Using data to do better business is (hopefully) just part and parcel of your everyday role now. But what if a cyber threat returned you to the dark ages for a few days? How long could you carry on doing great business without your systems working properly? A few days? A couple of weeks?
Forbes recently reported that CMOs need to know and do a lot more on cybersecurity. At Trustify, we’d agree with that. Marketing teams get incredibly stretched when put under the microscope of a cybersecurity issue. The communications function is often tied up with both internal and external communications. Marketing is often trying to get the business to perform as well as usual whilst trying to communicate with clients on the issue.
Using data to do better business is (hopefully) just part and parcel of your everyday role now. But what if a cyber threat returned you to the dark ages for a few days? How long could you carry on doing great business without your systems working properly? A few days? A couple of weeks?
Forbes recently reported that CMOs need to know and do a lot more on cybersecurity. At Trustify, we’d agree with that. Marketing teams get incredibly stretched when put under the microscope of a cybersecurity issue. The communications function is often tied up with both internal and external communications. Marketing is often trying to get the business to perform as well as usual whilst trying to communicate with clients on the issue.
The three classic stages remain relevant for marketers: preparation, execution and recovery.
Are you ready for a cybersecurity issue? Have you run the scenarios to get your team ready? Are you broadly sure of what you’d say in each circumstance? What systems do you have to alert you to a breach? What counts as large enough to be escalated to you? Do you have some resource ready on retainer to help you to continue business as usual if an issue arises?
What differs from the scenarios you’ve planned? Have matters been complicated by real-world events or circumstances? How do you need to tweak your plans? What steps do you need to take in relation to internal stakeholders or external stakeholders? Is your team in place? How long do you forecast that this execution phase will last? Have you planned resources for this period?
What lessons did you learn? What would you do differently next time? Is the situation one that you can use as a basis for future growth?
Are you ready for a cybersecurity issue? Have you run the scenarios to get your team ready? Are you broadly sure of what you’d say in each circumstance? What systems do you have to alert you to a breach? What counts as large enough to be escalated to you? Do you have some resource ready on retainer to help you to continue business as usual if an issue arises?
What differs from the scenarios you’ve planned? Have matters been complicated by real-world events or circumstances? How do you need to tweak your plans? What steps do you need to take in relation to internal stakeholders or external stakeholders? Is your team in place? How long do you forecast that this execution phase will last? Have you planned resources for this period?
What lessons did you learn? What would you do differently next time? Is the situation one that you can use as a basis for future growth?
We provide managed certificate services for larger enterprises – called AIM 2.0. Front-line security across your digital real estate.
Digital identity services put trust at the heart of your transactions with clients and customers, use an LEI to stand out.
Consulting services to provide precisely the right cybersecurity solution for your organisation.
We provide products for start-ups and smaller accountants, insurers and retailers, medium-sized law firms and financial services companies, for schools and biotechs.
We’re trusted to solve cyber-security for major organisations across the public, insurance, financial services, legal, pharmaceutical and accountancy sectors.
We provide products for start-ups and smaller accountants, insurers and retailers, medium-sized law firms and financial services companies, for schools and biotechs.
We’re trusted to solve cyber-security for major organisations across the public, insurance, financial services, legal, pharmaceutical and accountancy sectors.
Doddie Weir (1970-2022)
|