SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
Stanford Closer LOOK series
Stanford Closer LOOK series 1
By David F. Larcker, Peter C. Reiss, and Brian Tayan
November 16, 2017
critical update needed
cybersecurity expertise in the boardroom
introduction
As part of its oversight responsibilities, the board of directors is
expected to ensure that management has identified and developed
processes to mitigate risks facing the organization, including risks
arising from data theft and the loss of proprietary or customer
information. Unfortunately, general observation suggests that
companies are not doing a sufficient job of securing this data. Data
theft has grown considerably over the last decade. According to
the Identity Theft Resource Center, the number of data breaches
tripled from 2007 to 2016. The main contributor to this increase
was theft by third-party hacking, skimming, and phishing schemes
(see Exhibit 1).1
	 The cost of data theft is significant. According to the Ponemon
Institute, the average direct organizational cost of a data breach in
the United States is $7 million. This includes the cost to identify
and contain the breach, notify customers, and loss of business.2
Class-action lawsuits add to this figure, with settlements ranging
from approximately $1 million for moderate-scale data breaches
to over $100 million for large-scale breaches.3
One study finds
that the average stock declines 5 percent following the disclosure
of a breach and performs negatively over the subsequent 90-
day period.4
Clearly, cybersecurity is an important risk facing
companies and their shareholders.
Incidents of data theft
Given the cost and likelihood of a successful cyberattack, it is
important to ask whether boards and management have sufficient
understanding and are appropriately prepared to prevent,
monitor, and mitigate digital data theft (see Exhibit 2 for survey
data). To shed light on this question, we reviewed prominent
incidents of data theft over the last five years to understand the
types of cyberattacks that occur and how companies respond to
them.
	 Customer Data. Payment and accounting system breaches are
an important source of cyber risk. One of the largest attacks on
a payment network occurred at Target in December 2013 when
over 40 million accounts were compromised in a system-wide
breach over a three-week period during the holiday shopping
season. This attack was followed by several high-profile payment-
system breaches at the Home Depot, Michaels Stores, Neiman
Marcus, Supervalu, and Staples, as well as franchised owners of
UPS Stores, PF Chang’s, and Hard Rock Café. The frequency of
credit card breaches has been significantly reduced through chip-
card requirements introduced by the major payment networks in
2016; however, they remain an important point of vulnerability.5
	 Another type of data theft involves penetrating corporate
networks or employee devices that store the personal information
of clients and employees. This information is then sold in
anonymous “dark” markets on the web. Recent examples of
personal data theft include Morgan Stanley, Scottrade, and
Standard Charter, where hackers or internal employees download
the personal information of wealth-management clients, including
names, account numbers, and investments. Similarly, health
insurance networks such as Anthem, Primera, and CareFirst
BlueCross have been targeted by cybercriminals who steal the
names, birthdays, addresses, social security numbers and health
information of customers. One of the largest breaches of personal
data occurred in September 2017 when the credit-reporting
firm Equifax reported that personal information on 143 million
customers was exposed.
	 A more unusual example of personal data theft occurred in
September 2014 when hackers accessed the Apple iCloud data
storage accounts of targeted celebrities, such as actresses Jennifer
Lawrence and Kirsten Dunst and model Kate Upton, and stole
their personal photos and videos, some of which were released
publicly. The individual responsible for hacking these accounts
was sentenced to 18 months in prison.6
To improve security, Apple
introduced technology to provide automatic email notification
when an iCloud account is accessed from a new device or browser.7
	 Corporate Systems and Data. Customer data is not the sole
target of cybercriminals. In 2014, the North Korean government
attacked Sony Picture’s IT infrastructure in an attempt to
intimidate the company into not releasing a comedy film titled
The Interview, which featured a fictional plot to assassinate
Critical Update Needed
2Stanford Closer LOOK series
North Korea’s real leader. Hackers inserted a malware program,
which wiped out half of the company’s computers and servers
with a sophisticated algorithm that made data recovery nearly
impossible. Sony withheld release of the movie from most theaters
but later made it available on demand and in select locations.8
Similarly, in 2017, rumors circulated that hackers had infiltrated
Disney Studios and stole a copy of a forthcoming sequel to the
movie Pirates of the Caribbean. Reports alleged that the hackers
demanded “an enormous amount of money” in Bitcoin in order
not to release the firm.9
Disney, in cooperation with the FBI,
eventually determined that the hack had not been successful.
	 Company products also are subject to cyber threats when
hackers access and assume control over products. The variety
of products vulnerable to such attacks is remarkably broad.
For example, in 2015 Fiat Chrysler recalled 1.4 million Jeep
vehicles after it was determined that a cybersecurity flaw allowed
hackers to remotely assume control of the car through wireless
communication systems. The company had been aware of the
security flaw but issued the recall when it discovered that hackers
could remotely control the car’s brakes, transmission, and other
electronics.10
In 2016, a short-selling research firm released a
report that cardiac implants produced by medical device company
St. Jude Medical were vulnerable to cyberattack. A third party
confirmed that in proprietary testing it was successful in gaining
control over the company’s Merlin@home implantable cardiac
devices that wirelessly monitor patient heartbeat and was able
to remotely turned off the devices or, alternatively, deliver an
extreme shock that would lead to cardiac arrest.11
The company
subsequently updated product software to reduce the risk of
remote access.
	 Companies are also vulnerable to the theft of proprietary
technology or methods of production. In 2016, US Steel was
attacked by hackers allegedly linked to the Chinese government
who stole methods for producing lightweight steel. That same
year, Monsanto discovered that an employee had been working
with a foreign government to steal information on the company’s
advanced seed technology. The employee loaded “highly
sophisticated and unauthorized software” on his computer that
allowed a foreign government to monitor his activity remotely
and transmit proprietary data.12
	 More mundane but potentially more lucrative cybercrimes
involve the theft of corporate information shared between
companies and their advisors. For example, in 2016, prominent
