24.04.2013 Views

Governance of Enterprise Security: CyLab 2012 Report How ... - RSA

Governance of Enterprise Security: CyLab 2012 Report How ... - RSA

Governance of Enterprise Security: CyLab 2012 Report How ... - RSA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>How</strong> Boards & Senior Executives<br />

Are Managing Cyber Risks<br />

Research Sponsors:<br />

!<br />

!<br />

<strong>Governance</strong> <strong>of</strong> <strong>Enterprise</strong> <strong>Security</strong>:<br />

<strong>CyLab</strong> <strong>2012</strong> <strong>Report</strong><br />

Author: Jody R. Westby<br />

Adjunct Distinguished Fellow, <strong>CyLab</strong><br />

CEO, Global Cyber Risk LLC<br />

May 16, <strong>2012</strong><br />

!


Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />

© <strong>2012</strong> by Carnegie Mellon University & Jody R. Westby<br />

All rights reserved. No © <strong>2012</strong> part <strong>of</strong> by the Carnegie contents Mellon here<strong>of</strong> University may be reproduced & Jody R. Westby in any form without the prior<br />

All rights reserved. No part <strong>of</strong> written the contents consent here<strong>of</strong> <strong>of</strong> the may copyright be reproduced owners. in any form without the prior<br />

written consent <strong>of</strong> the copyright owners.<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon University <strong>CyLab</strong><br />

Carnegie 5000 Forbes Mellon Avenue University<br />

Pittsburgh, 5000 Forbes PA Avenue 15213<br />

(412) 268-5090 Pittsburgh, • (412) PA 268-7675 15213 (Fax)<br />

Dean, College <strong>of</strong> (412) Engineering 268-5090 & Founder, • (412) <strong>CyLab</strong>: 268-7675 Pradeep (Fax) K. Khosla, Ph.D.<br />

Dean, College <strong>of</strong> Engineering Director, & Founder, <strong>CyLab</strong>: Virgil <strong>CyLab</strong>: Gligor Pradeep K. Khosla, Ph.D.<br />

Table <strong>of</strong> Contents<br />

Table <strong>of</strong> Contents<br />

Carnegie Mellon <strong>CyLab</strong><br />

Adjunct Distinguished Director, <strong>CyLab</strong>: Fellow: Virgil Jody Gligor R. Westby<br />

Adjunct Distinguished Fellow: Jody R. Westby<br />

Jody R. Westby, Esq.<br />

Jody R. Westby, CEO Esq.<br />

Global Cyber CEO Risk LLC<br />

5125 Global MacArthur Cyber Risk Blvd., LLC NW<br />

5125 MacArthur Third Floor Blvd., NW<br />

Washington, Third Floor DC 20016<br />

(202) 537-5070 Washington, • (202) DC 537-5073 20016 (Fax)<br />

(202) 537-5070 • (202) 537-5073 (Fax)<br />

""!<br />

""!


Table <strong>of</strong> Contents<br />

Table <strong>of</strong> Contents<br />

#$%&'!()!*(+,'+,- .................................................................................................................................................... """!<br />

/%%0'1"$,"(+- ............................................................................................................................................................"1!<br />

#$%&'!()!*(+,'+,- .................................................................................................................................................... """!<br />

/%(2,!*$0+'3"'!4'&&(+!*56$% .............................................................................................................................7!<br />

/%%0'1"$,"(+- ............................................................................................................................................................"1!<br />

/%(2,!8(95!:.!;'-,%5..............................................................................................................................................


Abbreviations<br />

Abbreviations<br />

ABA American Bar Association<br />

ABA<br />

ASIS American<br />

American<br />

Society<br />

Bar Association<br />

for Industrial <strong>Security</strong><br />

CEO<br />

ASIS<br />

Chief<br />

American<br />

Executive<br />

Society<br />

Officer<br />

for Industrial <strong>Security</strong><br />

CERT<br />

CEO<br />

Computer<br />

Chief Executive<br />

Emergency<br />

Officer<br />

Response Team<br />

CFO<br />

CERT Computer<br />

Chief Financial<br />

Emergency<br />

Officer<br />

Response Team<br />

CFO<br />

CIO Chief<br />

Chief<br />

Information<br />

Financial Officer<br />

Officer<br />

CISO<br />

CIO<br />

Chief<br />

Chief<br />

Information<br />

Information<br />

<strong>Security</strong><br />

Officer<br />

Officer<br />

CMU<br />

CISO<br />

Carnegie<br />

Chief Information<br />

Mellon University<br />

<strong>Security</strong> Officer<br />

CMU<br />

CoE Council<br />

Carnegie<br />

<strong>of</strong><br />

Mellon<br />

Europe<br />

University<br />

COO<br />

CoE<br />

Chief<br />

Council<br />

Operating<br />

<strong>of</strong> Europe<br />

Officer<br />

CPO<br />

COO Chief<br />

Chief<br />

Operating<br />

Privacy Officer<br />

Officer<br />

CRO<br />

CPO<br />

Chief<br />

Chief<br />

Risk<br />

Privacy<br />

Officer<br />

Officer<br />

CSO<br />

CRO<br />

Chief<br />

Chief<br />

<strong>Security</strong><br />

Risk Officer<br />

Officer<br />

CSO<br />

<strong>CyLab</strong> Carnegie<br />

Chief <strong>Security</strong><br />

Mellon<br />

Officer<br />

<strong>CyLab</strong><br />

D&Os<br />

<strong>CyLab</strong><br />

Directors<br />

Carnegie Mellon<br />

& Officers<br />

<strong>CyLab</strong><br />

eGRC<br />

D&Os<br />

<strong>Enterprise</strong><br />

Directors &<br />

<strong>Governance</strong>,<br />

Officers<br />

Risk, and Compliance<br />

EU<br />

eGRC<br />

European<br />

<strong>Enterprise</strong><br />

Union<br />

<strong>Governance</strong>, Risk, and Compliance<br />

FDA<br />

EU<br />

Food<br />

European<br />

and Drug<br />

Union<br />

Administration<br />

FTC<br />

FDA<br />

Federal<br />

Food and<br />

Trade<br />

Drug<br />

Commission<br />

Administration<br />

GLBA<br />

FTC Federal<br />

Gramm-Leach-Bliley<br />

Trade Commission<br />

Act<br />

HITECH<br />

GLBA<br />

Act Health<br />

Gramm-Leach-Bliley<br />

Information Technology<br />

Act<br />

for Economic and Clinical Health Act<br />

HIPAA<br />

HITECH Act<br />

Health<br />

Health<br />

Insurance<br />

Information<br />

Portability<br />

Technology<br />

and<br />

for<br />

Accountability<br />

Economic and<br />

Act<br />

Clinical Health Act<br />

ISACA<br />

HIPAA<br />

Information<br />

Health Insurance<br />

Systems<br />

Portability<br />

Audit and<br />

and<br />

Control<br />

Accountability<br />

Association<br />

Act<br />

ISO<br />

ISACA<br />

International<br />

Information Systems<br />

Organization<br />

Audit<br />

for<br />

and<br />

Standardization<br />

Control Association<br />

ISSA<br />

ISO<br />

Information<br />

International<br />

Systems<br />

Organization<br />

<strong>Security</strong><br />

for<br />

Association<br />

Standardization<br />

IT<br />

ISSA Information<br />

Information<br />

Systems<br />

Technology<br />

<strong>Security</strong> Association<br />

ITU<br />

IT<br />

International<br />

Information Technology<br />

Telecommunication Union<br />

ITGI<br />

ITU International<br />

Information Technology<br />

Telecommunication<br />

<strong>Governance</strong><br />

Union<br />

Institute<br />

NIST<br />

ITGI<br />

National<br />

Information<br />

Institute<br />

Technology<br />

<strong>of</strong> Standards<br />

<strong>Governance</strong><br />

& Technology<br />

Institute<br />

NSA<br />

NIST<br />

National<br />

National<br />

<strong>Security</strong><br />

Institute<br />

Agency<br />

<strong>of</strong> Standards & Technology<br />

NSF<br />

NSA<br />

National<br />

National<br />

Science<br />

<strong>Security</strong><br />

Foundation<br />

Agency<br />

PII<br />

NSF<br />

Personally<br />

National Science<br />

Identifiable<br />

Foundation<br />

Information<br />

PwC<br />

PII<br />

PricewaterhouseCoopers<br />

Personally Identifiable Information<br />

PwC<br />

R&D Research<br />

PricewaterhouseCoopers<br />

& Development<br />

SEC<br />

R&D<br />

Securities<br />

Research &<br />

and<br />

Development<br />

Exchange Commission<br />

SIEM<br />

SEC Securities<br />

<strong>Security</strong> Information<br />

and Exchange<br />

and<br />

Commission<br />

Event Management<br />

SIEM<br />

SOD Segregation<br />

<strong>Security</strong> Information<br />

<strong>of</strong> Duties<br />

and Event Management<br />

U.S.<br />

SOD<br />

United<br />

Segregation<br />

States<br />

<strong>of</strong> Duties<br />

U.S. United States<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

"1!<br />

"1!


About Carnegie Mellon <strong>CyLab</strong><br />

About Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong> is one <strong>of</strong> the largest university-based cyber cybersecurity security research and education centers in<br />

Carnegie the U.S. <strong>CyLab</strong> Mellon is <strong>CyLab</strong> located is in one the <strong>of</strong> College the largest <strong>of</strong> Engineering university-based at Carnegie cyber security Mellon research University and and education has campuses centers in<br />

in<br />

the Silicon U.S. Valley Valley <strong>CyLab</strong> and is Pittsburgh.<br />

located in the College <strong>of</strong> Engineering at Carnegie Mellon University and has campuses in<br />

Silicon Valley and Pittsburgh.<br />

Carnegie Mellon Mellon <strong>CyLab</strong> is a bold and visionary effort, which establishes public-private public-private partnerships to<br />

Carnegie develop new Mellon technologies <strong>CyLab</strong> is for a bold measurable, and visionary secure, effort, available, which trustworthy, establishes public-private and sustainable partnerships computing to and<br />

develop communications new technologies systems. <strong>CyLab</strong> for measurable, is a world world secure, leader available, in both technological trustworthy, research research and sustainable and and the computing education <strong>of</strong><br />

and<br />

communications pr<strong>of</strong>essionals pr<strong>of</strong>essionals in information systems. <strong>CyLab</strong> assurance, is a world security leader technology, in both technological business and research policy, as and well the as education security awareness<br />

<strong>of</strong><br />

pr<strong>of</strong>essionals among cybercitizens in information <strong>of</strong> all ages.<br />

assurance, security technology, business and policy, as well as security awareness<br />

among cybercitizens <strong>of</strong> all ages.<br />

Building Building on more than than two decades decades <strong>of</strong> Carnegie Mellon leadership in Information Technology, <strong>CyLab</strong> is a<br />

Building university-wide on more initiative than two that decades involves <strong>of</strong> more Carnegie than Mellon 50 faculty leadership and 100 in graduate Information students Technology, from more <strong>CyLab</strong> than is six<br />

a<br />

different university-wide departments initiative and that schools. involves more than 50 faculty and 100 graduate students from more than six<br />

different departments and schools.<br />

<strong>CyLab</strong> is:<br />

<strong>CyLab</strong> • is: A National Science Foundation (NSF) CyberTrust Center<br />

• A Affiliated National with Science CERT, Foundation at the S<strong>of</strong>tware (NSF) Engineering CyberTrust Center Institute<br />

• Affiliated A key partner with in CERT, NSF-funded at the S<strong>of</strong>tware Center for Engineering Team Research Institute in Ubiquitous Secure Technology<br />

• A National key National partner <strong>Security</strong> in NSF-funded Agency (NSA) Center Center for Team <strong>of</strong> Academic Research Excellence in Ubiquitous in Information Secure Technology Assurance<br />

• A Education National and <strong>Security</strong> a Center Agency for Academic (NSA) Center Excellence <strong>of</strong> Academic in Research.<br />

Excellence in Information Assurance<br />

Education and a Center for Academic Excellence in Research.<br />

Carnegie Carnegie Mellon Mellon <strong>CyLab</strong> <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />

7!<br />

7!


About About Jody Jody R. R. Westby Westby<br />

About Jody R. Westby<br />

Drawing upon a unique combination <strong>of</strong> more than 20 years <strong>of</strong> technical, legal, policy, and business<br />

experience, Ms. Westby provides consulting and legal services to public and private sector clients in the areas<br />

<strong>of</strong> privacy, security, cybercrime, breach management, and IT governance. Her services include governance<br />

assistance to boards and senior management, security risk assessments, global compliance reviews, security<br />

investigations, and high-value data protection evaluations. Her company, Global Cyber Risk LLC, is a<br />

preferred provider <strong>of</strong> privacy and security consulting services to Reed Smith.<br />

Ms. Westby serves as Adjunct Distinguished Fellow at Carnegie Mellon <strong>CyLab</strong>. She was lead author on<br />

Carnegie Mellon’s Governing for <strong>Enterprise</strong> <strong>Security</strong> Implementation Guide, 1 Drawing upon a unique combination <strong>of</strong> more than 20 years <strong>of</strong> technical, legal, policy, and business<br />

experience, Ms. Westby provides consulting and legal services to public and private sector clients in the areas<br />

<strong>of</strong> privacy, security, cybercrime, breach management, and IT governance. Her services include governance<br />

assistance to boards and senior management, security risk assessments, global compliance reviews, security<br />

investigations, and high-value data protection evaluations. Her company, Global Cyber Risk LLC, is a<br />

preferred provider <strong>of</strong> privacy and security consulting services to Reed Smith.<br />

which was developed for boards and<br />

Ms. Westby serves as Adjunct Distinguished Fellow at Carnegie Mellon <strong>CyLab</strong>. She was lead author on<br />

senior management, and its 2008 and 2010 <strong>Governance</strong> <strong>of</strong> <strong>Enterprise</strong> <strong>Security</strong> Survey reports. Ms. Westby’s work<br />

Carnegie Mellon’s Governing for <strong>Enterprise</strong> <strong>Security</strong> Implementation Guide,<br />

for Carnegie Mellon on the governance responsibilities <strong>of</strong> boards and senior executives for the security <strong>of</strong><br />

their organizations’ systems and data has been showcased by the CISO Executive Network and Bloomberg<br />

BNA’s Privacy & <strong>Security</strong> Law <strong>Report</strong>.<br />

Prior to founding Global Cyber Risk, Ms. Westby served as senior managing director for<br />

PricewaterhouseCoopers (PwC) where she was responsible for information security, privacy, information<br />

sharing, and critical infrastructure protection issues across the federal government. She also was co-lead in<br />

launching their outsourcing practice. Before joining PwC, Ms. Westby founded the Work-IT Group, and<br />

specialized in serving government and private sector clients on legal and regulatory issues associated with<br />

information technology and online business. Ms. Westby has advised government <strong>of</strong>ficials and industry in<br />

countries around the world on the development <strong>of</strong> their legal frameworks for e-commerce and security.<br />

Previously, Ms. Westby launched In-Q-Tel, an IT solutions/venture capital company founded by the CIA,<br />

was Senior Fellow & Director <strong>of</strong> IT Studies for the Progress & Freedom Foundation, and was Director <strong>of</strong><br />

Domestic Policy for the U.S. Chamber <strong>of</strong> Commerce. She also practiced law with the New York firms <strong>of</strong><br />

Shearman & Sterling and Paul, Weiss, Rifkind, Wharton & Garrison.<br />

Ms. Westby is a pr<strong>of</strong>essional blogger for Forbes on cybersecurity and privacy issues. She is chair <strong>of</strong> the<br />

