Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2589,"date":"2024-02-27T17:52:50","date_gmt":"2024-02-27T17:52:50","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/"},"modified":"2024-02-27T17:52:50","modified_gmt":"2024-02-27T17:52:50","slug":"the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/","title":{"rendered":"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm"},"content":{"rendered":"

In today\u2019s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

In today\u2019s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest. Organizations are playing a high-stakes game with their networks, and the consequences of an attack could result in big financial losses, falls in customer trust, and damaged reputations if network infrastructure risk assessments are not conducted. Data loss is another issue that could occur due to a severe outage which could lead to data protection implications that impact the business, its customers, suppliers, and the brand.<\/p>\n

Based on a survey conducted by Information Technology Intelligence Consulting (Rock, 2023) an enterprise has an average of 15 unplanned outages a year where 91% of enterprises report downtime costs exceeding $300,000 per hour.<\/p>\n

Enterprises face various risks that can disrupt their operations. A resilient organization is prepared to mitigate risks and quickly recover in the case of operational disruption, minimizing downtime, and the associated costs. However, there is still a decision to be made around the business case to identify and assess operational risks and the cost of mitigation activities.<\/p>\n

The regulation spans even further, covering security. Robust cybersecurity measures must be in place, including firewalls, encryption, and intrusion detection systems, that can protect a business\u2019s data and digital infrastructure, reducing the risk of cyber-attacks and ensuring continued operation.<\/p>\n

Assessment of potential vulnerabilities of the network infrastructure and its critical components requires close collaboration of the enterprise with service providers and industry-leading experts. The infrastructure assessment exercise must take a holistic approach when it comes to the technology domain, resources and operation processes, and engagement models with service providers\/service management vendors. Environmental factors need to also be accounted for and examples of all these include, the latest trends, economic and political developments that might target potential industry, customers, or country.<\/p>\n

Some enterprises are considered as critical national infrastructure, and the question of risk assessment is part of their business model.<\/p>\n

Before an enterprise can mitigate risks, it needs to understand what those risks are. This often involves conducting a risk assessment, which can include hiring external consultants, purchasing risk assessment software, and spending employee time on the assessment process. The cost of such activities could range from a few thousand dollars for smaller, less complex organizations to tens or even hundreds of thousands for larger, more complex organizations; especially those in highly regulated industries like finance or healthcare.<\/p>\n

It\u2019s fundamental to understand that risk mitigation should be viewed as an investment, as the costs of not taking preventative measures can be significantly higher.<\/p>\n

Cisco brings a set of tooling and frameworks that accelerate the risk assessment exercise with industry-proven assets. We work with our customers across all industries and our experience is based on a proven track of successful delivery and lessons learnt. Our products and services handle enterprise challenges within the business and operational resiliency domain.<\/p>\n

The goal of risk mitigation is to protect the business. The costs associated with a major disruption or loss can far exceed the costs of risk mitigation.<\/p>\n

Technology unplanned outages and cyber incidents drive a need to upgrade technology architecture and the underlying infrastructure to reduce risk and build resiliency. In 2019, for example, the United Kingdom imposed a $230 million fine on a European airline for a 2018 breach caused by security vulnerabilities\u00a0(Townsend, 2019). The same year the global computer system outage of another airline grounded flights for several hours, causing large-scale cancellations across several airlines.<\/p>\n

Therefore, when considering the costs, it\u2019s also important to consider the potential savings and benefits that risk mitigation can provide. While risk assessments can be expensive, the cost of not conducting them can be much greater.<\/p>\n

Citations<\/p>\n

Rock, T. (2023, March 27). Invenio IT \u2013 25 Disaster Recovery Statistics. Retrieved from<\/p>\n

https:\/\/invenioit.com\/continuity\/disaster-recovery-statistics\/#:~:text=The%20ITIC%202021%20Hourly%20Cost,to%20more%20than%20%245%20million.: https:\/\/invenioit.com\/continuity\/disaster-recovery-statistics\/#:~:text=The%20ITIC%202021%20Hourly%20Cost,to%20more%20than%20%245%20million. Townsend, K. (2019, June 11).<\/p>\n

British Airways Faces $230 Million Fine for 2018 Breach. Retrieved from ITC Secure:<\/p>\n

https:\/\/itcsecure.com\/news\/british-airways-faces-230-million-fine-for-2018-breach\/<\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0In today’s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

In today\u2019s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

In today\u2019s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest. Organizations are playing a high-stakes game with their networks, and the consequences of an attack could result in big financial losses, falls in customer trust, and damaged reputations if network infrastructure risk assessments are not conducted. Data loss is another issue that could occur due to a severe outage which could lead to data protection implications that impact the business, its customers, suppliers, and the brand.<\/p>\n

Based on a survey conducted by Information Technology Intelligence Consulting (Rock, 2023) an enterprise has an average of 15 unplanned outages a year where 91% of enterprises report downtime costs exceeding $300,000 per hour.<\/p>\n

Enterprises face various risks that can disrupt their operations. A resilient organization is prepared to mitigate risks and quickly recover in the case of operational disruption, minimizing downtime, and the associated costs. However, there is still a decision to be made around the business case to identify and assess operational risks and the cost of mitigation activities.<\/p>\n

The regulation spans even further, covering security. Robust cybersecurity measures must be in place, including firewalls, encryption, and intrusion detection systems, that can protect a business\u2019s data and digital infrastructure, reducing the risk of cyber-attacks and ensuring continued operation.<\/p>\n

Assessment of potential vulnerabilities of the network infrastructure and its critical components requires close collaboration of the enterprise with service providers and industry-leading experts. The infrastructure assessment exercise must take a holistic approach when it comes to the technology domain, resources and operation processes, and engagement models with service providers\/service management vendors. Environmental factors need to also be accounted for and examples of all these include, the latest trends, economic and political developments that might target potential industry, customers, or country.<\/p>\n

Some enterprises are considered as critical national infrastructure, and the question of risk assessment is part of their business model.<\/p>\n

Before an enterprise can mitigate risks, it needs to understand what those risks are. This often involves conducting a risk assessment, which can include hiring external consultants, purchasing risk assessment software, and spending employee time on the assessment process. The cost of such activities could range from a few thousand dollars for smaller, less complex organizations to tens or even hundreds of thousands for larger, more complex organizations; especially those in highly regulated industries like finance or healthcare.<\/p>\n

It\u2019s fundamental to understand that risk mitigation should be viewed as an investment, as the costs of not taking preventative measures can be significantly higher.<\/p>\n

Cisco brings a set of tooling and frameworks that accelerate the risk assessment exercise with industry-proven assets. We work with our customers across all industries and our experience is based on a proven track of successful delivery and lessons learnt. Our products and services handle enterprise challenges within the business and operational resiliency domain.<\/p>\n

The goal of risk mitigation is to protect the business. The costs associated with a major disruption or loss can far exceed the costs of risk mitigation.<\/p>\n

Technology unplanned outages and cyber incidents drive a need to upgrade technology architecture and the underlying infrastructure to reduce risk and build resiliency. In 2019, for example, the United Kingdom imposed a $230 million fine on a European airline for a 2018 breach caused by security vulnerabilities\u00a0(Townsend, 2019). The same year the global computer system outage of another airline grounded flights for several hours, causing large-scale cancellations across several airlines.<\/p>\n

Therefore, when considering the costs, it\u2019s also important to consider the potential savings and benefits that risk mitigation can provide. While risk assessments can be expensive, the cost of not conducting them can be much greater.<\/p>\n

Citations<\/p>\n

Rock, T. (2023, March 27). Invenio IT \u2013 25 Disaster Recovery Statistics. Retrieved from<\/p>\n

https:\/\/invenioit.com\/continuity\/disaster-recovery-statistics\/#:~:text=The%20ITIC%202021%20Hourly%20Cost,to%20more%20than%20%245%20million.: https:\/\/invenioit.com\/continuity\/disaster-recovery-statistics\/#:~:text=The%20ITIC%202021%20Hourly%20Cost,to%20more%20than%20%245%20million. Townsend, K. (2019, June 11).<\/p>\n

British Airways Faces $230 Million Fine for 2018 Breach. Retrieved from ITC Secure:<\/p>\n

https:\/\/itcsecure.com\/news\/british-airways-faces-230-million-fine-for-2018-breach\/<\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0In today’s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2590,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nThe Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a\u2026 Read more on Cisco Blogs \u200b[[{"value":" In today\u2019s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest. Organizations are playing a high-stakes game with their networks, and the consequences of an attack could result in big financial losses, falls in customer trust, and damaged reputations if network infrastructure risk assessments are not conducted. Data loss is another issue that could occur due to a severe outage which could lead to data protection implications that impact the business, its customers, suppliers, and the brand. Based on a survey conducted by Information Technology Intelligence Consulting (Rock, 2023) an enterprise has an average of 15 unplanned outages a year where 91% of enterprises report downtime costs exceeding $300,000 per hour. Enterprises face various risks that can disrupt their operations. A resilient organization is prepared to mitigate risks and quickly recover in the case of operational disruption, minimizing downtime, and the associated costs. However, there is still a decision to be made around the business case to identify and assess operational risks and the cost of mitigation activities. The regulation spans even further, covering security. Robust cybersecurity measures must be in place, including firewalls, encryption, and intrusion detection systems, that can protect a business\u2019s data and digital infrastructure, reducing the risk of cyber-attacks and ensuring continued operation. Assessment of potential vulnerabilities of the network infrastructure and its critical components requires close collaboration of the enterprise with service providers and industry-leading experts. The infrastructure assessment exercise must take a holistic approach when it comes to the technology domain, resources and operation processes, and engagement models with service providers\/service management vendors. Environmental factors need to also be accounted for and examples of all these include, the latest trends, economic and political developments that might target potential industry, customers, or country. Some enterprises are considered as critical national infrastructure, and the question of risk assessment is part of their business model. Before an enterprise can mitigate risks, it needs to understand what those risks are. This often involves conducting a risk assessment, which can include hiring external consultants, purchasing risk assessment software, and spending employee time on the assessment process. The cost of such activities could range from a few thousand dollars for smaller, less complex organizations to tens or even hundreds of thousands for larger, more complex organizations; especially those in highly regulated industries like finance or healthcare. It\u2019s fundamental to understand that risk mitigation should be viewed as an investment, as the costs of not taking preventative measures can be significantly higher. Cisco brings a set of tooling and frameworks that accelerate the risk assessment exercise with industry-proven assets. We work with our customers across all industries and our experience is based on a proven track of successful delivery and lessons learnt. Our products and services handle enterprise challenges within the business and operational resiliency domain. The goal of risk mitigation is to protect the business. The costs associated with a major disruption or loss can far exceed the costs of risk mitigation. Technology unplanned outages and cyber incidents drive a need to upgrade technology architecture and the underlying infrastructure to reduce risk and build resiliency. In 2019, for example, the United Kingdom imposed a $230 million fine on a European airline for a 2018 breach caused by security vulnerabilities\u00a0(Townsend, 2019). The same year the global computer system outage of another airline grounded flights for several hours, causing large-scale cancellations across several airlines. Therefore, when considering the costs, it\u2019s also important to consider the potential savings and benefits that risk mitigation can provide. While risk assessments can be expensive, the cost of not conducting them can be much greater. Citations Rock, T. (2023, March 27). Invenio IT \u2013 25 Disaster Recovery Statistics. Retrieved from https:\/\/invenioit.com\/continuity\/disaster-recovery-statistics\/#:~:text=The%20ITIC%202021%20Hourly%20Cost,to%20more%20than%20%245%20million.: https:\/\/invenioit.com\/continuity\/disaster-recovery-statistics\/#:~:text=The%20ITIC%202021%20Hourly%20Cost,to%20more%20than%20%245%20million. Townsend, K. (2019, June 11). British Airways Faces $230 Million Fine for 2018 Breach. Retrieved from ITC Secure: https:\/\/itcsecure.com\/news\/british-airways-faces-230-million-fine-for-2018-breach\/ Share Share: "}]]\u00a0\u00a0In today's ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-27T17:52:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm\",\"datePublished\":\"2024-02-27T17:52:50+00:00\",\"dateModified\":\"2024-02-27T17:52:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/\"},\"wordCount\":791,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/\",\"name\":\"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif\",\"datePublished\":\"2024-02-27T17:52:50+00:00\",\"dateModified\":\"2024-02-27T17:52:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/","og_locale":"en_US","og_type":"article","og_title":"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm","og_description":"In today\u2019s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a\u2026 Read more on Cisco Blogs \u200b[[{\"value\":\" In today\u2019s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest. Organizations are playing a high-stakes game with their networks, and the consequences of an attack could result in big financial losses, falls in customer trust, and damaged reputations if network infrastructure risk assessments are not conducted. Data loss is another issue that could occur due to a severe outage which could lead to data protection implications that impact the business, its customers, suppliers, and the brand. Based on a survey conducted by Information Technology Intelligence Consulting (Rock, 2023) an enterprise has an average of 15 unplanned outages a year where 91% of enterprises report downtime costs exceeding $300,000 per hour. Enterprises face various risks that can disrupt their operations. A resilient organization is prepared to mitigate risks and quickly recover in the case of operational disruption, minimizing downtime, and the associated costs. However, there is still a decision to be made around the business case to identify and assess operational risks and the cost of mitigation activities. The regulation spans even further, covering security. Robust cybersecurity measures must be in place, including firewalls, encryption, and intrusion detection systems, that can protect a business\u2019s data and digital infrastructure, reducing the risk of cyber-attacks and ensuring continued operation. Assessment of potential vulnerabilities of the network infrastructure and its critical components requires close collaboration of the enterprise with service providers and industry-leading experts. The infrastructure assessment exercise must take a holistic approach when it comes to the technology domain, resources and operation processes, and engagement models with service providers\/service management vendors. Environmental factors need to also be accounted for and examples of all these include, the latest trends, economic and political developments that might target potential industry, customers, or country. Some enterprises are considered as critical national infrastructure, and the question of risk assessment is part of their business model. Before an enterprise can mitigate risks, it needs to understand what those risks are. This often involves conducting a risk assessment, which can include hiring external consultants, purchasing risk assessment software, and spending employee time on the assessment process. The cost of such activities could range from a few thousand dollars for smaller, less complex organizations to tens or even hundreds of thousands for larger, more complex organizations; especially those in highly regulated industries like finance or healthcare. It\u2019s fundamental to understand that risk mitigation should be viewed as an investment, as the costs of not taking preventative measures can be significantly higher. Cisco brings a set of tooling and frameworks that accelerate the risk assessment exercise with industry-proven assets. We work with our customers across all industries and our experience is based on a proven track of successful delivery and lessons learnt. Our products and services handle enterprise challenges within the business and operational resiliency domain. The goal of risk mitigation is to protect the business. The costs associated with a major disruption or loss can far exceed the costs of risk mitigation. Technology unplanned outages and cyber incidents drive a need to upgrade technology architecture and the underlying infrastructure to reduce risk and build resiliency. In 2019, for example, the United Kingdom imposed a $230 million fine on a European airline for a 2018 breach caused by security vulnerabilities\u00a0(Townsend, 2019). The same year the global computer system outage of another airline grounded flights for several hours, causing large-scale cancellations across several airlines. Therefore, when considering the costs, it\u2019s also important to consider the potential savings and benefits that risk mitigation can provide. While risk assessments can be expensive, the cost of not conducting them can be much greater. Citations Rock, T. (2023, March 27). Invenio IT \u2013 25 Disaster Recovery Statistics. Retrieved from https:\/\/invenioit.com\/continuity\/disaster-recovery-statistics\/#:~:text=The%20ITIC%202021%20Hourly%20Cost,to%20more%20than%20%245%20million.: https:\/\/invenioit.com\/continuity\/disaster-recovery-statistics\/#:~:text=The%20ITIC%202021%20Hourly%20Cost,to%20more%20than%20%245%20million. Townsend, K. (2019, June 11). British Airways Faces $230 Million Fine for 2018 Breach. Retrieved from ITC Secure: https:\/\/itcsecure.com\/news\/british-airways-faces-230-million-fine-for-2018-breach\/ Share Share: \"}]]\u00a0\u00a0In today's ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/","og_site_name":"JHC","article_published_time":"2024-02-27T17:52:50+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/"},"author":{"name":"","@id":""},"headline":"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm","datePublished":"2024-02-27T17:52:50+00:00","dateModified":"2024-02-27T17:52:50+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/"},"wordCount":791,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/","url":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/","name":"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif","datePublished":"2024-02-27T17:52:50+00:00","dateModified":"2024-02-27T17:52:50+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16556287-oojoPv.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/the-cost-of-not-conducting-a-network-infrastructure-risk-assessment-a-costly-gamble-oleg-tyschenko-on-february-27-2024-at-100-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble Oleg Tyschenko on February 27, 2024 at 1:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2589"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2589\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2590"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}