Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Virtualization: A Battlefield for Security Leaders

By Liviu Arsene
leader-cyber
October 5, 2017

The increasing adoption of hybrid cloud – a mix of public cloud services and privately owned data centers, already in place for 70 percent of companies on a global level – is giving rise to new security challenges and prompting CISOs to adopt different technologies to fight zero-day exploits, advanced persistent threats, and other devastating types of cybercrime.

Both IT C-suite decision-makers and boards are increasingly concerned about security, not only due to the cost of a breach, but also because the company’s future is at stake when the most valuable data is exposed. Almost 90 percent of boards view cybersecurity as a serious risk management issue with the understanding there could be severe reputational and financial consequences.

According to a recent Bitdefender survey, security concerns and issues have reached the board level in the overwhelming majority of large companies from France (95 percent), Italy (94 percent), Germany (91 percent) and the United States (90 percent). Lower, yet still good, numbers have been reported in Sweden (85 percent), the United Kingdom (81 percent) and Denmark (74 percent).

As evidenced by previous research, the rising pressure of cyber breaches and Blitzkrieg attacks has prompted CEOs to consider CIOs and CISOs as some of the most important C- level managers. Today, 34 percent of U.S. IT execs feel their job is more important than ever before, and another 30 percent admit their job has completely changed in recent years. Even though nine in 10 IT decision-makers perceive IT security as a top priority for their companies, they think the budgets need to increase by 34 percent to deliver efficient IT security policies.

But how can CISOs persuade boards and the C-level suite to increase security spending or buying competitive security solutions?

Unlike other acquisitions, security cannot be put off until next quarter, nor can it be fragmented. Boards need to be made aware that security must be unified from the start; it allows for better contextual threat intelligence data, and it’s probably less expensive in the long run to get the entire package instead of adding modules or integrating new solutions along the way.

When articulating security risks, C-level managers often respond better to the business impact of those risks, instead of technical details about zero-day vulnerabilities, advanced persistent threats and patch management. It’s also critical to keep in mind what is considered the most valuable data when approaching boards so you are prepared to offer solutions that will resonate. Companies mostly fear losing information about their customers (51 percent), followed by financial information (44 percent), information about certain employees (33 percent), research about new products (37 percent), product info and specifications (30 percent), intellectual property (27 percent), and research about the competition (18 percent).

Reminding the CEO that any security issue or infrastructure downtime has a direct proportional financial outcome in dropped stocks, lost customers, or even lawsuits can sometimes help build the business case needed to be heard. Bitdefender’s survey points out that 75 percent of U.S. CISOs state the worst consequences of an attacker gaining access to their companies’ most valuable asset would be the financial cost and reputational damage. However, more than a third (35 percent) say the financial cost could lead to bankruptcy. Even if it sounds alarming, loss of life – mentioned by 18 percent of the US respondents - is a severe yet real consequence of an APT. Targeted attacks could also aim at critical national or transnational infrastructures (i.e. nuclear power plants, national energy grids, urban water supplies, transportation management systems, traffic controller systems, hospitals and other healthcare facilities). In a modern environment where automation has become a reality, targeted attacks can practically paralyze countries and, unfortunately, lead to human casualties.

It should be emphasized to boards that security must be unified from the start; it allows for better contextual threat intelligence data and it’s probably less expensive in the long run to get the entire system instead of adding modules or integrating new solutions along the way.

Focusing on implications and cost-versus-benefit ratios is also helpful as long as you throw in numbers and statistics to back up your claims. Reminding the board that any security issue or infrastructure downtime has a directly proportional financial outcome in dropped stocks, lost customers, or even lawsuits can sometimes help build your case.

KEYWORDS: C-suite security data breach costs security budget virtualization

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Liviu Arsene is a Senior E-threat Analyst for Bitdefender, with a strong background in security. He has been closely working and interfacing with cross-company development teams, as his past Product Manager role involved understanding Bitdefender’s technology stack.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Standoff virtual hacking competition

    Put your cybersecurity skills to the test in a virtual battlefield

    See More
  • cyber_enews

    Cloud Security for Rational Leaders: A Practical Approach for the C-Suite

    See More
  • cyber-security-freepik1170x658x9.jpg

    Log4Shell a huge wake-up call for 95% of security leaders

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing