Cybersecurity Fundamentals – Change the Economics

Cybersecurity Fundamentals – Change the Economics

Cybersecurity Fundamentals – Change the Economics

Cyber-attacks are asymmetrical and reap large monetary and national security rewards, far greater than the resources they require.

Consider this statement from the 2014 Verizon Data Breach Investigations Report: “2013 may be remembered as the ‘year of the retailer breach,’ but a comprehensive assessment suggests it was a year of transition from geopolitical attacks to large-scale attacks on payment card systems.”

Stealing cars, robbing banks, or stealing an individual’s identity, offer less financial return than a database or stream of millions of credit card numbers. The frequency and volume of attacks indicates that current cybersecurity methods to protect sensitive information may not be sufficient, and perhaps the rate of attack will not slow until the risk or cost to the attackers becomes too high compared to the value of a breach.

Raising the cost or reducing the value of an attack is not easy, particularly when many attacks originate from countries without extradition agreements. Limited law enforcement capabilities make many of methods to combat this controversial. The notion of a counterattack requires more precision than we usually have in identifying the attacker within the necessary timeframe. A counterattack risks a great deal of collateral damage and potential diplomatic fallout. This is a long-term problem that requires long-term, indirect actions for any economic change. In that context, here are some ideas that might have an impact:

  • Participating in economic activity with the U.S. is a boon to most countries. As a result, cybercrime also impacts their economies. Before agreeing to trade agreements and economic treaties, the U.S. might require other countries to commit to cooperative law enforcement investigations and legislated programs for reducing cybercrime activities within their borders
  • Assign each credit card issued a set of decoy numbers that are recorded at the same time the real number is used to make a purchase. Over time, databases and point of sale applications will become loaded with several multiples of decoy numbers, lessening the chance that a real number is used in a fraudulent transaction involving stolen numbers. This makes it easier for the retailer to identify fraudulent transactions, and reduces the value of the compromised data

The complexity of geopolitics, technology, economic interests, and law enforcement operations for combating cyber-attacks will continue to make reaching, litigating, and incarcerating cyber-criminals very challenging. Efforts to increase the risk or cost to attackers will take a long time to implement and have an effect, but this is clearly a long time problem. 

Contributors

* Arc Aspicio |

Arc Aspicio enhances the future of our nation by creating bold ideas and bringing them to life. A consulting and solutions company, Arc Aspicio solves problems by applying our integrated capabilities in strategy, design, data, human capital, behavioral science, and technology. The company passionately pursues our vision to be the hub of creativity where people take action to change the world. To do this, employees collaborate with clients and partners to create solutions using a human-centered approach. Innovation is not possible without action. The company focuses on strategy first, then takes a hands-on approach implementing ideas to achieve results. Join Arc Aspicio and our Strategy Innovation Lab (SILab) by creating and sharing ideas to inspire people to change the world. Follow us on Twitter @ArcAspicio @SILabDC and, #welovedogs!

Reinventing Strategy

Reinventing Strategy

Since the GPRA Modernization Act in 2010, agencies across the Federal Government have raced to establish new Strategic Plans in response to incoming Presidential Administrations and agency leaders. Developing a new Strategic Plan is incredibly exciting for an agency. Leaders can redefine priorities, frontline managers can improve mission performance, and employees can better engage with the mission. Strategy, however, is so much more than just a Strategic Plan.

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

As the Government continually looks for ways to increase efficiency and encourage innovation, Information Technology (IT) is emerging as a solution to these needs. Recent Federal guidance mandates all agencies to adopt a new framework for better understanding IT costs. Technology Business Management (TBM) is a framework that incorporates IT departments into the overall business network, shifting away from treating IT as an independent unit. This provides a clear way to evaluate and manage IT, running IT as a business and communicating the value of new IT investments.

Behavioral Science – Using Behavioral Science to Effect Action

Behavioral Science – Using Behavioral Science to Effect Action

How do organizations encourage behavior change in their customers? Increasingly, they focus on customer experience, and as a consequence employ behavioral science methodologies. At the heart of behavioral science is the consideration of how an organization can make small investments that generate incremental savings/returns while considering both customers and organizational benefits. One example is Transportation Security Administration’s (TSA) Pre✓® and U.C. Customs and Border Protection’s Global Entry programs.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.