{"id":48389,"date":"2022-10-21T10:31:13","date_gmt":"2022-10-21T08:31:13","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=48389"},"modified":"2025-11-24T14:23:22","modified_gmt":"2025-11-24T12:23:22","slug":"risks-and-considerations-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/","title":{"rendered":"Risks and Considerations of Cybersecurity"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">In this video, Eric Rosenbach, Course Convener in the Harvard VPAL <\/span><a href=\"https:\/\/www.getsmarter.com\/products\/harvard-vpal-cybersecurity-online-short-course\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Cybersecurity: Managing Risk in the Information Age<\/span><\/a><span style=\"font-weight: 400;\"> online short course, discusses the risks companies face in the aftermath of a cyberattack, from operational incapacity, financial loss, reputational harm, and litigation.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Risks and Considerations of Cybersecurity | Harvard VPAL\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/zViKAgHHm3Q?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">Businesses, financial institutions, the government, and the public sector have reaped the rewards of advances in information technology. However, data is a valuable commodity and managing the risk of exploitation has become an industry-wide priority.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-transcript\">Transcript<\/h2>\n\n\n\n<p>Information technology has made huge advancements on the way that an organization can run.<\/p>\n<p>However, with all of those advances comes new risks.<\/p>\n<p>So, there are three important risks that I want you all to understand. The first is Business Operational risk, the second is Legal and Litigation risk, and the third is Reputational risk.<\/p>\n<p>First, when you think about Business Operational risk, this literally means the risk that a cyberattack would take down your core operation in a way that prevented you from either delivering goods and services, accomplishing your mission, or \u2013 when it comes down to it in the private sector \u2013 just making money.<\/p>\n<p>If you, for example, were targeted and you&#8217;re hacked, and you were no longer able to process payments, because the credit card system had been hacked, that has a big business impact.<\/p>\n<p>You&#8217;re not able to process payments and, thus, you&#8217;re not able to bring in money and conduct sales.<\/p>\n<p>Think about the Department of Defense, where I used to work, business operations are very important. We placed a high priority on our cybersecurity because we did not want to be in the situation where our network was down and, thus, we couldn&#8217;t fly aircraft; we couldn&#8217;t deliver precision munitions.<\/p>\n<p>Also, think about it in the banking sector. And a good case is the case of the Iranian attack on the financial services, where they conducted DDoS, which prevented customers from coming to their public-facing website, process payments, and get their business done.<\/p>\n<p>The next thing I\u2019d like to talk to you about is Litigation risk and Legal risk. So, when one of these cyberattacks happens, really, one of the things that can pose the biggest risk to a private sector firm, in particular, is Litigation risk. That means that some of the activities that resulted from the hack will result in lawsuits against your firm and your executives.<\/p>\n<p>In Target, for example, there was a shareholder derivative suit. That meant all the holders of Target stock sued the board and the executives of Target because they felt that their reaction to the attack was not good. That costs the firm money and then lowers their profit.<\/p>\n<p>Another form of Legal risk is Criminal Legal risk. When there&#8217;s a hack, usually, some aspects of the criminal code is influenced and implicated. And that means you&#8217;re going to be dealing with the FBI, or other law enforcement agencies, depending on how it\u2019s set up in your country.<\/p>\n<p>That also can present a reputational risk problem because now people see that you&#8217;re mixed up with a criminal lawsuit.<\/p>\n<p>Finally, I want to talk to you about Reputational risk. This is really important to understand. And it really drives and flows from those first two risks that I talked to you about.<\/p>\n<p>So, for example, if you&#8217;re hacked and your business operations go down, then you can expect that your reputation is going to suffer because customers are accustomed to being able to depend on you for the service.<\/p>\n<p>In the case of the financial services who were attacked by the Iranians; consumers who were used to be able to go their webpage, do all their banking transactions and then move on. When they can&#8217;t do that, their opinion of you and your firm goes down, it diminishes, they start to question whether you&#8217;re a credible organization.<\/p>\n<p>Here\u2019s another perfect example that can have a real financial impact: Yahoo disclosed major hacks over a period of time that gave the impression to people who were considering doing a merger and acquisition with Yahoo that they weren\u2019t competent in their handling, either of their cybersecurity, the litigation, or the public affairs. It hurt their reputation as a firm to the point that it really drove down the cost and the transaction.<\/p>\n<p>So, reputational risk is something that seems intangible, but is really important, and something that you need to think about consciously.<\/p>\n<p>The best way to really understand these risks that I&#8217;ve just talked about is for you to think critically about your own work now, maybe your own firm, if you work in the government, your organization\u2019s mission. And think through, from your perspective: How could these risks come into play with where I work right now?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this video, Eric Rosenbach, Course Convener in the Harvard VPAL Cybersecurity: Managing Risk in the Information Age online short course, discusses the risks companies face in the aftermath of a cyberattack, from operational incapacity, financial loss, reputational harm, and litigation. Businesses, financial institutions, the government, and the public sector have reaped the rewards of [&hellip;]<\/p>\n","protected":false},"author":81,"featured_media":48395,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1,199],"tags":[127,120],"article-format":[],"class_list":["post-48389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-advice","category-systems-technology","tag-career-advice","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Risks and Considerations of Cybersecurity - GetSmarter Blog<\/title>\n<meta name=\"description\" content=\"Learn why cybersecurity has become an essential business function in today\u2019s information age.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risks and Considerations of Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Learn why cybersecurity has become an essential business function in today\u2019s information age.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-21T08:31:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-24T12:23:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_risks-and-considerations-of-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aaminah Allie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/risks-and-considerations-of-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/risks-and-considerations-of-cybersecurity\\\/\"},\"author\":{\"name\":\"Aaminah Allie\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/#\\\/schema\\\/person\\\/dd2f83fcd9d19a49e609bf9329d13186\"},\"headline\":\"Risks and Considerations of Cybersecurity\",\"datePublished\":\"2022-10-21T08:31:13+00:00\",\"dateModified\":\"2025-11-24T12:23:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/risks-and-considerations-of-cybersecurity\\\/\"},\"wordCount\":814,\"image\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/risks-and-considerations-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/getsmarter_blog_header-banner_risks-and-considerations-of-cybersecurity.jpg\",\"keywords\":[\"Career advice\",\"Systems &amp; technology\"],\"articleSection\":[\"Career Advice\",\"Systems &amp; Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/risks-and-considerations-of-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/getsmarter_blog_header-banner_risks-and-considerations-of-cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/getsmarter_blog_header-banner_risks-and-considerations-of-cybersecurity.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/risks-and-considerations-of-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\"}]}]}<\/script>\n<meta property=\"og:video\" content=\"https:\/\/www.youtube.com\/embed\/zViKAgHHm3Q\" \/>\n<meta property=\"og:video:type\" content=\"text\/html\" \/>\n<meta property=\"og:video:duration\" content=\"296\" \/>\n<meta property=\"og:video:width\" content=\"480\" \/>\n<meta property=\"og:video:height\" content=\"270\" \/>\n<meta property=\"ya:ovs:adult\" content=\"false\" \/>\n<meta property=\"ya:ovs:upload_date\" content=\"2022-10-21T08:31:13+00:00\" \/>\n<meta property=\"ya:ovs:allow_embed\" content=\"true\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risks and Considerations of Cybersecurity - GetSmarter Blog","description":"Learn why cybersecurity has become an essential business function in today\u2019s information age.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Risks and Considerations of Cybersecurity","og_description":"Learn why cybersecurity has become an essential business function in today\u2019s information age.","og_url":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/","og_site_name":"GetSmarter Blog","article_published_time":"2022-10-21T08:31:13+00:00","article_modified_time":"2025-11-24T12:23:22+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_risks-and-considerations-of-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Aaminah Allie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/"},"author":{"name":"Aaminah Allie","@id":"https:\/\/www.getsmarter.com\/blog\/#\/schema\/person\/dd2f83fcd9d19a49e609bf9329d13186"},"headline":"Risks and Considerations of Cybersecurity","datePublished":"2022-10-21T08:31:13+00:00","dateModified":"2025-11-24T12:23:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/"},"wordCount":814,"image":{"@id":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_risks-and-considerations-of-cybersecurity.jpg","keywords":["Career advice","Systems &amp; technology"],"articleSection":["Career Advice","Systems &amp; Technology"],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_risks-and-considerations-of-cybersecurity.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_risks-and-considerations-of-cybersecurity.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/risks-and-considerations-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]},"og_video":"https:\/\/www.youtube.com\/embed\/zViKAgHHm3Q","og_video_type":"text\/html","og_video_duration":"296","og_video_width":"480","og_video_height":"270","ya_ovs_adult":"false","ya_ovs_upload_date":"2022-10-21T08:31:13+00:00","ya_ovs_allow_embed":"true"},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/48389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=48389"}],"version-history":[{"count":3,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/48389\/revisions"}],"predecessor-version":[{"id":52880,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/48389\/revisions\/52880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/48395"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=48389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=48389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=48389"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=48389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}