Page 18 - 10052 WORSH Marketor Issue 79.indd
P. 18

BUSINESS LECTURE TWO:

                                                                                                     Richard Christou
        Cyber security and privacy – threats and opportunities                                              Master

        The second lecture by Dr. Henry Pearson focused on data security and data privacy. He spent 25 years in
        senior appointments at Detica plc, a leading supplier of cyber security products and services to governments
        and commerce. He provided extensive advice on cyber security to the UK MOD with hands-on experience
        RI KDQGOLQJ PDMRU F\EHU DQG SULYDF\ LQFLGHQWV DQG QRZ IXOÀOV D QXPEHU RI UROHV IRU WKH 8. 1DWLRQDO &\EHU
        Security Centre.


        The costs and other impacts of cyber   other necessary measures to ensure   particularly to form a close
        attacks                              WKH\ DUH SURSHUO\ FRQÀJXUHG WR       relationship with the CIO or CSIO.
        Henry began by pointing out that     provide security. In this area       Data protection and privacy
        data security should be the concern   government is currently taking a very   Henry then turned to consider data
        of everyone in the business, including   active role. The National Cyber   protection and privacy. He made the
        the marketing department. Successful   Security Centre has now been       point that the question of privacy is
        cyber attacks not only cause         created, as part of GCHQ, to be the   intimately bound up with cyber
        FRPSDQLHV ÀQDQFLDO GDPDJH  WKH       single point of advice to the UK     security. Loss of data automatically
        impact on the reputation of the      government on cyber security,        involves loss of privacy for those
        victim’s brand and on its enterprise   providing world class incident     affected.
        value or share price (if quoted) can   management capabilities.           However, privacy of data is also
        also be severe.                      Managing the consequences of a       concerned with fears that data
                                             cyber attack
        The costs associated with cyber                                           holders may misuse or improperly
        attacks are escalating rapidly. The   Henry next moved on to give some    disclose the data they hold on their
        DQWL YLUXV ÀUP 0F$IHH HVWLPDWHV WKHP   advice as to how to deal with the   customers. The implementation of the
        at $600 billion annually, (0.8% of the   consequences of a cyber attack.   General Data Protection Regulation
        global GDP), while Forbes is         How a company reacts can             (GDPR) is of course intended to deal
        forecasting $6 trillion per year on   materially affect the business      with these issues.
        average through 2021. Many major     outcome. The basic principle is open,   In his view CMOs have a pivotal role
        incidents have collectively cost their   honest and timely announcement of   in dealing with the way the business
        victims up to $1 billion, and even   the problem and the steps being      reacts to GDPR. They should be
        single company costs can be in the   taken to deal with it.               concerned that the following matters
        range of $10 million to $100 million,   He cited LinkedIn (which lost 117   have been dealt with, either through
        and sometimes more.                  million passwords and email          the marketing department or that of
        However, the fallout from the loss of   addresses), Adobe and MumsNet as   the CIO or CSIO:
        personal data creates just as many   examples of such communication. Of   •  Audit of data holdings
        serious issues. For instance, Yahoo   course, the cost to remedy the
        suffered three major breaches        problem was still incurred but       ‡  &RQÀUPDWLRQ WKDW GDWD HQFU\SWLRQ
        affecting the data of around two     reputational damage was minimised.     has been implemented, where
                                                                                    needed
        billion accounts. As a result, its sale   On the other hand both Yahoo and
        price to Verizon was reduced by $4   $VKOH\ 0DGLVRQ VXIIHUHG VLJQLÀFDQW   ‡  5H FRQÀUPDWLRQ RI FRQWDFW
        ELOOLRQ  UHÁHFWLQJ D PDMRU GHFUHDVH LQ   reputational damage by trying to   preferences from customers
        enterprise value. Talktalk, the mobile   ignore the problem and hoping it   •  Audit of the methods used by the
        phone company, lost the data for     would go away.                         business to gather and record
        150,000 users. As a result tens of   It is essential to have a crisis       customer permissions
        thousands of customers went to other   management plan prepared in        •  Audit of contracts with, and
        suppliers.                           advance, so that it can be             oversight of, third parties who
                                             implemented quickly whenever
        Preventing cyber attacks – the                                              handle personal data collected by
        technology                           necessary. Such a plan needs to        the business
                                             address all stakeholders, as well as
        Henry said that cyber intrusions are   keeping the general public informed   The implementation of GDPR will
        inevitable, but this did not mean    if a public service provider is involved.  UHTXLUH PDQ\ FRPSDQLHV WR UH
        companies should give up and live in                                      FRQÀUP WKH SHUPLVVLRQV DQG
        fear. Eighty to 90% of cyber attacks   Cyber security and the CMO         preferences of their customers and
        could be prevented by relatively     Finally, Henry turned to consider the   potential customers whose data they
        simple and cheap measures. He gave   particular duties of the CMO in the   hold. Henry made the point that this
        the following pieces of advice, simple   ÀHOG RI F\EHU VHFXULW\  ZKLFK KH   can be done in a positive manner,
        to implement and important not just   described as follows:               reinforcing the image of the brand as
        for business but for all of us as home   •  Help identify key stakeholders  one that cares about customers’
        users as well:                       ‡  8QGHUVWDQG EUDQG VSHFLÀF ULVNV    data.
        1.  Always apply patches and         •  Engage in Business Continuity Plans  You can read full notes on Henry’s
          updates to your operating system                                        lecture and some further comments
          and other software as soon as they   •  Oversee the design and          on it from me in my Master’s Blog Two.
          become available.                    implementation of the Crisis       You can also read a full discussion of
                                               Management Plan.                   GDPR and privacy issues in my
            0DNH VXUH \RXU ÀUHZDOO LV WXUQHG RQ
                                             Henry concluded by commenting        Master’s Blog 3. Both Blogs are
            ,QVWDOO DQ DSSURSULDWH DQWL YLUXV   that in order to discharge their   available on the Marketors’ website
          program.                           responsibilities, CMOs need to work   at http://marketors.org in the News
        For larger systems there are of course   with all members of the C–Suite, and   Section.



        18  marketors.org                                                    WORSHIPFUL COMPANY of  MARKETORS
   13   14   15   16   17   18   19   20   21   22   23