Cybersecurity Trend Report: Crowd Sourced Solutions

Security vulnerabilities are a fact of life. Consequently, technology unicorns, e-commerce conglomerates, governments around the world, and hospitality giants are competing to attract hackers who have one key advantage over traditional methods: they can think like an attacker.

HackerOne is home to the world’s largest hacker community, with the power of nearly half a million hackers in their network. Their latest report emphasizes the pertinence of ethical hacking in cybersecurity and breaks the “hacker stigma” by sharing their stories of positive impact. 

They’ve helped find and fix over 130,000 vulnerabilities for 1,500 client organizations, earning hackers more than $67 million in awards—nearly half of that in the past year alone. Based on their findings, they’ve broken down the top vulnerability types by industry, median resolution times, and their typical severity level. 

HackerOne is tasked with protecting over 267 million active accounts in more than 200 markets in the world with PayPal, and their Information Security Engineer, Ray Duran stated, “In addition to being able to work with a broader more diverse set of researchers, HackerOne has enabled us to process bounty awards for qualifying submissions faster and get direct feedback from researchers on how to further improve our program.” 

With DropBox, HackerOne reported 264 vulnerabilities in the course of just 8 hours, claiming that “Our HackerOne bug bounty program has one of the most permissive scopes in the industry.”

Having a Vulnerability Disclosure Policy has proven to be vital in recent years, despite the fact that 93% of the Forbes Global 2000 companies have no known VDP. Jeff Massimilla, Chief Product Cybersecurity Officer of General Motors claims that, “To improve the security of their connected systems, every corporation should have a vulnerability disclosure policy that allows them to receive security submissions from the outside world.” By the same token, Gartner’s recently predicted that crowd-sourced security solutions will be employed by more than 50% of enterprises by 2022, up from less than 5% today, 

Hackers are the solution to the world’s cybersecurity challenges. By investing in people, not just software, we will see the greatest outcome. For full access to HackerOne’s latest report, click here!

THE EVENT FOR SECURITY INDUSTRY LEADERS

HackerOne is pleased to announce our third annual hacker-powered security conference, Security@ San Francisco on Tuesday, October 15th at the Palace of Fine Arts.

Meet industry leaders from some of the most advanced security teams and the top hackers from all over the world. Hear firsthand their challenges, successes, and cybersecurity predictions. This one-day event brings together those who are committed to making the internet a safer place to be. Help to pave the way with the same passionate, security-first-minded people like yourself.

Go here for more information!

Exclusive Interview with Agency Within

We had the opportunity to sit down with Agency Within to discuss strategy, challenges and trends at our Digital Marketing & Retail Transformation Assembly last month in Dallas, TX. If you don’t know already, Agency Within is a full-service digital marketing agency based out of Long Island City, NY, and their clientele includes industry leaders such as Nike, Budweiser, Shake Shack & Facebook. With their finger on the pulse of marketing innovation, see what they had to say about digital transformation.

1. Can you give us a little insight into what Agency Within specializes in? 

Agency Within is a full-service performance marketing company. They help their partners grow through paid media strategy/execution, as well as creative services They work with brands to solve complex business problems like cross-channel attribution and optimizing for customer lifetime value and long-term profit, instead of just monthly revenue or CPA.

2. Why do you think it is important for brands to invest in a digital marketing strategy?

Digital marketing allows brands to connect with potential consumers in a way that is not only highly trackable, but provides the opportunity to combine branding with performance marketing in a way that generates an emotional connection while also driving results.

3. Since the digital marketing landscape is constantly changing and evolving, how do you think brands can stay relevant, especially among their competition? 

Creative testing is the key to staying relevant. We work with all of our clients to develop rigorous methodologies for testing creative and messaging concepts at scale, quickly iterating on the winners and generating insights that can be leveraged for future testing.

4. What marketing trends do you think will make a disruptive impact in 2020?

Augmented reality (AR) is one we’re really excited about and think could make a big impact next year. The ability to add a “try before you buy” experience to the e-commerce journey could remove a lot of friction from the process in increase conversion rates in categories that typically rely on an in-person touchpoint. Our creative team has been working with leading publishers to push the boundaries on this new technology.

5. What has been the most rewarding brand success story that Agency Within has been a part of?

In recent years, our partners at Nike have shifted their focus to the new standard of retail – building a direct, digital connection with customers through it’s owned digital platforms. To quote Mark Parker, “FY19 was a pivotal year for Nike as [they] continue to bring [their] Consumer Direct Offense to life through the marketplace”. The 35% increase in digital commerce sales was further supported by a focus on NikePlus membership and integrating the owner properties – like app activations in retail locations.

For more information on Agency Within, click here!

How Retailers Can Counter Digital Disruption

80% of people say the experience a company provides is as important as its products and services, and jointly, 61% of consumers will share more data with brands that use personal information to make their shopping experiences more relevant. According to Bank of America Merchant Services’ latest whitepaper, that means pairing compelling online content with a browsing experience that’s as relevant and pleasurable as possible is a life force for retailers.  

In the state of retail today, there’s a long list of mall merchants and big-box stores being overwhelmed by a handful of eCommerce powerhouses. But if you dig deeper, you’ll find many retailers are finding ways to thrive in the age of digital disruption. How? They bolster their relationships with customers by using omni-channel technology — connecting to customers through a handful of channels while they shop or otherwise engage with their brand — to amplify their natural competitive advantages.

The businesses that thrive in the coming years will be the ones that combine convenience and ease with unique, hard to-replicate experiences.

It isn’t uncommon to find today’s shoppers reading product reviews and sourcing social media for ideas, thus creating a new occasion for a retailer to interact with a customer. Bank of America’s whitepaper strategizes how retailers can seize every opportunity and counter digital disruption for their competitive advantage. 

Click here for exclusive access!

How to Make Digital Identity a Business Enabler

Sila’s latest whitepaper explains the expanding landscape of digital identity services, and how to make your digital identity a business enabler. With the evolution of digital identity services, their key takeaways are: 

1. Identity targets automating access provisioning

2. Identity programs focus on checking audit and regulatory boxes. 

3. Digital identity services drive business success through secure identities, systems, and data

Over the past decade, organizations have made great strides in their digital identity services programs. Previously, identity was managed by IT as an infrastructure function to automate provisioning. As time and technology progressed, digital identity became a security program driven by audit and compliance needs including Sarbanes-Oxley (SOX) and Federal Identity, Credential, and Access Management (FICAM). This shift resulted in several organizational benefits, such as increased visibility into access to high-value assets and improvements towards a “least privilege” model. 

Organizations often have a wide array of programs and teams to meet business and security needs, including IGA, PAM, SIEM, SOC, WAM, DAG, and CIAM. However, the emphasis on a compliance-driven security approach has resulted in many programs being implemented in a siloed manner. Even though they all fall under the same cybersecurity umbrella, they often have separate stakeholders, drivers, and roadmaps, resulting in a discordant set of services being independently implemented and administered.

Breaking down these silos is critical to increasing security and supporting business needs. Each program has its specific purpose but organizations benefit from coordinating and integrating their individual contributions into a broader cybersecurity ecosystem. 

Click here for exclusive access to the full whitepaper!

The World as It Is: A Memoir of the Obama Whitehouse

We’re looking forward to our Transformational CISO Assembly with Keynote Speaker Ben Rhodes this November, and leading up to the event, we recommend that you make Rhodes’ The World as It Is: A Memoir of the Obama White House the top of your summer reading list. 

Rhodes’ inside-the-bubble account gives a glimpse into the Obama Administration like never before, with George Packer of The New Yorker claiming it to be “The closest view of Obama we’re likely to get until he publishes his own memoir.” His memoir details behind-the-scenes insight on some of the most gripping moments during the Obama Administration- waiting out the bin Laden raid in the Situation Room, responding to the Arab Spring, reaching a nuclear agreement with Iran, leading secret negotiations with the Cuban government to normalize relations, and confronting the resurgence of nationalism and nativism that culminated in the election of Donald Trump. Rhodes’ novelistic style gives clarity and depth to the events we lived through, and much like the speeches he’s written, captivates the audience from the start.

Find out why the Guardian named The World as It Is one of the books of the year! Click here to purchase your copy. 

We are excited to hear Ben Rhodes’ wealth of knowledge in his keynote presentation this November! 

About Ben Rhodes:

Ben Rhodes is the author of the New York Times bestseller The World As It Is; a contributor for NBC News, MSNBC and Crooked Media; the co-chair of National Security Action; and an advisor to former President Barack Obama. From 2009-2017, Rhodes served as a Deputy National Security Advisor to President Obama. In that capacity, he participated in nearly all of President Obama’s key decisions, and oversaw the President’s national security communications, speechwriting, public diplomacy and global engagement programming. He also led the secret negotiations with the Cuban government which resulted in the effort to normalize relations between the United States and Cuba, and supported the negotiations to conclude the Joint Comprehensive Plan of Action (JCPOA) with Iran. Prior to joining the Administration, he was a Senior Speechwriter and foreign policy advisor to the Obama campaign. From 2002-2007, he worked for former Congressman Lee Hamilton, supporting his work on the 9/11 Commission and Iraq Study Group. A native New Yorker, Mr. Rhodes has a B.A. from Rice University and an M.F.A from New York University. 

Transformational CISO Assembly

The Millennium Alliance is thrilled to present our bi-annual Transformational CISO Assembly, taking place in Nashville, TN.

With the instances of cyber attacks increasing, businesses of all sizes are working tirelessly to secure their networks, devices, and data. Fortune 500 organizations are especially vulnerable as they have big data pools and thousands of people who need access. CISOs need to plan for worst-case scenarios, stay ahead of the latest IT Security transformation technology, and maintain their company’s information assets, all without losing sight of the corporate culture.

Are you interested in becoming a sponsor for this event? Click here today to learn more >>

Are you a CISO interested in attending this event? Inquire here today to find out if you qualify for Millennium Membership >>

How to Approach your Virtual Front Door for the Digital Patient Experience

Did you know that patients have to wait, on average, 24 days to schedule an appointment with a doctor in 15 major US cities? Consequently, 61% of patients agree that they would switch providers just to get a faster appointment. The digital customer experience faces consumer expectations like never before thanks to standards set by the Amazons on the world, and the patient experience is no exception to this. SCI Solutions found that according to research, 77% of patients conduct an online search and read reviews before making an appointment with a physician, which means that most consumers’ first impressions are occurring online. As a result, the healthcare industry as a whole demands a better digital patient experience, especially with increasing out-of-pocket costs running the risk of patients switching service providers. For this reason, it’s imperative that your virtual front door offers a welcoming, convenient experience that can both acquire and retain a customer base. 

SCI Solutions’ latest whitepaper outlines how to achieve success with your digital customer experience, emphasizing a comprehensive view of the patient experience that encompasses every touchpoint across the system as a whole. In 5 objectives, SCI Solutions answers how to build an effective digital patient engagement strategy that addresses patient acquisition, intake and conversion, care coordination, and retention. 

Click here for exclusive access to the full whitepaper!

The CCO as Pacesetter: What It Means, Why It Matters, How to Get There

Industry leader, Jon Iwata, recently released his report on the progression path to the CCO position, and how essential their role is in pacesetting transformation at the company level. 

CEOs across industries and regions are driving the greatest wave of transformation in generations. It is striking that not only are so many companies changing simultaneously, but many are changing into the same kind of company. We are seeing the emergence of a new business design. 

We also see ample evidence that CCOs are playing a key role in helping CEOs transform their companies by defining, reinforcing or reviving corporate character – the unique, differentiating identity of the enterprise. At the same time, new digital capabilities are helping CCOs to engage stakeholders, authentically and effectively, to build a reputation, earn trust and achieve measurable results in entirely new ways.

“Pacesetting CCOs are playing a key role in helping CEOs transform their companies.”

While few CCOs who participated in our research are at the most advanced stage in any of these realms, the trends and trajectories are clear. To help CCOs and their teams continue to develop and grow, the centerpiece of this report is “Progression Paths.” There are four: one for CommTech and three — Brand, Culture and Societal Value — for the major elements of corporate character.

Click here for access to the full study!

Gearing Up for Erin Joe’s Keynote Presentation!

The Millennium Alliance is gearing up for our Transformational CISO East Coast Assembly next week with Erin Joe, Director, US Government Cyber Threat Intelligence Center. We’re looking forward to hearing from Erin Joe’s wealth of knowledge given her 22+ years in the national security and criminal operations space with the FBI.

About Erin Joe:

Erin Joe is an attorney and senior FBI cyber professional who served as the Section Chief of Cyber Operations at FBI before joining CTIIC as its second Director. Ms. Joe has more than 22 years’ experience in national security and criminal operations as a Special Agent in FBI, most recently leading the Bureau’s strategy and response to nation-state cyber threats emanating from the Middle East and Africa and to cyberterrorism threats worldwide.

In 2015, Ms. Joe became the first Section Chief of FBI’s Office of Partner Engagement, responsible for managing FBI’s Domestic Director of National Intelligence program; engaging with federal, state, and local partners; and addressing issues common to both law enforcement and the IC—including emerging cyber threats.

In addition, Ms. Joe served as Assistant Special Agent in Charge, FBI Los Angeles, where she oversaw intelligence, surveillance, and aviation programs; established collection priorities; directed operations; and integrated intelligence and operations across the office’s areas of responsibility. Ms. Joe has served in FBI Field Offices in Oklahoma City, Salt Lake City, and New Haven, where she was Acting Special Agent in Charge. Before joining FBI, Ms. Joe served as an administrative law judge in Dallas, Texas.

Ms. Joe has completed senior executive leadership courses at the Naval Post Graduate School, Kellogg School of Business, Carnegie Mellon, and Harvard. Ms. Joe earned a BA in English, with high distinction, from the University of Illinois and a JD from Ohio State University. She is a member of the Oklahoma Bar Association and the State Bar of Texas.

Ms. Joe succeeds Tonya Ugoretz, a career FBI intelligence analyst who served as CTIIC Director for almost three years.

Transformational CISO East Assembly

Due to the success of our National Transformational CISO Assembly, in 2019 The Millennium Alliance in partnership with our Advisory Board, has launched Transformation CISO East. This exclusive Assembly will bring industry experts and the best solution providers to our CISO Members based on the East Coast.

With the instances of cyber attacks increasing, businesses of all sizes are working tirelessly to secure their networks, devices, and data. Fortune 500 organizations are especially vulnerable as they have big data pools and thousands of people who need access. CISOs need to plan for worst-case scenarios, stay ahead of the latest IT Security transformation technology, and maintain their company’s information assets, all without losing sight of the corporate culture

Are you interested in becoming a sponsor for this event? Click here today to learn more >>

Are you a CISO interested in attending this event? Inquire here today to find out if you qualify for Millennium Membership >>

80% of Applications are At-Risk, Time for a New Strategy?

Nearly 80% of applications are considered at-risk, do you feel confident in your ongoing security testing program? Market Research has shown that Fortify on Demand® is a great option for those seeking a comprehensive security strategy, and their most recent case study with Coca Cola FEMSA shows just how flexible the system can be when posed with the challenge of increasing security and identifying vulnerabilities at scale. The Chief Technology Security Officer at Coca Cola FEMSA, Jair García Osorio, noted, “We looked at alternatives but found it a real challenge to find a solution that identifies a wide range of vulnerabilities and makes them visible in an easy-to-action way. Once we saw what Fortify on Demand was capable of, we knew it was the solution for us.

This application security as a service integrates static, dynamic, and mobile application security testing with continuous application monitoring. Scalable for application growth, Fortify on Demand can be delivered in a flexible cloud or hybrid environment, to align with application demand. Osorio elaborates, “The clear reporting within Fortify on Demand enables us to translate technical issues into business ones. Once a vulnerability is identified, there are different ways of fixing it. We can give the vendor a report which explains exactly what code changes need to be made to improve the solution. We have also created fixes for common problems that can be implemented automatically through the use of digital signatures.”

Fortify on Demand® allows you to find vulnerabilities early and manage risk as you go. Their static application security testing is proven to save development time by 25% with 2x’s more vulnerabilities identified and a 95% reduction in false positives reported, and their dynamic assessments even have the ability to mimic real-world hacking. If you’re interested in reading more about the latest Fortify on Demand® case study with Coca Cola FEMSA, click here for exclusive access!

daVinci Payments: Gen Z and Millennial Buying Behaviors

Gen Z and Millennials are the most sought-after demographic groups for today’s marketers, and although the two have unique traits and affinities that affect their buying journey, their mobile-first inclinations draw similarities in how they make purchase decisions, learn about brands, and where name brands matter most. 

Their study found that:

Price is still a #1 factor when making a purchase decision, followed by Quality, Selection, and Availability.
– Friends and Family referrals remain the #1 way they discover new brands, followed by Google, Social Media, and Amazon.
– The two groups prefer private labels for purchases in the bed and furniture, housewares, and spirits categories.
– Brand name is prioritized for smartphone, computer, and TV purchases above all else. 

daVinci expands on their Gen Z and Millennial Buying Behavior study with 7 brand hacks that attract and retain, click here for exclusive access to the full whitepaper! 

Transformational CMO Assembly

The digital revolution has forever changed the balance of power between individual consumers and brands. This need to think “customer first” has made the marketing function more vital than ever before.

C-Level executives around the world are anticipating that digital technology will continue to drive business. We’ve put together a series of executive education roundtables, keynote presentations, collaborative think tanks, educational workshops, and networking sessions with our industry experts and advisory board.

Are you interested in becoming a sponsor for this event? Click here today to learn more >>

Are you a CMO interested in attending this event? Inquire here today to find out if you qualify for Millennium Membership >>