SlideShare a Scribd company logo
1 of 3
NOVEMBER/DECEMBER 2016 25
When Yahoo Inc. recently reported a data breach that involved the theft of 500 million clients’ records two years ago,
the company laid the blame for the entire incident squarely on a foreign state. This finger pointing suggests that Yahoo
sees the breach as an international relations matter, and that the company’s board, CEO and management team were
innocent bystanders.
Some speculate that Yahoo took this tack to reduce its culpability in any class-action lawsuits to follow. Regardless,
the unacknowledged failure on the part of Yahoo means that some customers will be counting the cost of the breach for
years, as their data linger on the Internet and the Dark Web, possibly forever.
The outcry that followed Yahoo’s announcement demonstrates that the public sees the responsibility of corporate
cybersecurity as being non-transferable from business. Indeed, what Yahoo did serves as a warning to others, and as a
motivation to understand where the responsibility for cybersecurity really lies.
Cybersecurity:
Whose Job is it Anyway?
GUY PEARCE
C Y B E R R I S K
NOVEMBER/DECEMBER 2016 25
26 DIRECTOR JOURNAL
TECH IS NOT
ENOUGH
Clarifying the roles of the chief
information officer, the IT department
and management depends first
on defining an organization’s
cybersecurity strategy and objectives.
Those attributing responsibility for
cybersecurity to the IT department
and the CIO wrongly believe that
cybersecurity objectives are limited
to defending only against risks such
as hackers, viruses and malware. In
reality, a comprehensive cybersecurity
strategy extends far beyond these risks,
which means that technology on its own
cannot be a sufficient line of defence
against cyber risk.
Furthermore, research shows that
most data breaches are not technology
based, but are instead caused by physical
theft or loss of equipment, such as flash
drives and smartphones; “miscellaneous
errors,” such as e-mailing data to
the wrong person and unsecure
data disposal; and insider misuse by
employees with privileged data access. .
Third-party breaches are another
considerable cyber risk that technology
can only partly mitigate. The massive
data breach suffered by Target in 2014,
for example, resulted from the misuse
of a password provided to an HVAC
contractor.
While the primary causes of
data breaches will change over time,
concentrating an organization’s entire
cybersecurity strategy on a technology
response can leave it exposed to
unsatisfactory levels of residual cyber
risk. Identifying residual cyber risk is
a necessary part of effective cyber-risk
management and a growing governance
imperative.
% CAUSES OF DATA BREACH
29.4
Miscellaneous error
25.1
Crimewave
20.6
Insider misuse
15.3
Physical theft/loss
4.1
Web app attacks
3.9
Denial-of-service attacks
0.8
Cyber espionage
0.7
Point-of-sale intrusions
0.1
Payment card skimmers
26 DIRECTOR JOURNAL
C Y B E R R I S K
Source: Verizon Data Breach Report, 2015
NOVEMBER/DECEMBER 2016 27
IT’S ALL ABOUT
DISCIPLINE
So how can one proceed to identify
the full scope of cyber risk, and to
identify the roles needed for an effective
cyber defence? Basic risk management
discipline guides us here.
Risk identification
Reviewing network logs, forensic
audits and independent security reports
provides a structured way to identify
risks. Conversations with cybersecurity
vendors can prove useful. Analyzing
the organization’s tasks and activities,
business processes and data flows for
security vulnerabilities is also essential,
but often overlooked.
Objectives
Cybersecurity objectives are best
defined once all the risks have been
identified. The more detailed the
objectives, the better the risk response
design.
Risk assessment and response
Identified risks should be assessed
for severity, followed by the development
of risk controls in the form of mitigating
policies, procedures, standards,
guidelines and technology tools.
Corrective actions may be needed
for the affected business processes and
data flows, which could potentially
involve both the chief operating officer
and the CIO. New processes may also
need to be developed as part of the risk
response.
Employees and contractors require
specific training, as well as general
training that creates an enterprise-wide
awareness of cyber risk. Creating an
environment where all staff strengthen
the line of defence is more important
than ever, as regulators increasingly
demand that companies grasp the
importance of mitigating risk from the
ground up. Training and culture mean
that the chief human resources officer
(CHRO) must become a key player in
the defence against cyber risk.
Execution
Execution is monitored against
performance metrics while the strategy
is continually updated in the presence of
new information.
From a governance perspective,
how should a board respond to
management’s claims that cybersecurity
measures are in place? Ask for evidence.
If management cannot detail the risks
it is mitigating, is not able to map each
of these risks to an appropriate risk
response, or cannot talk about residual
risk, then the board should feel uneasy.
A risk identification and risk response
mapping document – in effect a cyber
risk register – is a key control.
SECURITY IS
EVERYONE’S JOB
Cybersecurity cannot be the
responsibility of the CIO alone, and
neither is technology a silver bullet for
all cyber risk. Not only the CIO, but
also the CHRO and the COO have roles
to play in an effective cyber strategy,
all of whom may report to the CEO.
The CHRO could also be a member of
the board’s HR committee, the CIO of
the ICT committee, and the COO of
the risk committee, all of which report
to the board along with the CEO.
Pinpointing responsibility for a breach
then depends on identifying whether
people, processes or technology are the
point of failure.
Ultimately, the reputation damage
from Yahoo’s data breach, and its
attempt to deflect blame from the board
and the CEO, likely exceeds what it
would have cost Yahoo to create a secure
environment in the first place. The New
York Times has suggested that security
spending at Yahoo was deprioritized,
perhaps in the context of Verizon’s
proposed US$4.8-billion acquisition
of Yahoo. How much Verizon’s offer
for Yahoo may fall following the
data breach disclosure – if it doesn’t
withdraw totally from the deal – would
quantify the damage. An offer of even
US$100-million less – effectively
a measure of the destruction of
shareholder value – would exceed what
it would have cost to properly secure
Yahoo. The lesson is clear: Effective
cybersecurity is far cheaper than the
alternative.
And what about that state-
sponsored attacker? There is nothing to
suggest that a diplomatic line of defence
– such as Canada is in the process of
securing with China, and as the United
States has already established – will
ever be an acceptable replacement for a
physical line of defence. History shows
that diplomacy is no deterrent to rogues,
and also that accords and treaties are
broken all the time. Since government
cannot offer business guarantees under
this model, the onus for a physical
line of defence still rests with the
corporation.
GUY PEARCE serves on the board of the
International Institute of Business Analysis and
is a consultant specializing in strategy, risk,
data and technology.
C Y B E R R I S K
This article originally appeared in the Director Journal, a publication of the Institute of Corporate Directors (ICD). Permission has been granted by the ICD to use this
article for non-commercial purposes including research, educational materials and online resources. Other uses, such as selling or licensing copies, are prohibited.