American Bar Association’s (ABA) Privacy and Computer Crime Committee and was chair, co-author and<br />

editor <strong>of</strong> its International Guide to Combating Cybercrime, International Guide to Cyber <strong>Security</strong>, International Guide to<br />

Privacy, and Roadmap to an <strong>Enterprise</strong> <strong>Security</strong> Program (endorsed by the Global CSO Council). She was editor<br />

and co-author <strong>of</strong> the 2010 UN publication, The Quest for Cyber Peace and is author <strong>of</strong> two books on legal issues<br />

associated with cyber security research.<br />

She is co-chair <strong>of</strong> the World Federation <strong>of</strong> Scientists’ Permanent Monitoring Panel on Information <strong>Security</strong><br />

and was appointed to the United Nations’ ITU High Level Experts Group on Cyber <strong>Security</strong>. She also serves<br />

on the advisory board <strong>of</strong> The Intellectual Property Counselor and Bloomberg BNA’s Privacy and <strong>Security</strong> Law <strong>Report</strong>.<br />

Ms. Westby is a member <strong>of</strong> the bars <strong>of</strong> the District <strong>of</strong> Columbia, Colorado, and Pennsylvania, and <strong>of</strong> the<br />

ABA. She received her B.A., summa cum laude, from the University <strong>of</strong> Tulsa and her J.D., magna cum laude,<br />

from Georgetown University Law Center. She is a member <strong>of</strong> the Order <strong>of</strong> the Coif, the American Bar<br />

Foundation, and the Cosmos Club.<br />

1 Drawing upon a unique combination <strong>of</strong> more than 20 years <strong>of</strong> technical, legal, policy, and business<br />

experience, Ms. Westby provides consulting and legal services to public and private sector clients in the areas<br />

<strong>of</strong> privacy, security, cybercrime, breach management, and IT governance. Her services include governance<br />

assistance to boards and senior management, security risk assessments, global compliance reviews, security<br />

investigations, and high-value data protection evaluations. Her company, Global Cyber Risk LLC, is a<br />

preferred provider <strong>of</strong> privacy and security consulting services to Reed Smith.<br />

Ms. Westby serves as Adjunct Distinguished Fellow at Carnegie Mellon <strong>CyLab</strong>. She was lead author on<br />

Carnegie Mellon’s Governing for <strong>Enterprise</strong> <strong>Security</strong> Implementation Guide,<br />

which was developed for boards and<br />

senior management, and its 2008 and 2010 <strong>Governance</strong> <strong>of</strong> <strong>Enterprise</strong> <strong>Security</strong> Survey reports. Ms. Westby’s work<br />

for Carnegie Mellon on the governance responsibilities <strong>of</strong> boards and senior executives for the security <strong>of</strong><br />

their organizations’ systems and data has been showcased by the CISO Executive Network and Bloomberg<br />

BNA’s Privacy & <strong>Security</strong> Law <strong>Report</strong>.<br />

Prior to founding Global Cyber Risk, Ms. Westby served as senior managing director for<br />

PricewaterhouseCoopers (PwC) where she was responsible for information security, privacy, information<br />

sharing, and critical infrastructure protection issues across the federal government. She also was co-lead in<br />

launching their outsourcing practice. Before joining PwC, Ms. Westby founded the Work-IT Group, and<br />

specialized in serving government and private sector clients on legal and regulatory issues associated with<br />

information technology and online business. Ms. Westby has advised government <strong>of</strong>ficials and industry in<br />

countries around the world on the development <strong>of</strong> their legal frameworks for e-commerce and security.<br />

Previously, Ms. Westby launched In-Q-Tel, an IT solutions/venture capital company founded by the CIA,<br />

was Senior Fellow & Director <strong>of</strong> IT Studies for the Progress & Freedom Foundation, and was Director <strong>of</strong><br />

Domestic Policy for the U.S. Chamber <strong>of</strong> Commerce. She also practiced law with the New York firms <strong>of</strong><br />

Shearman & Sterling and Paul, Weiss, Rifkind, Wharton & Garrison.<br />

Ms. Westby is a pr<strong>of</strong>essional blogger for Forbes on cybersecurity and privacy issues. She is chair <strong>of</strong> the<br />

American Bar Association’s (ABA) Privacy and Computer Crime Committee and was chair, co-author and<br />

editor <strong>of</strong> its International Guide to Combating Cybercrime, International Guide to Cyber <strong>Security</strong>, International Guide to<br />

Privacy, and Roadmap to an <strong>Enterprise</strong> <strong>Security</strong> Program (endorsed by the Global CSO Council). She was editor<br />

and co-author <strong>of</strong> the 2010 UN publication, The Quest for Cyber Peace and is author <strong>of</strong> two books on legal issues<br />

associated with cyber security research.<br />

She is co-chair <strong>of</strong> the World Federation <strong>of</strong> Scientists’ Permanent Monitoring Panel on Information <strong>Security</strong><br />

and was appointed to the United Nations’ ITU High Level Experts Group on Cyber <strong>Security</strong>. She also serves<br />

on the advisory board <strong>of</strong> The Intellectual Property Counselor and Bloomberg BNA’s Privacy and <strong>Security</strong> Law <strong>Report</strong>.<br />

Ms. Westby is a member <strong>of</strong> the bars <strong>of</strong> the District <strong>of</strong> Columbia, Colorado, and Pennsylvania, and <strong>of</strong> the<br />

ABA. She received her B.A., summa cum laude, from the University <strong>of</strong> Tulsa and her J.D., magna cum laude,<br />

from Georgetown University Law Center. She is a member <strong>of</strong> the Order <strong>of</strong> the Coif, the American Bar<br />

Foundation, and the Cosmos Club.<br />

1 which was developed for boards and<br />

senior management, and its 2008 and 2010 <strong>Governance</strong> <strong>of</strong> <strong>Enterprise</strong> <strong>Security</strong> Survey reports. Ms. Westby’s work<br />

for Carnegie Mellon on the governance responsibilities <strong>of</strong> boards and senior executives for the security <strong>of</strong><br />

their organizations’ systems and data has been showcased by the CISO Executive Network and Bloomberg<br />

BNA’s Privacy & <strong>Security</strong> Law <strong>Report</strong>.<br />

Prior to founding Global Cyber Risk, Ms. Westby served as senior managing director for<br />

PricewaterhouseCoopers (PwC) where she was responsible for information security, privacy, information<br />

sharing, and critical infrastructure protection issues across the federal government. She also was co-lead in<br />

launching their outsourcing practice. Before joining PwC, Ms. Westby founded the Work-IT Group, and<br />

specialized in serving government and private sector clients on legal and regulatory issues associated with<br />

information technology and online business. Ms. Westby has advised government <strong>of</strong>ficials and industry in<br />

countries around the world on the development <strong>of</strong> their legal frameworks for e-commerce and security.<br />

Previously, Ms. Westby launched In-Q-Tel, an IT solutions/venture capital company founded by the CIA,<br />

was Senior Fellow & Director <strong>of</strong> IT Studies for the Progress & Freedom Foundation, and was Director <strong>of</strong><br />

Domestic Policy for the U.S. Chamber <strong>of</strong> Commerce. She also practiced law with the New York firms <strong>of</strong><br />

Shearman & Sterling and Paul, Weiss, Rifkind, Wharton & Garrison.<br />

Ms. Westby is a pr<strong>of</strong>essional blogger for Forbes on cybersecurity and privacy issues. She is chair <strong>of</strong> the<br />

American Bar Association’s (ABA) Privacy and Computer Crime Committee and was chair, co-author and<br />

editor <strong>of</strong> its International Guide to Combating Cybercrime, International Guide to Cyber <strong>Security</strong>, International Guide to<br />

Privacy, and Roadmap to an <strong>Enterprise</strong> <strong>Security</strong> Program (endorsed by the Global CSO Council). She was editor<br />

and co-author <strong>of</strong> the 2010 UN publication, The Quest for Cyber Peace and is author <strong>of</strong> two books on legal issues<br />

associated with cybersecurity research.<br />

She is co-chair <strong>of</strong> the World Federation <strong>of</strong> Scientists’ Permanent Monitoring Panel on Information <strong>Security</strong><br />

and was appointed to the United Nations’ ITU High Level Experts Group on Cybersecurity. She also serves<br />

on the advisory board <strong>of</strong> The Intellectual Property Counselor and Bloomberg BNA’s Privacy and <strong>Security</strong> Law <strong>Report</strong>.<br />

Ms. Westby is a member <strong>of</strong> the bars <strong>of</strong> the District <strong>of</strong> Columbia, Colorado, and Pennsylvania, and <strong>of</strong> the<br />

ABA. She received her B.A., summa cum laude, from the University <strong>of</strong> Tulsa and her J.D., magna cum laude,<br />

from Georgetown University Law Center. She is a member <strong>of</strong> the Order <strong>of</strong> the Coif, the American Bar<br />

Foundation, and the Cosmos Club.<br />

Carnegie Carnegie Mellon Mellon <strong>CyLab</strong> <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />


About <strong>RSA</strong><br />

About <strong>RSA</strong><br />

Founded in 1982, <strong>RSA</strong>, The <strong>Security</strong> Division <strong>of</strong> EMC, is the premier provider <strong>of</strong> security, risk and<br />

compliance management solutions for business acceleration. <strong>RSA</strong> helps the world’s leading organizations<br />

Founded solve their in most 1982, complex <strong>RSA</strong>, The and <strong>Security</strong> sensitive Division security challenges. <strong>of</strong> EMC, is These the premier challenges provider include <strong>of</strong> managing security, risk organizational and<br />

compliance risk, safeguarding management mobile solutions access and for collaboration, business acceleration. proving compliance, <strong>RSA</strong> helps the and world’s securing leading virtual organizations and cloud<br />

solve environments. their most complex and sensitive security challenges. These challenges include managing organizational<br />

risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud<br />

environments.<br />

Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss<br />

Prevention, Continuous Network Monitoring, and Fraud Protection with industry-leading eGRC capabilities<br />

and Combining robust consulting business-critical services, controls <strong>RSA</strong> brings in identity visibility assurance, and trust encryption to millions & key <strong>of</strong> user management, identities, SIEM, the transactions Data Loss<br />

that Prevention, they perform, Continuous and the Network data that Monitoring, is generated. and Fraud Protection with industry-leading eGRC capabilities<br />

and<br />

<strong>RSA</strong>’s<br />

robust<br />

industry<br />

consulting<br />

leading-solutions<br />

services, <strong>RSA</strong><br />

are<br />

brings<br />

designed<br />

visibility<br />

to work<br />

and<br />

together<br />

trust to<br />

to<br />

millions<br />

create a<br />

<strong>of</strong><br />

systematic<br />

user identities,<br />

approach<br />

the transactions<br />

to managing<br />

that<br />

security,<br />

they<br />

risk<br />

perform,<br />

and compliance<br />

and the data<br />

– eliminating<br />

that is generated.<br />

the hundreds <strong>of</strong> security and compliance silos that exist in most<br />

<strong>RSA</strong>’s organizations industry today. leading-solutions Our technology are designed solutions to for work physical, together virtual to create and cloud a systematic computing approach environments to managing<br />

security, include: risk and compliance – eliminating the hundreds <strong>of</strong> security and compliance silos that exist in most<br />

organizations<br />

• Authentication<br />

today. Our<br />

– A<br />

technology<br />

wide range<br />

solutions<br />

<strong>of</strong> strong<br />

for<br />

two-factor<br />

physical,<br />

authentication<br />

virtual and cloud<br />

solutions<br />

computing<br />

to help<br />

environments<br />

organizations<br />

include:<br />

assure user identities and meet compliance requirements.<br />

• Access<br />

Authentication<br />

Control – Access<br />

A wide<br />

control<br />

range <strong>of</strong><br />

solutions<br />

strong two-factor<br />

manage access,<br />

authentication<br />

federate identities<br />

solutions<br />

and<br />

to help<br />

enforce<br />

organizations<br />

organizational<br />

policies<br />

assure user<br />

across<br />

identities<br />

multiple<br />

and<br />

web<br />

meet<br />

resources,<br />

compliance<br />

portals<br />

requirements.<br />

and applications.<br />

• Data<br />

Access<br />

Loss<br />

Control<br />

Prevention—Identify<br />

– Access control<br />

and<br />

solutions<br />

enforce<br />

manage<br />

policies<br />

access,<br />

to prevent<br />

federate<br />

the<br />

identities<br />

loss or misuse<br />

and enforce<br />

<strong>of</strong> sensitive<br />

organizational<br />

data –<br />

policies<br />

whether<br />

across<br />

at rest<br />

multiple<br />

in a data<br />

web<br />

center,<br />

resources,<br />

in motion<br />

portals<br />

over<br />

and<br />

the<br />

applications.<br />

network, or in use on a laptop or desktop.<br />

•<br />

Data<br />

Encryption,<br />

Loss Prevention—Identify<br />

Tokenization, and Key<br />

and<br />

Management—<br />

enforce policies<br />

Secures<br />

to prevent<br />

sensitive<br />

the<br />

data<br />

loss<br />

stored<br />

or misuse<br />

in file<br />

<strong>of</strong><br />

systems<br />

sensitive<br />

on<br />

data<br />

servers<br />

–<br />

and<br />

whether<br />

endpoints<br />

at rest<br />

and<br />

in a<br />

at<br />

data<br />

the<br />

center,<br />

point <strong>of</strong><br />

in<br />

capture.<br />

motion over<br />

<strong>RSA</strong><br />

the<br />

key<br />

network,<br />

management<br />

or in<br />

solutions<br />

use on a laptop<br />

simplify<br />

or<br />

the<br />

desktop.<br />

provisioning,<br />

• Encryption, distribution, Tokenization, and management and Key <strong>of</strong> Management— encryption keys. Secures sensitive data stored in file systems on servers<br />

•<br />

and<br />

Fraud<br />

endpoints<br />

Prevention—Reduces<br />

and at the point<br />

the risk<br />

<strong>of</strong> capture.<br />

<strong>of</strong> fraud and<br />

<strong>RSA</strong><br />

identity<br />

key management<br />

theft by assuring<br />

solutions<br />

user<br />

simplify<br />

identities,<br />

the<br />

monitoring<br />

provisioning,<br />

distribution,<br />

for high-risk<br />

and<br />

activities,<br />

management<br />

and mitigating<br />

<strong>of</strong> encryption<br />

the damage<br />

keys.<br />

caused by external threats such as phishing,<br />

• pharming, Fraud Prevention—Reduces Trojans, and other the cyber risk <strong>of</strong> threats. fraud and identity theft by assuring user identities, monitoring<br />

• <strong>Enterprise</strong><br />

for high-risk<br />

<strong>Governance</strong>,<br />

activities,<br />

Risk<br />

and<br />

and<br />

mitigating<br />

Compliance—Helps<br />

the damage<br />

to<br />

caused<br />

manage<br />

by<br />

the<br />

external<br />

lifecycle<br />

threats<br />

<strong>of</strong> corporate<br />

such as phishing,<br />

policies and<br />

objectives<br />

pharming,<br />

by<br />

Trojans,<br />

analyzing<br />

and<br />

and<br />

other<br />

responding<br />

cyber threats.<br />

to enterprise risk and demonstrating compliance with a real-<br />

• time <strong>Enterprise</strong> view <strong>Governance</strong>, into the state Risk <strong>of</strong> and compliance Compliance—Helps and risk level. to manage the lifecycle <strong>of</strong> corporate policies and<br />

• Network<br />

objectives<br />

security<br />

by analyzing<br />

monitoring—Provides<br />

and responding<br />

real-time<br />

to enterprise<br />

visibility<br />

risk<br />

into<br />

and<br />

network<br />

demonstrating<br />

traffic and<br />

compliance<br />

log event<br />

with<br />

activity<br />

a real-<br />

for<br />

a<br />

time<br />

precise<br />

view<br />

and<br />

into<br />

actionable<br />

the state <strong>of</strong><br />

understanding<br />

compliance and<br />

<strong>of</strong> everything<br />

risk level.<br />

happening on the network. Enables<br />

• Network organizations security to monitoring—Provides identify, prioritize, and real-time remediate visibility complex into network IT risks, traffic gain efficiencies and log event in their activity incident for<br />

management a precise and process actionable and understanding improve their <strong>of</strong> overall everything operational happening effectiveness. on the network. Enables<br />

• <strong>Security</strong><br />

organizations<br />

Information<br />

to identify,<br />

and Event<br />

prioritize,<br />

Management—Transforms<br />

and remediate complex<br />

raw log<br />

IT<br />

and<br />

risks,<br />

event<br />

gain<br />

data<br />

efficiencies<br />

into critical<br />

in their<br />

information<br />

incident<br />

management<br />

to help organizations<br />

process and<br />

simplify<br />

improve<br />

compliance,<br />

their overall<br />

identify<br />

operational<br />

and respond<br />

effectiveness.<br />

to high-risk events, and optimize IT<br />

• <strong>Security</strong> and network Information operations. and Event Management—Transforms raw log and event data into critical information<br />

For more<br />

to<br />

information,<br />

help organizations<br />

please visit<br />

simplify<br />

www.<strong>RSA</strong>.com<br />

compliance,<br />

and<br />

identify<br />

www.EMC.com.<br />

and respond to high-risk events, and optimize IT<br />

and network operations.<br />

For Carnegie more information, Mellon <strong>CyLab</strong> please visit www.<strong>RSA</strong>.com and www.EMC.com.<br />

!<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

>!<br />

>!


