Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

5/8/2018
02:00 PM
Jeremy Wittkop
Jeremy Wittkop
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv

Properly Framing the Cost of a Data Breach

The expenses and actions typically associated with a cyberattack are not all created equal. Here's how to explain what's important to the C-suite and board.
1 of 2

Comment  | 
Print  | 
Comments
Threaded  |  Newest First  |  Oldest First
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
5/8/2018 | 2:22:01 PM
All good points .... but
Remember the attitude of the Equifax C-Suite when the CEO blamed the entire catastrophe on ONE, JUST ONE, IT staffer who failed to perform an update.  Lunacy and ignorance all combined into one stupid comment.  If THIS is the attitude and understanding C-Suite has of IT as a business practice, then all your points are worthless.  Oh, BTW - staffers are always cheaper in Bangalore too. 
jeremy_wittkop
100%
0%
jeremy_wittkop,
User Rank: Author
5/9/2018 | 2:58:01 PM
Re: All good points .... but
Thank you for the comment! I understand the frustration when ridiculous comments such as that are made by members of leadership who should know that if one individual can cause the entire program to fail, it is the program that is broken. I also understand the frustration of the general public when Equifax's board of directors were re-elected after the breach. I would suggest that the root of the problem with Equifax is that they have a business model that is compulsory for data subjects. These types of issues are the reason that data privacy regulations are being passed in major markets around the world.

I would suggest from my conversations with executive leadership that organizations that must ask for permission from data subjects to gather their information and who ultimately must win their business, that those organizations are much more sensitive to how they handle personal information. Ultimately, we are in a consumer-driven economy. If the general public decides that they ways in which companies secure their personal data will impact their purchasing decisions, the business community will identify those trends and respond accordingly.
managedoutsource
50%
50%
managedoutsource,
User Rank: Apprentice
6/18/2018 | 5:01:35 AM
Thank you for sharing
While all kinds of data breach can be expensive, it was great for this article to break this down for better understanding.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13386
PUBLISHED: 2020-05-27
In SmartDraw 2020 27.0.0.0, the installer gives inherited write permissions to the Authenticated Users group on the SmartDraw 2020 installation folder. Additionally, when the product is installed, two scheduled tasks are created on the machine, SDMsgUpdate (Local) and SDMsgUpdate (TE). The scheduled...
CVE-2019-20806
PUBLISHED: 2020-05-27
An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.
CVE-2020-10737
PUBLISHED: 2020-05-27
A race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the hom...
CVE-2020-13622
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
CVE-2020-13623
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation.