Threat Intelligence

9/8/2017
10:06 AM
50%
50%

38% of Attorneys Fail to Disclose Cybersecurity Issues to Board

Directors increasingly find themselves held accountable for cybersecurity breaches at their companies.

Despite a movement to hold company directors responsible for security breaches at their organization, nearly 40% of in-house attorneys and general counsel fail to disclose security issues h to their board, according to a survey by ALM Intelligence and law firm Morrison & Foerster.

The survey of 200 in-house attorneys and general counsel also found that 14% of respondents will inform their board of security matters less often than once a year.

"Cybersecurity oversight has also moved to the boardroom, where directors are expected to be accountable for cyber matters, but, we discovered, are often not briefed on these issues regularly enough," says Miriam Wugmeister, a Morrison & Foerster partner, in a statement. "With high-profile data security incidents constantly in the news, including a wave of recent global ransomware attacks, regular board reporting is a key component of an organization’s readiness plan."

The survey also found 24% of respondents indicated their companies were hit with a ransomware attack in the past year. Meanwhile, 36% of survey respondents noted their organizations lacked a crisis management plan and only 3% of respondents believed their companies were "well prepared" to take on a crisis, according to the survey.

Read more about the survey here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/8/2017 | 10:53:17 AM
The Land of Lawyers
Another interesting spot-on article, and no lawyer would enjoy informing board or client (billing out time at $250 an hour if an outside practitioner) of cyber security threats - because of the simple fact that this can invoke A LAWSUIT against the lawyer!  BEST practice in their eye is to SHUT THE MOUTH and let the old IT guys in the corner take care of that one.  BLAME THEM if something goes wrong, as it will.  As for DR plans, I have seen binders on a shelf with a plan started and updated 7 years prior.  True.  Oh, has your business CHANGED? since July of 2007???  Betcha it has indeed, so that plan is a pile of tripe now.   Again, lawsuit territory.  Lawyers avoid bad news like the plague. 
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Symantec Intros USB Scanning Tool for ICS Operators
Jai Vijayan, Freelance writer,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I guess this answers the question: who's watching the watchers?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10008
PUBLISHED: 2018-12-10
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended...
CVE-2018-10008
PUBLISHED: 2018-12-10
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace br...
CVE-2018-10008
PUBLISHED: 2018-12-10
A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jen...
CVE-2018-10008
PUBLISHED: 2018-12-10
A denial of service vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.
CVE-2018-10008
PUBLISHED: 2018-12-10
A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy san...