law firms Cravath Swaine and Weil Gotshal were among a number
of law firms hacked by cybercriminals who stole nonpublic
information on corporate clients, which could potentially be
used for insider trading. Similarly, the servers of accounting
firm Deloitte were hacked and files for a small number of clients
were accessed. In 2017, the Securities and Exchange Commission
revealed that Edgar, the database that stores the corporate filings
of all publicly traded companies listed in the U.S., had been
accessed, although the agency did not detail what information was
stolen.
	 Finally, companies and their supply chains have been
compromised by ransomware attacks in which cybercriminals
disrupt computing systems or demand payment under threat of
disrupting systems. Two major attacks occurred in 2017. The
first involved a ransomware program called WannaCry which
infected computers running Microsoft Windows operating
system. The program automatically encrypted computer data
and demanded payment in Bitcoin for its release. Over 200,000
computers in 150 countries were affected.13
FedEx and Nissan
reported being materially impacted.14
A second malware
attack in July 2017 took down the computing systems of major
multinational corporations—such as Merck, Mondelez, and
Maersk—and disrupted business operations over multiple days.
Maersk announced that widespread computer outages prevented
the company’s shipping subsidiary from booking new shipments
and providing quotes at selected terminals.15
Mondelez estimated
that the attack reduced second-quarter revenue growth by 3
percentage points.16
corporate response to cyberattacks
What actions do corporations take in response to cyberattacks
such as these? Many announce steps to improve data security.
When customers are affected, they make assurances about their
commitment to data protection and offer free credit or identity-
theft monitoring. Almost invariably, the company is sued and
enters into a settlement (see Exhibit 3).
	 Beyond this, however, surprisingly little happens in terms
of holding individuals accountable or structural changes that
improve cybersecurity expertise at the senior-executive and
board levels. For example, among a sample of approximately 50
cybersecurity breaches over the last five years, we find that the
CEO is fired or steps down in only a handful of cases. Exceptions
include massive data breaches such as those at Target, Equifax, and
the website Ashley Madison, in which hackers stole and published
the names of 32 million (potentially unfaithful) clients. Executive
pay is almost never reduced. The CEO of Target received no
bonus and forfeited $5 million in pension benefits after 40 million
credit card accounts were stolen; however, the CEO of the Home
Depot suffered no decrease in compensation after more than 50
Critical Update Needed
3Stanford Closer LOOK series
million credit card accounts were stolen.17
	 Furthermore, executives below the CEO are also rarely fired
or penalized. The chief information officer (CIO) of Target was
terminated along with that company’s CEO. The chief information
security officer (CISO) of credit agency Experian was fired after
information on 15 million customers was exposed. At Equifax,
both the CIO and CISO were terminated along with the CEO. The
head of Sony Pictures was fired after the North Korean hack of
the company’s movie studio; however, Sony’s CISO kept his job.
We see no evidence of executive terminations—CEO, CFO, CIO,
CISO, or other C-suite level executive—following dozens of other
high-profile cyberattacks.
	 Some companies hire forensics firms or cybersecurity experts
in the aftermath of data breaches. Cybersecurity firms are
brought in to assess how the breach happened and what assets
were compromised. Cybersecurity experts are brought in to fill
gaps in the firm’s internal ranks. For example, JPMorgan hired
a former cybersecurity executive from Lockheed Martin a year
after the bank discovered that hackers gained access to more than
90 bank servers after stealing the login credentials of a JPMorgan
employee. The company also announced plans to increase its data
security budget from $250 million to $500 million.18
Fiat Chrysler
took additional steps. After it was discovered that cybercriminals
could remotely gain control over its Jeeps, the company developed
a program of hiring hackers to identify vulnerabilities in its
products and offered to pay between $150 and $1500 for each
legitimate security flaw identified.19
	 Few companies add a cybersecurity expert to the board
following data breaches. The Home Depot added an IT executive
from Lockheed Martin. Neiman Marcus added the chief digital
offer from Starbucks after Neiman’s payment systems were
compromised. Uber recruited the former director of the U.S.
Secret Service to serve on an advisory board—not the formal
board of directors—a year after hackers stole personal information
on 50,000 of its drivers. The hire, however, was part of a broader
effort to reduce risk and increase safety for riders, drivers, and the
public and not specifically heralded as an increase in security of
the company’s systems.
	 We find little less evidence of formal governance changes
following cyberattacks. The most commonly observed change is
increased disclosure in the proxy. Following hacks, the boards
of Coca-Cola, Monsanto, Home Depot, and Staples added
specific mention of cybersecurity as a responsibility of the audit
committee. Morgan Stanley added language that cybersecurity
is a responsibility of its operations and technology committee.
Standard Charter added it to its “risk review.” Target added data
security as a “collective experience” of the board.
	 We found only one instance of a company making changes to
an executive compensation plan to incorporate cybersecurity risk.
JPMorgan added cybersecurity as part of the annual performance
plans of both its CEO and COO.
	 Whether governance changes such as these are sufficient to
compensate shareholders for the costs incurred in a cyberattack
is unclear. Verizon Communications reduced the amount that it
offered to pay for Yahoo!’s internet properties by $350 million
after Yahoo! disclosed that hackers had stolen the birthdays, email
addresses, and passwords of over 1 billion users (later increased to
3 billion users). A spokesperson for Yahoo! described the reduced
purchase price as “a fair and favorable outcome.”20
	 To decrease the risk of a cyber threat, some experts recommend
the following:
•	 Elevate cybersecurity within the company’s risk framework.
The board should ensure that management and employees take
cybersecurity seriously. They should periodically review the
company’s potential exposure and cybersecurity policies.
•	 Develop an action plan to respond to a breach in customer data.
The plan should outline employee and board responsibilities,
who should be contacted and when, how the company will
communicate to the public, and how the breach will be assessed.
•	 Implement additional safeguards to protect corporate data.
Management and the board should review who has access to
critical corporate data and trade secrets, and develop policies
around how this information is documented, stored, accessed
and shared within the company. The board should have its own
cybersecurity policies to protect director communications,
documents, and conversations.21
Why This Matters
1.	 In recent years, cyberattacks on corporate data have increased
in frequency and cost. At the same time, experience has
shown that a wide variety of data—not just customer but also
corporate data—are the target of such attacks. What steps
can the board and management teams take to prepare for and
respond to cyber threats? What practical steps can they take to
mitigate or prevent them?
2.	 Observationsuggeststhatcompaniesmakeveryfewgovernance
changes in response to major cyberattacks. Senior executives
are rarely terminated. Their pay packages are rarely reduced or
restructured to reward data protection. Cyber expertise is not
a central qualification or requirement of most board members.
Why? Do boards not appreciate the scope and severity of cyber
threats? Or do they believe that they have sufficient policies in
place to deal with them?
Critical Update Needed
4Stanford Closer LOOK series
3.	 Cyberattacks represent a major risk to organizations:
the cost of a breach is high, the variety of attacks broad,
and the technological issues sophisticated. What data,
metrics, and information should board members review
to satisfy themselves that management has taken proper
steps to minimize cyber risks? What qualifications should
a board member have in order to constructively contribute
to boardroom discussions on cybersecurity? How
difficult is it to find board candidates with these skills? 
1
	 Identity Theft Resource Center (ITRC), Breach Statistics 2005-2016.
2
	 Ponemon Institute, “2016 Cost of Data Breach Study: Global Analysis,”
(2016).
3
	See Alexander H. Southwell, Eric Vandevelde, Ryan Bergsieker, and
Jeana Bisnar Maute, “Gibson Dunn Reviews U.S. Cybersecurity and
Data Privacy,” The CLS Blue Sky Blog (Columbia Law School), (February
3, 2017).
4
	 Ponemon Institute, “The Impact of Data Breaches on Reputation and
Share Value,” (May 2017).
5
	According to data from Visa, chip-enabled merchants experienced a
26 percent drop in counterfeit fraud year-over-year in January 2016,
following the first rollout of new credit and debit card chip technology.
See Andrew Meola, “Visa Is Significantly Reducing Fraud,” Business
Insider (June 9, 2016).
6
	 Andrew Blankstein, “Pennsylvania Man Is Charged in Celebrity Hack,
Reaches Plea Deal,” NBC News (March 15, 2016).
7
	 Russell Brandom, “Apple Just Added Another Layer of iCloud Security, a
Day before iPhone 6 Event,” The Verge (September 8, 2014).
8
	 Peter Elkind, “Inside the Hack of the Century,” Fortune (June 25, 2015).
9
	 Anita Busch, “Hackers Holding Disney’s Latest ‘Pirates of the Caribbean’
for Ransom,” Deadline Hollywood (May 15, 2017).
10
	Mike Spector and Danny Yadron, “After Cyber Hack, Big Chrysler
Recall,” The Wall Street Journal (July 25, 2015).
11
	Jim Finkle, “Hired Experts Back Claims St. Jude Heart Devices Can Be
Hacked,” Reuters (October 24, 2016).
12
	Jacob Bunge, “Monsanto Alleges Worker Stole Data,” The Wall Street
Journal (June 18, 2016).
13
	“‘Unprecedented’ Cyberattack Hits 200,000 in at Least 150 Countries,
and the Threat is Escalating,” CNBC (May 14, 2017).
14
	Brandon Vigliarolo, “10 Major Organizations Affected by the WannaCry
Ransomware Attack,” TechRepublic (May 19, 2017).
15
	Nick Kostov and Costas Paris, “Cyberattack’s Fallout Fuels Scramble,”
The Wall Street Journal (June 29, 2017).
16
	“Update on Cyber-Attack and Preliminary Estimate of Financial
Impacts,” Mondelez press release (July 6, 2017).
17
	At the time of the data breach, the company was in the middle of a
CEO transition. Neither the outgoing CEO nor his successor saw a
reduction in bonus or performance awards as a result of the breach.
Key performance indicators (KPIs) for the annual bonus plan were sales,
operating profit, and inventory turns; KPIs for long-term equity awards
were three-year return on invested capital and operating profit. Neither
payment was decreased because of the data breach.
18
	Steve Morgan, “Why J.P. Morgan Chase & Co. Is Spending a Half Billion
Dollars on Cybersecurity,” The New York Times (January 30, 2016).
19
	Kristen Korosec, “Fiat Chrysler Is Paying the Public to Find Security
Flaws in Its Cars,” Fortune (July 13, 2016).
20
	Scott Moritz, “Verizon Reaches Deal for Lowered Yahoo Price After
Hacks,” Bloomberg (February 21, 2017).
21
	Adapted from: Peter Reiss, “Cybersecurity and the Board,” presentation
made at the Directors’ Consortium at Stanford Graduate School of
Business (April 7, 2017).
David Larcker is Director of the Corporate Governance Research Initiative at
the Stanford Graduate School of Business and senior faculty member at the Rock
Center for Corporate Governance at Stanford University. Peter Reiss is MBA
Class of 1963 Professor of Economics at the Stanford Graduate School of Business.
Brian Tayan is a researcher with Stanford’s Corporate Governance Research
Initiative. Larcker and Tayan are coauthors of the books A Real Look at Real
World Corporate Governance and Corporate Governance Matters. The
authors would like to thank Michelle E. Gutman for research assistance in the
preparation of these materials.
The Stanford Closer Look Series is a collection of short case studies that explore
topics, issues, and controversies in corporate governance and leadership.
The Closer Look Series is published by the Corporate Governance Research
Initiative at the Stanford Graduate School of Business and the Rock Center
for Corporate Governance at Stanford University. For more information, visit:
http:/www.gsb.stanford.edu/cgri-research.
Copyright © 2017 by the Board of Trustees of the Leland Stanford Junior
University. All rights reserved.
Critical Update Needed
5Stanford Closer LOOK series
Exhibit 1 — data breaches by category
Data breach is defined as an incident in which an individual name plus social security number, driver’s license number, medical record, or financial record
(including credit or debit card numbers) is potentially at risk because of exposure.
Source: Identity Theft Resource Center (ITRC).
355
493
354
455
321
354
504
772
812
1,072
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
NumberofBreaches
Insider Theft Hacking, Phishing Data on the Move Internet Exposure
3rd Party Exposure Employee Error, Negligence Physical Theft
Critical Update Needed
6Stanford Closer LOOK series
Exhibit 2 — Survey Data: Board of Directors on Cybersecurity
Source: Veracode and New York Stock Exchange, “A 2015 Survey: Cybersecurity in the Boardroom,” (2015).
How confident are you that your companies are properly secured against cyberattacks?
4%
29%
66%
Very confident
Confident
Less than confident
How often are cybersecurity matters discussed during board meetings?
1%
18%
46%
35%
Never
Only after internal
or industry incident
Most meetings
Every meeting
Critical Update Needed
7Stanford Closer LOOK series
Exhibit 3 — Cost to Settle Class Action Lawsuits for Data Theft (selected)
Source: Alexander H. Southwell, Eric Vandevelde, Ryan Bergsieker, and Jeana Bisnar Maute, “Gibson Dunn Reviews U.S. Cybersecurity and Data Privacy,” The CLS
Blue Sky Blog (Columbia Law School), (February 3, 2017). Selected data 2013 to 2016.