About Forbes<br />

About Forbes<br />

Forbes Media encompasses Forbes and Forbes.com<br />

(www.forbes.com), the leading business site on the Web that reaches on average<br />

Forbes 30 million Media people encompasses monthly. The Forbes company and Forbes.com<br />

publishes Forbes, Forbes Asia and Forbes Europe, which together<br />

(www.forbes.com), reach a worldwide audience <strong>of</strong> more than six million the leading readers. business It also site publishes on the ForbesLife Web that reaches magazine, on average in<br />

addition 30 million to people licensee monthly. editions The in Africa, company Argentina, publishes Bulgaria, Forbes, China, Forbes Croatia, Asia and Czech Forbes Republic, Europe, Estonia, which together Georgia,<br />

India, reach a Indonesia, worldwide Israel, audience Kazakhstan, <strong>of</strong> more than Korea, six Latvia, million Middle readers. East, It also Poland, publishes Romania, ForbesLife Russia, magazine, Slovakia, in Turkey,<br />

addition and Ukraine. to licensee editions in Africa, Argentina, Bulgaria, China, Croatia, Czech Republic, Estonia, Georgia,<br />

India, Indonesia, Israel, Kazakhstan, Korea, Latvia, Middle East, Poland, Romania, Russia, Slovakia, Turkey,<br />

and Other Ukraine. Forbes Media Web sites are:<br />

ForbesWoman.com http://ForbesWoman.com<br />

Other Forbes Media Web sites are:<br />

RealClearPolitics.com http://RealClearPolitics.com<br />

ForbesWoman.com http://ForbesWoman.com<br />

RealClearMarkets.com http://RealClearMarkets.com<br />

RealClearPolitics.com http://RealClearPolitics.com<br />

RealClearSports.com http://RealClearSports.com<br />

RealClearMarkets.com http://RealClearMarkets.com<br />

RealClearWorld.com http://RealClearWorld.com.<br />

RealClearSports.com http://RealClearSports.com<br />

Together with Forbes.com, http://Forbes.com, these sites reach on average 36 million business decision<br />

makers<br />

RealClearWorld.com<br />

each month.<br />

http://RealClearWorld.com.<br />

Steve<br />

Together<br />

Forbes<br />

with<br />

serves<br />

Forbes.com,<br />

as Chairman<br />

http://Forbes.com,<br />

and Editor in Chief.<br />

these sites<br />

Mike<br />

reach<br />

Perlis<br />

on<br />

is<br />

average<br />

President<br />

36<br />

and<br />

million<br />

Chief<br />

business<br />

Executive<br />

decision<br />

Officer.<br />

makers<br />

Lewis D’Vorkin<br />

each month.<br />

is Chief Product Officer. Meredith Kopit Levien is Chief Revenue Officer.<br />

Steve Forbes serves as Chairman and Editor in Chief. Mike Perlis is President and Chief Executive Officer.<br />

Lewis D’Vorkin is Chief Product Officer. Meredith Kopit Levien is Chief Revenue Officer.<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

@!<br />

@!


Executive Executive Summary Summary<br />

Executive Summary<br />

It has long been recognized recognized that that directors directors and<br />

<strong>of</strong>ficers <strong>of</strong>ficers have have a a fiduciary fiduciary duty duty to to protect protect the the assets assets<br />

It <strong>of</strong> has their long organizations. been recognized Today, that this directors duty duty extends extends and to<br />

digital <strong>of</strong>ficers digital assets, assets, have a and and fiduciary has has been been duty expanded expanded to protect by by the laws laws assets and and<br />

regulations <strong>of</strong> regulations their organizations. that that impose impose Today, specific specific this privacy privacy duty and and extends cyber to<br />

digital security cybersecurity assets, obligations and obligations has on been companies. on expanded companies. by laws and<br />

regulations that impose specific privacy and cyber<br />

This security This is is the the obligations third third biennial biennial on companies. survey survey that that Carnegie Carnegie<br />

Mellon <strong>CyLab</strong> has conducted on how boards boards <strong>of</strong><br />

directors This directors is the and third senior biennial management management survey that are are Carnegie governing governing the<br />

security security Mellon <strong>CyLab</strong> <strong>of</strong> <strong>of</strong> their their has organizations’ organizations’ conducted on information, information, how boards <strong>of</strong><br />

applications, applications, directors and and senior networks networks management (digital (digital are assets). governing First First the<br />

conducted conducted security <strong>of</strong> their in in 2008 2008 organizations’ and and carried forward information, in in 2010 and<br />

applications, <strong>2012</strong>, <strong>2012</strong>, the the surveys surveys and networks are are intended intended (digital to to measure measure assets). the the First extent extent to to which which cyber cyber governance governance is is improving. improving. The The <strong>2012</strong> <strong>2012</strong><br />

conducted survey is the in first 2008 global and carried governance forward survey, in 2010 comparing and responses from industry sectors and geographical geographical<br />

regions. <strong>2012</strong>, regions. the surveys are intended to measure the extent to which cyber governance is improving. The <strong>2012</strong><br />

survey is the first global governance survey, comparing responses from industry sectors and geographical<br />

regions.<br />

The The <strong>CyLab</strong> <strong>CyLab</strong> <strong>2012</strong> <strong>2012</strong> survey survey is is based based upon upon results results received received from 108 108<br />

57% 57% <strong>of</strong> respondents are are not not<br />

respondents respondents at the the board board or senior senior executive executive level from from Forbes Forbes<br />

analyzing the adequacy <strong>of</strong> <strong>of</strong> Global The Global <strong>CyLab</strong> 2000 2000 <strong>2012</strong> companies. companies. survey is Half Half based <strong>of</strong> <strong>of</strong> upon the the respondents respondents results received are board board from 108<br />

57% <strong>of</strong> respondents are not<br />

cyber insurance coverage or members, respondents members, and and at the the other other board half half or senior are non-director non-director executive level senior senior from executives. executives. Forbes<br />

analyzing the adequacy <strong>of</strong> Twenty-four Twenty-four Global 2000 companies. percent percent (24%) (24%) Half <strong>of</strong> <strong>of</strong> <strong>of</strong> the the the respondents respondents are are are board board board chairs chairs and and<br />

undertaking or undertaking key key activities<br />

cyber insurance coverage 44% 44% members, are are on on and board board the other Audit, Audit, half <strong>Governance</strong>, <strong>Governance</strong>, are non-director or Risk Risk senior Committees. Committees. executives. SeventySeventy- related activities to cyber related risk to cyber fivefive Twenty-four percent percent (75%) (75%) percent <strong>of</strong> <strong>of</strong> (24%) the the respondents respondents <strong>of</strong> the respondents are are from are critical critical board infrastructure<br />

infrastructure chairs and<br />

or undertaking key<br />

management risk management to help to them help companies. companies. 44% are on board Audit, <strong>Governance</strong>, or Risk Committees. Seventy-<br />

activities related to cyber<br />

manage them manage reputational reputational and<br />

five percent (75%) <strong>of</strong> the respondents are from critical infrastructure<br />

risk management to help For companies. For the the third third time, time, the the survey survey revealed revealed that that boards boards are not not actively actively<br />

financial and financial risks associated risks with<br />

addressing addressing cyber cyber risk risk management. management. While While placing placing high high importance importance<br />

them manage reputational<br />

the associated theft <strong>of</strong> confidential with the theft and <strong>of</strong> on For on risk risk the management management third time, the generally, generally, survey revealed there there is still still that a a boards gap gap in in are understanding understanding not actively the the<br />

and financial risks<br />

proprietary confidential data and and proprietary security linkage addressing linkage between between cyber information information risk management. technology technology While (IT) (IT) placing risks risks high and and enterprise enterprise importance risk risk<br />

associated with the theft <strong>of</strong> management. on management. risk management Although Although generally, there there have have there been been is still some some a gap measureable measureable in understanding the<br />

breaches.<br />

data and security breaches.<br />

confidential and proprietary improvements linkage improvements between since since information the the 2008 2008 technology and and 2010 2010 surveys, surveys, (IT) risks boards boards and enterprise still still are are not not risk<br />

undertaking key oversight activities related management. to cyber cyber risks, Although such as there reviewing have budgets, budgets, been some security security measureable program program<br />

data and security breaches.<br />

assessments, and and top-level top-level policies; assigning improvements roles roles and and responsibilities since the 2008 and for privacy 2010 surveys, and security; security; boards and still receiving<br />

are not<br />

regular undertaking regular reports reports key on on oversight breaches breaches activities and and IT IT risks. risks. related Involvement Involvement to cyber risks, in in such these these as areas areas reviewing would would budgets, help help them them security manage manage program reputational reputational<br />

and assessments, and financial financial and risks risks top-level associated associated policies; with with the the assigning theft theft <strong>of</strong> roles confidential confidential and responsibilities and proprietary proprietary for privacy data and and security security; breaches and receiving <strong>of</strong><br />

personal regular personal reports information. information. on breaches and IT risks. Involvement in these areas would help them manage reputational<br />

and financial risks associated with the theft <strong>of</strong> confidential and proprietary data and security breaches <strong>of</strong><br />

Improvements personal Improvements information. are are largely largely organizational. There has been a a noticeable noticeable increase increase in the the number <strong>of</strong> <strong>of</strong> boards boards with with<br />

Risk Committees responsible for for privacy privacy and and security security risks risks (48% in in <strong>2012</strong> <strong>2012</strong> compared compared with with 8% 8% in in 2008) 2008) and and in<br />

the Improvements the number number <strong>of</strong> <strong>of</strong> companies companies are largely organizational. that that have have established established There cross-organizational cross-organizational has been a noticeable teams teams increase to to manage manage in the number privacy privacy and and <strong>of</strong> boards security security with<br />

risks Risk risks Committees (72% in <strong>2012</strong> responsible compared compared for with with privacy 17% 17% in and 2008). 2008). security Boards risks and (48% senior in <strong>2012</strong> management management compared are are with lagging, lagging, 8% in however, however, 2008) and in in<br />

the number <strong>of</strong> companies that have established cross-organizational teams to manage privacy and security<br />

Carnegie Carnegie Mellon Mellon <strong>CyLab</strong> <strong>CyLab</strong><br />

risks (72% in <strong>2012</strong> compared with 17% in 2008). Boards and senior management are lagging, however, in E!<br />

! !<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

E!


establishing key positions for privacy and security and appropriately assigning responsibilities. Less than two-<br />

establishing key positions for privacy and security and appropriately assigning responsibilities. Less than twothirds<br />

<strong>of</strong> the Forbes Global 2000 companies responding to the survey have full-time personnel in key roles for privacy and security<br />

thirds <strong>of</strong> the Forbes Global 2000 companies responding to the survey have full-time personnel in key roles for privacy and security<br />

(CISO/CSO, CPO, CRO) in a manner that is consistent with internationally accepted best practices and standards. An<br />

(CISO/CSO, CPO, CRO) in a manner that is consistent with internationally accepted best practices and standards. An<br />

amazing 82% <strong>of</strong> the respondents indicated that they did not have a CPO. In addition, the majority <strong>of</strong> CISOs<br />

amazing 82% <strong>of</strong> the respondents indicated that they did not have a CPO. In addition, the majority <strong>of</strong> CISOs<br />

(58%) and 47% <strong>of</strong> CSOs are assigned responsibility for both privacy and security and tend to report to the<br />

(58%) and 47% <strong>of</strong> CSOs are assigned responsibility for both privacy and security and tend to report to the<br />

CIO, creating segregation <strong>of</strong> duties (SOD) issues that are against best practices.<br />

CIO, creating segregation <strong>of</strong> duties (SOD) issues that are against best practices.<br />

Despite these organizational improvements, respondents indicated that Audit Committees and full boards are<br />

Despite these organizational improvements, respondents indicated that Audit Committees and full boards are<br />

still mostly responsible for oversight <strong>of</strong> risk. The report highlights the SOD issues that arise when Audit<br />

still mostly responsible for oversight <strong>of</strong> risk. The report highlights the SOD issues that arise when Audit<br />

Committees both oversee the development <strong>of</strong> security programs and also audit the controls and effectiveness<br />

Committees both oversee the development <strong>of</strong> security programs and also audit the controls and effectiveness<br />

<strong>of</strong> such programs.<br />

<strong>of</strong> such programs.<br />

Although most boards (89%) review risk assessments, less than half <strong>of</strong> them hire outside expertise to assist<br />

Although most boards (89%) review risk assessments, less than half <strong>of</strong> them hire outside expertise to assist<br />

with risk management. Only 16% <strong>of</strong> board Risk Committees and 16% <strong>of</strong> IT Committees hire outside<br />

with risk management. Only 16% <strong>of</strong> board Risk Committees and 16% <strong>of</strong> IT Committees hire outside<br />

experts. Despite 91% <strong>of</strong> the respondents indicating that risk management was being actively addressed by the<br />

experts. Despite 91% <strong>of</strong> the respondents indicating that risk management was being actively addressed by the<br />

board, the issues that received the least attention were IT operations (29%), computer and information<br />

board, the issues that received the least attention were IT operations (29%), computer and information<br />

security (33%), and vendor management (13%). The continuing low scores in these areas indicate that boards<br />

security (33%), and vendor management (13%). The continuing low scores in these areas indicate that boards<br />

do not understand that, today, all business operations are supported by computer systems and digital data,<br />

do not understand that, today, all business operations are supported by computer systems and digital data,<br />

and that risks in these areas can undermine operations. The low response for vendor management is<br />

and that risks in these areas can undermine operations. The low response for vendor management is<br />

concerning because it indicates that the privacy and security <strong>of</strong> data at cloud and s<strong>of</strong>tware providers and<br />

concerning because it indicates that the privacy and security <strong>of</strong> data at cloud and s<strong>of</strong>tware providers and<br />

outsource vendors are receiving little oversight.<br />

outsource vendors are receiving little oversight.<br />

Another positive sign from the survey was the importance that boards are placing “Another positive<br />

Another positive sign from the survey was the importance that boards are placing “Another positive<br />

upon IT and security/risk expertise in board recruitment. Results indicated that IT sign from the survey<br />

upon IT and security/risk expertise in board recruitment. Results indicated that IT sign from the survey<br />

expertise was very important or important for 37% <strong>of</strong> the respondents and somewhat<br />

expertise was very important or important for 37% <strong>of</strong> the respondents and somewhat was the importance<br />

important for 42%. Risk and security expertise was even more encouraging, with 64% was the importance<br />

important for 42%. Risk and security expertise was even more encouraging, with 64% that boards are<br />

<strong>of</strong> the respondents indicating that it was very important or important and 27% that boards are<br />

<strong>of</strong> the respondents indicating that it was very important or important and 27%<br />

indicating it was somewhat important.<br />

placing upon IT and<br />

indicating it was somewhat important.<br />

placing upon IT and<br />

security/risk<br />

security/risk<br />

INDUSTRY SECTOR COMPARISONS<br />

INDUSTRY SECTOR COMPARISONS<br />

expertise in board<br />

expertise in board<br />

recruitment.”<br />

Industry sector and regional comparisons from the survey provide interesting insights into recruitment.”<br />

how privacy and<br />

Industry sector and regional comparisons from the survey provide interesting insights into how privacy and<br />

security risks are managed among critical infrastructure industry sectors and across geographical regions. The<br />

security risks are managed among critical infrastructure industry sectors and across geographical regions. The<br />

survey confirmed the belief among security experts that, overall, the financial sector has better privacy and security practices than<br />

survey confirmed the belief among security experts that, overall, the financial sector has better privacy and security practices than<br />

other industry sectors. Respondents indicated that the financial sector paid more attention to IT and security<br />

other industry sectors. Respondents indicated that the financial sector paid more attention to IT and security<br />

issues and was more engaged in best practice activities, such as budget reviews, roles and responsibilities, and<br />

issues and was more engaged in best practice activities, such as budget reviews, roles and responsibilities, and<br />

top-level policies, than the energy/utilities, IT/telecom, and industrials industry sectors. The financial sector<br />

top-level policies, than the energy/utilities, IT/telecom, and industrials industry sectors. The financial sector<br />

also has a higher rate <strong>of</strong> (1) board IT/Technology Committees, and (2) Risk Committees separate from the<br />

also has a higher rate <strong>of</strong> (1) board IT/Technology Committees, and (2) Risk Committees separate from the<br />

Audit Committee that have responsibility for privacy and security.<br />

Audit Committee that have responsibility for privacy and security.<br />

The IT/telecom sector tends not to establish board IT/Technology Committees and assigns privacy and<br />

The IT/telecom sector tends not to establish board IT/Technology Committees and assigns privacy and<br />

security oversight responsibilities to their Audit Committees. The energy/utilities and industrials sector<br />

security oversight responsibilities to their Audit Committees. The energy/utilities and industrials sector<br />

respondents each indicated that their boards never (0%) address vendor management issues, whereas the<br />

respondents each indicated that their boards never (0%) address vendor management issues, whereas the<br />

financial and IT/telecom respondents said they do (28% and 15%, respectively). Energy/utilities<br />

financial and IT/telecom respondents said they do (28% and 15%, respectively). Energy/utilities<br />

respondents also ranked the lowest in establishing board Risk Committees separate from the Audit<br />

respondents also ranked the lowest in establishing board Risk Committees separate from the Audit<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

R!<br />

R!


Committee, but indicated that when they do form a Risk Committee, they assign it responsibility for privacy<br />

Committee, but indicated that when they do form a Risk Committee, they assign it responsibility for privacy<br />

and security. Only half <strong>of</strong> the energy/utilities and infrastructure sectors indicated that they have cross-<br />

and security. Only half <strong>of</strong> the energy/utilities and infrastructure sectors indicated that they have crossorganizational<br />

committees.<br />

organizational committees.<br />

Respondents indicated that all industry sectors surveyed are not properly assigning privacy responsibilities to<br />

Respondents indicated that all industry sectors surveyed are not properly assigning privacy responsibilities to<br />

CPOs. None <strong>of</strong> the IT/telecom respondents (0%) indicated that they had a CPO, even though they have<br />

CPOs. None <strong>of</strong> the IT/telecom respondents (0%) indicated that they had a CPO, even though they have<br />

some <strong>of</strong> the most stringent privacy and security compliance requirements, and only seven percent (7%) <strong>of</strong> the<br />

some <strong>of</strong> the most stringent privacy and security compliance requirements, and only seven percent (7%) <strong>of</strong> the<br />

energy/utilities respondents said they had a CPO. Just 13% <strong>of</strong> industrials sector respondents said they had a<br />

energy/utilities respondents said they had a CPO. Just 13% <strong>of</strong> industrials sector respondents said they had a<br />

CPO, and 17% <strong>of</strong> the financial sector respondents said they did.<br />

CPO, and 17% <strong>of</strong> the financial sector respondents said they did.<br />

Interestingly, none <strong>of</strong> the energy/utilities sector respondents (0%) indicated that they have a CRO even<br />

Interestingly, none <strong>of</strong> the energy/utilities sector respondents (0%) indicated that they have a CRO even<br />

though their risks are high. The energy/utilities sector also places a much lower value on board member IT<br />

though their risks are high. The energy/utilities sector also places a much lower value on board member IT<br />

experience than the other sectors, which is puzzling since their operations are so dependent upon complex<br />

experience than the other sectors, which is puzzling since their operations are so dependent upon complex<br />

supervisory control and data acquisition (SCADA) systems.<br />

supervisory control and data acquisition (SCADA) systems.<br />

The energy/utilities and IT/telecom sector boards also are not reviewing cyber insurance coverage (79% and<br />

The energy/utilities and IT/telecom sector boards also are not reviewing cyber insurance coverage (79% and<br />

77%, respectively) compared to the financial sector (52% not reviewing) and industrials sector (44% not<br />

77%, respectively) compared to the financial sector (52% not reviewing) and industrials sector (44% not<br />

reviewing) boards. The industrials sector respondents indicated that they exclusively (100%) rely upon<br />

reviewing) boards. The industrials sector respondents indicated that they exclusively (100%) rely upon<br />

insurance brokers to provide outside risk expertise, while the energy/utilities and IT/telecom sectors never<br />

insurance brokers to provide outside risk expertise, while the energy/utilities and IT/telecom sectors never<br />

do (0% for each). The financial sector respondents indicated that they seldom use insurance brokers for this<br />

do (0% for each). The financial sector respondents indicated that they seldom use insurance brokers for this<br />

purpose.<br />

purpose.<br />

REGIONAL COMPARISONS<br />

REGIONAL COMPARISONS<br />

Although Europe leads globally in privacy regulation and enforcement, few European organizations have a<br />

Although Europe leads globally in privacy regulation and enforcement, few European organizations have a<br />

CPO (3%), with Asia only slightly ahead at five percent (5%) and North America at 23%. European<br />

CPO (3%), with Asia only slightly ahead at five percent (5%) and North America at 23%. European<br />

companies, however, are more likely to have CISOs and CSOs (72%) than North American or Asian<br />

companies, however, are more likely to have CISOs and CSOs (72%) than North American or Asian<br />

organizations (58% and 52%, respectively).<br />

organizations (58% and 52%, respectively).<br />

North American boards lag behind European and Asian boards in undertaking key activities associated with<br />

North American boards lag behind European and Asian boards in undertaking key activities associated with<br />

privacy and security governance. European boards, however, pay less attention to IT operations and<br />

privacy and security governance. European boards, however, pay less attention to IT operations and<br />

computer and information security (19%) than North American and Asian boards (40% and 38%,<br />

computer and information security (19%) than North American and Asian boards (40% and 38%,<br />

respectively).<br />

respectively).<br />

Boards across geographical regions were even in their neglect to review cyber insurance coverage (56-58%).<br />

Boards across geographical regions were even in their neglect to review cyber insurance coverage (56-58%).<br />

Asian boards (76%) are much more likely to have a board Risk Committee responsible for privacy and<br />

Asian boards (76%) are much more likely to have a board Risk Committee responsible for privacy and<br />

security than North American and European boards (35% and 41%, respectively). Asian organizations (82%)<br />

security than North American and European boards (35% and 41%, respectively). Asian organizations (82%)<br />

are much more likely to have privacy responsibilities assigned to security personnel than North American and<br />

are much more likely to have privacy responsibilities assigned to security personnel than North American and<br />

European organizations (44% and 48%, respectively). Asian organizations are less likely to have the<br />

European organizations (44% and 48%, respectively). Asian organizations are less likely to have the<br />

CISO/CSO report to the CIO, however.<br />

CISO/CSO report to the CIO, however.<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

S!<br />

S!


RECOMMENDATIONS<br />

RECOMMENDATIONS<br />

RECOMMENDATIONS<br />

RECOMMENDATIONS<br />

The survey survey revealed that governance <strong>of</strong> enterprise security is still lacking in most corporations, with gaps in<br />

critical areas. If boards boards and and senior senior management management take take the the following following 12 actions, actions, they could significantly significantly<br />

The survey revealed that governance <strong>of</strong> enterprise security is still lacking in most corporations, with gaps in<br />

improve improve their organizations’ security posture and reduce risk:<br />

critical areas. If boards and senior management take the following 12 actions, they could significantly<br />

improve 1. 1. Establish Establish their organizations’ a board Risk security Committee posture separate and reduce from risk: the Audit Committee and assign it responsibility for<br />

enterprise enterprise risks, risks, including including IT IT risks. risks. Recruit Recruit directors directors with with security security and and IT IT governance governance and and cyber cyber risk risk<br />

1. Establish a board Risk Committee separate from the Audit Committee and assign it responsibility for<br />

expertise.<br />

enterprise risks, including IT risks. Recruit directors with security and IT governance and cyber risk<br />

2. 2. Ensure expertise. Ensure that privacy and security roles within the organization are separated and that that responsibilities<br />

responsibilities<br />

are are appropriately assigned. assigned. The The CIO, CIO, CISO/CSO, CISO/CSO, and and CPO should should report report independently independently to senior senior<br />

2. Ensure that privacy and security roles within the organization are separated and that responsibilities<br />

management.<br />

are appropriately assigned. The CIO, CISO/CSO, and CPO should report independently to senior<br />

3. 3. Evaluate management.<br />

Evaluate the existing organizational organizational structure and establish a cross-organizational team that is<br />

required required to meet meet at at least least monthly monthly to coordinate coordinate and communicate communicate on privacy privacy and security issues. issues.<br />

3. Evaluate the existing organizational structure and establish a cross-organizational team that is<br />

This team should include senior management from human resources, public relations, legal, and<br />

required to meet at least monthly to coordinate and communicate on privacy and security issues.<br />

procurement, procurement, as well as the CFO, CFO, the CIO, CISO/CSO, CISO/CSO, CRO, the CPO, and business business line<br />

This team should include senior management from human resources, public relations, legal, and<br />

executives. executives.<br />

procurement, as well as the CFO, the CIO, CISO/CSO, CRO, the CPO, and business line<br />

4. 4. 4. executives. Review existing top-level policies to to create a culture <strong>of</strong> security and respect for privacy.<br />

Organizations can enhance their reputation by valuing cybersecurity cyber security and the protection <strong>of</strong> privacy<br />

4. Review existing top-level policies to create a culture <strong>of</strong> security and respect for privacy.<br />

and viewing it as a a corporate corporate social social responsibility.<br />

responsibility.<br />

Organizations can enhance their reputation by valuing cyber security and the protection <strong>of</strong> privacy<br />

5. 5. 5. Review and Review viewing assessments it as a corporate <strong>of</strong> the organization’s social responsibility. security program and ensure that the it comports program with comports best<br />

practices with best and practices standards and standards and includes and incident includes response, incident response, breach notification, breach notification, disaster recovery, disaster and<br />

5. Review assessments <strong>of</strong> the organization’s security program and ensure that it comports with best<br />

crisis recovery, communications and crisis communications plans. plans.<br />

practices and standards and includes incident response, breach notification, disaster recovery, and<br />

6. 6. 6. Ensure crisis Ensure communications that privacy and plans. security requirements for vendors (including cloud and s<strong>of</strong>tware-as-a-service<br />

providers) are based upon key aspects <strong>of</strong> the organization’s security program, including annual audits<br />

6. Ensure that privacy and security requirements for vendors (including cloud and s<strong>of</strong>tware-as-a-service<br />

and and control requirements. requirements. Carefully Carefully review review notification notification procedures procedures in the event event <strong>of</strong> a breach breach or<br />

providers) are based upon key aspects <strong>of</strong> the organization’s security program, including annual audits<br />

security incident.<br />

and control requirements. Carefully review notification procedures in the event <strong>of</strong> a breach or<br />

7. 7. 7. Conduct security Conduct incident. an annual audit <strong>of</strong> the organization’s enterprise security program, to be reviewed by the<br />

Audit Audit Committee. Committee.<br />

7. Conduct an annual audit <strong>of</strong> the organization’s enterprise security program, to be reviewed by the<br />

8. 8. 8. Conduct Audit Conduct Committee. an annual review <strong>of</strong> the enterprise security program and effectiveness <strong>of</strong> controls, to be<br />

reviewed by the the board Risk Committee, and ensure that identified identified gaps or weaknesses are addressed. addressed.<br />

8. Conduct an annual review <strong>of</strong> the enterprise security program and effectiveness <strong>of</strong> controls, to be<br />

9. 9. 9. Require reviewed Require regular by the reports reports board Risk from Committee, senior senior management management and ensure on that privacy privacy identified and security gaps or risks. risks. weaknesses are addressed.<br />

Carnegie Carnegie Mellon Mellon <strong>CyLab</strong> <strong>CyLab</strong><br />

!<br />

10. 9. 10. 10. Require annual regular board reports review from <strong>of</strong> senior budgets management for privacy on and privacy security and risk security management.<br />

risks.<br />

10. 11. 11. 11. Require Conduct annual annual board privacy review compliance <strong>of</strong> budgets audits for and and privacy test review incident and incident security response, risk management. breach breach notification, disaster<br />

recovery, recovery, and crisis crisis communication communication plans. plans.<br />

11. Conduct annual privacy compliance audits and review incident response, breach notification, disaster<br />

12. 12. 12. Assess recovery, Assess cyber and risks crisis and communication potential loss plans. valuations and review adequacy <strong>of</strong> cyber insurance coverage.<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

12. Assess cyber risks and potential loss valuations and review adequacy <strong>of</strong> cyber insurance coverage.<br />

T!<br />

T!


Carnegie Mellon University’s Dean <strong>of</strong> Engineering and Founder <strong>of</strong> <strong>CyLab</strong>, Pradeep Khosla, sent personal<br />

About the Survey<br />

letters to board members and senior executives from the Forbes Global 2000 list <strong>of</strong> companies, asking them<br />

to complete a brief survey designed to help Carnegie Mellon understand how boards and business leaders are<br />

Carnegie managing Mellon risk, particularly University’s technology-related Dean <strong>of</strong> Engineering risks. and Only Founder one response <strong>of</strong> <strong>CyLab</strong>, per Pradeep company Khosla, was used sent in personal calculating<br />

letters response to board rates. members and senior executives from the Forbes Global 2000 list <strong>of</strong> companies, asking them<br />

to complete a brief survey designed to help Carnegie Mellon understand how boards and business leaders are<br />

managing The <strong>CyLab</strong> risk, <strong>2012</strong> particularly report on technology-related <strong>Governance</strong> <strong>of</strong> <strong>Enterprise</strong> risks. <strong>Security</strong> Only is one based response upon 108 per responses, company was representing used in calculating a<br />

response rates. rate <strong>of</strong> 5.4% out <strong>of</strong> a total <strong>of</strong> 1,989 surveys (based on one per company). One half <strong>of</strong> the<br />

respondents were board members: forty-eight percent (48%) were inside directors and two percent (2%)<br />

The were <strong>CyLab</strong> outside <strong>2012</strong> directors. report Twenty-four on <strong>Governance</strong> percent <strong>of</strong> <strong>Enterprise</strong> (24%) <strong>Security</strong> <strong>of</strong> these is based directors upon were 108 board responses, chairs. representing The remaining a half<br />

response <strong>of</strong> the respondents rate <strong>of</strong> 5.4% were out senior <strong>of</strong> a total executives, <strong>of</strong> 1,989 but surveys not a board (based member. on one per company). One half <strong>of</strong> the<br />

respondents were board members: forty-eight percent (48%) were inside directors and two percent (2%)<br />

were Since outside respondents directors. may serve Twenty-four on several percent boards, (24%) the survey <strong>of</strong> these asked directors them were to select board only chairs. one organization The remaining as half the<br />

<strong>of</strong> focus the <strong>of</strong> respondents their responses were and senior to base executives, all <strong>of</strong> their but not answers a board on member. that one organization.<br />

The Since findings respondents were analyzed may serve according on several to boards, actual responses, the survey i.e., asked percentages them to select reflect only the one number organization <strong>of</strong> participants as the<br />

who focus responded <strong>of</strong> their responses to the particular and to base question, all <strong>of</strong> their rather answers than the on total that number one organization. <strong>of</strong> participants.<br />

The Please findings note that were this analyzed survey is according exploratory to actual in nature responses, and is based i.e., percentages on voluntary reflect (rather the than number randomly <strong>of</strong> participants selected)<br />

who respondents, responded and to that the these particular findings question, do not rather purport than to the represent total number the entire <strong>of</strong> participants. population <strong>of</strong> directors.<br />

Please <strong>CyLab</strong> note and Jody that this Westby survey wish is exploratory to gratefully in acknowledge nature and is the based contribution on voluntary <strong>of</strong> Steve (rather Fienberg, than randomly Chair <strong>of</strong> selected) the<br />

respondents, Statistics Department and that and these Maurice findings Falk do not University purport Pr<strong>of</strong>essor to represent <strong>of</strong> Statistics the entire and population Social Science, <strong>of</strong> directors. Carnegie Mellon<br />

University, and Benjamin McGrath, a CMU student, who assisted in the development <strong>of</strong> the survey, the<br />

<strong>CyLab</strong> calculation and <strong>of</strong> Jody the Westby survey wish results, to and gratefully finalization acknowledge <strong>of</strong> this report.<br />

the contribution <strong>of</strong> Steve Fienberg, Chair <strong>of</strong> the<br />

Statistics Department and Maurice Falk University Pr<strong>of</strong>essor <strong>of</strong> Statistics and Social Science, Carnegie Mellon<br />

University, and Benjamin McGrath, a CMU student, who assisted in the development <strong>of</strong> the survey, the<br />

calculation <strong>of</strong> the survey results, and finalization <strong>of</strong> this report.<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

About the Survey<br />

G!<br />

G!


I. I. Introduction<br />

Introduction<br />

I. Introduction<br />

PURPOSE OF OF THE THE GOVERNANCE SURVEY<br />

PURPOSE OF THE GOVERNANCE SURVEY<br />

<strong>CyLab</strong>’s <strong>CyLab</strong>’s first first biennial biennial <strong>Governance</strong> <strong>Governance</strong> <strong>of</strong> <strong>of</strong> <strong>Enterprise</strong> <strong>Enterprise</strong> <strong>Security</strong> <strong>Security</strong> Survey Survey (<strong>Governance</strong> (<strong>Governance</strong> Survey) Survey) was was conducted conducted in in 2008, 2008, and and<br />

<strong>CyLab</strong>’s the the second first in biennial 2010. The <strong>Governance</strong> surveys <strong>of</strong> have have <strong>Enterprise</strong> been been consistent <strong>Security</strong> Survey and (<strong>Governance</strong> designed designed to to determine: determine: Survey) was conducted in 2008, and<br />

the second in 2010. The surveys have been consistent and designed to determine:<br />

! ! Whether Whether the claims claims <strong>of</strong> <strong>of</strong> IT pr<strong>of</strong>essionals pr<strong>of</strong>essionals that that their their boards boards and and senior management management were were not not paying paying<br />

! attention Whether attention the to to the the claims security security <strong>of</strong> IT <strong>of</strong> <strong>of</strong> pr<strong>of</strong>essionals their their organizations’ organizations’ that their data data boards and and information information and senior management technology technology (IT) (IT) were systems systems not paying were were<br />

attention valid valid to the security <strong>of</strong> their organizations’ data and information technology (IT) systems were<br />

valid<br />

! ! The The degree degree to to which which boards <strong>of</strong> directors and <strong>of</strong>ficers <strong>of</strong>ficers (D&Os) (D&Os) were actually managing privacy privacy and<br />

! The cybersecurity cybersecurity degree to risks risks which boards <strong>of</strong> directors and <strong>of</strong>ficers (D&Os) were actually managing privacy and<br />

cybersecurity risks<br />

! ! The board and organizational organizational structure for such governance governance<br />

! The board and organizational structure for such governance<br />

! The degree to which companies were following best practices for privacy and security. security.<br />

! The degree to which companies were following best practices for privacy and security.<br />

The results <strong>of</strong> the 2008 2008 and <strong>Governance</strong> 2010 <strong>Governance</strong> Survey confirmed Surveys confirmed that: that:<br />

The results <strong>of</strong> the 2008 <strong>Governance</strong> Survey confirmed that:<br />

! Boards and executives were not exercising adequate oversight oversight <strong>of</strong> <strong>of</strong> the the privacy privacy and and security <strong>of</strong> <strong>of</strong> their their<br />

! systems Boards systems and and executives data data were not exercising adequate oversight <strong>of</strong> the privacy and security <strong>of</strong> their<br />

systems and data<br />

! Most Most companies companies did did not have have privacy and security executives<br />

! Most companies did not have privacy and security executives<br />

! Most Most organizations organizations were were not not engaging engaging in in key key privacy privacy and and security security activities activities that that would would help help protect protect<br />

! the Most the organization organization organizations from from were risk. risk. not engaging in key privacy and security activities that would help protect<br />

the organization from risk.<br />

The <strong>CyLab</strong> 2010 and <strong>2012</strong> <strong>Governance</strong> Surveys asked asked similar similar questions questions to determine determine whether whether governance governance<br />

over The over <strong>CyLab</strong> digital digital assets assets 2010 and has has <strong>2012</strong> improved. improved. <strong>Governance</strong> The The <strong>2012</strong> <strong>2012</strong> Surveys report report asked measures measures similar the the questions progress progress to made made determine and and identifies identifies whether areas governance where where<br />

boards boards over digital and and senior senior assets has executives executives improved. need The to improve <strong>2012</strong> report their measures oversight, oversight, the and progress compares, made where and identifies possible, the areas results where from<br />

2008 boards 2008 and and 2010. 2010. senior executives need to improve their oversight, and compares, where possible, the results from<br />

2008 and 2010.<br />

BACKGROUND: DUTY OF BOARDS & DIRECTORS<br />

The governance responsibilities <strong>of</strong> D&Os have been in the spotlight since 2002 with the fall <strong>of</strong> Enron and<br />

Arthur Andersen and the enactment <strong>of</strong> Sarbanes-Oxley. The economic collapse in 2008-09 drew even more<br />

attention to board and executive responsibility for the management <strong>of</strong> risk. In addition, (1) natural disasters<br />

that have disrupted operations, (2) headlines that have resulted from data breaches, and (3) the loss <strong>of</strong><br />

confidential and proprietary information from sophisticated cyber attacks have caused D&Os to wonder if<br />

their operations and data are secure and if corporate response plans are adequate.<br />

The dependency <strong>of</strong> all organizations upon information systems and global networks has extended governance<br />

responsibilities to the use <strong>of</strong> IT. What is IT governance? The IT <strong>Governance</strong> Institute (ITGI) states that:<br />

IT governance is the responsibility <strong>of</strong> the board <strong>of</strong> directors and executive management. It is an<br />

integral part <strong>of</strong> enterprise governance and consists <strong>of</strong> the leadership and organizational structures<br />

and processes that ensure that the organization’s IT sustains and extends the organization’s<br />

strategies and objectives. 2<br />

BACKGROUND: DUTY OF BOARDS & DIRECTORS<br />

The governance responsibilities <strong>of</strong> D&Os have been in the spotlight since 2002 with the fall <strong>of</strong> Enron and<br />

Arthur Andersen and the enactment <strong>of</strong> Sarbanes-Oxley. The economic collapse in 2008-09 drew even more<br />

attention to board and executive responsibility for the management <strong>of</strong> risk. In addition, (1) natural disasters<br />

that have disrupted operations, (2) headlines that have resulted from data breaches, and (3) the loss <strong>of</strong><br />

confidential and proprietary information from sophisticated cyber attacks have caused D&Os to wonder if<br />

their operations and data are secure and if corporate response plans are adequate.<br />

The dependency <strong>of</strong> all organizations upon information systems and global networks has extended governance<br />

responsibilities to the use <strong>of</strong> IT. What is IT governance? The IT <strong>Governance</strong> Institute (ITGI) states that:<br />

IT governance is the responsibility <strong>of</strong> the board <strong>of</strong> directors and executive management. It is an<br />

integral part <strong>of</strong> enterprise governance and consists <strong>of</strong> the leadership and organizational structures<br />

and processes that ensure that the organization’s IT sustains and extends the organization’s<br />

strategies and objectives. 2<br />

BACKGROUND: DUTY OF BOARDS & DIRECTORS<br />

The governance responsibilities <strong>of</strong> D&Os have been in the spotlight since 2002 with the fall <strong>of</strong> Enron and<br />

Arthur Andersen and the enactment <strong>of</strong> Sarbanes-Oxley. The economic collapse in 2008-09 drew even more<br />

attention to board and executive responsibility for the management <strong>of</strong> risk. In addition, (1) natural disasters<br />

that have disrupted operations, (2) headlines that have resulted from data breaches, and (3) the loss <strong>of</strong><br />

confidential and proprietary information from sophisticated cyber attacks have caused D&Os to wonder if<br />

their operations and data are secure and if corporate response plans are adequate.<br />

The dependency <strong>of</strong> all organizations upon information systems and global networks has extended governance<br />

responsibilities to the use <strong>of</strong> IT. What is IT governance? The IT <strong>Governance</strong> Institute (ITGI) states that:<br />

IT governance is the responsibility <strong>of</strong> the board <strong>of</strong> directors and executive management. It is an<br />

integral part <strong>of</strong> enterprise governance and consists <strong>of</strong> the leadership and organizational structures<br />

and processes that ensure that the organization’s IT sustains and extends the organization’s<br />

strategies and objectives. 2<br />

Carnegie Carnegie Mellon Mellon <strong>CyLab</strong> <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />

7I!<br />

7I!


<strong>Enterprise</strong> governance and IT governance increasingly encompass the security <strong>of</strong> IT systems and<br />

information. The American Society for Industrial <strong>Security</strong> (ASIS), the Information Systems <strong>Security</strong><br />

Association (ISSA), and the Information Systems Audit and Control Association (ISACA) note in their<br />

report, Convergence <strong>of</strong> <strong>Enterprise</strong> <strong>Security</strong> Organizations, that:<br />

As new technologies emerge and threats become increasingly complex and unpredictable,<br />

senior security executives recognize the need to merge security functions throughout the<br />

entire enterprise. 3<br />

It has long been recognized that D&Os have a fiduciary duty to protect<br />

the assets <strong>of</strong> their organizations. 4 Today, this duty extends to “digital<br />

assets” – information, applications, and networks. This duty has been<br />

expanded by the enactment <strong>of</strong> state and federal laws and regulations<br />

that impose specific privacy and security requirements on targeted<br />

industry sectors and types <strong>of</strong> data. For example, the Gramm-Leach-<br />

Bliley Act (GLBA), the Health Insurance Portability and Accountability<br />

Act (HIPAA), the Health Information Technology for Economic and<br />

Clinical Health Act (HITECH Act), and state breach laws impose<br />

specific requirements pertaining to the security and privacy <strong>of</strong> data and<br />

networks.<br />

Sarbanes-Oxley requires both management and external auditors to<br />

attest to the effectiveness <strong>of</strong> internal controls that provide meaningful<br />

assurance about the security <strong>of</strong> information assets. 5 In late 2011, the<br />

Securities and Exchange Commission (SEC) issued guidelines that require public companies to disclose the<br />

risk <strong>of</strong> cyber incidents if they materially affect a registrant’s products, services, relationships with customers or<br />

suppliers, or competitive conditions, or if they make an investment in the company speculative or risky. 6<br />

The pressure on critical infrastructure industry sectors to secure their systems according to best practices and<br />

standards persists, with the U.S. energy sector already subject to regulations. 7 Today, the tone in Washington<br />

has moved from persuasive to compulsory, with numerous bills pending in Congress that mandate security<br />

measures for corporate systems if enacted. 8<br />

In addition, the reputational and financial consequences <strong>of</strong> a breach can be significant. When a company is<br />

the victim <strong>of</strong> an attack on its information systems – whether from an insider or an outside bad actor – studies<br />

have shown that this can result in a lack <strong>of</strong> confidence in the company and even a drop in the company stock<br />

price. 9 Breaches <strong>of</strong> personally identifiable information (PII) are expensive and frequently result in civil and<br />

class action lawsuits and investigation by state attorneys general or the Federal Trade Commission. The 2011<br />

U.S. Cost <strong>of</strong> a Data Breach Study, conducted by Symantec and the Ponemon Institute, calculated that data<br />

breaches cost companies an average <strong>of</strong> USD5.5 million per incident. 10 Another recent Ponemon survey<br />

found that brand and reputation can decline 17-31% after a breach, and that it may take an organization more<br />

than a year to recover its corporate image. 11<br />

<strong>Enterprise</strong> governance and IT governance increasingly encompass the security <strong>of</strong> IT systems and<br />

information. The American Society for Industrial <strong>Security</strong> (ASIS), the Information Systems <strong>Security</strong><br />

Association (ISSA), and the Information Systems Audit and Control Association (ISACA) note in their<br />

report, Convergence <strong>of</strong> <strong>Enterprise</strong> <strong>Security</strong> Organizations, that:<br />

As new technologies emerge and threats become increasingly complex and unpredictable,<br />

senior security executives recognize the need to merge security functions throughout the<br />

entire enterprise.<br />

“Corporate data is at a<br />

higher risk <strong>of</strong> theft or<br />

misuse than ever before,<br />

and the systemic nature<br />

<strong>of</strong> recent attacks has<br />

alarmed both industry<br />

leaders and government<br />

<strong>of</strong>ficials around the<br />

world.”<br />

Corporate data is at a higher risk <strong>of</strong> theft or misuse than ever before, and the systemic nature <strong>of</strong> recent attacks<br />

has alarmed both industry leaders and government <strong>of</strong>ficials around the world. Managing these cyber risks now<br />

3<br />

It has long been recognized that D&Os have a fiduciary duty to protect<br />

the assets <strong>of</strong> their organizations. 4 Today, this duty extends to “digital<br />

assets” – information, applications, and networks. This duty has been<br />

expanded by the enactment <strong>of</strong> state and federal laws and regulations<br />

that impose specific privacy and security requirements on targeted<br />

industry sectors and types <strong>of</strong> data. For example, the Gramm-Leach-<br />

Bliley Act (GLBA), the Health Insurance Portability and Accountability<br />

Act (HIPAA), the Health Information Technology for Economic and<br />

Clinical Health Act (HITECH Act), and state breach laws impose<br />

specific requirements pertaining to the security and privacy <strong>of</strong> data and<br />

networks.<br />

Sarbanes-Oxley requires both management and external auditors to<br />

attest to the effectiveness <strong>of</strong> internal controls that provide meaningful<br />

assurance about the security <strong>of</strong> information assets. 5 In late 2011, the<br />

Securities and Exchange Commission (SEC) issued guidelines that require public companies to disclose the<br />

risk <strong>of</strong> cyber incidents if they materially affect a registrant’s products, services, relationships with customers or<br />

suppliers, or competitive conditions, or if they make an investment in the company speculative or risky. 6<br />

The pressure on critical infrastructure industry sectors to secure their systems according to best practices and<br />

standards persists, with the U.S. energy sector already subject to regulations. 7 Today, the tone in Washington<br />

has moved from persuasive to compulsory, with numerous bills pending in Congress that mandate security<br />

measures for corporate systems if enacted. 8<br />

In addition, the reputational and financial consequences <strong>of</strong> a breach can be significant. When a company is<br />

the victim <strong>of</strong> an attack on its information systems – whether from an insider or an outside bad actor – studies<br />

have shown that this can result in a lack <strong>of</strong> confidence in the company and even a drop in the company stock<br />

price. 9 Breaches <strong>of</strong> personally identifiable information (PII) are expensive and frequently result in civil and<br />

class action lawsuits and investigation by state attorneys general or the Federal Trade Commission. The 2011<br />

U.S. Cost <strong>of</strong> a Data Breach Study, conducted by Symantec and the Ponemon Institute, calculated that data<br />

breaches cost companies an average <strong>of</strong> USD5.5 million per incident. 10 Another recent Ponemon survey<br />

found that brand and reputation can decline 17-31% after a breach, and that it may take an organization more<br />

than a year to recover its corporate image. 11<br />

“Corporate data is at a<br />

higher risk <strong>of</strong> theft or<br />

misuse than ever before,<br />

and the systemic nature<br />

<strong>of</strong> recent attacks has<br />

alarmed both industry<br />

leaders and government<br />

<strong>of</strong>ficials around the<br />

world.”<br />

Corporate data is at a higher risk <strong>of</strong> theft or misuse than ever before, and the systemic nature <strong>of</strong> recent attacks<br />

has alarmed both industry leaders and government <strong>of</strong>ficials around the world. Managing these cyber risks now<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />

77!<br />

77!


equires active oversight by boards and senior executives. Failure to properly govern cybersecurity and privacy may<br />

result in shareholder derivative suits against D&Os for breach <strong>of</strong> fiduciary duty as a result <strong>of</strong> losses on stock<br />

price, decrease in market share, or damage to brand caused by inadequate attention to the security <strong>of</strong> the<br />

company’s data, applications, and networks. Although Delaware case law provides strong protections to<br />

D&Os under the business judgment rule and recent case law, 12 requires active oversight by boards and senior executives. Failure to properly govern cybersecurity and privacy may<br />

result in shareholder derivative suits against D&Os for breach <strong>of</strong> fiduciary duty as a result <strong>of</strong> losses on stock<br />

price, decrease in market share, or damage to brand caused by inadequate attention to the security <strong>of</strong> the<br />

company’s data, applications, and networks. Although Delaware case law provides strong protections to<br />

D&Os under the business judgment rule and recent case law, harm caused by security breaches may receive<br />

stricter scrutiny because:<br />

12 harm caused by security breaches may receive<br />

stricter scrutiny because:<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

! <strong>Security</strong> best practices and standards are well-developed, harmonized, and widely available;<br />

! Many privacy and security laws require organizations to have an enterprise security program that is<br />

regularly reviewed and tested;<br />

! The Council <strong>of</strong> Europe Convention on Cybercrime, 13 which has been signed by 47 countries and<br />

ratified by 33 (including the U.S.), holds companies civilly, administratively, or criminally liable for<br />

cybercrimes that benefit the company and were made possible due to the lack <strong>of</strong> supervision or<br />

control by someone in a senior management position, such as an <strong>of</strong>ficer or director. Article 9 <strong>of</strong> the<br />

European Union’s (EU) Council Framework Decision on attacks against information systems, 14<br />

! The Council <strong>of</strong> Europe Convention on Cybercrime,<br />

which applies to all 27 EU member countries, mirrors the CoE language.<br />

13 which has been signed by 47 countries and<br />

ratified by 33 (including the U.S.), holds companies civilly, administratively, or criminally liable for<br />

cybercrimes that benefit the company and were made possible due to the lack <strong>of</strong> supervision or<br />

control by someone in a senior management position, such as an <strong>of</strong>ficer or director. Article 9 <strong>of</strong> the<br />

European Union’s (EU) Council Framework Decision on attacks against information systems, 14<br />

which applies to all 27 EU member countries, mirrors the CoE language.<br />

Thus, D&O duties with respect to privacy and security may be more prescribed in this area and negligence<br />

more easily proven. There are also situations where higher standards apply to directors and <strong>of</strong>ficers, such as<br />

acquisitions, takeovers, responses to shareholder suits, and distribution <strong>of</strong> assets to shareholders in preference<br />

over creditors. In these circumstances, directors and <strong>of</strong>ficers are required to obtain pr<strong>of</strong>essional assistance or<br />

perform adequate analyses to mitigate the risks that ordinarily accompany these activities. Some information<br />

assurance experts assert that a “higher degree <strong>of</strong> care will also be required <strong>of</strong> Directors and Officers regarding<br />

the complex nature <strong>of</strong> issues involved in information assurance.” 15<br />

Thus, D&O duties with respect to privacy and security may be more prescribed in this area and negligence<br />

more easily proven. There are also situations where higher standards apply to directors and <strong>of</strong>ficers, such as<br />

acquisitions, takeovers, responses to shareholder suits, and distribution <strong>of</strong> assets to shareholders in preference<br />

over creditors. In these circumstances, directors and <strong>of</strong>ficers are required to obtain pr<strong>of</strong>essional assistance or<br />

perform adequate analyses to mitigate the risks that ordinarily accompany these activities. Some information<br />

assurance experts assert that a “higher degree <strong>of</strong> care will also be required <strong>of</strong> Directors and Officers regarding<br />

the complex nature <strong>of</strong> issues involved in information assurance.” 15<br />

In addition, securities laws and regulations also require public corporations to adequately disclose the risks<br />

relevant to the corporation and its assets in their public filings. The Independent Director put this in the context<br />

<strong>of</strong> information systems by reporting that:<br />

Management <strong>of</strong> information risk is central to the success <strong>of</strong> any organization operating<br />

today. For Directors, this means that Board performance is increasingly being judged by<br />

how well their company measures up to internationally accepted codes and guidelines on<br />

preferred Information Assurance practice. .16<br />

Management <strong>of</strong> information risk is central to the success <strong>of</strong> any organization operating<br />

today. For Directors, this means that Board performance is increasingly being judged by<br />

how well their company measures up to internationally accepted codes and guidelines on<br />

preferred Information Assurance practice. .16<br />

Clearly, directors and <strong>of</strong>ficers need to undertake a certain level <strong>of</strong> involvement and oversight in ensuring that<br />

the organization is properly secured and data is protected.<br />

Fortunately, boards and senior executives have access to standards and best practices that guide them in<br />

fulfilling their governance responsibilities. The IT <strong>Governance</strong> Institute has an excellent collection <strong>of</strong><br />

materials, as does ISACA, and Carnegie Mellon University. In addition, the International Organization for<br />

Standardization (ISO) has released ISO 38500, the international standard for corporate governance <strong>of</strong> IT, and<br />

the National Institute <strong>of</strong> Standards and Technology (NIST) has produced world-class materials on privacy<br />

and security best practices and guidance – including risk management – that are available at no cost.<br />

7


II. Findings and Conclusions<br />

II. Findings and Conclusions<br />

WHO WE ASKED<br />

WHO WE ASKED<br />

The <strong>Governance</strong> Survey respondents were half board members, half senior executives.<br />

Forty-eight The <strong>Governance</strong> percent Survey (48%) respondents <strong>of</strong> respondents were were half inside board directors members, and half two senior percent executives. (2%) were outside directors.<br />

Twenty-four Forty-eight percent (48%) (24%) <strong>of</strong> <strong>of</strong> respondents these directors were were inside board directors chairs. and The two remaining percent (2%) half <strong>of</strong> were the outside respondents directors. were<br />

Twenty-four senior executives, percent but (24%) not a board <strong>of</strong> these member. directors were board chairs. The remaining half <strong>of</strong> the respondents were<br />

senior The respondents executives, also but indicated not a board that: member.<br />

The respondents also indicated that:<br />

! 13% <strong>of</strong> respondents were Audit<br />

! 13% Committee <strong>of</strong> respondents members; were Audit<br />

Committee members;<br />

! 12% <strong>of</strong> respondents were a<br />

! 12% <strong>Governance</strong>, <strong>of</strong> respondents Compliance, were a or Ethics<br />

<strong>Governance</strong>, Committee member; Compliance, and or Ethics<br />

Committee member; and<br />

! 19% <strong>of</strong> respondents were Risk<br />

! 19% Committee <strong>of</strong> respondents members. were Risk<br />

Committee members.<br />

Internal respondents were holding positions as:<br />

Internal respondents CEO or President were holding (53%) positions as:<br />

CEO CFO (19%) or President (53%)<br />

CFO COO (19%) (9%)<br />

COO Corporate (9%) Secretary (15%).<br />

Corporate Secretary (15%).<br />

The majority <strong>of</strong> <strong>Governance</strong> Survey respondents (75%) were from critical infrastructure industry sectors<br />

which The majority increasingly <strong>of</strong> <strong>Governance</strong> face government Survey pressure respondents and/or (75%) regulatory were compliance from critical requirements infrastructure with industry respect to sectors the<br />

which security increasingly <strong>of</strong> their IT face systems government and data. pressure These survey and/or respondents regulatory compliance represented: requirements with respect to the<br />

security <strong>of</strong> their IT systems and data. These survey respondents represented:<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />

! Energy and utility companies – 13%<br />

!<br />

Energy and utility companies – 13%<br />

Financial sector – 33%<br />

!<br />

Financial sector – 33%<br />

Health care – 2%<br />

!<br />

Health care – 2%<br />

Industrials – 15%<br />

!<br />

Industrials – 15%<br />

IT and telecommunications companies – 12%.<br />

! IT and telecommunications companies – 12%.<br />

The remaining 25% <strong>of</strong> respondents represented consumer,<br />

The materials, remaining pr<strong>of</strong>essional 25% <strong>of</strong> services, respondents retailing, represented and other consumer, types <strong>of</strong><br />

materials, companies. pr<strong>of</strong>essional services, retailing, and other types <strong>of</strong><br />

companies.<br />

Responses from four industrial sectors are compared in this report: energy/utilities, financial, IT/telecom,<br />

Responses and industrials.<br />

from four industrial sectors are compared in this report: energy/utilities, financial, IT/telecom,<br />

and industrials.<br />

7>!<br />

7>!


Survey respondents represented large to very large corporations. Since the respondent pool was drawn<br />

from the Forbes Global 2000 list, the respondents represented large or very large corporations. Almost half<br />

(49%) <strong>of</strong> respondents were from very large corporations with annual revenues greater than USD10 billion.<br />

Thirty-seven percent (37%) <strong>of</strong> the <strong>Governance</strong> Survey respondents came from large companies with annual<br />

revenues ranging between USD2.5 billion and USD10 billion, and 9% <strong>of</strong> respondents represented companies<br />

with revenues between USD1 billion and USD2.5 billion. Six percent (6%) <strong>of</strong> the respondents had revenues<br />

<strong>of</strong> USD500 million to less than USD1 billion.<br />

Using the Forbes Global 2000 list, the <strong>2012</strong> survey represents the<br />

first analysis <strong>of</strong> cyber governance postures <strong>of</strong> major corporations<br />

around the world. Regions were aligned with those used by Internet<br />

World Stats to enable analysis <strong>of</strong> responses against Internet usage. 17<br />

Using the Forbes Global 2000 list, the <strong>2012</strong> survey represents the<br />

first analysis <strong>of</strong> cyber governance postures <strong>of</strong> major corporations<br />

around the world. Regions were aligned with those used by Internet<br />

World Stats to enable analysis <strong>of</strong> responses against Internet usage.<br />

Responses were primarily from three geographical regions: North<br />

America (40%), Europe (30%), and Asia (19%), although a few<br />

responses were also received from Latin America, Australia and<br />

Oceania, the Middle East, and Africa. Responses from three regions<br />

are compared in this report, with key countries noted below by<br />

Internet usage:<br />

17<br />

Responses were primarily from three geographical regions: North<br />

America (40%), Europe (30%), and Asia (19%), although a few<br />

responses were also received from Latin America, Australia and<br />

Oceania, the Middle East, and Africa. Responses from three regions<br />

are compared in this report, with key countries noted below by<br />

Internet usage:<br />

North America: United States and Canada.<br />

Europe: EU countries, Russia, Turkey, Ukraine, and Switzerland.<br />

Asia: China, India, Japan, Indonesia, South Korea, Philippines, Vietnam, Pakistan, and Thailand.<br />

FINDINGS<br />

Oversight & <strong>Governance</strong><br />

For the third time, the survey revealed that boards are actively addressing risk management, but that<br />

there is still a gap in understanding the linkage between IT risks and enterprise risk management.<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

Although 91% <strong>of</strong> respondents<br />

indicated that risk management was<br />

being actively addressed by their<br />

board, the areas receiving the least<br />

attention were IT operations (29%),<br />

computer and information security<br />

(33%), and vendor management<br />

(13%). The lack <strong>of</strong> attention to<br />

vendor management is particularly<br />

concerning since this includes<br />

outsourcing <strong>of</strong> IT operations and<br />

business processes, most <strong>of</strong> which is<br />

dependent upon IT systems. These<br />

three issue areas held the same<br />

position in the 2010 results.<br />

7@!


Industry & Region Comparison Table: Issues Actively Addressed By Boards<br />

European respondents gave the least attention to computer and information security (19%), compared to<br />

North American and Asian respondents at 40% and 38% respectively. Europe also was lowest in the<br />

attention given to IT operations (19%), compared to 30% for North America and 24% for Asia.<br />

The financial sector showed the greatest degree <strong>of</strong> attention to these critical issues related to cyber risk<br />

management. One <strong>of</strong> the most revealing gaps is the lack <strong>of</strong> attention given to these issues by the<br />

energy/utilities and industrials sectors, particularly considering the<br />

degree to which operations and processes are controlled by IT<br />

systems.<br />

Even though risk management is a high priority, most boards<br />

are not reviewing their company’s insurance coverage for cyberrelated<br />

risks.!<br />

Although cyber incidents are not covered by general liability policies,<br />

57% <strong>of</strong> the respondents indicated that their boards are not reviewing<br />

insurance coverage for cyber related risks, compared with 65% in<br />

2010. This slight improvement, however, is due to the increase in<br />

respondents in <strong>2012</strong> that said they did not know. The response was<br />

consistent across geographical regions.<br />

Industry & Region Comparison Table: Boards NOT Reviewing Cyber Insurance Coverage<br />

It was surprising that a much higher percentage <strong>of</strong> respondents from the two “consequential” infrastructure<br />

sectors<br />

Carnegie Mellon <strong>CyLab</strong><br />

7E!<br />

18 Industry & Region Comparison Table: Issues Actively Addressed By Boards<br />

Issue Addressed North Europe Asia Energy / Financial IT / Industrials<br />

By Boards<br />

America<br />

Utilities<br />

Telecom<br />

Vendor Mgmt 12% 9% 10% 0% 28% 15% 0%<br />

Computer & Info Sec 40% 19% 38% 29% 44% 31% 13%<br />

IT Operations 30% 19% 24% 14% 36% 31% 19%<br />

European respondents gave the least attention to computer and information security (19%), compared to<br />

North American and Asian respondents at 40% and 38% respectively. Europe also was lowest in the<br />

attention given to IT operations (19%), compared to 30% for North America and 24% for Asia.<br />

The financial sector showed the greatest degree <strong>of</strong> attention to these critical issues related to cyber risk<br />

management. One <strong>of</strong> the most revealing gaps is the lack <strong>of</strong> attention given to these issues by the<br />

energy/utilities and industrials sectors, particularly considering the<br />

degree to which operations and processes are controlled by IT<br />

systems.<br />

Even though risk management is a high priority, most boards<br />

are not reviewing their company’s insurance coverage for cyberrelated<br />

risks.!<br />

Although cyber incidents are not covered by general liability policies,<br />

57% <strong>of</strong> the respondents indicated that their boards are not reviewing<br />

insurance coverage for cyber related risks, compared with 65% in<br />

2010. This slight improvement, however, is due to the increase in<br />

respondents in <strong>2012</strong> that said they did not know. The response was<br />

consistent across geographical regions.<br />

Industry & Region Comparison Table: Boards NOT Reviewing Cyber Insurance Coverage<br />

Board reviews cyber North Europe Asia Energy / Financial IT / Industrials<br />

insurance coverage? America<br />

Utilities<br />

Telecom<br />

No 58% 56% 57% 79% 52% 77% 44%<br />

It was surprising that a much higher percentage <strong>of</strong> respondents from the two “consequential” infrastructure<br />

sectors – energy/utilities and IT/telecom – indicated that their boards did not review insurance coverage <strong>of</strong><br />

cyber risks: Seventy-nine percent (79%) <strong>of</strong> the energy/utilities respondents indicated that their boards do not<br />

review coverage and 77% <strong>of</strong> the IT/telecom sector respondents said the same.<br />

For the third time, the <strong>Governance</strong> Survey confirmed the belief among IT security pr<strong>of</strong>essionals that<br />

boards and senior executives still are not involved in key areas related to governance over privacy and<br />

security. Although 89% <strong>of</strong> respondents said their boards review annual risk assessment reports and 91% <strong>of</strong><br />

these cover computer systems and data, this activity alone is not adequate oversight.<br />

Respondents indicated that boards are not focusing on important activities that would help protect the<br />

organization from some <strong>of</strong> its highest risks: the reputational and financial losses flowing from theft <strong>of</strong><br />

confidential or proprietary data or security breaches involving the disclosure <strong>of</strong> PII. There are a number <strong>of</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

18 Industry & Region Comparison Table: Issues Actively Addressed By Boards<br />

Issue Addressed North Europe Asia Energy / Financial IT / Industrials<br />

By Boards<br />

America<br />

Utilities<br />

Telecom<br />

Vendor Mgmt 12% 9% 10% 0% 28% 15% 0%<br />

Computer & Info Sec 40% 19% 38% 29% 44% 31% 13%<br />

IT Operations 30% 19% 24% 14% 36% 31% 19%<br />

European respondents gave the least attention to computer and information security (19%), compared to<br />

North American and Asian respondents at 40% and 38% respectively. Europe also was lowest in the<br />

attention given to IT operations (19%), compared to 30% for North America and 24% for Asia.<br />

The financial sector showed the greatest degree <strong>of</strong> attention to these critical issues related to cyber risk<br />

management. One <strong>of</strong> the most revealing gaps is the lack <strong>of</strong> attention given to these issues by the<br />

energy/utilities and industrials sectors, particularly considering the<br />

degree to which operations and processes are controlled by IT<br />

systems.<br />

Even though risk management is a high priority, most boards<br />

are not reviewing their company’s insurance coverage for cyberrelated<br />

risks.!<br />

Although cyber incidents are not covered by general liability policies,<br />

57% <strong>of</strong> the respondents indicated that their boards are not reviewing<br />

insurance coverage for cyber related risks, compared with 65% in<br />

2010. This slight improvement, however, is due to the increase in<br />

respondents in <strong>2012</strong> that said they did not know. The response was<br />

consistent across geographical regions.<br />

Industry & Region Comparison Table: Boards NOT Reviewing Cyber Insurance Coverage<br />

Board reviews cyber North Europe Asia Energy / Financial IT / Industrials<br />

insurance coverage? America<br />

Utilities<br />

Telecom<br />

No 58% 56% 57% 79% 52% 77% 44%<br />

It was surprising that a much higher percentage <strong>of</strong> respondents from the two “consequential” infrastructure<br />

sectors – energy/utilities and IT/telecom – indicated that their boards did not review insurance coverage <strong>of</strong><br />

cyber risks: Seventy-nine percent (79%) <strong>of</strong> the energy/utilities respondents indicated that their boards do not<br />

review coverage and 77% <strong>of</strong> the IT/telecom sector respondents said the same.<br />

For the third time, the <strong>Governance</strong> Survey confirmed the belief among IT security pr<strong>of</strong>essionals that<br />

boards and senior executives still are not involved in key areas related to governance over privacy and<br />

security. Although 89% <strong>of</strong> respondents said their boards review annual risk assessment reports and 91% <strong>of</strong><br />

these cover computer systems and data, this activity alone is not adequate oversight.<br />

Respondents indicated that boards are not focusing on important activities that would help protect the<br />

organization from some <strong>of</strong> its highest risks: the reputational and financial losses flowing from theft <strong>of</strong><br />

confidential or proprietary data or security breaches involving the disclosure <strong>of</strong> PII. There are a number <strong>of</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

7E!<br />

18 Issue Industry Addressed & Region North Comparison Europe Table: Asia Issues Energy Actively / Financial Addressed IT / By Boards Industrials<br />

By Boards<br />

America<br />

Utilities<br />

Telecom<br />

Vendor Mgmt 12% 9% 10% 0% 28% 15% 0%<br />

Computer & Info Sec 40% 19% 38% 29% 44% 31% 13%<br />

IT Operations 30% 19% 24% 14% 36% 31% 19%<br />

European respondents gave the least attention to computer and information security (19%), compared to<br />

North American and Asian respondents at 40% and 38% respectively. Europe also was lowest in the<br />

attention given to IT operations (19%), compared to 30% for North America and 24% for Asia.<br />

The financial sector showed the greatest degree <strong>of</strong> attention to these critical issues related to cyber risk<br />

management. One <strong>of</strong> the most revealing gaps is the lack <strong>of</strong> attention given to these issues by the<br />

energy/utilities and industrials sectors, particularly considering the<br />

degree to which operations and processes are controlled by IT<br />

systems.<br />

Even though risk management is a high priority, most boards<br />

are not reviewing their company’s insurance coverage for cyberrelated<br />

risks.!<br />

Although cyber incidents are not covered by general liability policies,<br />

57% <strong>of</strong> the respondents indicated that their boards are not reviewing<br />

insurance coverage for cyber related risks, compared with 65% in<br />

2010. This slight improvement, however, is due to the increase in<br />

respondents in <strong>2012</strong> that said they did not know. The response was<br />

consistent across geographical regions.<br />

Board Industry reviews & cyber Region North Comparison Europe Table: Asia Boards Energy NOT / Financial Reviewing IT / Cyber Insurance Industrials Coverage<br />

insurance coverage? America<br />

Utilities<br />

Telecom<br />

No 58% 56% 57% 79% 52% 77% 44%<br />

It was surprising – energy/utilities that a much and IT/telecom higher percentage – indicated <strong>of</strong> respondents that their boards from the did two not “consequential” review insurance infrastructure coverage <strong>of</strong><br />

cyber sectors risks: Seventy-nine percent (79%) <strong>of</strong> the energy/utilities respondents indicated that their boards do not<br />

review coverage and 77% <strong>of</strong> the IT/telecom sector respondents said the same.<br />

For the third time, the <strong>Governance</strong> Survey confirmed the belief among IT security pr<strong>of</strong>essionals that<br />

boards and senior executives still are not involved in key areas related to governance over privacy and<br />

security. Although 89% <strong>of</strong> respondents said their boards review annual risk assessment reports and 91% <strong>of</strong><br />

these cover computer systems and data, this activity alone is not adequate oversight.<br />

Respondents indicated that boards are not focusing on important activities that would help protect the<br />

organization from some <strong>of</strong> its highest risks: the reputational and financial losses flowing from theft <strong>of</strong><br />

confidential or proprietary data or security breaches involving the disclosure <strong>of</strong> PII. There are a number <strong>of</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

18 Industry & Region Comparison Table: Issues Actively Addressed By Boards<br />

Issue Addressed North Europe Asia Energy / Financial IT / Industrials<br />

By Boards<br />

America<br />

Utilities<br />

Telecom<br />

Vendor Mgmt 12% 9% 10% 0% 28% 15% 0%<br />

Computer & Info Sec 40% 19% 38% 29% 44% 31% 13%<br />

IT Operations 30% 19% 24% 14% 36% 31% 19%<br />

European respondents gave the least attention to computer and information security (19%), compared to<br />

North American and Asian respondents at 40% and 38% respectively. Europe also was lowest in the<br />

attention given to IT operations (19%), compared to 30% for North America and 24% for Asia.<br />

The financial sector showed the greatest degree <strong>of</strong> attention to these critical issues related to cyber risk<br />

management. One <strong>of</strong> the most revealing gaps is the lack <strong>of</strong> attention given to these issues by the<br />

energy/utilities and industrials sectors, particularly considering the<br />

degree to which operations and processes are controlled by IT<br />

systems.<br />

Even though risk management is a high priority, most boards<br />

are not reviewing their company’s insurance coverage for cyberrelated<br />

risks.!<br />

Although cyber incidents are not covered by general liability policies,<br />

57% <strong>of</strong> the respondents indicated that their boards are not reviewing<br />

insurance coverage for cyber related risks, compared with 65% in<br />

2010. This slight improvement, however, is due to the increase in<br />

respondents in <strong>2012</strong> that said they did not know. The response was<br />

consistent across geographical regions.<br />

Industry & Region Comparison Table: Boards NOT Reviewing Cyber Insurance Coverage<br />

Board reviews cyber North Europe Asia Energy / Financial IT / Industrials<br />

insurance coverage? America<br />

Utilities<br />

Telecom<br />

No 58% 56% 57% 79% 52% 77% 44%<br />

It was surprising that a much higher percentage <strong>of</strong> respondents from the two “consequential” infrastructure<br />

sectors – energy/utilities and IT/telecom – indicated that their boards did not review insurance coverage <strong>of</strong><br />

cyber risks: Seventy-nine percent (79%) <strong>of</strong> the energy/utilities respondents indicated that their boards do not<br />

review coverage and 77% <strong>of</strong> the IT/telecom sector respondents said the same.<br />

For the third time, the <strong>Governance</strong> Survey confirmed the belief among IT security pr<strong>of</strong>essionals that<br />

boards and senior executives still are not involved in key areas related to governance over privacy and<br />

security. Although 89% <strong>of</strong> respondents said their boards review annual risk assessment reports and 91% <strong>of</strong><br />

these cover computer systems and data, this activity alone is not adequate oversight.<br />

Respondents indicated that boards are not focusing on important activities that would help protect the<br />

organization from some <strong>of</strong> its highest risks: the reputational and financial losses flowing from theft <strong>of</strong><br />

confidential or proprietary data or security breaches involving the disclosure <strong>of</strong> PII. There are a number <strong>of</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

7E!<br />

18 Issue Addressed North Europe Asia Energy / Financial IT / Industrials<br />

By Industry Boards & Region America Comparison Table: Issues Utilities Actively Addressed Telecom By Boards<br />

Vendor Mgmt 12% 9% 10% 0% 28% 15% 0%<br />

Computer & Info Sec 40% 19% 38% 29% 44% 31% 13%<br />

IT Operations 30% 19% 24% 14% 36% 31% 19%<br />

European respondents gave the least attention to computer and information security (19%), compared to<br />

North American and Asian respondents at 40% and 38% respectively. Europe also was lowest in the<br />

attention given to IT operations (19%), compared to 30% for North America and 24% for Asia.<br />

The financial sector showed the greatest degree <strong>of</strong> attention to these critical issues related to cyber risk<br />

management. One <strong>of</strong> the most revealing gaps is the lack <strong>of</strong> attention given to these issues by the<br />

energy/utilities and industrials sectors, particularly considering the<br />

degree to which operations and processes are controlled by IT<br />

systems.<br />

Even though risk management is a high priority, most boards<br />

are not reviewing their company’s insurance coverage for cyberrelated<br />

risks.!<br />

Although cyber incidents are not covered by general liability policies,<br />

57% <strong>of</strong> the respondents indicated that their boards are not reviewing<br />

insurance coverage for cyber related risks, compared with 65% in<br />

2010. This slight improvement, however, is due to the increase in<br />

respondents in <strong>2012</strong> that said they did not know. The response was<br />

consistent across geographical regions.<br />

Board reviews cyber North Europe Asia Energy / Financial IT / Industrials<br />

Industry insurance coverage? & Region America Comparison Table: Boards Utilities NOT Reviewing Telecom Cyber Insurance Coverage<br />

No 58% 56% 57% 79% 52% 77% 44%<br />

– energy/utilities and IT/telecom – indicated that their boards did not review insurance coverage <strong>of</strong><br />

It cyber was risks: surprising Seventy-nine that a much percent higher (79%) percentage <strong>of</strong> the energy/utilities <strong>of</strong> respondents respondents from the two indicated “consequential” that their infrastructure boards do not<br />

sectors review coverage and 77% <strong>of</strong> the IT/telecom sector respondents said the same.<br />

For the third time, the <strong>Governance</strong> Survey confirmed the belief among IT security pr<strong>of</strong>essionals that<br />

boards and senior executives still are not involved in key areas related to governance over privacy and<br />

security. Although 89% <strong>of</strong> respondents said their boards review annual risk assessment reports and 91% <strong>of</strong><br />

these cover computer systems and data, this activity alone is not adequate oversight.<br />

Respondents indicated that boards are not focusing on important activities that would help protect the<br />

organization from some <strong>of</strong> its highest risks: the reputational and financial losses flowing from theft <strong>of</strong><br />

confidential or proprietary data or security breaches involving the disclosure <strong>of</strong> PII. There are a number <strong>of</strong><br />

