Endpoint

11/6/2017
12:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Majority of Legal Departments Play Heavy Role in Data Security Risks Response

Survey explores general counsels' views on regulatory risk management and risk assessments to cybersecurity and data analytics.

Successful organizations understand that risk management is not just a compliance exercise but an opportunity to gain a competitive advantage. More than ever, legal departments are playing a significant role in managing risk and monitoring its effectiveness, especially in the critical area of cybersecurity.

Grant Thornton and Corporate Counsel magazine recently surveyed over 190 corporate general counsel to assess their views on the keys to business growth. The topics ranged from regulatory risk management and risk assessments to cybersecurity and data analytics. Below are a sampling of insights from Grant Thornton’s 2017 Corporate General Counsel Survey:

  • 58% of legal departments are highly involved in responding to data security risks; nearly a quarter have primary responsibility for the issue
  • Less than a quarter of counsel are very satisfied with their organizaton’s risk assessment
  • Nearly three-quarters of legal departments cite cyber issues as a top risk.
  • Of those very concerned about data security, only about a third feel adequately prepared


As a result of increasing risk concerns, the role of the corporate general counsel continues to evolve to include new, important areas of focus and responsibilities.  While maintaining a firm handle on the traditional functions of the legal department, the survey reveals that their role is increasingly concerned with regulation and compliance, as well as data privacy and related cybersecurity issues. 

Download Grant Thornton’s 2017 Corporate General Counsel Survey report to gain more insights

Learn more:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-8656
PUBLISHED: 2018-05-22
Jboss jbossas before versions 5.2.0-23, 6.4.13, 7.0.5 is vulnerable to an unsafe file handling in the jboss init script which could result in local privilege escalation.
CVE-2017-2609
PUBLISHED: 2018-05-22
jenkins before versions 2.44, 2.32.2 is vulnerable to an information disclosure vulnerability in search suggestions (SECURITY-385). The autocomplete feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to.
CVE-2017-2617
PUBLISHED: 2018-05-22
hawtio before version 1.5.5 is vulnerable to remote code execution via file upload. An attacker could use this vulnerability to upload a crafted file which could be executed on a target machine where hawtio is deployed.
CVE-2018-11372
PUBLISHED: 2018-05-22
iScripts eSwap v2.4 has SQL injection via the wishlistdetailed.php User Panel ToId parameter.
CVE-2018-11373
PUBLISHED: 2018-05-22
iScripts eSwap v2.4 has SQL injection via the "salelistdetailed.php" User Panel ToId parameter.