Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Another Growing Issue for CSOs and CISOs

By Kevin Coleman
September 30, 2016

A heads-up to CSOs and CISOs. The ability for you to keep up with the continued evolution and introduction of new technologies has been a challenge for years, and it won't end soon. 

Never before in the history of the enterprise security profession has there been such a continuous influx of new and emerging technologies for CSOs and CISOs to get their arms around. A technology that clearly fits into the category of new/emerging technology is cryptocurrencies.This is an issue now and the importance and implications are expected to grow for the foreseeable future.

A cryptocurrency is a medium of value exchange much like traditional currencies such as U.S. dollar, Euro, Yen and so on. Unlike traditional money, there is no physical manifestation of a cryptocurrency nor is it backed by a government authority, at least that is the case at this time. These new forms of money are designed for the sole purpose of exchanging digital information about value through a process made possible by certain principles of cryptography, which is used to secure the transactions and to control the creation of new cryptocurrency units. In July 2016 there were 740 different cryptocurrency types identified, and some predict the total number of cryptocurrencies from the concept’s inception to be around a thousand. Here are what I believe to be the most common cryptocurrencies today. Not in any particular order they are – Bitcoin, BlackCoin, Dash, DogeCoin, and Ethereum.

It is clear that digital money or cryptocurrencies are well underway to becoming a central component in the digital globalization era that we are in today. So what does this mean to CSOs and CISOs? As it turns out, a lot!  Consider all of the computer systems and business processes that will be impacted as more organizations integrate cryptocurrencies as a method of payment. Now think of all the new equipment that will need to be installed if an organization is going to accept cryptocurrencies at physical locations. I recently saw a new retail credit-card reader that was equipped to accept Bitcoins. 

But the use of cryptocurrencies do not stop there, as there is a dark side to this technological advancement. 

We are all familiar with the growing threat of Ransomware. These style attacks are becoming more frequent and more expensive. In fact, the Atlantic recently published a piece titled, “How Ransomware Became a Billion-Dollar Nightmare for Businesses.” That title alone should put this issue in perspective. The article notes how Ransomware now costs small and medium companies at least $75 billion in expenses and lost productivity annually. The FBI has stated that ransomware attacks cost victims a total of $209 million in the first three months of 2016. 

If you do the math from the 2015 figure, you can see an increase of more than 870 percent! Another shocking statistic revealed in that article was that a survey of IT professionals found that 92 percent had clients that suffered ransomware attacks last year. Shocking was the statement that 40 percent sustained at least six attacks. Cybersecurity icon Symantec reported earlier this year that ransomware attackers demanded an average ransom from consumers of $679, up sharply from $294 at the end of 2015. That is a 230-percent increase in just three months. Now, you can understand why some organizations are establishing cryptocurrency accounts, to have the ability to pay ransoms for systems being held hostage. Clearly, this is the norm for ransomware! 

The bottom line is that every CSO and CISO must prepare their organization for an onslaught of ransomware attacks and its associated costs. The first step is to brief your executives and corporate council. I am sure they will want to be involved.

KEYWORDS: cryptocurrencies currency cyber security ransomware

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing