Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/5/2014
03:27 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail

Target Seeks New CIO

Data breach last year prompts CIO Beth Jacob to resign; Target will hire interim CIO and chief compliance officer.

9 Notorious Hackers Of 2013
9 Notorious Hackers Of 2013
(click image for larger view and for slideshow)

Target is looking for a new chief information officer following the resignation of CIO and executive VP of technology services Beth Jacob on Wednesday.

As the company's top technology executive, Jacob had responsibility for Target's computer systems and network, which succumbed to hackers late last year, enabling a massive data breach.

The breach began on Nov. 27, was confirmed on Dec. 15, and ended on Dec. 18. The company initially said 40 million credit and debit card accounts were affected, but its investigation subsequently revealed that a separate set of data, stored elsewhere and covering 70 million accounts, also had been stolen.

One of the largest retail data thefts ever, the incident contributed to a 40% decline in the profit reported by the company last month.

[Can a phone be snoop-proofed? Read FreedomPop Debuts Encrypted Snowden Phone. ]

Jacob started with Target in 1984 as an assistant buyer. She left in 2002 then returned to the company in 2006. She was appointed CIO in 2008.

In an emailed statement, Gregg Steinhafel, chairman, president and CEO of Target, confirmed that the company is seeking a new CIO. "While we are still in the process of an ongoing investigation, we recognize that the information security environment is evolving rapidly," he said. "To ensure that Target is well positioned following the data breach we suffered last year, we are undertaking an overhaul of our information security and compliance structure and practices at Target. As a first step in this effort, Target will be conducting an external search for an interim CIO who can help guide Target through this transformation."

Image credit: Jay Reed on Flickr.
Image credit: Jay Reed on Flickr.

Steinhafel said Target will be "elevating the role of the chief information security officer" and filling the position externally. He also said the company plans to look for a chief compliance officer outside the company. In addition, he said Target is working with Promontory Financial Group to assess its systems, infrastructure, business processes, and talent.

The new chief compliance officer position has been created in conjunction with a retirement: Target's current VP of assurance risk and compliance, Ann Scovil, previously planned to retire at the end of March, according to a company spokeswoman. As part of its effort to rebuild its information security infrastructure and processes, Target has decided to divide responsibility for assurance risk and compliance.

Beyond changes in personnel and processes, Target last month said it plans to invest $100 million to issue smart chip credit and debit cards and to equip its stores with the hardware to handle the technology.

Pen testing helps companies become more secure by finding and analyzing their insecurities, but pen test services can be fraught with their own kind of risk. In this Dark Reading report, Choosing, Managing And Evaluating A Penetration Testing Service, we recommend what to look for in a provider and its wares, how to get what you pay for, and how to ensure that pen testing itself doesn't open the company or its employees up to new risk. (Free registration required.)

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful ... View Full Bio

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Li Tan
Li Tan,
User Rank: Apprentice
3/9/2014 | 11:18:19 PM
Re: CIO or Chief Customer Officer?
Good point - we should have a know-how person in the enterprise, who has hands-on experience about security related technologies and the understanding about corportate security. CIO should not be the one who takes full security ownership.
Ariella
Ariella,
User Rank: Apprentice
3/6/2014 | 3:11:21 PM
Re: CIO or Chief Customer Officer?
@Alison that's an excellent point. Who has a greater need than a huge retailer with both physcial stores and an online presence?
Alison_Diana
Alison_Diana,
User Rank: Moderator
3/6/2014 | 10:28:43 AM
Re: Target seeks Beth Jacob replacement
If she fought for better security and was shot down, then it seems unfair. If security was low on her radar, then she was part of the problem that allowed hackers to break into the company and damage its sales and image. As a CIO, you play a bigger and bigger role in a company's image these days. Tech is a large part (both before and behind the scenes). Think websites, etail, apps, and partnerships with third-party apps like Shopkick, and it's clear how important tech is to actual transactions plus marketing and engagement. That's one reason CIOs must push hard for smart security spending. Even if boards don't agree, at least CIOs are on record if the unimaginable happens. 
Alison_Diana
Alison_Diana,
User Rank: Moderator
3/6/2014 | 10:24:51 AM
Re: CIO or Chief Customer Officer?
I am surprised a company as large as Target did not have a chief security officer. A CIO doesn't need to have hands-on experience with technology; they should know how an organization can use technology to differentiate the business. But a CSO or CISO must be well-versed in security technologies and understand how various solutions can safeguard employees, customers, and partners without impacting the experience.
Li Tan
Li Tan,
User Rank: Apprentice
3/6/2014 | 12:45:41 AM
Re: Target seeks Beth Jacob replacement
From this perspective, CIO is becoming a kind of job with higher and higher risk. You need to not only make the decision for IT infrastructure, but also take care of the operation and prevent any kind of security breach. If an accident happened, unfortunately you may risk your career.:-(
Charlie Babcock
Charlie Babcock,
User Rank: Ninja
3/5/2014 | 6:22:53 PM
Target seeks Beth Jacob replacement
Very hard to apportion blame from the outside. I'd be curous what an objective security expert, if there is such a thing, would say. The shops of some of the best people are broken into. But this decision to replace her will be noted by every CIO in the country and security will be tightened in many places,
WKash
WKash,
User Rank: Apprentice
3/5/2014 | 5:19:03 PM
Re: CIO or Chief Customer Officer?
Michael,  you make a good point here.  When you see what Amazon has done to retailing, even companies like Target have no choice but to morph into world class tech operations.
Michael Endler
Michael Endler,
User Rank: Apprentice
3/5/2014 | 5:07:43 PM
Re: CIO or Chief Customer Officer?
I think that's the case. Silicon Valley vendors are fond of saying that every company in the world will soon be a technology company. It's a good sales slogan when you're the one selling tech products and services-- but for any company the size of Target, it's also true.
WKash
WKash,
User Rank: Apprentice
3/5/2014 | 5:01:55 PM
Re: CIO or Chief Customer Officer?
Tom, I concede you're probably right.  The task of managing IT is so complex, being a good executive may no longer be enough.
Thomas Claburn
Thomas Claburn,
User Rank: Ninja
3/5/2014 | 4:32:10 PM
Re: CIO or Chief Customer Officer?
Target doesn't mention any specific technical credentials in her bio. I wonder whether anyone can be a truly effective CIO these days without also having the CTO skillset.
Page 1 / 2   >   >>
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file