Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Business Risk of Data Breaches: Preparing Your C-Suite

By Michael Bruemmer
November 25, 2014

As 2014 draws to a close, we’re left picking up the pieces from one of the biggest years in data breach history. Compared to 2012, industry reports show a 100-percent increase in the number of individuals notified of a breach– impacting the bottom line and brand reputation of businesses. Set against the data breach landscape, C-suite executives are being held more accountable by stakeholders, regulators and consumers for security lapses. In fact, industry research suggests 51 percent of consumers will take business elsewhere after a company is breached.

With this in mind, it’s become increasingly easier for security executives to demonstrate the need to be prepared for a data breach the same way companies would plan to face a natural disaster or other major business risk. Decision makers at the highest level should take an active role in both preparation and response. And while we’ve seen more companies answering the call and taking basic steps to prepare for the increasing likelihood of a breach, businesses need to do more than simply check the box to establish an effective incident response plan.

Companies are aware they have a high likelihood of experiencing a security incident. Seventy-three percent of businesses report having a data breach response plan in place yet, a majority of executives (63 percent), feel unprepared to respond to a breach. In these situations, having a plan is only the first step. To respond effectively, a plan must be practiced and updated regularly. This is where companies are failing to execute with 78 percent of businesses reporting they don’t regularly update their data breach response plan to account for changing threats or their own evolving company processes. To ensure a company is prepared for a breach, security executives should view the response plan as they do a fire evacuation plan. Having every employee practice regular drills and data breach response audits ensures everyone knows precisely what to do in the event of an incident. Some companies take this advice to heart with one client recently calling us and other partners as part of a data breach response drill. With the exception of a select few employees that knew about the audit, everyone on the internal and external response team believed they were experiencing a breach. The result was a true reflection of their response process and valuable learnings for improving in case of a real-life scenario.

For a successful data breach response, companies must ensure communications is integrated into the planning process as it’s an essential part of protecting company brand. Immediately following a breach, a company’s corporate reputationis most susceptible to harm with value at risk of declining by as much as 17 percent to 31 percent. This makes the ability to immediately, and effectively, respond to a security incident correctly all the more important. Clear, sincere communication to affected consumers following a breach can help maintain trust and combat “data breach fatigue,” as more than one-third of breached consumers report they’ve ignored data breach notifications from companies. Partnering with a communications team better prepares executives to maintain consumer trust and respond to questions from regulators and the media.

Internally prioritizing security creates a culture of security from the top-down. To do this, the C-suite must allocate proper resources to fund training for employees and up-to-date technology. This need is clearly felt by businesses. Recent research from the Ponemon Institute indicates 69 percent of senior executives identify funding as a major need to improve response activity after a breach.To improve data breach response and create a company-wide focus on security preparedness, investment in department-specific training should trickle down from the CSO and data breach response team. Security executives should ensure each member of the team understands their responsibility to apply prevention and preparedness best practices to each of their own departments.

Senior executives are at a point where they must shift their ways of doing business to emphasize a culture of security and data breach preparedness within their company. Unfortunately, there are several recent examples companies can look to of what can happen if a breach is not handled properly. To prepare, security executives must recognize data breaches have moved beyond the IT department to become a holistic business issue. It is more important than ever that C-suite executives be prepared to respond to a breach and protect customers – or face consequences of increased scrutiny resulting in reputational and financial damage.

More information on how businesses can prepare for a data breach is outlined in Experian’s annual data breach response guide: http://bit.ly/2014-2015-response-guide.

KEYWORDS: brand security C-Suite cybersecurity data breach data breach costs identity theft

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0416 data slide2 900px

Michael Bruemmer, CHC, CIPP/US, is Vice President with the Experian® Data Breach Resolution group. With more than 25 years in the industry, Bruemmer brings a wealth of knowledge related to business operations and development in the identity theft and fraud resolution space where he has educated businesses of all sizes and sectors through pre-breach and breach response planning and delivery, including notification, call center and identity protection services. Bruemmer currently resides on the Ponemon Responsible Information Management (RIM) Board, the Information Security Media Group (ISMG) Editorial Advisory Board and the International Association of Privacy Professionals (IAPP) Certification Advisory Board.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    See More
  • Top 5 Fails from Companies Preparing for and Responding to a Data Breach

    See More
  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    Dispelling the Dangerous Myth of Data Breach Fatigue

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing