Lost in a Cyber Second: Protecting Information and Mitigating Cyber Risk

Imagine this scenario: A Wall Street Journal reporter is on the phone and wants to know how a trove of your company’s confidential data—including customer credit card information, employee social security numbers, confidential emails, and future product plans—ended up on the dark web. What steps do you take? What notifications need to be made? Who do you bring into the room to address this issue?

[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_2″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” box_shadow=”no” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” background_type=”single” gradient_start_position=”0″ gradient_end_position=”100″ gradient_type=”linear” radial_direction=”center” linear_angle=”180″ background_color=”” background_image=”” background_image_id=”” background_position=”left top” background_repeat=”no-repeat” background_blend_mode=”none” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” filter_type=”regular” filter_hue=”0″ filter_saturation=”100″ filter_brightness=”100″ filter_contrast=”100″ filter_invert=”0″ filter_sepia=”0″ filter_opacity=”100″ filter_blur=”0″ filter_hue_hover=”0″ filter_saturation_hover=”100″ filter_brightness_hover=”100″ filter_contrast_hover=”100″ filter_invert_hover=”0″ filter_sepia_hover=”0″ filter_opacity_hover=”100″ filter_blur_hover=”0″ first=”true” last=”false”][fusion_imageframe image_id=”24266|medium” max_width=”” style_type=”” blur=”” stylecolor=”” hover_type=”none” bordersize=”” bordercolor=”” borderradius=”” align=”center” lightbox=”no” gallery_id=”” lightbox_image=”” lightbox_image_id=”” alt=”” link=”” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]https://magazine.ethisphere.com/wp-content/uploads/Pamela-Passman-230×300.png[/fusion_imageframe][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”true” min_height=”” hover_type=”none” link=”” first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Each day, companies around the world are facing this crisis scenario in a variety of ways. Cyber threats are on the rise, and risks will inevitably increase exponentially with the surge of new access points created by internet-connected devices (the “Internet of Things”), the advance of trends such as the digital supply chain and artificial intelligence, and ongoing vulnerabilities identified in silicon chips, software, and systems.

At the same time, regulations around data protection and cybersecurity are increasing. Most notably, the European Union (EU) General Data Protection Regulation (GDPR), effective on May 25, 2018, extends the scope of the EU data protection law to include all foreign companies processing data of EU residents. Among other requirements, companies must appoint a data protection officer and report to the Supervisory Authority within 72 hours after becoming aware of a data breach.

How do you know if your organization is doing enough to mitigate risks? As a starting point, here are five questions to consider.

  1. Who is responsible for information security?
    Cybersecurity is no longer the sole domain of the Chief Information Officer (CIO) or information technology (IT) department. Breaches—and the threat of attacks—touch on many stakeholders throughout an organization, from legal teams to risk managers, communications, IT, and human resources. Given new and existing regulations around cyber breaches, legal and compliance professionals have an important seat at the table and are increasingly playing a visible role in their organizations on cybersecurity. Before a breach ever happens, you should have already assembled a cross-functional team involving those who can help to ensure controls are in place, legal requirements are being met, and there are communications and training for employees and other insiders about their role in promoting effective cybersecurity.
  2. What are your risks?
    Consider the possibilities and potential impacts of losing critical corporate data. What information is most important and, if misappropriated, would be most damaging to the organization? In many companies, cybersecurity is treated as one element of the broader enterprise risk management (ERM) landscape. This risk-based approach is a good one and helps to focus resources on top priorities. As part of this process, consider the threat actors—from nation states, to malicious insiders, criminal organizations, competitors, and hacktivists—who are most likely to value your confidential information for competitive or political gain.
  3. Where are top information assets located and what controls are in place?
    For many companies, identifying sensitive information is a challenge. Do you have a process to identify and categorize sensitive information, and to know where these key assets are located and who has access to them? Is access given on a need-to-know basis? Are there policies and procedures specific to protecting this information?
  4. Do all insiders know their roles and expectations about protecting sensitive information?
    Insiders are the most likely source of a cyber breach, and they are also your first line of defense. Many companies are accomplished at informing and training employees on cyber hygiene, but then they fall short when it comes to other “insiders”—contractors, consultants, business partners, and other third parties. Anyone with network access should understand your company’s policies about information security and at a minimum should be trained on the most common ways breaches can occur. There should also be systems in place when onboarding and offboarding employees, contractors, and others. In some cases, contractors have used old credentials to access corporate systems and steal information after a project is completed. To avoid this risk, you must have a contract in place and a systematic way to terminate network access at the end of employment.
  5. Does your cybersecurity approach align with external standards and best practices?
    Cybersecurity is now considered a top risk for companies and, as a result, a key focus of boards and the C-suite. For legal, IT, and compliance teams reporting to senior management, a useful approach is to frame communications about the maturity of company cybersecurity programs in the context of established guidance and standards. The NIST Cybersecurity Framework—a voluntary, flexible approach consisting of standards, guidelines, and best practices to manage cybersecurity-related risk—is gaining momentum around the world. It defines 98 categories of “people, processes, and technology” controls that should be in place. The approach is risk-based and can be adapted to a company’s risk profile and business priorities. The International Organization for Standardization (ISO) 27001 Standard is also widely used (and is referenced in the NIST Framework). It specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system. The NIST Framework and ISO 27001 are designed to be applicable to a range of organizations. Mapping to the NIST Framework or other established standards offers a way to validate a company’s cybersecurity approach and also measure maturity across an organization in a consistent way over time. Boards and senior management are increasingly aware of the NIST Framework as leading guidance for information security.

Sensitive corporate information is at greater risk than ever before. Asking the tough questions and taking a proactive approach to addressing the “people, processes, and technology” elements of cybersecurity won’t necessarily stop a breach from occurring. However, it will help to mitigate impacts and foster resilience if disaster does strike.


About the Expert:

Pamela Passman is President and CEO of the Center for Responsible Enterprise And Trade (CREATe.org) a non-governmental organization with a mission to promote leading practices in cybersecurity, intellectual property (IP) and trade secret protection, and anti-corruption. Passman is also co-founder of The Cyber Readiness Institute, launched by CREATe.org and The Center for Global Enterprise to enable the private sector to better address cybersecurity risk management across value chains.

Prior to founding CREATe in 2011, Passman was Corporate Vice President and Deputy General Counsel, Global Corporate and Regulatory Affairs, Microsoft Corporation. From 2002 to 2011, Passman led Microsoft’s global public policy work and regulatory compliance across a range of issues, including privacy, security, and cloud computing issues.

Subscribe to our bi-weekly newsletter Ethisphere Insights for the latest articles, episodes, and updates.

RELATED POSTS

Free Magazine Access!

Fill out the form below, and get access to our Magazine Library

Free Magazine Access!

Fill out the form below, and get access to our Magazine Library

%d