Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Benchmarking Cybersecurity: CISOs and Security Leaders Share Perspectives on Managing Evolving Global Risks

By Jessica Block and Ari Kaplan
March 01, 2018

In a hyperactive security landscape, new threats often emerge faster than organizations can mount defenses. While they routinely create solutions to rapidly combat information uncertainty, security leaders are battling a relentless foe on multiple fronts. By combining tools, teams and tenacity in the face of a shifting regulatory environment and a complex business climate, they are beginning to acclimate to the perpetual uncertainty that now characterizes the modern economy.

To help them benchmark information management protocols, insider threat practices, security investments, and an array of issues that impact an organization's data protection techniques, Ankura Consulting commissioned Ari Kaplan Advisors to engage 30 security leaders, 70% of whom were their company's chief information security officer (CISO), in a collective conversation about the cross-functional solutions they are applying to today's most complex challenges and the creative ways they are adapting to a perilous threat landscape.

Ari Kaplan Advisors conducted the interviews by telephone, under condition of anonymity, in August of 2017. While most participants were based in the United States, the report includes perspectives from Europe and Australia. Given that 67% of the respondents were from the highly-regulated financial services and life sciences industries, the responses skew toward strong levels of awareness about cybersecurity and data governance, though a review of the remaining third from non-regulated industries reflects a more measured viewpoint.

Seventy percent of the participants were from organizations with over $1 billion in annual revenue, and 50% were from companies with revenues of more than $5 billion. Eighty percent were from companies with over 5,000 employees. They hailed from a diverse group of industries, including: financial services (30%); health care (16.7%); technology (16.7%); banking (10%); insurance (10%); consulting (3.3%); manufacturing (3.3%); media (3.3%); telecommunications (3.3%); and retail (3.3%).

The excerpts below from the findings reflect that security leaders are ultimately working toward building and sustaining cross-functional programs by improving both processes and technologies.

|

The Evolving Role of the CISO

Eighty percent of respondents work in organizations that employ a CISO, and 23% have a CSO as well. Fifty-three percent of CISOs report to the chief information officer, 7% report directly to the chief executive officer, and the remaining participants report to their chief operating officer, chief risk officer, or another senior-level individual at the company. Fifty-seven percent report to senior management at least monthly, while 37% do so quarterly. Forty-three percent of participating CISOs report to their board of directors on a quarterly basis, while 20% do so monthly, 13% semi-annually, and 10% annually.

|

CISOs Are Cautiously Adapting to the Cloud

Eighty-seven percent of the respondents reported that they rely on vendors or cloud hosting providers to generally host non-critical information to save money and streamline their operations. Some are also trying to upgrade their infrastructure and respond to an enterprise-wide initiative to innovate. Seventeen percent of the respondents noted that Office 365 is a common impetus for moving to the cloud.

|

Outside Support Is Essential

One-hundred percent of respondents work with third parties to support their security initiatives and 87% use third parties for ongoing project or program support. While 97% formally evaluate the security practices of their vendors, partners, law firms and third parties that interact with their data, 60% of respondents do not extend this level of inquiry to the partners of their third parties.

|

Managed Services Providers Typically Support Cybersecurity

Seventy-seven percent of respondents advised that the scope of their managed security services includes incident response. And, for 63%, that support included onsite response. Thirty-seven percent were confident that their managed services provider would provide a legally defensible investigation if they were the victim of a breach or other cyber incident. Thirty percent claimed to be very confident.

|

Security and BYOD Policies Abound

One-hundred percent of the respondents reported having data security and incident response plans. All of the respondents noted that they have a privacy policy or program, but 13% described it as “insufficient or incomplete.” Eighty-seven percent reported that their organizations have both a disaster recovery plan and a data governance framework or committee in place. Eighty percent reported having a Bring Your Own Device (BYOD) plan, though some noted that their plan is to prohibit personal devices; 63% believe that those gadgets contain company sensitive information.

|

Security Messaging Is Evolving with Training and Communication Trends

While 93% reported focusing their messaging on being part of the solution, 20% still claimed to leverage fear to grab the attention of their employees. Despite the 20% who choose fear, a number of security leaders provided reasons for avoiding it, 20% also noted offering best practices to avoid risk.

|

Success of Security Investments Is Measured by Risk Reduction

Ninety-three percent of respondents focus on risk reduction as a measure of the return on their IT security investments, followed by 70% interested in improved detection capabilities. While 57% characterized the amount they had spent on IT security in the past two years as sufficient, 20% advised that it has been insufficient.

Balanced Breach Posture Reflects a Measured Approach to Incident Response

Fifty percent of the respondents described their information security posture as equally reactive and proactive, with an additional 37% characterizing it as proactive. Eighty percent of the respondents were somewhat concerned or very concerned that they had already been breached; 37% were most concerned about an employee mistake, followed by 27% focused on cyber attacks, and 17% most worried about ransomware or malware. And, 76% ranked user threats as their greatest area of weakness for enterprise security visibility.

Data Management Is a Mystery for Some

Although 77% of respondents claimed to have a data map of their organization's information landscape, 30% described it as “ineffective or out of date.” Fifty-seven percent of the respondents advised that conducting a data identification study to map and evaluate their existing data stores in the next year would add the most value to the security road map of their respective organizations. And, while 97% can identify critical-value data within their networks and 83% have the means to identify whom within their organization accesses that critical value data, only 60% have a way to know what people do with the critical value data after they have accessed it.

|

Looking Forward

More Financial Services Companies Will Hire CISOs or Engage Virtual CISOs

The participants reported that the median number of external providers who support them was seven to 10. “We outsource most of the work that the internal technology team does not have time to do,” said the CISO for a smaller financial services institution. For the 20% of respondents who do not have a CISO, the CTO, COO, or deputy security official assumes that role. Forty percent of those companies have revenue under $1 billion.

Also, 40% of the respondents noted that they are subject to 23 NYCRR 500, the state of New York's new Cybersecurity Requirements for Financial Services Companies, which mandates that a company designate a CISO, either internally or from an external resource. It is likely that the role of the CISO will continue to become more prominent. This is particularly important for smaller companies without a CISO that now need to either hire one on a full-time basis or engage a third party to provide those services.

Data Mapping Is Likely to Expand

Although 77% of respondents work for organizations that maintain data maps, 30% of them described those documents as ineffective or out of date. As a result, it is likely that they will update existing records and more companies will develop them, given the challenges associated with the data landscape. “We would desperately love to do that and are making baby steps,” reported a bank CISO. “It is the ultimate blind man feeling an elephant, as it describes a situation that is so big, but you have no idea how to get started,” the individual added. A CISO with an insurance company highlighted that the regulatory environment is also driving the importance of this effort. “Encryption at rest is required by the New York regulations, and in order to do that, you need a data map.”

Clarity May Characterize Cyber Liability Insurance

While 83% of the participating CISOs advised their companies on the purchase of cyber liability insurance and 67% maintain such policies, there is a consistent call for clarity in these agreements. As the size, scope, and frequency of these claims rise, the documents may provide a more thorough outline of the coverage limitations going forward. “The cyber policies we've reviewed have so many waivers and limitations within them that if we had a breach, they would not cover us,” said a healthcare CISO. “We have looked at them and have gone through the exercise of evaluating peers because when you assess the items that they exempt, we did not feel like we were getting our money's worth; we would rather be self-insured,” added another in the insurance industry.

Focus on New Regulations, Including GDPR, Should Rise

Since 73% of respondents noted that regulators are driving their IT security budgeting decisions (and that was 20% more than the next most significant factor, i.e., the value of their data), and that 100% of the participants advised that there is at least one regulatory framework that applies to their business, the focus on an increasingly dynamic regulatory environment is likely to rise. Most important, since 60% of those surveyed noted that GDPR is important to their organizations and 87% have a privacy policy or program, given the global interest in the new framework and its impending May 2018 enforcement date for non-compliance violations, organizations are likely to concentrate on its influence more closely in the coming months.

Insider Threat Programs and Policies May Increase

While 63% of the respondents have an insider threat program or policy, this number is likely to increase, especially since an employee mistake was the security incident about which the largest number of respondents (37%) were concerned. One financial services CISO noted: “An insider threat could encompass an employee mistake, a cyber attack, or a malware attack.” In addition to the uncertainty associated with employee behavior, many organizations have weak data policies in general. “The data stuff is usually completely out of the control of the security team; most of the time, nobody has control of it, which is part of the problem,” said a CISO in financial services. The combination of fragile information governance coupled with the prominence of insider threats increases the likelihood that more organizations will develop strategies to combat this potent combination.

|

Conclusion

Uncertainty in today's cybersecurity landscape is not slowing positive change in information management, emerging threat response, and global data protection efforts. Most organizations recognize the need for security influence in the C-suite, all have incident response plans, and almost everyone in this area recognizes the value of investing in infrastructure to promote risk reduction. By emphasizing training, communicating effectively, and acknowledging the increased influence of the cloud, companies of all sizes in most industries are succeeding in greater numbers. This trend will continue if organizations prioritize informing leadership, applying a successful risk management strategy, and collaborating with strong cybersecurity partners.

***** Jessica Block is a senior managing director at Ankura Consulting based in Washington, DC, and leads the firm's data governance practice.  She has more than 15 years of experience working with companies and counsel facing complex information management challenges. Ari Kaplan is a legal industry analyst and the principal of Ari Kaplan Advisors. He is a member of this newsletter's editorial advisory board.

|

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.