In the past 12 months, we have seen one massive corporate security breach after another. Major retailers (Target, Home Depot, Neiman Marcus, Sony), e-commerce sites (eBay) and financial institutions (JPMorgan) have all been victims.
Taken individually, digital security breaches serve as a warning for executives and security professionals to remain vigilant. However, when every major breach shares the same telltale strategy, it is a sign that there is something more fundamentally broken in enterprise security that must be addressed.
There are several important similarities in these attacks, all suggesting that your company’s data security protections need stronger oversight.
Security looks for the first step, but misses the life cycle of an attack. Traditional online security structures attempt to detect and block malicious payloads (either a piece of malware or vulnerability exploit). In a modern attack, the initial compromise is just a means to a much larger end. The vast majority of security technologies are not designed to see the so-called “long con” of an attack. Even though the security industry continues to develop more and more advanced methods of detecting individual pieces of malware, there is still little ability to see the larger attack that follows the initial malware attack.
There are infinite opportunities for security systems to fail. As computing and business have evolved, the “attackable” areas of enterprises have become nearly impossible to secure. Employees use mobile devices that are routinely outside corporate firewalls. Corporate applications and data are increasingly both inside and outside the perimeter.
Online security has become incredibly complicated, and corporate directors may not even know the fundamental distinctions between the various types of online intrusions.
Boards need to understand that they are supposed to be offering oversight on these risks as part of their fiduciary duties. They must ensure that there are internal controls in place to protect their corporation’s cyberassets. The stakes are high; a study found that up to $21 trillion in global assets could be at risk from cybercrime. A solid board structure is needed for monitoring and managing cyberrisk in the company.
To begin, I recommend a series of committee briefings so that “cybersecurity” is demystified and better understood. However, given the complexity and dangers involved, I think the time has come for boards to create dedicated cybersecurity technology committees.
It is crucial that boards require management to present their policies on cybersecurity and request that management write up their security practices and standards and their protocol for responding to a security breach. Boards should be able to identify the manager responsible by title, and in what time frame he or she is to respond to an intrusion.
In the event of a cyberbreach, the board should then schedule an update from the security committee on any forensic review. The company may need to disclose any data breach in SEC filings if the breach was material. Your board might be surprised to find out that a court considers failure to disclose a cyberattack as a “material omission,” according to some interpretations of new SEC guidance on disclosure.
Shaping Your CyberBoard
Board action items for cybersecurity:
” Management needs to encourage the board to fully embrace cybersecurity as a governance oversight responsibility. The board needs information and training on cybersecurity issues so they are not seen as too complex or technical, outstripping the board’s ability to exercise oversight.
” The board should consider whether a change needs to be made in the way cybersecurity oversight is currently handled at the board level. Is there a need for a new security compliance committee?
” The board may require new candidates with computer security backgrounds in the director nomination process.
” Given the risk exposure involved, the board should work with the general counsel to determine the extent to which existing directors and officers” insurance coverage provides protection.
” For the board to exercise effective oversight, directors will need an understanding of what matters are properly reserved to the CIO, what matters require board awareness and what matters require board/committee oversight, action and/or approval.
Boards must get out in front of cybersecurity and create clear policies to proactively address this very real risk. ?
Betsy Atkins is the founder of venture capital firm Baja LLC and former CEO and chairman of Clear Standards Inc. Her current board memberships include Polycom Inc., HD Supply, Darden Restaurants and Schneider Electric SA. Contact her at betsyatkins.wix.com/betsyatkins.