Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceGovernment: Federal, State and Local

Public-private cybersecurity partnerships are good for business

By Kevin Orr
handshake

Image from Unsplash

September 29, 2022

Discussions of the national cybersecurity ecosystem — that is, the combination of government and commercial stakeholders who secure U.S. public infrastructure and private enterprise — often center on national security. And, of course, public-private partnerships are vital for that very reason. Sometimes forgotten in the conversation, however, are the positive business impacts such partnerships can have for individual enterprise organizations themselves. 

The desire to forge and strengthen public-private partnerships is clearly present: 93% of cyber decision-makers feel public-private partnerships are vital to national cyber defense, according to a report from RSA Conference and MeriTalk titled “Reimagining Public-Private Partnerships: Minimizing Systematic Risk and Transforming National Cybersecurity Resilience.” Additionally, 91% feel systemic risk is one of the biggest threats to national and economic security.

In mitigating cyber risk, security professionals can help create a safer country for U.S. citizens, allies and countless other stakeholders. But, simply, uniting the public and private sectors in this pursuit also presents unique business opportunities for enterprise organizations. 

By strengthening the public-private partnership in cybersecurity, business leaders open the door for not only greater security within their individual organizations, but also a stronger cybersecurity workforce and enablement of greater technological innovation.

Supporting national security reciprocates business value

Cyberthreats pose a hefty price for private enterprises. Globally, cybercrime is expected to cost up to $10.5 trillion annually by 2025; a ransomware attack, on average, costs businesses $84,116 and over 16 days of network downtime. 

However, while individual enterprise organizations can and should tend their own vulnerabilities to try and prevent such attacks, the public sector has much more power to dissuade cyberattacks systemically and reduce the overall activity of malicious actors at large. 

The combined resources of federal intelligence agencies, as well as organizations such as the Cybersecurity and Infrastructure Security Agency (CISA), offer a global reach for detecting digital risks, tracking active malicious hacking groups and, ultimately, punishing those malicious actors. In doing so, they help prevent further proliferation of cyberattacks such as ransomware from inflating above today’s levels. That translates to money and time saved for businesses.

Of course, ransomware attacks do still remain on the rise, and cybersecurity teams must work to slow that rise beyond what they already have. To do so requires private organizations to play their part in identifying and reporting breaches to assist the public sector in its role as global investigator and legal enforcer.

Building a stronger cybersecurity workforce

Of the responsibilities both the public and private sectors are assigned, public and private cybersecurity decisionmakers agree that it is more the role of government agencies to maintain an educated workforce, according to the “Reimagining Public-Private Partnerships” report.

CISA, for example, publishes educational materials and virtual training modules for federal and non-federal security employees as well as the general public through certification courses, incident response training, a workforce training guide, the Federal Virtual Training Environment and more. The National Security Agency funds CyberSkills2Work, a program offering professional development training to those with military or first-responder experience pursuing a job in the cybersecurity field. 

But the dialogue must flow both ways. Private organizations must clearly communicate to federal agencies the educational needs of their security and non-security workforce. In return, federal agencies are better able to collate those needs into far-reaching educational and training materials easily accessible to the private workforce.

This symbiosis serves to lift all boats — a stronger cybersecurity workforce in the private sector ultimately fosters greater security at the national level and provides individual enterprise organizations the benefits listed above — money and time.

Innovation depends on public-private cooperation

Beyond the premise that cybersecurity saves enterprise organizations both time and money, business leaders must also consider the technological innovation that public-private partnerships enable. 

Take, for example, the problem of digital identity management. To improve cybersecurity strategies tackling identity management, security teams need access to a large number of data points. Currently, many identity proofing strategies rely on a few major data points, such as government IDs, identity history or biometrics such as facial recognition. Public-private partnerships, however, could enable the sharing of several others, including information from national criminal databases, verification data from public institutions like the IRS, private healthcare records, user device authentication and many more.

The sharing of personal data poses important concerns about individual liberty, and important conversations about the standards and regulations surrounding that sharing must be had. However, government agencies are largely unwilling to tackle the identity proofing problem themselves; so, if such a system is to be built, strong public-private partnerships must be forged. The private sector will ultimately be responsible for the sensitive data that the government is capable of sharing. 

The business benefits of public-private partnerships in cybersecurity are straightforward: saving time and money, improving innovation and building a smarter workforce. Partnering with federal agencies to communicate breaches, highlight vulnerabilities and discuss enterprise cybersecurity needs are not sacrifices enterprise organizations must make in the name of national security; rather, they are investments any enterprise organization can make in national security and individual business value.

KEYWORDS: CISA cyber security initiatives enterprise security identity (ID) management public private partnerships ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin orr

As President for RSA Federal, Kevin Orr ensures that each RSA business unit provides its federal customers with the solutions they need to protect identities, detect threats, prevent fraud and address risk. Orr has over 25 years of information technology and cybersecurity expertise while leading high-growth technology organizations such as Cisco, BMC Software, Commvault and CyberArk in the public sector market. He excels at opening new markets, attracting and retaining world-class talent, and leading in challenging environments.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1019-edu-Feat-slide1_900px

    Cybersecurity for Public-Private Partnerships

    See More
  • usa cyber

    Public-private partnerships can increase cyber readiness

    See More
  • SEC1018-cover-Feat-slide_900px

    Public-Private Partnerships and The Fight Against Terrorism

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing