{"id":672,"date":"2015-11-25T19:36:37","date_gmt":"2015-11-25T19:36:37","guid":{"rendered":"http:\/\/54.201.249.27\/?p=672"},"modified":"2015-11-25T19:36:37","modified_gmt":"2015-11-25T19:36:37","slug":"ibm-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/ibm-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world\/","title":{"rendered":"Forbes: IBM’s CEO On Hackers: ‘Cyber Crime Is The Greatest Threat To Every Company In The World’"},"content":{"rendered":"

The British insurance company\u00a0Lloyd\u2019s<\/a>\u00a0estimates that cyber attacks\u00a0cost businesses as much as $400 billion a year<\/a>, which includes direct damage plus post-attack disruption to the normal course of\u00a0business<\/a>.\u00a0Some vendor and media forecasts put the cybercrime figure as high as $500 billion and more.<\/p>\n

The\u00a0World Economic Forum (WEF)<\/a>\u00a0says\u00a0a significant portion of cybercrime goes undetected<\/a>, particularly industrial espionage where access to confidential documents and data is difficult to spot.<\/p>\n

Then there\u2019s the hacks and breaches which go unreported by privately held and unregulated companies who are fearful of how cyber incidents will damage their reputations \u2014 which can have a negative impact on revenues, company valuation when raising capital, customer acquisition and retention, and their ability to recruit top talent.<\/p>\n

Ginni Rometty<\/a>,\u00a0IBM\u00a0Corp.\u2019s<\/a>\u00a0Chairman, President and CEO, had the following to say at the\u00a0IBM<\/a>\u00a0IBM +0.00%<\/a><\/span><\/span>\u00a0Security<\/a>\u00a0Summit\u00a0in New York City earlier this year, when she addressed CISOs (Chief Information\u00a0 Security Officers), CIOs, and CEOs from 123 companies in 24 industries. \u2013 \u201cWe believe that data is the phenomenon of our time. It is the world\u2019s new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true \u2013 even inevitable \u2013 then cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.\u201d<\/p>\n

IBM has built up a big security business in\u00a0response to the cybercrime epidemic. Rometty said IBM\u00a0has created a\u00a0Security Business Unit<\/a>\u00a0that marshals the knowledge of 6,000 experts.<\/p>\n

According to IT research firm\u00a0Gartner\u00a0Inc.<\/a>,\u00a0IBM Security<\/a>\u00a0is the fastest growing vendor in the security market with a 17% growth rate, and they are the third largest security software vendor with nearly $1.5 billion in revenues.\u00a0Gartner<\/a>\u00a0IT +2.17%<\/a><\/span><\/span>\u00a0has called IBM the largest security vendor selling exclusively to enterprises.<\/p>\n

When speaking at the IBM Security Summit, Rometty was so pumped up on security that she could have been mistaken for a CTO (chief technology officer). She had this to say on IBM\u2019s new security technology: \u201cWe announced that more than 1,000 organizations across 16 industries are participating in our X-Force Exchange threat intelligence network. We only launched the network a month ago, so its rapid growth speaks to significant need. And we\u2019re bringing a potent weapon to the fight \u2013 a 700 terabyte threat database including two decades of malicious cyberattack data from IBM\u2019s security operations, as well as anonymous threat data from more than 4,000 organizations, which have contributed 300 new collections of data in the last month.\u201d<\/p>\n

Read the full article on\u00a0Forbes<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

The British insurance company Lloyd\u2019s estimates that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the normal course of business. Some vendor and media forecasts put the cybercrime figure as high as $500 billion and more.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,10],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/672"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=672"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/672\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}