August 23, 2016 By Anshul Garg 2 min read

Asia-Pacific is a region of unique contracts — rules, customs, cultures, languages, food, etc. However, there is a common thread that glues the region together: On the whole, it is growing.

Per capita income is rising, and so is consumerism. Markets are growing at a remarkable rate and show no signs of slowing. As long as the consumer mindset is positive, so is the business mindset. Organizations are embracing cloud, mobile and social technology at an unprecedented speed. But what about risk management?

Growing Challenges for CISOs

Cyberattacks are increasing at an alarming pace. With that, the cost of a data breach is also increasing. In India, for example, the average total cost of data breach increased from 88.5 million Indian rupees in 2015 to 97.3 million Indian rupees in 2016 — an increase of 10 percent.

Because of the nature of data, certain industries have a higher average breach cost compared to others. As a result of all this, CISOs are faced with big, tough challenges.


Figure 1: Challenges for CISOs (Source: IBM)

Time for Introspection

Security leaders should ask the following questions about their risk management posture:

  • Are you protected from the latest threats? Cyberattacks are at an all-time high, new vulnerabilities are being introduced each day and big names in your industry are making headlines for the wrong reasons. Are you protected?
  • Have you protected your most critical data? In a world where security budgets are never enough, they are often applied like peanut butter — some areas have enough security and some have woefully inadequate safeguards. Do you know what your critical data is? Have you applied sufficient controls to protect it? Is the right governance in place?
  • Do you have access to the right skill set? Most organizations face the challenge of attracting and retaining skilled security resources. In fact, some estimates say the global security industry will be 1.5 million jobs short by 2020.
  • Are you adapting to changing platforms? As you migrate from a traditional data center to cloud, mobile and SaaS capabilities, you must think about the IT environment for employees and customers. You must also consider how you engage with suppliers. New elements introduce new risks, so you need to plan where your environment is headed in three or four years.
  • Are you operating at an appropriate maturity level for your industry? This is one of the most important questions you need to answer. Are you on par with others in the industry? Are you doing enough? If not, you need to reassess your security posture.

Plotting Your Risk Management Journey

There are plenty of questions that you need to ask yourself, and all share a common objective: achieving successful risk management with limited resources. There are a number of indicators that can provide insight into this: how you are organized, what technology is being used, the level of integration, governance techniques and more.

You need to find out where you are in your risk management journey. Are you just starting out or are you well on your way? Whatever the answer, it is imperative to plan accordingly.

More from Risk Management

How will the Merck settlement affect the insurance industry?

3 min read - A major shift in how cyber insurance works started with an attack on the pharmaceutical giant Merck. Or did it start somewhere else?In June 2017, the NotPetya incident hit some 40,000 Merck computers, destroying data and forcing a months-long recovery process. The attack affected thousands of multinational companies, including Mondelēz and Maersk. In total, the malware caused roughly $10 billion in damage.NotPetya malware exploited two Windows vulnerabilities: EternalBlue, a digital skeleton key leaked from the NSA, and Mimikatz, an exploit…

ICS CERT predictions for 2024: What you need to know

4 min read - As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure.Kaspersky just released their ICS CERT Predictions for this year, outlining the key cybersecurity challenges industrial enterprises will face in the year ahead. The forecasts emphasize the persistent nature of ransomware threats, the increasing prevalence of cosmopolitical hacktivism, insights…

How I got started: Ransomware negotiator

4 min read - Specialized roles in cybersecurity are proliferating, which isn’t surprising given the evolving threat landscape and the devastating impact of ransomware on many businesses.Among these roles, ransomware negotiators are becoming more and more crucial. These negotiators operate on the front lines of cyber defense, engaging directly with cyber criminals to mitigate the impact of ransomware attacks on organizations.Ransomware negotiators possess a unique blend of technical expertise, psychological insight and negotiation skills that allow them to navigate the high-stakes environment of ransomware…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today