Intelligent CIO LATAM Issue 12 | Page 35

EDITOR ’ S QUESTION

One of the most significant changes we are following in the market is that CIOs , who used to focus on protecting their network , are now also focusing on external risks . These external risks come as compromised vendors and supply chain organizations access the customer network .

CIOs are seeing that they need to worry about threats indirectly posed through their supply chain and attacks directly aimed at them by criminal organizations . As internal security becomes more secure , third parties are often the weak link .
According to a recent global survey of security leaders conducted by BlueVoyant , 97 % of companies have been adversely affected by a cybersecurity breach in their supply chain .
One possible reason is concerning the third-party risk , considering that 47 % of respondents said they audited or reported on supplier security no more than twice a year . The respondents who said they practiced continuous monitoring were only 0.5 %.
CIOs are seeing that they need to worry about threats indirectly posed through their supply chain and attacks directly aimed at them by criminal organizations .
The best practice is to continuously monitor the organization ’ s supply chain to respond immediately to any threats .
Once monitoring is implemented , vulnerabilities must be mitigated quickly and effectively .
In addition , CIOs should start looking beyond even their external ecosystem to gain a real-time view of digital threats that could negatively affect their brand .
Furthermore , brand protection is the process of helping and protecting the intellectual property ( IP ) of companies and their associated brands against all types of cybercriminals , such as hackers or fraudsters .
It also includes defending customer data against theft . This protection happens through continuous monitoring of domains and websites , social networks , the applications in the official and unofficial app stores , the Deep and Dark Web , instant messaging and open-source . Once monitoring is implemented , vulnerabilities must be mitigated quickly and effectively .
IBM ’ s Cost of a Data Breach 2021 Report revealed that organizations affected by data breaches suffered about US $ 4.24 million in damages , up from US $ 3.86 million just a year earlier . The breaches resulting from phishing scams cost about US $ 4.65 million , underscoring the potential severity of phishing attacks that leverage corporate brand assets . p
DANIEL ROJAS , MARKETING DIRECTOR LATAM , BLUEVOYANT
www . intelligentcio . com INTELLIGENTCIO LATAM 35