Mais conteúdo relacionado

Mais procurados

Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decadestudentinternetdeals33
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
Social Media & Cybersecurity
Social Media & CybersecuritySocial Media & Cybersecurity
Social Media & CybersecurityYuda Saydun
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 

Mais procurados (20)

Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Social Media & Cybersecurity
Social Media & CybersecuritySocial Media & Cybersecurity
Social Media & Cybersecurity
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 

Semelhante a Stanford CLOSER LOOK series examines critical need for cybersecurity expertise on corporate boards

What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 
Data Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfData Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfinfo48697
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust modelCristian Garcia G.
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxdeanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxbradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxerlindaw
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 

Semelhante a Stanford CLOSER LOOK series examines critical need for cybersecurity expertise on corporate boards (20)

What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
Data Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfData Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdf
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 

Mais de Stanford GSB Corporate Governance Research Initiative

Mais de Stanford GSB Corporate Governance Research Initiative (20)

The Spread of COVID-19 Disclosure
The Spread of COVID-19 DisclosureThe Spread of COVID-19 Disclosure
The Spread of COVID-19 Disclosure
 
Board Composition, Quality, & Turnover: Research Spotlight
Board Composition, Quality, & Turnover: Research SpotlightBoard Composition, Quality, & Turnover: Research Spotlight
Board Composition, Quality, & Turnover: Research Spotlight
 
The First Outside Director
The First Outside DirectorThe First Outside Director
The First Outside Director
 
Diversity in the C-Suite: The Dismal State of Diversity Among Fortune 100 Sen...
Diversity in the C-Suite: The Dismal State of Diversity Among Fortune 100 Sen...Diversity in the C-Suite: The Dismal State of Diversity Among Fortune 100 Sen...
Diversity in the C-Suite: The Dismal State of Diversity Among Fortune 100 Sen...
 
Governance of Corporate Insider Equity Trades
Governance of Corporate Insider Equity TradesGovernance of Corporate Insider Equity Trades
Governance of Corporate Insider Equity Trades
 
The Principles of Corporate Governance: A Guide to Understanding Concepts of ...
The Principles of Corporate Governance: A Guide to Understanding Concepts of ...The Principles of Corporate Governance: A Guide to Understanding Concepts of ...
The Principles of Corporate Governance: A Guide to Understanding Concepts of ...
 
Pay for Performance… But Not Too Much Pay: The American Public’s View of CEO Pay
Pay for Performance… But Not Too Much Pay: The American Public’s View of CEO PayPay for Performance… But Not Too Much Pay: The American Public’s View of CEO Pay
Pay for Performance… But Not Too Much Pay: The American Public’s View of CEO Pay
 
Survey | 2019 U.S. Tax Survey
Survey | 2019 U.S. Tax SurveySurvey | 2019 U.S. Tax Survey
Survey | 2019 U.S. Tax Survey
 
Stakeholders Take Center Stage: Director Views on Priorities and Society
Stakeholders Take Center Stage: Director Views on Priorities and SocietyStakeholders Take Center Stage: Director Views on Priorities and Society
Stakeholders Take Center Stage: Director Views on Priorities and Society
 
Loosey-Goosey Governance Four: Misunderstood Terms in Corporate Governance
Loosey-Goosey Governance Four: Misunderstood Terms in Corporate GovernanceLoosey-Goosey Governance Four: Misunderstood Terms in Corporate Governance
Loosey-Goosey Governance Four: Misunderstood Terms in Corporate Governance
 
Stakeholders and Shareholders: Are Executives Really “Penny Wise and Pound Fo...
Stakeholders and Shareholders: Are Executives Really “Penny Wise and Pound Fo...Stakeholders and Shareholders: Are Executives Really “Penny Wise and Pound Fo...
Stakeholders and Shareholders: Are Executives Really “Penny Wise and Pound Fo...
 
2019 Survey On Shareholder Versus Stakeholder Interests
2019 Survey On Shareholder Versus Stakeholder Interests 2019 Survey On Shareholder Versus Stakeholder Interests
2019 Survey On Shareholder Versus Stakeholder Interests
 
Core Concept: Shareholders & Activism
Core Concept: Shareholders & ActivismCore Concept: Shareholders & Activism
Core Concept: Shareholders & Activism
 
The Business Case for ESG
The Business Case for ESGThe Business Case for ESG
The Business Case for ESG
 
Environmental, Social, and Governance (ESG) Activities
Environmental, Social, and Governance (ESG) ActivitiesEnvironmental, Social, and Governance (ESG) Activities
Environmental, Social, and Governance (ESG) Activities
 
Dual-Class Shares - Research Spotlight
Dual-Class Shares - Research SpotlightDual-Class Shares - Research Spotlight
Dual-Class Shares - Research Spotlight
 
Where Does Human Resources Sit at the Strategy Table?
Where Does Human Resources Sit at the Strategy Table?Where Does Human Resources Sit at the Strategy Table?
Where Does Human Resources Sit at the Strategy Table?
 
Scaling Up: The Implementation of Corporate Governance in Pre-IPO Companies
Scaling Up: The Implementation of Corporate Governance in Pre-IPO CompaniesScaling Up: The Implementation of Corporate Governance in Pre-IPO Companies
Scaling Up: The Implementation of Corporate Governance in Pre-IPO Companies
 
The Evolution of Corporate Governance: 2018 Study of Inception to IPO
The Evolution of Corporate Governance: 2018 Study of Inception to IPOThe Evolution of Corporate Governance: 2018 Study of Inception to IPO
The Evolution of Corporate Governance: 2018 Study of Inception to IPO
 
The Double-Edged Sword of CEO Activism
The Double-Edged Sword of CEO ActivismThe Double-Edged Sword of CEO Activism
The Double-Edged Sword of CEO Activism
 

Último

Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Pitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business ProposalPitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business ProposalEvelina300651
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 

Último (20)

Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Pitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business ProposalPitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business Proposal
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 

Stanford CLOSER LOOK series examines critical need for cybersecurity expertise on corporate boards

  • 1. Stanford Closer LOOK series Stanford Closer LOOK series 1 By David F. Larcker, Peter C. Reiss, and Brian Tayan November 16, 2017 critical update needed cybersecurity expertise in the boardroom introduction As part of its oversight responsibilities, the board of directors is expected to ensure that management has identified and developed processes to mitigate risks facing the organization, including risks arising from data theft and the loss of proprietary or customer information. Unfortunately, general observation suggests that companies are not doing a sufficient job of securing this data. Data theft has grown considerably over the last decade. According to the Identity Theft Resource Center, the number of data breaches tripled from 2007 to 2016. The main contributor to this increase was theft by third-party hacking, skimming, and phishing schemes (see Exhibit 1).1 The cost of data theft is significant. According to the Ponemon Institute, the average direct organizational cost of a data breach in the United States is $7 million. This includes the cost to identify and contain the breach, notify customers, and loss of business.2 Class-action lawsuits add to this figure, with settlements ranging from approximately $1 million for moderate-scale data breaches to over $100 million for large-scale breaches.3 One study finds that the average stock declines 5 percent following the disclosure of a breach and performs negatively over the subsequent 90- day period.4 Clearly, cybersecurity is an important risk facing companies and their shareholders. Incidents of data theft Given the cost and likelihood of a successful cyberattack, it is important to ask whether boards and management have sufficient understanding and are appropriately prepared to prevent, monitor, and mitigate digital data theft (see Exhibit 2 for survey data). To shed light on this question, we reviewed prominent incidents of data theft over the last five years to understand the types of cyberattacks that occur and how companies respond to them. Customer Data. Payment and accounting system breaches are an important source of cyber risk. One of the largest attacks on a payment network occurred at Target in December 2013 when over 40 million accounts were compromised in a system-wide breach over a three-week period during the holiday shopping season. This attack was followed by several high-profile payment- system breaches at the Home Depot, Michaels Stores, Neiman Marcus, Supervalu, and Staples, as well as franchised owners of UPS Stores, PF Chang’s, and Hard Rock Café. The frequency of credit card breaches has been significantly reduced through chip- card requirements introduced by the major payment networks in 2016; however, they remain an important point of vulnerability.5 Another type of data theft involves penetrating corporate networks or employee devices that store the personal information of clients and employees. This information is then sold in anonymous “dark” markets on the web. Recent examples of personal data theft include Morgan Stanley, Scottrade, and Standard Charter, where hackers or internal employees download the personal information of wealth-management clients, including names, account numbers, and investments. Similarly, health insurance networks such as Anthem, Primera, and CareFirst BlueCross have been targeted by cybercriminals who steal the names, birthdays, addresses, social security numbers and health information of customers. One of the largest breaches of personal data occurred in September 2017 when the credit-reporting firm Equifax reported that personal information on 143 million customers was exposed. A more unusual example of personal data theft occurred in September 2014 when hackers accessed the Apple iCloud data storage accounts of targeted celebrities, such as actresses Jennifer Lawrence and Kirsten Dunst and model Kate Upton, and stole their personal photos and videos, some of which were released publicly. The individual responsible for hacking these accounts was sentenced to 18 months in prison.6 To improve security, Apple introduced technology to provide automatic email notification when an iCloud account is accessed from a new device or browser.7 Corporate Systems and Data. Customer data is not the sole target of cybercriminals. In 2014, the North Korean government attacked Sony Picture’s IT infrastructure in an attempt to intimidate the company into not releasing a comedy film titled The Interview, which featured a fictional plot to assassinate
  • 2. Critical Update Needed 2Stanford Closer LOOK series North Korea’s real leader. Hackers inserted a malware program, which wiped out half of the company’s computers and servers with a sophisticated algorithm that made data recovery nearly impossible. Sony withheld release of the movie from most theaters but later made it available on demand and in select locations.8 Similarly, in 2017, rumors circulated that hackers had infiltrated Disney Studios and stole a copy of a forthcoming sequel to the movie Pirates of the Caribbean. Reports alleged that the hackers demanded “an enormous amount of money” in Bitcoin in order not to release the firm.9 Disney, in cooperation with the FBI, eventually determined that the hack had not been successful. Company products also are subject to cyber threats when hackers access and assume control over products. The variety of products vulnerable to such attacks is remarkably broad. For example, in 2015 Fiat Chrysler recalled 1.4 million Jeep vehicles after it was determined that a cybersecurity flaw allowed hackers to remotely assume control of the car through wireless communication systems. The company had been aware of the security flaw but issued the recall when it discovered that hackers could remotely control the car’s brakes, transmission, and other electronics.10 In 2016, a short-selling research firm released a report that cardiac implants produced by medical device company St. Jude Medical were vulnerable to cyberattack. A third party confirmed that in proprietary testing it was successful in gaining control over the company’s Merlin@home implantable cardiac devices that wirelessly monitor patient heartbeat and was able to remotely turned off the devices or, alternatively, deliver an extreme shock that would lead to cardiac arrest.11 The company subsequently updated product software to reduce the risk of remote access. Companies are also vulnerable to the theft of proprietary technology or methods of production. In 2016, US Steel was attacked by hackers allegedly linked to the Chinese government who stole methods for producing lightweight steel. That same year, Monsanto discovered that an employee had been working with a foreign government to steal information on the company’s advanced seed technology. The employee loaded “highly sophisticated and unauthorized software” on his computer that allowed a foreign government to monitor his activity remotely and transmit proprietary data.12 More mundane but potentially more lucrative cybercrimes involve the theft of corporate information shared between companies and their advisors. For example, in 2016, prominent law firms Cravath Swaine and Weil Gotshal