More Related Content

What's hot

DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014- Mark - Fullbright
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmDavid Sweigert
 
Risk neversleeps wps-016
Risk neversleeps wps-016Risk neversleeps wps-016
Risk neversleeps wps-016Jake Lepine
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 publishedNACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 publishedPrista Corporation
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 

What's hot (20)

DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
Risk neversleeps wps-016
Risk neversleeps wps-016Risk neversleeps wps-016
Risk neversleeps wps-016
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 publishedNACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 published
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 

Similar to Cybersecurity: Whose job is it anyway?

CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfVikashSinghBaghel1
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docxwrite30
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityPaul Ferrillo
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 

Similar to Cybersecurity: Whose job is it anyway? (20)

CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 

More from Guy Pearce

Governance: The key to effecting successful Digital Transformation
Governance: The key to effecting successful Digital TransformationGovernance: The key to effecting successful Digital Transformation
Governance: The key to effecting successful Digital TransformationGuy Pearce
 
Closing the gap between innovation intent and reality (corporate governance)
Closing the gap between innovation intent and reality (corporate governance)Closing the gap between innovation intent and reality (corporate governance)
Closing the gap between innovation intent and reality (corporate governance)Guy Pearce
 
Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)Guy Pearce
 
Leading enterprise-scale big data business outcomes
Leading enterprise-scale big data business outcomesLeading enterprise-scale big data business outcomes
Leading enterprise-scale big data business outcomesGuy Pearce
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeGuy Pearce
 
Creating $100 million from Big Data Analytics in Banking
Creating $100 million from Big Data Analytics in BankingCreating $100 million from Big Data Analytics in Banking
Creating $100 million from Big Data Analytics in BankingGuy Pearce
 
Branding In Banking And Finance 2011
Branding In Banking And Finance 2011Branding In Banking And Finance 2011
Branding In Banking And Finance 2011Guy Pearce
 
African Retail Banking Opportunities In The Brics And (1)
African Retail Banking Opportunities In The Brics And (1)African Retail Banking Opportunities In The Brics And (1)
African Retail Banking Opportunities In The Brics And (1)Guy Pearce
 
The relationship marketing advantage, ICSB Halifax, Canada, 2008
The relationship marketing advantage, ICSB Halifax, Canada, 2008The relationship marketing advantage, ICSB Halifax, Canada, 2008
The relationship marketing advantage, ICSB Halifax, Canada, 2008Guy Pearce
 
Marketing Science Conference on the SME use of banking products, Vancouver 2008
Marketing Science Conference on the SME use of banking products, Vancouver 2008 Marketing Science Conference on the SME use of banking products, Vancouver 2008
Marketing Science Conference on the SME use of banking products, Vancouver 2008 Guy Pearce
 
Academy of Marketing International Conference On Brand Management, Birmingham...
Academy of Marketing International Conference On Brand Management, Birmingham...Academy of Marketing International Conference On Brand Management, Birmingham...
Academy of Marketing International Conference On Brand Management, Birmingham...Guy Pearce
 
Emerging Market SME Turnaround in a Recession: Theory and Practice. Cincinnat...
Emerging Market SME Turnaround in a Recession: Theory and Practice. Cincinnat...Emerging Market SME Turnaround in a Recession: Theory and Practice. Cincinnat...
Emerging Market SME Turnaround in a Recession: Theory and Practice. Cincinnat...Guy Pearce
 

More from Guy Pearce (12)

Governance: The key to effecting successful Digital Transformation
Governance: The key to effecting successful Digital TransformationGovernance: The key to effecting successful Digital Transformation
Governance: The key to effecting successful Digital Transformation
 
Closing the gap between innovation intent and reality (corporate governance)
Closing the gap between innovation intent and reality (corporate governance)Closing the gap between innovation intent and reality (corporate governance)
Closing the gap between innovation intent and reality (corporate governance)
 
Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)
 
Leading enterprise-scale big data business outcomes
Leading enterprise-scale big data business outcomesLeading enterprise-scale big data business outcomes
Leading enterprise-scale big data business outcomes
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperative
 
Creating $100 million from Big Data Analytics in Banking
Creating $100 million from Big Data Analytics in BankingCreating $100 million from Big Data Analytics in Banking
Creating $100 million from Big Data Analytics in Banking
 
Branding In Banking And Finance 2011
Branding In Banking And Finance 2011Branding In Banking And Finance 2011
Branding In Banking And Finance 2011
 
African Retail Banking Opportunities In The Brics And (1)
African Retail Banking Opportunities In The Brics And (1)African Retail Banking Opportunities In The Brics And (1)
African Retail Banking Opportunities In The Brics And (1)
 
The relationship marketing advantage, ICSB Halifax, Canada, 2008
The relationship marketing advantage, ICSB Halifax, Canada, 2008The relationship marketing advantage, ICSB Halifax, Canada, 2008
The relationship marketing advantage, ICSB Halifax, Canada, 2008
 
Marketing Science Conference on the SME use of banking products, Vancouver 2008
Marketing Science Conference on the SME use of banking products, Vancouver 2008 Marketing Science Conference on the SME use of banking products, Vancouver 2008
Marketing Science Conference on the SME use of banking products, Vancouver 2008
 
Academy of Marketing International Conference On Brand Management, Birmingham...
Academy of Marketing International Conference On Brand Management, Birmingham...Academy of Marketing International Conference On Brand Management, Birmingham...
Academy of Marketing International Conference On Brand Management, Birmingham...
 
Emerging Market SME Turnaround in a Recession: Theory and Practice. Cincinnat...
Emerging Market SME Turnaround in a Recession: Theory and Practice. Cincinnat...Emerging Market SME Turnaround in a Recession: Theory and Practice. Cincinnat...
Emerging Market SME Turnaround in a Recession: Theory and Practice. Cincinnat...
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Cybersecurity: Whose job is it anyway?

  • 1. NOVEMBER/DECEMBER 2016 25 When Yahoo Inc. recently reported a data breach that involved the theft of 500 million clients’ records two years ago, the company laid the blame for the entire incident squarely on a foreign state. This finger pointing suggests that Yahoo sees the breach as an international relations matter, and that the company’s board, CEO and management team were innocent bystanders. Some speculate that Yahoo took this tack to reduce its culpability in any class-action lawsuits to follow. Regardless, the unacknowledged failure on the part of Yahoo means that some customers will be counting the cost of the breach for years, as their data linger on the Internet and the Dark Web, possibly forever. The outcry that followed Yahoo’s announcement demonstrates that the public sees the responsibility of corporate cybersecurity as being non-transferable from business. Indeed, what Yahoo did serves as a warning to others, and as a motivation to understand where the responsibility for cybersecurity really lies. Cybersecurity: Whose Job is it Anyway? GUY PEARCE C Y B E R R I S K NOVEMBER/DECEMBER 2016 25
  • 2. 26 DIRECTOR JOURNAL TECH IS NOT ENOUGH Clarifying the roles of the chief information officer, the IT department and management depends first on defining an organization’s cybersecurity strategy and objectives. Those attributing responsibility for cybersecurity to the IT department and the CIO wrongly believe that cybersecurity objectives are limited to defending only against risks such as hackers, viruses and malware. In reality, a comprehensive cybersecurity strategy extends far beyond these risks, which means that technology on its own cannot be a sufficient line of defence against cyber risk. Furthermore, research shows that most data breaches are not technology based, but are instead caused by physical theft or loss of equipment, such as flash drives and smartphones; “miscellaneous errors,” such as e-mailing data to the wrong person and unsecure data disposal; and insider misuse by employees with privileged data access. . Third-party breaches are another considerable cyber risk that technology can only partly mitigate. The massive data breach suffered by Target in 2014, for example, resulted from the misuse of a password provided to an HVAC contractor. While the primary causes of data breaches will change over time, concentrating an organization’s entire cybersecurity strategy on a technology response can leave it exposed to unsatisfactory levels of residual cyber risk. Identifying residual cyber risk is a necessary part of effective cyber-risk management and a growing governance imperative. % CAUSES OF DATA BREACH 29.4 Miscellaneous error 25.1 Crimewave 20.6 Insider misuse 15.3 Physical theft/loss 4.1 Web app attacks 3.9 Denial-of-service attacks 0.8 Cyber espionage 0.7 Point-of-sale intrusions 0.1 Payment card skimmers 26 DIRECTOR JOURNAL C Y B E R R I S K Source: Verizon Data Breach Report, 2015
  • 3. NOVEMBER/DECEMBER 2016 27 IT’S ALL ABOUT DISCIPLINE So how can one proceed to identify the full scope of cyber risk, and to identify the roles needed for an effective cyber defence? Basic risk management discipline guides us here. Risk identification Reviewing network logs, forensic audits and independent security reports provides a structured way to identify risks. Conversations with cybersecurity vendors can prove useful. Analyzing the organization’s tasks and activities, business processes and data flows for security vulnerabilities is also essential, but often overlooked. Objectives Cybersecurity objectives are best defined once all the risks have been identified. The more detailed the objectives, the better the risk response design. Risk assessment and response Identified risks should be assessed for severity, followed by the development of risk controls in the form of mitigating policies, procedures, standards, guidelines and technology tools. Corrective actions may be needed for the affected business processes and data flows, which could potentially involve both the chief operating officer and the CIO. New processes may also need to be developed as part of the risk response. Employees and contractors require specific training, as well as general training that creates an enterprise-wide awareness of cyber risk. Creating an environment where all staff strengthen the line of defence is more important than ever, as regulators increasingly demand that companies grasp the importance of mitigating risk from the ground up. Training and culture mean that the chief human resources officer (CHRO) must become a key player in the defence against cyber risk. Execution Execution is monitored against performance metrics while the strategy is continually updated in the presence of new information. From a governance perspective, how should a board respond to management’s claims that cybersecurity measures are in place? Ask for evidence. If management cannot detail the risks it is mitigating, is not able to map each of these risks to an appropriate risk response, or cannot talk about residual risk, then the board should feel uneasy. A risk identification and risk response mapping document – in effect a cyber risk register – is a key control. SECURITY IS EVERYONE’S JOB Cybersecurity cannot be the responsibility of the CIO alone, and neither is technology a silver bullet for all cyber risk. Not only the CIO, but also the CHRO and the COO have roles to play in an effective cyber strategy, all of whom may report to the CEO. The CHRO could also be a member of the board’s HR committee, the CIO of the ICT committee, and the COO of the risk committee, all of which report to the board along with the CEO. Pinpointing responsibility for a breach then depends on identifying whether people, processes or technology are the point of failure. Ultimately, the reputation damage from Yahoo’s data breach, and its attempt to deflect blame from the board and the CEO, likely exceeds what it would have cost Yahoo to create a secure environment in the first place. The New York Times has suggested that security spending at Yahoo was deprioritized, perhaps in the context of Verizon’s proposed US$4.8-billion acquisition of Yahoo. How much Verizon’s offer for Yahoo may fall following the data breach disclosure – if it doesn’t withdraw totally from the deal – would quantify the damage. An offer of even US$100-million less – effectively a measure of the destruction of shareholder value – would exceed what it would have cost to properly secure Yahoo. The lesson is clear: Effective cybersecurity is far cheaper than the alternative. And what about that state- sponsored attacker? There is nothing to suggest that a diplomatic line of defence – such as Canada is in the process of securing with China, and as the United States has already established – will ever be an acceptable replacement for a physical line of defence. History shows that diplomacy is no deterrent to rogues, and also that accords and treaties are broken all the time. Since government cannot offer business guarantees under this model, the onus for a physical line of defence still rests with the corporation. GUY PEARCE serves on the board of the International Institute of Business Analysis and is a consultant specializing in strategy, risk, data and technology. C Y B E R R I S K This article originally appeared in the Director Journal, a publication of the Institute of Corporate Directors (ICD). Permission has been granted by the ICD to use this article for non-commercial purposes including research, educational materials and online resources. Other uses, such as selling or licensing copies, are prohibited.