Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Ashley Madison CEO Resigns
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
9/4/2015 | 5:39:26 AM
Re: C-suiters resigning
Other pertinent factors, I think, include the breadth/depth of the breach, and the vulnerabilities (both technical and cultural) that contributed to the breach.

Another important factor: crisis response.  Adobe presents a great example of what not to do.  With their major breach a while back, the company first estimated that just under 3 million customers had been impacted.  They later amended that number to at least 38 million.  Eventually, it was revealed that more than 150 million customers' information was compromised.

Not good for business.
rlynxwiler617
rlynxwiler617,
User Rank: Apprentice
9/1/2015 | 9:45:01 AM
Re: C-suiters resigning
Your two types of companies was exactly what i was thinking when i wrote my response.  If every company has been breached to some degree (and I believe most if not all have already been) then every CxO in the nation should be stepping down at some point in the next few months.  I don't think this individual would have stepped down except for the high media visibility (and, of course, their business purpose), which is why I'm proposing that public perception/press are undeniable factors in who steps down and who doesn't.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
8/31/2015 | 11:25:45 PM
Re: C-suiters resigning
On the one hand, I think your cause-and-effect analysis here is spot on.

On the other hand, there is a popular saying in the security community that I think holds true: "There are two types of organizations -- those that know they have been breached, and those that don't yet know they have been breached."

Which is to say that to a certain degree, hacks -- while mitigatable -- are not wholesale preventable.
SgS125
SgS125,
User Rank: Ninja
8/31/2015 | 11:42:18 AM
Re: C-suiters resigning
Or in some cases it's just a valid result of poor performance just like any other job.  There are consequesnces for not doing a good job at most employers, why should we treat the c level suite any different?
jamieinmontreal
jamieinmontreal,
User Rank: Strategist
8/31/2015 | 9:51:44 AM
Re: C-suiters resigning
This is true, but the effect is then to force other CxOs to look at their organization's security posture and liability differently.   If the buck stops at the CEO's door for a data breach the trickle down effect should be to force tighter security across the organisation.

The Board, in deciding that releasing the CEO port-breach is tacitly agreeing that breach prevention is a strategic, executive level responsibility.   This is no bad thing.
rlynxwiler617
rlynxwiler617,
User Rank: Apprentice
8/29/2015 | 12:34:57 PM
Re: C-suiters resigning
I wonder if it's not so much the gov't regulators as much as saving face with the public.  Maybe the perception is that if I lose the trust of the public because of a breach, I can regain some of that by punishing someone at the highest levels, someone who is more visible than a first line manager.  My experience is that regulators are more concerned with the nuts and bolts of control changes rather than some figure head getting fired.  Who knows.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
8/28/2015 | 11:12:30 PM
C-suiters resigning
One of the main reasons we see C-suiters resigning in the wake of data breaches is because of pressure from politicians and regulatory authorities, who want to see that the company is doing *something*.  Firing/asking the C(x)O to resign is a good step in that direction because it's usually a far preferable action than being subject to heightened regulatory scrutiny and sanctions.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-41340
PUBLISHED: 2022-09-24
The secp256k1-js package before 1.1.0 for Node.js implements ECDSA without required r and s validation, leading to signature forgery.
CVE-2022-23463
PUBLISHED: 2022-09-24
Nepxion Discovery is a solution for Spring Cloud. Discover is vulnerable to SpEL Injection in discovery-commons. DiscoveryExpressionResolver’s eval method is evaluating expression with a StandardEvaluationContext, allowing the expression to reach and interact with Java classes suc...
CVE-2022-23464
PUBLISHED: 2022-09-24
Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate’s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information...
CVE-2022-23461
PUBLISHED: 2022-09-24
Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds.
CVE-2022-36025
PUBLISHED: 2022-09-24
Besu is a Java-based Ethereum client. In versions newer than 22.1.3 and prior to 22.7.1, Besu is subject to an Incorrect Conversion between Numeric Types. An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incor...