were among a number of law firms hacked by cybercriminals who stole nonpublic information on corporate clients, which could potentially be used for insider trading. Similarly, the servers of accounting firm Deloitte were hacked and files for a small number of clients were accessed. In 2017, the Securities and Exchange Commission revealed that Edgar, the database that stores the corporate filings of all publicly traded companies listed in the U.S., had been accessed, although the agency did not detail what information was stolen. Finally, companies and their supply chains have been compromised by ransomware attacks in which cybercriminals disrupt computing systems or demand payment under threat of disrupting systems. Two major attacks occurred in 2017. The first involved a ransomware program called WannaCry which infected computers running Microsoft Windows operating system. The program automatically encrypted computer data and demanded payment in Bitcoin for its release. Over 200,000 computers in 150 countries were affected.13 FedEx and Nissan reported being materially impacted.14 A second malware attack in July 2017 took down the computing systems of major multinational corporations—such as Merck, Mondelez, and Maersk—and disrupted business operations over multiple days. Maersk announced that widespread computer outages prevented the company’s shipping subsidiary from booking new shipments and providing quotes at selected terminals.15 Mondelez estimated that the attack reduced second-quarter revenue growth by 3 percentage points.16 corporate response to cyberattacks What actions do corporations take in response to cyberattacks such as these? Many announce steps to improve data security. When customers are affected, they make assurances about their commitment to data protection and offer free credit or identity- theft monitoring. Almost invariably, the company is sued and enters into a settlement (see Exhibit 3). Beyond this, however, surprisingly little happens in terms of holding individuals accountable or structural changes that improve cybersecurity expertise at the senior-executive and board levels. For example, among a sample of approximately 50 cybersecurity breaches over the last five years, we find that the CEO is fired or steps down in only a handful of cases. Exceptions include massive data breaches such as those at Target, Equifax, and the website Ashley Madison, in which hackers stole and published the names of 32 million (potentially unfaithful) clients. Executive pay is almost never reduced. The CEO of Target received no bonus and forfeited $5 million in pension benefits after 40 million credit card accounts were stolen; however, the CEO of the Home Depot suffered no decrease in compensation after more than 50
  • 3. Critical Update Needed 3Stanford Closer LOOK series million credit card accounts were stolen.17 Furthermore, executives below the CEO are also rarely fired or penalized. The chief information officer (CIO) of Target was terminated along with that company’s CEO. The chief information security officer (CISO) of credit agency Experian was fired after information on 15 million customers was exposed. At Equifax, both the CIO and CISO were terminated along with the CEO. The head of Sony Pictures was fired after the North Korean hack of the company’s movie studio; however, Sony’s CISO kept his job. We see no evidence of executive terminations—CEO, CFO, CIO, CISO, or other C-suite level executive—following dozens of other high-profile cyberattacks. Some companies hire forensics firms or cybersecurity experts in the aftermath of data breaches. Cybersecurity firms are brought in to assess how the breach happened and what assets were compromised. Cybersecurity experts are brought in to fill gaps in the firm’s internal ranks. For example, JPMorgan hired a former cybersecurity executive from Lockheed Martin a year after the bank discovered that hackers gained access to more than 90 bank servers after stealing the login credentials of a JPMorgan employee. The company also announced plans to increase its data security budget from $250 million to $500 million.18 Fiat Chrysler took additional steps. After it was discovered that cybercriminals could remotely gain control over its Jeeps, the company developed a program of hiring hackers to identify vulnerabilities in its products and offered to pay between $150 and $1500 for each legitimate security flaw identified.19 Few companies add a cybersecurity expert to the board following data breaches. The Home Depot added an IT executive from Lockheed Martin. Neiman Marcus added the chief digital offer from Starbucks after Neiman’s payment systems were compromised. Uber recruited the former director of the U.S. Secret Service to serve on an advisory board—not the formal board of directors—a year after hackers stole personal information on 50,000 of its drivers. The hire, however, was part of a broader effort to reduce risk and increase safety for riders, drivers, and the public and not specifically heralded as an increase in security of the company’s systems. We find little less evidence of formal governance changes following cyberattacks. The most commonly observed change is increased disclosure in the proxy. Following hacks, the boards of Coca-Cola, Monsanto, Home Depot, and Staples added specific mention of cybersecurity as a responsibility of the audit committee. Morgan Stanley added language that cybersecurity is a responsibility of its operations and technology committee. Standard Charter added it to its “risk review.” Target added data security as a “collective experience” of the board. We found only one instance of a company making changes to an executive compensation plan to incorporate cybersecurity risk. JPMorgan added cybersecurity as part of the annual performance plans of both its CEO and COO. Whether governance changes such as these are sufficient to compensate shareholders for the costs incurred in a cyberattack is unclear. Verizon Communications reduced the amount that it offered to pay for Yahoo!’s internet properties by $350 million after Yahoo! disclosed that hackers had stolen the birthdays, email addresses, and passwords of over 1 billion users (later increased to 3 billion users). A spokesperson for Yahoo! described the reduced purchase price as “a fair and favorable outcome.”20 To decrease the risk of a cyber threat, some experts recommend the following: • Elevate cybersecurity within the company’s risk framework. The board should ensure that management and employees take cybersecurity seriously. They should periodically review the company’s potential exposure and cybersecurity policies. • Develop an action plan to respond to a breach in customer data. The plan should outline employee and board responsibilities, who should be contacted and when, how the company will communicate to the public, and how the breach will be assessed. • Implement additional safeguards to protect corporate data. Management and the board should review who has access to critical corporate data and trade secrets, and develop policies around how this information is documented, stored, accessed and shared within the company. The board should have its own cybersecurity policies to protect director communications, documents, and conversations.21 Why This Matters 1. In recent years, cyberattacks on corporate data have increased in frequency and cost. At the same time, experience has shown that a wide variety of data—not just customer but also corporate data—are the target of such attacks. What steps can the board and management teams take to prepare for and respond to cyber threats? What practical steps can they take to mitigate or prevent them? 2. Observationsuggeststhatcompaniesmakeveryfewgovernance changes in response to major cyberattacks. Senior executives are rarely terminated. Their pay packages are rarely reduced or restructured to reward data protection. Cyber expertise is not a central qualification or requirement of most board members. Why? Do boards not appreciate the scope and severity of cyber threats? Or do they believe that they have sufficient policies in place to deal with them?
  • 4. Critical Update Needed 4Stanford Closer LOOK series 3. Cyberattacks represent a major risk to organizations: the cost of a breach is high, the variety of attacks broad, and the technological issues sophisticated. What data, metrics, and information should board members review to satisfy themselves that management has taken proper steps to minimize cyber risks? What qualifications should a board member have in order to constructively contribute to boardroom discussions on cybersecurity? How difficult is it to find board candidates with these skills?  1 Identity Theft Resource Center (ITRC), Breach Statistics 2005-2016. 2 Ponemon Institute, “2016 Cost of Data Breach Study: Global Analysis,” (2016). 3 See Alexander H. Southwell, Eric Vandevelde, Ryan Bergsieker, and Jeana Bisnar Maute, “Gibson Dunn Reviews U.S. Cybersecurity and Data Privacy,” The CLS Blue Sky Blog (Columbia Law School), (February 3, 2017). 4 Ponemon Institute, “The Impact of Data Breaches on Reputation and Share Value,” (May 2017). 5 According to data from Visa, chip-enabled merchants experienced a 26 percent drop in counterfeit fraud year-over-year in January 2016, following the first rollout of new credit and debit card chip technology. See Andrew Meola, “Visa Is Significantly Reducing Fraud,” Business Insider (June 9, 2016). 6 Andrew Blankstein, “Pennsylvania Man Is Charged in Celebrity Hack, Reaches Plea Deal,” NBC News (March 15, 2016). 7 Russell Brandom, “Apple Just Added Another Layer of iCloud Security, a Day before iPhone 6 Event,” The Verge (September 8, 2014). 8 Peter Elkind, “Inside the Hack of the Century,” Fortune (June 25, 2015). 9 Anita Busch, “Hackers Holding Disney’s Latest ‘Pirates of the Caribbean’ for Ransom,” Deadline Hollywood (May 15, 2017). 10 Mike Spector and Danny Yadron, “After Cyber Hack, Big Chrysler Recall,” The Wall Street Journal (July 25, 2015). 11 Jim Finkle, “Hired Experts Back Claims St. Jude Heart Devices Can Be Hacked,” Reuters (October 24, 2016). 12 Jacob Bunge, “Monsanto Alleges Worker Stole Data,” The Wall Street Journal (June 18, 2016). 13 “‘Unprecedented’ Cyberattack Hits 200,000 in at Least 150 Countries, and the Threat is Escalating,” CNBC (May 14, 2017). 14 Brandon Vigliarolo, “10 Major Organizations Affected by the WannaCry Ransomware Attack,” TechRepublic (May 19, 2017). 15 Nick Kostov and Costas Paris, “Cyberattack’s Fallout Fuels Scramble,” The Wall Street Journal (June 29, 2017). 16 “Update on Cyber-Attack and Preliminary Estimate of Financial Impacts,” Mondelez press release (July 6, 2017). 17 At the time of the data breach, the company was in the middle of a CEO transition. Neither the outgoing CEO nor his successor saw a reduction in bonus or performance awards as a result of the breach. Key performance indicators (KPIs) for the annual bonus plan were sales, operating profit, and inventory turns; KPIs for long-term equity awards were three-year return on invested capital and operating profit. Neither payment was decreased because of the data breach. 18 Steve Morgan, “Why J.P. Morgan Chase & Co. Is Spending a Half Billion Dollars on Cybersecurity,” The New York Times (January 30, 2016). 19 Kristen Korosec, “Fiat Chrysler Is Paying the Public to Find Security Flaws in Its Cars,” Fortune (July 13, 2016). 20 Scott Moritz, “Verizon Reaches Deal for Lowered Yahoo Price After Hacks,” Bloomberg (February 21, 2017). 21 Adapted from: Peter Reiss, “Cybersecurity and the Board,” presentation made at the Directors’ Consortium at Stanford Graduate School of Business (April 7, 2017). David Larcker is Director of the Corporate Governance Research Initiative at the Stanford Graduate School of Business and senior faculty member at the Rock Center for Corporate Governance at Stanford University. Peter Reiss is MBA Class of 1963 Professor of Economics at the Stanford Graduate School of Business. Brian Tayan is a researcher with Stanford’s Corporate Governance Research Initiative. Larcker and Tayan are coauthors of the books A Real Look at Real World Corporate Governance and Corporate Governance Matters. The authors would like to thank Michelle E. Gutman for research assistance in the preparation of these materials. The Stanford Closer Look Series is a collection of short case studies that explore topics, issues, and controversies in corporate governance and leadership. The Closer Look Series is published by the Corporate Governance Research Initiative at the Stanford Graduate School of Business and the Rock Center for Corporate Governance at Stanford University. For more information, visit: http:/www.gsb.stanford.edu/cgri-research. Copyright © 2017 by the Board of Trustees of the Leland Stanford Junior University. All rights reserved.
  • 5. Critical Update Needed 5Stanford Closer LOOK series Exhibit 1 — data breaches by category Data breach is defined as an incident in which an individual name plus social security number, driver’s license number, medical record, or financial record (including credit or debit card numbers) is potentially at risk because of exposure. Source: Identity Theft Resource Center (ITRC). 355 493 354 455 321 354 504 772 812 1,072 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 NumberofBreaches Insider Theft Hacking, Phishing Data on the Move Internet Exposure 3rd Party Exposure Employee Error, Negligence Physical Theft
  • 6. Critical Update Needed 6Stanford Closer LOOK series Exhibit 2 — Survey Data: Board of Directors on Cybersecurity Source: Veracode and New York Stock Exchange, “A 2015 Survey: Cybersecurity in the Boardroom,” (2015). How confident are you that your companies are properly secured against cyberattacks? 4% 29% 66% Very confident Confident Less than confident How often are cybersecurity matters discussed during board meetings? 1% 18% 46% 35% Never Only after internal or industry incident Most meetings Every meeting
  • 7. Critical Update Needed 7Stanford Closer LOOK series Exhibit 3 — Cost to Settle Class Action Lawsuits for Data Theft (selected) Source: Alexander H. Southwell, Eric Vandevelde, Ryan Bergsieker, and Jeana Bisnar Maute, “Gibson Dunn Reviews U.S. Cybersecurity and Data Privacy,” The CLS Blue Sky Blog (Columbia Law School), (February 3, 2017). Selected data 2013 to 2016.