December 14, 2023 By Dr. Nataraj Nagaratnam 3 min read

A cybersecurity strategy is not solely about managing risk across a business’ IT infrastructure. The stakes are especially high for organizations in highly regulated industries because they can be exploited through their digital supply chain, giving hackers access to consumers’ valuable and sensitive data. Consequently, these data breaches can rattle customer trust and the confidence of regulators.  

When done correctly, cybersecurity can be a strategic initiative that supports product capability, organizational effectiveness and customer relationships. As enterprises scale infrastructure and systems to manage sensitive data and complex workloads, they must rely more on an ecosystem of partners to help them enhance their security and compliance without impacting performance and resiliency.  

Minimizing breaches and vulnerabilities  

As more enterprises adopt technologies to help solve their data security and privacy concerns, the lifecycle of a security breach becomes more integral to the overall financial impact to the organization. This is especially important for companies in highly regulated industries as they are consistently tasked with protecting the privacy of sensitive consumer data—such as the personal information found in financial and health records—while remaining in adherence to the latest security and compliance requirements. 

According to the 2023 Cost of a Data Breach report conducted by Ponemon Institute and sponsored by IBM, breaches with identification and containment times under 200 days cost organizations USD 3.93 million. However, those with a breach lifecycle of over 200 days cost organizations USD 4.95 million—a 23% difference. Moreover, cloud environments were identified as frequent targets for cyberattacks in 2023. These attackers often gained access to multiple environments, with 39% of breaches spanning multiple environments and incurring a higher-than average cost of USD 4.75 million. 

IBM is supporting clients across industries in their cybersecurity journey by providing comprehensive security capabilities to help make it easier to simplify their risk management and demonstrate regulatory compliance postures. The data security capabilities that are provided by IBM Cloud® Hyper Protect Crypto Services help clients on their confidential computing journey by providing complete control of cloud data encryption keys and cloud hardware security modules. It also offers the industry’s only Keep Your Own Key (KYOK) for data encryption at rest. This solution allows clients to retain sole access to their crypto keys, meaning not even IBM has access to clients’ keys. 

Collaborating with the right partners to support security goals  

Fortris, based in Spain, provides companies the tools to hold digital assets and utilize them in business operations such as cross-border payments and payroll. Fortris is aiming to improve its digital asset treasury operations platform by using confidential computing capabilities available through IBM Cloud Hyper Protect Services.  

This collaboration allows Fortris’ clients to address the risk of malicious actors to manipulate or gain access to company workflows, confidential data, and digital assets. The KYOK capability from IBM allows Fortris to protect data end-to-end while at rest. It also allows Fortris’ corporate users to leverage enhanced tools to operate with digital assets while minimizing security risks with full control over their digital asset keys.  

Innovation with a security-first mindset  

We see fintechs playing a heightened role in helping enterprises securely manage the growing market demand for digital assets. With this shift, fintechs are also looking for cloud services and providers that can help them navigate the regulated world of financial services more seamlessly and support greater levels of security for their cloud infrastructures.  

Togg, a global mobility technologies and ecosystem provider that offers digital asset custody wallets, is working alongside Swiss-based fintech Metaco to help secure the custody and governance of digital assets such as cryptocurrencies and tokens. Togg’s primary goal is to build a secure platform based on a newly created token for all their consumers to use. The tokens are linked to different assets such as a certificate of ownership of a car that was purchased or carbon tracking and trading certificates to support sustainability metrics. These assets can be vulnerable to malicious actors that are looking to access these highly valuable assets and confidential data and they require security capabilities to help mitigate these threats.  

Both Togg and Metaco also use KYOK encryption and confidential computing capabilities to protect data when it is unencrypted and most vulnerable. This protection is achieved by using a hardware-based trusted execution environment (TEE) that provides security and isolation to address unauthorized access to applications and data while they are in use.  

Supporting cybersecurity initiatives through collaboration 

The key to driving enterprise innovation and agility at scale is first developing a holistic cloud and security approach to support digital transformation from the onset. Along with making the necessary investments to bolster a well-defined cloud strategy and working with a provider that delivers high levels of resiliency and reliability, enterprises should be leveraging an ecosystem for support to help mitigate various levels of security risks that need to be managed before they become a problem. 

Learn more about IBM Hyper Protect Crypto Services
Was this article helpful?
YesNo

More from Cybersecurity

Authentication vs. authorization: What’s the difference?

6 min read - Authentication and authorization are related but distinct processes in an organization’s identity and access management (IAM) system. Authentication verifies a user’s identity. Authorization gives the user the right level of access to system resources.  The authentication process relies on credentials, such as passwords or fingerprint scans, that users present to prove they are who they claim to be.  The authorization process relies on user permissions that outline what each user can do within a particular resource or network. For example,…

Intesa Sanpaolo and IBM secure digital transactions with fully homomorphic encryption

6 min read - This blog was made possible thanks to contributions from Nicola Bertoli, Sandra Grazia Tedesco, Alessio Di Michelangeli, Omri Soceanu, Akram Bitar, Allon Adir, Salvatore Sollami and Liam Chambers. Intesa Sanpaolo is one of the most trusted and profitable European banks. It offers commercial banking, corporate investment banking, asset management and insurance services. It is the leading bank in Italy with approximately 12 million customers served through its digital and traditional channels. The Cybersecurity Lab of Intesa Sanpaolo (ISP) needed to…

What is AI risk management?

8 min read - AI risk management is the process of systematically identifying, mitigating and addressing the potential risks associated with AI technologies. It involves a combination of tools, practices and principles, with a particular emphasis on deploying formal AI risk management frameworks. Generally speaking, the goal of AI risk management is to minimize AI's potential negative impacts while maximizing its benefits. AI risk management and AI governance AI risk management is part of the broader field of AI governance. AI governance refers to…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters