Threat Intelligence

9/8/2017
10:06 AM
50%
50%

38% of Attorneys Fail to Disclose Cybersecurity Issues to Board

Directors increasingly find themselves held accountable for cybersecurity breaches at their companies.

Despite a movement to hold company directors responsible for security breaches at their organization, nearly 40% of in-house attorneys and general counsel fail to disclose security issues h to their board, according to a survey by ALM Intelligence and law firm Morrison & Foerster.

The survey of 200 in-house attorneys and general counsel also found that 14% of respondents will inform their board of security matters less often than once a year.

"Cybersecurity oversight has also moved to the boardroom, where directors are expected to be accountable for cyber matters, but, we discovered, are often not briefed on these issues regularly enough," says Miriam Wugmeister, a Morrison & Foerster partner, in a statement. "With high-profile data security incidents constantly in the news, including a wave of recent global ransomware attacks, regular board reporting is a key component of an organization’s readiness plan."

The survey also found 24% of respondents indicated their companies were hit with a ransomware attack in the past year. Meanwhile, 36% of survey respondents noted their organizations lacked a crisis management plan and only 3% of respondents believed their companies were "well prepared" to take on a crisis, according to the survey.

Read more about the survey here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/8/2017 | 10:53:17 AM
The Land of Lawyers
Another interesting spot-on article, and no lawyer would enjoy informing board or client (billing out time at $250 an hour if an outside practitioner) of cyber security threats - because of the simple fact that this can invoke A LAWSUIT against the lawyer!  BEST practice in their eye is to SHUT THE MOUTH and let the old IT guys in the corner take care of that one.  BLAME THEM if something goes wrong, as it will.  As for DR plans, I have seen binders on a shelf with a plan started and updated 7 years prior.  True.  Oh, has your business CHANGED? since July of 2007???  Betcha it has indeed, so that plan is a pile of tripe now.   Again, lawsuit territory.  Lawyers avoid bad news like the plague. 
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11498
PUBLISHED: 2019-04-24
WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
CVE-2019-11490
PUBLISHED: 2019-04-24
An issue was discovered in Npcap 0.992. Sending a malformed .pcap file with the loopback adapter using either pcap_sendqueue_queue() or pcap_sendqueue_transmit() results in kernel pool corruption. This could lead to arbitrary code executing inside the Windows kernel and allow escalation of privilege...
CVE-2019-11486
PUBLISHED: 2019-04-23
The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
CVE-2019-11487
PUBLISHED: 2019-04-23
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hu...
CVE-2018-7576
PUBLISHED: 2019-04-23
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent.