Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceGovernment: Federal, State and Local

Public-private cybersecurity partnerships are good for business

By Kevin Orr
handshake

Image from Unsplash

September 29, 2022

Discussions of the national cybersecurity ecosystem — that is, the combination of government and commercial stakeholders who secure U.S. public infrastructure and private enterprise — often center on national security. And, of course, public-private partnerships are vital for that very reason. Sometimes forgotten in the conversation, however, are the positive business impacts such partnerships can have for individual enterprise organizations themselves. 

The desire to forge and strengthen public-private partnerships is clearly present: 93% of cyber decision-makers feel public-private partnerships are vital to national cyber defense, according to a report from RSA Conference and MeriTalk titled “Reimagining Public-Private Partnerships: Minimizing Systematic Risk and Transforming National Cybersecurity Resilience.” Additionally, 91% feel systemic risk is one of the biggest threats to national and economic security.

In mitigating cyber risk, security professionals can help create a safer country for U.S. citizens, allies and countless other stakeholders. But, simply, uniting the public and private sectors in this pursuit also presents unique business opportunities for enterprise organizations. 

By strengthening the public-private partnership in cybersecurity, business leaders open the door for not only greater security within their individual organizations, but also a stronger cybersecurity workforce and enablement of greater technological innovation.

Supporting national security reciprocates business value

Cyberthreats pose a hefty price for private enterprises. Globally, cybercrime is expected to cost up to $10.5 trillion annually by 2025; a ransomware attack, on average, costs businesses $84,116 and over 16 days of network downtime. 

However, while individual enterprise organizations can and should tend their own vulnerabilities to try and prevent such attacks, the public sector has much more power to dissuade cyberattacks systemically and reduce the overall activity of malicious actors at large. 

The combined resources of federal intelligence agencies, as well as organizations such as the Cybersecurity and Infrastructure Security Agency (CISA), offer a global reach for detecting digital risks, tracking active malicious hacking groups and, ultimately, punishing those malicious actors. In doing so, they help prevent further proliferation of cyberattacks such as ransomware from inflating above today’s levels. That translates to money and time saved for businesses.

Of course, ransomware attacks do still remain on the rise, and cybersecurity teams must work to slow that rise beyond what they already have. To do so requires private organizations to play their part in identifying and reporting breaches to assist the public sector in its role as global investigator and legal enforcer.

Building a stronger cybersecurity workforce

Of the responsibilities both the public and private sectors are assigned, public and private cybersecurity decisionmakers agree that it is more the role of government agencies to maintain an educated workforce, according to the “Reimagining Public-Private Partnerships” report.

CISA, for example, publishes educational materials and virtual training modules for federal and non-federal security employees as well as the general public through certification courses, incident response training, a workforce training guide, the Federal Virtual Training Environment and more. The National Security Agency funds CyberSkills2Work, a program offering professional development training to those with military or first-responder experience pursuing a job in the cybersecurity field. 

But the dialogue must flow both ways. Private organizations must clearly communicate to federal agencies the educational needs of their security and non-security workforce. In return, federal agencies are better able to collate those needs into far-reaching educational and training materials easily accessible to the private workforce.

This symbiosis serves to lift all boats — a stronger cybersecurity workforce in the private sector ultimately fosters greater security at the national level and provides individual enterprise organizations the benefits listed above — money and time.

Innovation depends on public-private cooperation

Beyond the premise that cybersecurity saves enterprise organizations both time and money, business leaders must also consider the technological innovation that public-private partnerships enable. 

Take, for example, the problem of digital identity management. To improve cybersecurity strategies tackling identity management, security teams need access to a large number of data points. Currently, many identity proofing strategies rely on a few major data points, such as government IDs, identity history or biometrics such as facial recognition. Public-private partnerships, however, could enable the sharing of several others, including information from national criminal databases, verification data from public institutions like the IRS, private healthcare records, user device authentication and many more.

The sharing of personal data poses important concerns about individual liberty, and important conversations about the standards and regulations surrounding that sharing must be had. However, government agencies are largely unwilling to tackle the identity proofing problem themselves; so, if such a system is to be built, strong public-private partnerships must be forged. The private sector will ultimately be responsible for the sensitive data that the government is capable of sharing. 

The business benefits of public-private partnerships in cybersecurity are straightforward: saving time and money, improving innovation and building a smarter workforce. Partnering with federal agencies to communicate breaches, highlight vulnerabilities and discuss enterprise cybersecurity needs are not sacrifices enterprise organizations must make in the name of national security; rather, they are investments any enterprise organization can make in national security and individual business value.

KEYWORDS: CISA cyber security initiatives enterprise security identity (ID) management public private partnerships ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin orr

As President for RSA Federal, Kevin Orr ensures that each RSA business unit provides its federal customers with the solutions they need to protect identities, detect threats, prevent fraud and address risk. Orr has over 25 years of information technology and cybersecurity expertise while leading high-growth technology organizations such as Cisco, BMC Software, Commvault and CyberArk in the public sector market. He excels at opening new markets, attracting and retaining world-class talent, and leading in challenging environments.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1019-edu-Feat-slide1_900px

    Cybersecurity for Public-Private Partnerships

    See More
  • White Paper Highlights Benefits of Public-Private Partnerships for Cybersecurity

    See More
  • Are Public-Private Cyber Partnerships Worth the Effort?

    See More

Related Products

See More Products
  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing