• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
CommentaryCybersecurity

The Cybersecurity Challenge Every Business Should Prepare for

By
Peter J. Beshar
Peter J. Beshar
and
Bethany Cianciolo
Bethany Cianciolo
Down Arrow Button Icon
By
Peter J. Beshar
Peter J. Beshar
and
Bethany Cianciolo
Bethany Cianciolo
Down Arrow Button Icon
January 26, 2016, 11:06 AM ET
Online Crime
BERLIN, GERMANY - AUGUST 20: Symbolic feature with topic online crime, data theft and piracy and hacker, here the silhouette of a person with a laptop in his hands, on Augut 20, 2015 in Berlin, Germany. (Photo by Thomas Trutschel/Photothek via Getty Images)Photography by Thomas Trutschel Photothek via Getty Images

While much of the conversation in Davos centered around Europe’s refugee crisis, cybersecurity dominated the agenda. At a dozen public and private sessions, CEOs and heads of state focused on three trends:

Cyber attacks against critical infrastructure are coming
In just two years, the threat posed by cyber attacks has increased exponentially.

In 2014, tens of millions of credit cards were stolen from large retailers. While embarrassing, the damage from these attacks was limited because banks immediately cut off the cards and consumers weren’t held liable for fraudulent charges.

In 2015, there was an even more damaging attack: the social security breach. Hackers wanted to access a piece of data that could not be readily changed—and you only get one social security number. Tens of millions of SSNs were misappropriated from health care companies and the Office of Personnel Management.

As frustrating as the incursions of 2014 and 2015 have been, 2016 may be characterized by something more concerning still: cyber attacks on critical infrastructure.

Just weeks before Davos, a successful cyber attack on Ukraine’s utilities disabled a substantial portion of the country’s electric grid. According to the Department of Homeland Security, the form of malware deployed in the Ukrainian attack, dubbed “Black Energy,” has also been seen in the U.S. Within days of the attack, General Michael Hayden, who served as director of both the NSA and the CIA, warned “of a darkening sky” over the U.S. power grid.

According to Lloyd’s of London, a sophisticated cyber attack on the power grid in the northeastern U.S. could cause $1 trillion in damages. As a measure of comparison, the 2011 earthquake and tsunami in Japan caused $300 billion in economic damages, while the price tag for Hurricane Sandy was $100 billion.

As if that were not sobering enough, a report issued last week by the Nuclear Threat Initiative in the run-up to Davos asserted that civilian nuclear plants in 20 different countries are potentially vulnerable to cyber attacks.

The public and private sectors need to link arms to address the new cyber reality
Recent headlines spotlighting a bitter feud between the government and tech industry around whether to allow a backdoor to encryption seemed a world away from the discussions in Davos. On multiple occasions, government leaders and business executives pledged greater collaboration and mutual support. This newly cooperative tone is based in pragmatism and reflects a simple conclusion from leaders on both sides of the public-private equation: No one is immune to cyber attacks, and we are all in this together.

A year ago, the World Economic Forum established a cyber crime task force to bring government and industry closer together. Chaired by the former head of the Swiss police, the Steering Committee included the secretary general of Interpol, the director of Europol, and numerous corporate executives. To the pleasant surprise of those involved, U.S. Attorney General Loretta Lynch showed up in Davos this year and embraced the recommendations articulated by the task force for a public-private partnership to address cyber challenges.

 

Two asks were repeatedly made during this year’s meeting. First, the government asked industry to be more forthcoming in sharing information about attempted attacks. Government officials emphasized this point because the vast majority of critical infrastructure ( e.g., transportation systems, telecommunication networks, chemical plants, and dams) in the U.S. and Europe is owned and operated by the private—not public—sector. It was telling that Admiral Rogers, the commander of United States Cyber Command, recently said that we’ve got to do a better job of helping the private sector work with the government.

Congress’ recent passage of the Cybersecurity Information Sharing Act, which provides important liability and privacy protections, was hailed as a constructive step to encourage the sharing of cyber threat indicators. The challenge in realizing the law’s promise will be to implement a machine-readable platform that can distill and disseminate warnings in real time.

