containing-the-career-impact-of-cybercrime-_pdf_final

4
Sony Pictures Entertainment, the U.S. Office of Personnel Management, Bangladesh Bank, the State of Texas, Ashley Madison, Target: these are a few of the organizations where top or senior- level executives have resigned or been fired in the wake of fallout from major cybersecurity breaches. So should executives everywhere worry about their careers in light of increasingly damaging and sophisticated attacks? Security industry experts say that the nature and complexity of today’s cyberattacks are beyond the scope of even the largest companies. “It seems unreasonable to expect companies to prevent every sophisticated attack, especially targeted attacks by state actors,” notes Kevin Mandia, CEO of FireEye, a global cybersecurity company. A recent study by FireEye indicated that 2015 saw a rise in the number of disruptive attacks, in which hackers hold information for ransom, delete critical data, post sensitive company information on the Internet, or add malicious code to a source- code repository. The research also uncovered an increase in the bulk export of personally identifiable information (PII) from targeted companies by Chinese cybercriminals. Such breaches are hitting corporations where it hurts the most: the bottom line. Bangladesh Bank, which recently experienced a breach resulting in the loss of a staggering $81 million, is just one example of the potential scope of the risk today. In many such cases, the cybercriminals are never caught or prosecuted because it’s so difficult to track them down. Underground networks of sophisticated hackers can launch an attack from anywhere in the world, using other countries and even other companies to hide what they’re doing, says Arthur Wong, senior vice president and general manager, Hewlett Packard Enterprise (HPE) Security Services. All too often, company executives are blamed instead. Often, the CIO or CISO of a midsize—or even a large—company lacks the same level of resources that hackers have. As a result, “it’s an unfair fight, and you can’t make them responsible for it,” Wong says. But that doesn’t mean that companies and shareholders won’t hold executives responsible, he adds. Containing the Career Impact of Cybercrime Cyberattacks don’t just devastate businesses; they sometimes destroy careers as well. Here are five tactics executives can employ to protect their organizations—and their own reputations. 42% Percentage of business and IT leaders who say their organizations’ top executives don’t understand what’s needed to improve cybersecurity 16% Percentage who couldn’t gauge their C-suites’ cybersecurity knowledge Source: Cybersecurity Challenges, Risks, Trends and Impacts Survey, MIT Technology Review Custom in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc., 2016 Even if C-level executives don’t actually make the decisions that lead to security breaches, they may well ultimately shoulder the blame. 1 The Cybersecurity Challenge MIT Technology Review Custom by MIT Technology Review Custom, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.

Upload: kristi-houssiere

Post on 14-Feb-2017

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Containing-the-career-impact-of-cybercrime-_PDF_FINAL

Sony Pictures Entertainment, the U.S. Office of Personnel Management, Bangladesh Bank, the State of Texas, Ashley Madison, Target: these are a few of the organizations where top or senior-level executives have resigned or been fired in the wake of fallout from major cybersecurity breaches. So should executives everywhere worry about their careers in light of increasingly damaging and sophisticated attacks?

Security industry experts say that the nature and complexity of today’s cyberattacks are beyond the scope of even the largest companies. “It seems unreasonable to expect companies to prevent every sophisticated attack, especially targeted attacks by state actors,” notes Kevin Mandia, CEO of FireEye, a global cybersecurity company.

A recent study by FireEye indicated that 2015 saw a rise in the number of disruptive attacks, in which hackers hold information for ransom, delete

critical data, post sensitive company information on the Internet, or add malicious code to a source-code repository. The research also uncovered an increase in the bulk export of personally identifiable information (PII) from targeted companies by Chinese cybercriminals.

Such breaches are hitting corporations where it hurts the most: the bottom line. Bangladesh Bank, which recently experienced a breach resulting in the loss of a staggering $81 million, is just one example of the potential scope of the risk today.

In many such cases, the cybercriminals are never caught or prosecuted because it’s so difficult to track them down. Underground networks of sophisticated hackers can launch an attack from anywhere in the world, using other countries and even other companies to hide what they’re doing, says Arthur Wong, senior vice president and general manager, Hewlett Packard Enterprise (HPE) Security Services. All too often, company executives are blamed instead.

Often, the CIO or CISO of a midsize—or even a large—company lacks the same level of resources that hackers have. As a result, “it’s an unfair fight, and you can’t make them responsible for it,” Wong says. But that doesn’t mean that companies and shareholders won’t hold executives responsible, he adds.

Containing the Career Impact of CybercrimeCyberattacks don’t just devastate businesses; they sometimes destroy careers as well. Here are five tactics executives can employ to protect their organizations—and their own reputations.

42%Percentage of business and IT leaders who say their organizations’ top executives don’t understand what’s needed to improve cybersecurity

16%Percentage who couldn’t gauge their C-suites’ cybersecurity knowledge

Source: Cybersecurity Challenges, Risks, Trends and Impacts Survey, MIT Technology Review Custom in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc., 2016

Even if C-level executives don’t actually make the decisions that lead to security breaches, they may well ultimately shoulder the blame.

1

The Cybersecurity ChallengeMIT Technology Review Custom

by MIT Technology Review Custom, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.

Page 2: Containing-the-career-impact-of-cybercrime-_PDF_FINAL

Battling the hackers may seem like a lost cause when some can penetrate major financial institutions and government agencies with seemingly relative ease. Yet with the right preparation, executives from CISOs to board members can help mitigate damage from breaches, even if they can’t prevent them entirely. Following are five tactics for protecting your organization—and your career—from cybersecurity disaster.

1. Create a Risk ProfileEvery industry, and every organization, faces different security risks. Begin by assessing your organization’s risk level and what capabilities are in place for preventing and responding to an attack, including budget and staff. That knowledge will serve as a road map for creating cybersecurity prevention, detection, response, and recovery plans.

After that, it’s a matter of objectives. Mandia recommends identifying six or seven types of events that you believe would be catastrophic for your company. Next, determine what your organization is doing to combat those threats, whether it’s mitigating the risk of people stealing credit-card data or preventing somebody from hacking into the CEO’s email account. The latter would warrant providing higher levels of security for C-level accounts than those for lower-level employees. “We work with companies to figure out what are your assets that matter most, so you can build a secure enclave around those,” Mandia says.

2. Engage the CEOMore than 42 percent of the business and IT leaders who participated in a February 2016 survey indicated that senior executives in their companies didn’t understand the amount of time and resources needed to mitigate risk and minimize threat exposure, while 16 percent couldn’t gauge executive awareness. (MIT Technology Review Custom conducted the Cybersecurity Challenges, Risks, Trends, and Impacts Survey in partnership with HPE and FireEye.)

“CEOs need to have a much more active role in understanding what is being done, and the level of diligence that is occurring in their organizations, to protect against cyberattacks,” Wong notes. Even if C-level executives don’t actually make the decisions that lead to security breaches, they may well ultimately shoulder the blame.

CEOs shouldn’t, however, be expected to become security experts: that’s the job of the CISO. Instead, “the CEO’s goal is to make sure they hire the best person they can, one who can best implement a plan for the company’s risk profile,” Mandia says.

3. Elevate Cybersecurity Roles and SpendingA growing number of CISOs today report to executives outside the IT department, Wong says. “We see many CISOs reporting to a risk leader, if there is one in the company, or to the CFO, or even to legal,” he says. The trend reflects an increasing understanding that security is no longer just an IT function, because the potential damage from security breaches extends well beyond IT. “Breaches can impact the business, the market capitalization of the company, the brand,” Wong says.

Beyond elevating the CISO’s role, many companies need to boost their investments in security technology and personnel. Wong advises that organizations allocate at least 8 to 10 percent of their total IT budgets to security, but acknowledges that many still spend less.

38%Percentage of business and IT leaders whose organizations spend less than 5% of their IT budgets on cybersecurity

34%Percentage who don’t know how much their organizations spend on cybersecurity

Source: Cybersecurity Challenges, Risks, Trends and Impacts Survey, MIT Technology Review Custom in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc., 2016

“CEOs need to have a much more active role in understanding what is being done, and the level of diligence that is occurring in their organizations, to protect against cyberattacks.” — Arthur Wong, Senior Vice President and

General Manager, Hewlett Packard Enterprise (HPE) Security Services

2

The Cybersecurity ChallengeMIT Technology Review Custom

Page 3: Containing-the-career-impact-of-cybercrime-_PDF_FINAL

The Cybersecurity Challenges, Risks, Trends, and Impacts Survey reached a similar conclusion. Fully 38 percent of the 225 business and IT leaders surveyed spent less than 5 percent of their IT budgets on cybersecurity, with just 15 percent estimating such spending at 5 to 10 percent. Only 9 percent reported allocating 10 to 15 percent of their IT budgets for cybersecurity, and just 4 percent estimated spending more than 15 percent. Most of the rest didn’t know what their organizations spent on cybersecurity, a clear indicator that maybe it’s time to find out.

4. Understand the Risks and Ramifications—and Pinpoint the GapsCIOs, CEOs, and other corporate officers may wonder whether they need lawyers to represent them in the case of a breach. And, in fact, some law firms offer breach-preparedness services focused on helping executives understand what they need to know before, during, and after a breach, Wong says.

Still, CIOs, CISOs, and other executives typically don’t get dragged into court as witnesses following a breach. “Currently, it is more the norm that there is no lawsuit—or if there is, it’s settled before any sort of trial occurs,” Mandia says. “The advice that I give to boards is: if something bad happens to your organization in cyberspace, you want to be postured to withstand any third-party inspections.” That means answering detailed questions from investigators about the security program and efforts an organization had in place before and during an incident.

Wong recommends that organizations focus on ensuring that:

• Their companies are in compliance with industry regulations.

• Their boards and executives fully understand the risks associated with security breaches.

• They have developed metrics quantifying known gaps.

• They have instituted plans and made resources available for bridging those gaps.

Specifically, organizations must know where their critical data is and how it’s secured. They must continually assess risks, and they must identify and raise the awareness of their high-risk users. And, of course, they must vigilantly monitor users, applications, and data—and the interactions between them.

5. Seek Expert PartnersIt isn’t always sensible, or possible, to build and maintain your fortress alone. An experienced partner can make the job easier by, for instance, providing expert assistance with risk assessment and transformation plans.

“We help people step through how to meet the objectives of their cybersecurity programs, and we respond to virtually every security breach that matters,” says Mandia of FireEye, whose six global operations centers provide constant detection and response to more than 4,400 customers. “That gives you a vantage point of what technology works and doesn’t work as promised, and what the threats actually are today. If there’s a whole bunch of breaches in a certain industry, we can advise very relevant threat intelligence.”

HPE helps clients assess risk, build, architect, design, and implement resilient systems and infrastructure; for those seeking more, it can manage security operations entirely. The company maintains 10 security operations centers worldwide, with 5,000 security professionals serving 10,000 clients. As Wong puts it: “There’s

81millionBangladesh Bank’s loss from a March 2016 security breach

“The advice that I give to boards is: if something bad happens to your organization in cyberspace, you want to be postured to withstand any third-party inspections.”— Kevin Mandia, CEO, FireEye

3

The Cybersecurity ChallengeMIT Technology Review Custom

Page 4: Containing-the-career-impact-of-cybercrime-_PDF_FINAL

a shortage of security skills and security knowledge around the world, and we help protect customers from threats out there better than they can protect themselves.”

Ultimately, choosing the right partner can help senior executives and their boards navigate cybersecurity challenges, protecting not only their organizations, but their careers as well.

To learn more about cybersecurity and digital transformation, please explore this HPE–FireEye resource website.

About MIT Technology Review Custom

Built on more than 115 years of excellence in technology journalism, MIT Technology Review Custom is the arm of global media company MIT Technology Review that creates and distributes custom content. Our turnkey solutions include everything from writing, editing, and design expertise to multiple options for promotional support. Working closely with clients, our expert custom-editorial staff develops a range of high-quality, relevant content, delivering it to users when and where they want it—in digital, print, online, or in-person experiences. Everything is customized to fit clients’ content marketing goals and position them as thought leaders aligned with the authority on technology that matters.

www.technologyreview.com/media

Copyright © 2016, MIT Technology Review. All Rights Reserved.

4

The Cybersecurity ChallengeMIT Technology Review Custom