{"id":14571,"date":"2016-06-09T18:00:34","date_gmt":"2016-06-10T01:00:34","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14571"},"modified":"2017-12-20T11:00:40","modified_gmt":"2017-12-20T19:00:40","slug":"cso-cybersecurity-is-not-a-cost-leverage-the-fourth-industrial-revolution-for-economic-growth","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/06\/cso-cybersecurity-is-not-a-cost-leverage-the-fourth-industrial-revolution-for-economic-growth\/","title":{"rendered":"Cybersecurity Is Not a Cost \u2013 Leverage the Fourth Industrial Revolution for Economic Growth"},"content":{"rendered":"<p>On June 7, 2016, Palo Alto Networks held an international cybersecurity conference in Tokyo called Palo Alto Networks Day. Over 1,200 participants from government organizations and industry came together to learn about the latest global trends in cybersecurity, threat intelligence, legal and policy issues as well as to look for networking opportunities with each other. Compared to last year, the aitoize of this year\u2019s conference almost tripled \u2013 highlighting the ongoing importance of and interest in cybersecurity.<\/p>\n<p><!--more--><\/p>\n<p>Multiple participants shared challenges they face in getting their leadership and management teams\u2019 buy-in to invest in and commit to cybersecurity technology and the people and processes needed to defend their organization against cyberattacks. Some struggle with keeping their executives up to date on new cyberthreats that are attacking today\u2019s organizations. Until recently, most executives didn\u2019t often consider cybersecurity in the context of their most common concerns, such as managing risk, preserving business operations and hitting sales targets. Because new threats are \u201cunknown,\u201d they often cannot attract enough attention from executives to take any immediate action to pay for \u201cunknown costs.\u201d<\/p>\n<p>This is understandable. It is hard to invest resources in something not easily measurable when we have multiple things to worry about in today\u2019s complicated and interconnected world. Nonetheless, it is also true that cyberattackers take advantage of such a mindset. This means culprits can keep winning as long as they adjust the ways they mount successful cyberattacks for the purpose of stealing proprietary information, customers\u2019 personal data, sensitive government intelligence, or even crippling the operations of critical infrastructure to harm people.<\/p>\n<p>During Palo Alto Networks Day, Mark McLaughlin, our chairman, president and CEO, reiterated the importance of automated prevention and the sharing of threat intelligence, saying that it is crucial to take unknown threats, turn them into known threats, and share the threat intelligence as openly and quickly as possible to bring greater security to the world. The <a href=\"http:\/\/cyberthreatalliance.org\/mission.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Threat Alliance<\/a> and <a href=\"https:\/\/www.fsisac.com\/about\" rel=\"nofollow,noopener\"  target=\"_blank\">Financial Services \u2013 Information Sharing and Analysis Center (FS-ISAC)<\/a> are two good examples of organizations that use sharing frameworks to provide threat intelligence among member companies in the same industry. Their efforts jointly raise awareness at the global cybersecurity level and bring greater value to their customers in the form of protection from advanced cyberattacks.<\/p>\n<p>The U.S. defense and intelligence communities learned this the hard way during the 9\/11 terror attacks, which prompted the paradigm shift from <a href=\"http:\/\/www.afcea.org\/mission\/intel\/documents\/SpringIntel07whitepaper_000.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">\u201cneed-to-know\u201d to \u201cneed-to-share\u201d<\/a> to make relevant threat intelligence available to all stakeholders as soon as possible. Such a revolutionary change is needed for cybersecurity as well. Bad guys \u2013 whether cybercriminals, hacktivists, terrorists or state actors \u2013 work organizationally, tactically and strategically to achieve their adverse goals by cyber means. Defenders also need to collaborate in the same manner to increase the cost of successful cyberattacks \u2013 and make that cost prohibitive for attackers.<\/p>\n<p>Second, organizations must switch from reactive defense to proactive and automated prevention. This does not mean denying the importance of incident response. Since there is no 100 percent effective security, incident response is an indispensable part of cyber resiliency. Automation allows defenders to compress the time for incident response, which involves time-consuming manual work and eventually reduces costs for cyber defenses.<\/p>\n<p><a href=\"https:\/\/www.weforum.org\/agenda\/2016\/01\/the-fourth-industrial-revolution-what-it-means-and-how-to-respond\/\" rel=\"nofollow,noopener\"  target=\"_blank\">The World Economic Forum<\/a> argues that the Fourth Industrial Revolution relies on digital technology to push global economy and quality of life. The concept is dependent on people\u2019s trust in the Internet. In his keynote speech, former Internal Affairs and Communications Minister Heizo Takenaka analyzed that economies are increasingly connected and only security can make them robust and successful. If people lose confidence in Internet security and use it less, the strength of the global economy will be diminished. In the 21st century, cybersecurity is not simply a cost as some people believe. Cybersecurity is, in fact, leverage to drive the Fourth Industrial Revolution.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/06\/a-look-back-at-palo-alto-networks-day-2016-in-japan\/\" target=\"_blank\"><em>See photos and read more details from Palo Alto Networks Day<\/em><\/a><em> in Tokyo.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On June 7, 2016, Palo Alto Networks held an international cybersecurity conference in Tokyo called Palo Alto Networks Day. Over 1,200 participants from government organizations and industry came together to learn about &hellip;<\/p>\n","protected":false},"author":189,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89,1766,155,133],"tags":[662,2091,417,2097,2082,1343],"coauthors":[1920],"class_list":["post-14571","post","type-post","status-publish","format-standard","hentry","category-ciociso","category-cso-perspective","category-cybersecurity-2","category-events","tag-cyber-threat-alliance","tag-fourth-industrial-revolution","tag-fs-isac","tag-mihoko-matsubara","tag-palo-alto-networks-day","tag-world-economic-forum"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14571"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14571\/revisions"}],"predecessor-version":[{"id":55398,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14571\/revisions\/55398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14571"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}