In turn, the second ask came from business leaders, who pressed the government to put greater emphasis on prosecuting hackers who perpetrate cyber attacks rather than blaming the companies that are victimized by them. One financial executive commented that when a bank is robbed at gunpoint, law enforcement comes down hard on the criminal—not the bank. In addition, industry wants the government to be more forthcoming about providing attack “attribution,” or who launched the attack. Companies want to know whether attacks on their networks were conducted by countries or independent hackers.

Breaches are inevitable, so resilience is critical
The theme of this year’s Davos was “Mastering the Fourth Industrial Revolution,” that is, the rapid expansion of cyber-physical systems and the Internet of Things.

This focus was well-placed. Everything is connected now. Robots perform critical tasks, and artificial intelligence mimics human cognition. Although these advances in technology present tremendous opportunity to society and business, there was a growing chorus in Davos that these interconnected innovations could open the door to making cyber breaches more frequent and more severe. It is simply not possible at this time to accommodate the proliferation of devices and applications necessary to meet the demands of consumers in the new economy while maintaining impenetrable security.

Accordingly, experts advocated embracing the concept of cyber resiliency. Businesses, governments, and NGOs should assume they will be breached and focus on maintaining continuity of core operations. That way, when they encounter a cyber attack, networks are resilient enough to make sure patients are treated, power is generated, and commerce flows.

To achieve cyber resilience, each organization must answer a simple question: What do you have to lose? That is, what are the specific data, applications, or systems that are essential to conducting operations? Answering that question with precision will enable businesses to begin developing a cyber security posture that is able to protect core functions while under duress.

Attacks on critical infrastructure are the new front in the battle for cybersecurity. At Davos, global leaders laid the framework for addressing this emerging threat. Now, businesses must turn ideas into action and ensure the Fourth Industrial Revolution meets its vast potential to drive global good.

Peter J. Beshar is the executive vice president and general counsel of Marsh & McLennan Companies, Inc.

 

About the Authors
By Peter J. Beshar
See full bioRight Arrow Button Icon
By Bethany Cianciolo
See full bioRight Arrow Button Icon

Latest in Commentary

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Commentary

reed
CommentaryRetirement
Tim Cook and Reed Hastings just showed every CEO how to leave gracefully
By Paul HardartMay 9, 2026
2 hours ago
golf
Commentarybooks
How playing golf alone can make you better at your job
By Gary BelskyMay 8, 2026
23 hours ago
naomi
Commentarymental health
Naomi Osaka: the things I didn’t do to succeed
By Naomi OsakaMay 8, 2026
1 day ago
amanda
Commentarybatteries
Why energy storage is moving beyond the capex debate
By Amanda SimonianMay 7, 2026
2 days ago
trump
CommentaryMedicare
Auto-enrollment in Medicare Advantage isn’t a nudge. It’s a trap
By Brian KeyserMay 7, 2026
2 days ago
nyse
CommentaryAI agents
Your trusted advocate or your rebellious Frankenstein: how you deploy agentic AI determines which one you get
By Jeffrey Sonnenfeld, Stephen Henriques, Yevheniia Podurets and Jasmine GarryMay 7, 2026
2 days ago

Most Popular

California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
North America
California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
By Sasha RogelbergMay 7, 2026
2 days ago
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
Arts & Entertainment
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
By Dave Lozo and Morning BrewMay 7, 2026
2 days ago
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
Magazine
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
By Sharon GoldmanMay 6, 2026
3 days ago
Current price of oil as of May 8, 2026
Personal Finance
Current price of oil as of May 8, 2026
By Joseph HostetlerMay 8, 2026
22 hours ago
U.S. Treasury will have to borrow $2 trillion this year just to continue functioning—more than $166 billion every month
Economy
U.S. Treasury will have to borrow $2 trillion this year just to continue functioning—more than $166 billion every month
By Eleanor PringleMay 7, 2026
2 days ago
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
Success
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
By Emma BurleighMay 7, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.