Cyber Perspective – Executive, Board Accountability and Credit Rating

As cyber incidents and breaches becoming a routine activity, it has become a significant public interest issue and is now getting established as a mandate focus area on the sustenance of the business.

In matured enterprises, security function is driving differentiation on privacy, security, and assurance to its stakeholders, which is an enabler to their overall growth. Here CISO is in control of security and a key enabler to business.

In enterprises which are yet to mature on accountability and commitments, security function is considered as a mere compliance function on record with limited resources and lacks management commitment. Here CISO is a low-level manager at the risk of being ‘chief scapegoat officer’ surviving at the mercy of IT Manager or the best CIO or COO.

Cyberworld, business model and its threats have changed in recent years, new IT architectures, security controls, approaches required in this heterogeneous cloud environment to sustain effectively. Executives somehow seem to be missing to understand these changes and their impact on cybersecurity.

While CISO’s has the right intent to make things better, many a time a potential cyber incident is the trigger for attention from management, at least for the patch works to save the situation.

Few recent interventions from regulators and agencies may force right attention from the executives on adequate, effective cybersecurity and privacy in the enterprise in fulfilling their commitments to stakeholders on security, privacy and assurance.

Recently proposed “Corporate Executive Accountability Act” having Executives of large enterprises liable.

The Bills stated purpose is "...to establish criminal liability for negligent executive officers of major corporations...that affects the health, safety, finances or personal data... " of a significant number (not less than 1%) of individuals in the United States.

https://www.forbes.com/sites/bobzukis/2019/04/10/regulators-want-ceos-to-go-to-jail-for-cyber-failings-should-you/#71a547a219fa

Stakeholders expect, Board’s responsibility, accountability, and oversight on potential Cyber and Privacy risk by having proper governance, policy and systems to ensure information and systems safeguarded at all time through its lifecycle

Now the recent intervention, Credit agencies. 

"warns that cyber defenses as well as breach detection, prevention and response will be higher priorities in its analysis of the creditworthiness of companies across all sectors, including healthcare and financial services".

https://www.bankinfosecurity.com/moodys-warns-cyber-risks-could-impact-credit-ratings-a-8702

https://www.cnbc.com/2019/05/22/moodys-downgrades-equifax-outlook-to-negative-cites-cybersecurity.html

Cost saving by reducing security and privacy spent is not the right approach since the cost and impact of a breach or incident is multifold and everlasting. 

Cyber risk and events are real and can happen to anyone at any time if required importance and priority is not given on a continues basis. CISO's are fighting a battle internally to get attention, resources, support, authority, changes, investments, executive support...

Right executive intervention and prioritization is the need of the hour!

Pradeep Krishnan Nair

Assistant Director Information security, CISSP, PMP, ISO 27001 LA

5 年

well said

回复

Agree with the tone at the top approach.

要查看或添加评论,请登录

Sunil Varkey的更多文章

  • Building an Application Security Program - A high level approach

    Building an Application Security Program - A high level approach

    The majority of the security incident category in recent time is related to exploits of vulnerabilities or…

    18 条评论
  • Fishing in Muddy Water

    Fishing in Muddy Water

    Most of the enterprise networks are too noisy, with huge volume of bad traffics getting denied at host of systems…

    4 条评论
  • 2021 Security Predictions

    2021 Security Predictions

    Security events triggered by Solarwinds episode and others, will trigger revalidation of security strategy, mainly on…

    21 条评论
  • Elephants, Tigers and Snakes

    Elephants, Tigers and Snakes

    Many incident handlers and analysts defend cyber-attacks with a 'One size fits all' standard response, which most of…

    2 条评论
  • 2020 Cyber Security – Strategy Considerations

    2020 Cyber Security – Strategy Considerations

    With the new financial year, Cybersecurity strategy and budget discussions are now in the finalising stage at…

    3 条评论
  • Blueprint, your Digital Estate

    Blueprint, your Digital Estate

    For any digital environment to sustain and to be defensible, there are few principles, hygiene, DNA it needs to…

    1 条评论
  • Persona based Adaptive security

    Persona based Adaptive security

    In the interconnected cyber world, access and privileges to sensitive information and critical infrastructure…

    3 条评论
  • Cyber Crisis Communication – A Key factor in Incident Response

    Cyber Crisis Communication – A Key factor in Incident Response

    With incident and crisis becoming a routine activity in the Cyberworld, communications with stakeholders during various…

    5 条评论
  • Leverage Digital Forensic resources effectively

    Leverage Digital Forensic resources effectively

    With many universities offering master's in digital forensics study and with other training, the supply of forensics…

    7 条评论
  • Time based Security - Relevance

    Time based Security - Relevance

    One of the fundamental principles of security is to understand the criticality of the asset to be safeguarded, its…

    6 条评论

社区洞察

其他会员也浏览了