Operations
6/1/2015
05:00 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Board Rooms Becoming More Security-Savvy

Thirty-five percent say they discuss cybersecurity at every board meeting, a Veracode-NYSE survey says.

Board rooms are becoming more sophisticated about cybersecurity, creating new opportunities for CISOs to lead, according to a recent survey of 200 directors of public companies, conducted by NYSE Governance Services and Veracode.

The unfortunate news is that 66 percent of survey respondents are "less than confident" that their companies are properly secured against cyberattacks. The good news, though, is that these directors seem to be taking action.

Over 80 percent of respondents said that cybersecurity is frequently discusssed at board meetings -- 46 percent said "most meetings," and 35 percent said "every meeting."

"Hopefully the other 20 percent will read this report and say 'we're being negligent,'" says Chris Wysopal, CTO and CISO of Veracode.

They're also elevating responsibility for security -- so that the security officer is no longer the scapegoat. When asked who is held accountable for a data breach, respondents' number one answer was CEO; that was followed, in descending order, by CIO, entire executive team, CISO, and board members.

Over 70 percent of repondents are significantly concerned about the risk of third-party software in their supply chains.

They're also shifting away from a compliance-focused approach to a more risk-based, strategic approach. Only 9 percent of respondents said they prefered CISOs to present cybersecurity information by "audit and compliance status," while 33 percent preferred "high-level security strategy descriptions" and 31 percent preferred "risk metrics."

"They're starting to think about the right issues," says Wysopal. "The place where we saw a bit of a disconnect was on brand damage. They didn't connect" brand damage with the security of the products and service their own company makes.

As he explains, respondents' number one fear regarding cyberattacks was "brand damage due to customer loss" -- moreso than costs of responding to incidents, corporate espionage, or compliance violations. Yet, Wysopal says organizations don't adequately consider the brand damage that could be done by putting a highly vulnerable or even malicious application on the market.

Respondents ranked security risks second to last in their list of concerns when introducing a new product or service to market, behind development costs, competitive differentiation, and revenue potential (but ahead of marketing costs).

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
6/1/2015 | 7:38:24 PM
American Board Rooms: Add Security to the Docket
 I am really glad to hear this - no worry C-suits, there will still be enough time to talk about stock options, expense reimbursements and quarterly bonuses ....
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Get Serious about IoT Security
Derek Manky, Global Security Strategist, Fortinet,  9/20/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The Dark Reading Security Spending Survey
The Dark Reading Security Spending Survey
Enterprises are spending an unprecedented amount of money on IT security where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download the report and find out what they had to say.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.