privilege to execute arbitrary OS commands via unspecified vectors.