Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Global CISO: Why U.S. Leaders Must Think Beyond Borders
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
10/30/2015 | 11:39:47 AM
Re: Good depiction of the current state
Companies stateside *have* to follow HIPAA (because it is the law for those companies in the healthcare and life sciences sectors) and the NIST Cybersecurity Framework (because, while not the law per se, is required for government contractors and subcontractors, and is used by regulatory agencies such as the SEC, the CFTC, the FTC, and so on as a yardstick) as a matter of course.  There is so many regulatory burdens that, for many, throwing in additional rubrics is unpalatable.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
10/30/2015 | 11:36:22 AM
Really, the "non-binary mentality" is simply a way of looking at cybersecurity as one piece of the risk management pie.  Security is constantly at odds with accessibility, and compliance issues further complicate all of that.  All of these come down to ROI and risk -- and, yes, many American execs that I meet and discuss these issues with are, at first, reluctant to look at security that way.
[email protected],
User Rank: Apprentice
10/29/2015 | 9:05:50 AM
Good depiction of the current state
Well written article Kal, thanks for sharing.

"Binary mentality" really puts it as it is.  Another good example is the typical legal term used in the US: "... including but not limited to ... LIST OF 25 EXAMPLES..." - my challenge for you: if it is not limited to, why do you list it in the first place :-) ?

Also, most companies and people here in the US only understand US culture - and think it's always the best and only.  Not true.  There are plenty of good cultures and well educated people and viewpoints in many other countries, too. 

On the subject, the ISO27001ff framework is the best international security standard so far - but most US com\panies focus on NIST or HIPAA or FIPS or FISMA etc.  ITIL (ISO20000) is a well established change management control standard but few have heard of it. 

On privacy, the US is looking like the fiethdoms in middle Europe in the 15th century - no federal privacy law, 48(?) various state laws, no true protection from government and NSA snooping, and zero protection while at work ("no expectation of privacy") anyway.

Well, the latest developments from the highest EU court to invalidate safe harbor for any data transfer from the EU into the US may ring in a bell in Washington.  Or, maybe we'll wait until January and enforcement kicks in.
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.
PUBLISHED: 2021-10-15
Yealink Device Management (DM) allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
PUBLISHED: 2021-10-15
IBM Cognos Analytics 11.1.7 and 11.2.0 contains locally cached browser data, that could allow a local attacker to obtain sensitive information.
PUBLISHED: 2021-10-15
Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h in stb 2.26 via a crafted JPEG file.