As technological innovations such as cloud computing, the Internet of Things, robotic process automation, and predictive analytics are integrated into organizations, it makes them increasingly susceptible to cyber threats. Fortune 1000 companies, for example, have a 25% probability of being breached, and 10% of them will face multi-million loss. In smaller companies, 60% will be out of business within six months of a severe cyberattack. This means that governing and assessing cyber risks becomes a prerequisite for successful business performance — and that investors need to know how vulnerable companies really are.
This need for transparency has been recognized by the regulators and facilitated by the new cyber security rules. Currently, the U.S. Security and Exchange Commission (SEC) has increased its enforcement to ensure companies maintain adequate cybersecurity controls and appropriately disclose cyber-related risks and incidents.
Unfortunately, our research shows that cyber risk is not easy to understand.
Read more here.
Haissam Badih PhD, is the Researcher and Professor at the Department of Math and Computer Science at the Lawrence Technological University, Southfield, Michigan, USA. He earned His B.S. degree in Computer Science from the University of Windsor at Ontario Canada, his M.S. Degree from Lawrence Technological University, and a Ph.D. in Computer Science and Informatics from Oakland University in 2020. He will begin his academic career at Lawrence Technological University in 2021. He has worked in various software companies in software engineering and architecture.He authored numerous journal and conference papers that were peer-reviewed. His current research and development interests and activities in Project DIAMOnD for Automation Alley in blockchain for building a 3D printer marketplace for the supply chain to support all kinds of business, including 4.0 Industry. This work on blockchain for autonomous systems design, sensor fusion, intelligent agents, automation, human/machine interaction, robotic programming, and interfacing/coding. His research dissertation, entitled "Advance and specialize our application of blockchain for webcam/microphone access control" and "Add Blockchain in A.I. for communication," has worked within research on the Blockchain and Decoy deception research project. He worked on blockchain and decoy deception using smart contracts. This project utilized a Blockchain application that enforces limited access to webcam and microphone devices. We utilize Blockchain's Smart Contract to form a contract between the user's computer and another party connected via a network.