18 Issue Addressed North Europe Asia Energy / Financial IT / Industrials<br />

By Boards<br />

America<br />

Utilities<br />

Telecom<br />

Vendor Mgmt 12% 9% 10% 0% 28% 15% 0%<br />

Computer & Info Sec 40% 19% 38% 29% 44% 31% 13%<br />

IT Operations 30% 19% 24% 14% 36% 31% 19%<br />

Board reviews cyber North Europe Asia Energy / Financial IT / Industrials<br />

insurance coverage? America<br />

Utilities<br />

Telecom<br />

No 58% 56% 57% 79% 52% 77% 44%<br />

– energy/utilities and IT/telecom – indicated that their boards did not review insurance coverage <strong>of</strong><br />

cyber risks: Seventy-nine percent (79%) <strong>of</strong> the energy/utilities respondents indicated that their boards do not<br />

review coverage and 77% <strong>of</strong> the IT/telecom sector respondents said the same.<br />

For the third time, the <strong>Governance</strong> Survey confirmed the belief among IT security pr<strong>of</strong>essionals that<br />

boards and senior executives still are not involved in key areas related to governance over privacy and<br />

security. Although 89% <strong>of</strong> respondents said their boards review annual risk assessment reports and 91% <strong>of</strong><br />

these cover computer systems and data, this activity alone is not adequate oversight.<br />

Respondents indicated that boards are not focusing on important activities that would help protect the<br />

organization from some <strong>of</strong> its highest risks: the reputational and financial losses flowing from theft <strong>of</strong><br />

confidential or proprietary data or security breaches involving the disclosure <strong>of</strong> PII. There are a number <strong>of</strong><br />

! !<br />

! !<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

7E!<br />

7E!<br />

7E!


est practices for board involvement with respect to IT governance that strengthen the security posture <strong>of</strong> a<br />

company.<br />

When asked whether their boards receive information or are involved in activities related to these best<br />

practices, respondents indicated that boards are only occasionally, rarely or never engaged:<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

! Review annual budgets. Fifty-three percent (53%) <strong>of</strong> respondents said their board rarely or never<br />

reviewed and approved annual budgets for privacy and IT security programs; 9% said they<br />

occasionally did. Only 31% <strong>of</strong> respondents indicated that their boards regularly reviewed and<br />

approved these budgets.<br />

! Review roles and responsibilities. Fifty-six percent (56%) <strong>of</strong> respondents indicated their board rarely<br />

or never reviewed and approved roles and responsibilities <strong>of</strong> personnel responsible for privacy and<br />

security risks; an additional<br />

18% said they occasionally<br />

did. Only 19% said they<br />

regularly reviewed privacy<br />

and security roles and<br />

responsibilities.<br />

! Review top-level policies.<br />

Forty-one percent (41%)<br />

<strong>of</strong> respondents said their<br />

board rarely or never<br />

reviewed and approved<br />

top-level policies regarding<br />

privacy and security risks;<br />

an additional 28% said<br />

they occasionally did. Only one-quarter (25%) <strong>of</strong> the respondents said they regularly reviewed toplevel<br />

privacy and security policies.<br />

! Receive reports on privacy and security risks. Twenty-six percent (26%) <strong>of</strong> respondents said their<br />

board rarely or never received reports from senior management regarding privacy and IT security<br />

risks; an additional 33% said they occasionally got such reports. Thirty-nine percent (39%) said they<br />

regularly received reports on privacy and IT security risks. These results were slightly better than the<br />

2008 results (62% occasionally or rarely received reports and 15% never did).<br />

! Receive reports on security breaches or loss <strong>of</strong> data. Thirty percent (30%) <strong>of</strong> respondents said their<br />

board rarely or never reviewed reports <strong>of</strong> security breaches or incidents involving the disclosure <strong>of</strong><br />

personally identifiable information or theft <strong>of</strong> corporate data; another 30% said they occasionally<br />

received such reports. Thirty-one percent (31%) <strong>of</strong> the respondents said their boards regularly<br />

reviewed these reports.<br />

! Review annual computer security program assessments. Thirty-six (36%) <strong>of</strong> respondents said their<br />

board rarely or never reviewed annual security program assessments; another 20% said they<br />

occasionally did. Only 35% <strong>of</strong> the respondents said they regularly reviewed such reports.<br />

There were only modest gains in each <strong>of</strong> the first four areas (breach reports and security program assessments<br />

were not asked for in the 2008 and 2010 surveys), particularly in regularly receiving reports from senior<br />

7R!


management regarding privacy and security risks (20% in 2008 compared with 39% in <strong>2012</strong>) and reviewing<br />

management budgets management (14% regarding in 2008 compared privacy and with security 31% in risks <strong>2012</strong>). (20% in 2008 compared with 39% in <strong>2012</strong>) and reviewing<br />

budgets management budgets (14% regarding in 2008 compared privacy and with security 31% in risks <strong>2012</strong>). (20% in 2008 compared with 39% in <strong>2012</strong>) and reviewing<br />

budgets Industry budgets (14% & Region in 2008 Comparison compared with Table: 31% Boards in <strong>2012</strong>).<br />

Rarely or Never Undertaking Best Practice Activities<br />

Industry & Region Comparison Table: Boards Rarely or Never Undertaking Best Practice Activities<br />

Industry Percentage & <strong>of</strong> Region boards that Comparison rarely or never: Table: North Boards Europe Rarely Asia or Never Energy Undertaking Financial Best IT Practice / Activities<br />

Industrials<br />

America<br />

/<br />

Telecom<br />

Percentage <strong>of</strong> boards that rarely or never: North Europe Asia Utilities<br />

Energy Financial IT / Industrials<br />

Percentage <strong>of</strong> boards that rarely or never:<br />

North America North<br />

America Europe Asia Energy / Energy<br />

/ Financial IT Telecom IT Telecom /<br />

Industrials<br />

Rarely/never review annual budgets 81% 44% 29% 71% 42% 62% 56%<br />

America<br />

/ Utilities /<br />

Utilities<br />

Telecom<br />

Rarely/never review roles &<br />

67% 53% 43% 79% 39% 69% 75%<br />

Rarely/never review annual budgets 81% 44% 29% Utilities<br />

71% 42% 62% 56%<br />

responsibilities<br />

71% 42% 62% 56%<br />

Rarely/never Rarely/never review review annual roles annual roles & budgets responsibilities 81% 67% 81% 67% 44% 53% 44% 53% 29% 43% 29% 43% 71% 79% 71% 79% 42% 39% 42% 39% 62% 69% 62% 69% 56% 75% 56%<br />

Rarely/never review top-level policies 56% 38% 33% 64% 19% 54% 63% 75%<br />

Rarely/never Rarely/never review review roles top-level roles top-level & responsibilities policies 67% 56% 67% 56% 53% 38% 53% 38% 43% 33% 43% 33% 79% 64% 79% 64% 39% 19% 39% 19% 69% 54% 69% 54% 75% 63% 75%<br />

Rarely/never receive privacy/security 23% 31% 24% 21% 11% 31% 50%<br />

63%<br />

Rarely/never Rarely/never review receive review receive top-level privacy/security policies reports 56% 23% 56% 23% 38% 31% 38% 31% 33% 24% 33% 24% 64% 21% 64% 21% 19% 11% 19% 11% 54% 31% 54% 31% 63% 50% 63%<br />

reports<br />

50%<br />

Rarely/never Rarely/never receive receive privacy/security breach/data privacy/security breach/data loss reports rpts 23% 14% 23% 14% 31% 44% 31% 44% 24% 52% 24% 52% 21% 36% 21% 36% 11% 22% 11% 22% 31% 31% 50% 44% 50%<br />

Rarely/never receive breach/data loss 14% 44% 52% 36% 22% 31% 44% 44%<br />

Rarely/never<br />

rpts<br />

Rarely/never receive review receive review security breach/data program loss rpts 14% 37% 14% 37% 44% 34% 44% 34% 52% 48% 52% 48% 36% 57% 36% 57% 22% 17% 22% 17% 31% 46% 31% 46% 44% 50% 44%<br />

50%<br />

Rarely/never assessments Rarely/never<br />

Rarely/never<br />

Rarely/never assessments review<br />

review<br />

review security<br />

security<br />

security program<br />

program<br />

program<br />

37% 37% 34% 34% 48% 48% 57% 57% 17% 17% 46% 46% 50%<br />

50%<br />

assessments<br />

assessments<br />

assessments<br />

North North American American respondents respondents indicated indicated that that their their boards boards are are more more neglectful neglectful in undertaking undertaking key activities activities<br />

North associated North associated North<br />

associated American with with privacy privacy respondents and and security security indicated governance governance that their than than boards European European are more and and neglectful Asian Asian boards, boards, in undertaking except except for for key receiving receiving activities<br />

associated reports. associated reports. associated<br />

reports. European European with privacy respondents respondents and security are are worse worse governance<br />

worse<br />

governance at at undertaking undertaking than European best best practices practices and Asian than than boards, Asian Asian except respondents, respondents, for receiving<br />

except except for<br />

for<br />

reports. reviewing reports. reviewing reports.<br />

reviewing European breach breach reports reports respondents and and security security are worse program program at undertaking assessments.<br />

assessments. best In practices examining than sector Asian responses, respondents, the financial except for<br />

sector reviewing sector far outpaced breach<br />

outpaced<br />

breach reports other and industry security sectors program in every assessments. area, confirming In examining the view sector that they responses, lead in the good financial<br />

governance sector In sector<br />

governance examining far outpaced practices, sector other responses, although industry the budget sectors financial reviews in sector every should area, far outpaced improve. confirming other the industry view that sectors they lead in every in good<br />

area,<br />

governance confirming governance the practices, view that although they lead budget in good reviews governance should improve.<br />

practices, although budget reviews should improve.<br />

The The survey survey respondents respondents indicated indicated that that the the energy/utilities energy/utilities industry industry sector sector has has the the poorest poorest governance governance in in every<br />

The almost The area The<br />

almost survey except survey every respondents for respondents area. receiving indicated reports. that the energy/utilities industry sector has the poorest governance in<br />

almost every area.<br />

Board Committee Committee Structure<br />

Structure<br />

Board Committee Structure<br />

Some <strong>of</strong> <strong>of</strong> the the biggest biggest improvements improvements have have been been organizational. organizational. Traditionally, Traditionally, boards boards have have not not separated separated risk<br />

risk<br />

management Some management Some<br />

management <strong>of</strong> the biggest and and audit audit improvements responsibilities responsibilities have by by been establishing establishing organizational. separate separate Risk Risk Traditionally, and and Audit Audit boards Committees. Committees. boards<br />

Committees. have not Although Although separated the the risk<br />

majority management majority management<br />

majority <strong>of</strong> <strong>of</strong> companies companies and audit still still responsibilities tend tend to to place place by risk risk establishing responsibilities responsibilities separate with with Risk the the and Audit Audit Audit Committee, Committee, Committees. the the <strong>Governance</strong> <strong>Governance</strong> Although the<br />

Surveys majority Surveys majority Surveys show show <strong>of</strong> companies this this is is changing. changing. still tend <strong>How</strong> <strong>How</strong> to place a a board board risk responsibilities is is organized organized and and with how how the it it Audit assigns assigns Audit<br />

assigns Committee, committee committee the responsibilities responsibilities <strong>Governance</strong><br />

can<br />

can<br />

significantly Surveys significantly Surveys<br />

significantly show influence influence this is changing. the the effectiveness effectiveness <strong>How</strong> a board <strong>of</strong> <strong>of</strong> its its management management is<br />

management<br />

is organized and activities activities how it and and assigns security security committee posture. posture. responsibilities can<br />

significantly influence the effectiveness <strong>of</strong> its management activities and security posture.<br />

Respondents Respondents indicated indicated that that only only 48% 48% <strong>of</strong> <strong>of</strong> boards boards have have a a Risk Risk Committee Committee that that is is separate separate from from an an Audit Audit<br />

Committee Committee Respondents Committee – – indicated and and <strong>of</strong> <strong>of</strong> these, these, that 81% 81% only <strong>of</strong> <strong>of</strong> 48% <strong>of</strong> these these <strong>of</strong> boards Risk Risk boards<br />

Risk Committees Committees have a Risk oversee oversee Committee privacy privacy that and and is security. security. separate These These from an results results Audit<br />

Committee represent represent Committee<br />

represent a a significant significant – and <strong>of</strong> these, improvement improvement 81% <strong>of</strong> since since these the the Risk 2008 2008 Committees survey, survey, when when oversee only only privacy 8% 8% <strong>of</strong> <strong>of</strong> boards boards and security. had had Risk Risk These Committees Committees<br />

results<br />

represent and represent and represent<br />

and only only 53% 53% a significant <strong>of</strong> <strong>of</strong> those those improvement oversaw oversaw privacy privacy since and and the security, security, 2008 survey, and and the the when 2010 2010 only survey, survey, 8% <strong>of</strong> which <strong>of</strong><br />

which boards indicated indicated had Risk 14% 14% Committees<br />

<strong>of</strong> <strong>of</strong> boards boards had<br />

had<br />

a and a and a Risk Risk only Committee Committee 53% <strong>of</strong> those and and <strong>of</strong> <strong>of</strong> oversaw those, those, privacy 67% 67% privacy<br />

67% <strong>of</strong> <strong>of</strong> and them them security, had had oversight oversight and the <strong>of</strong> <strong>of</strong> 2010 privacy privacy survey, and and which security. security. indicated 14% <strong>of</strong> boards had<br />

a Risk Committee and <strong>of</strong> those, 67% <strong>of</strong> them had oversight <strong>of</strong> privacy and security.<br />

Industry & & Region Region Comparison Comparison Table: Table: Risk Risk Committees Committees Responsible Responsible for for Privacy Privacy & & <strong>Security</strong><br />

<strong>Security</strong><br />

Industry Risk Committee & Region Comparison North Table: Europe Risk Asia Committees Energy Responsible / Financial for IT Privacy / & Industrials <strong>Security</strong><br />

Risk Committee<br />

North North Europe Europe Asia Asia Energy Energy / Financial IT IT / / Industrials<br />

Risk Separate Risk Separate Risk Separate Committee<br />

from Audit?<br />

America North America North<br />

America Europe Asia / Energy Utilities Energy Utilities /<br />

Financial Telecom IT Telecom IT Telecom /<br />

Industrials<br />

Separate Yes Separate Yes from Audit?<br />

America<br />

35% 41% 76% Utilities<br />

Utilities<br />

35% 78% Telecom<br />

31% 44%<br />

Yes If Yes If yes, does the Risk Committee 35% 35% 41% 41% 76% 76% 35% 35% 78% 78% 31% 31% 44%<br />

44%<br />

If oversee If oversee yes, does privacy the Risk<br />

& security? Committee<br />

oversee Yes oversee Committee oversee Yes privacy & security?<br />

93% 85% 75% 100% 79% 75% 57%<br />

Yes oversee Yes privacy &<br />

93% 85% 75% 100% 79% 75% 57%<br />

security?<br />

Yes 93% 85% 75% 100% 79% 75% 57%<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie ! Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />

7S!<br />

7S!<br />

7S!


The survey indicates that Asia is far ahead <strong>of</strong> North America and Europe in understanding the importance <strong>of</strong><br />

having a Risk Committee separate from the board Audit Committee, but more North American companies<br />

assign privacy and security risks to these Risk Committees than Asian companies.<br />

The financial sector respondents indicated that they are much farther ahead in establishing Risk Committees<br />

(78%), but only about three-fourths <strong>of</strong> them (79%) are responsible for privacy and security. Even though the<br />

energy sector was next to last in establishing Risk Committees (35%), 100% <strong>of</strong> them are assigned privacy and<br />

security oversight.<br />

Board Board committee structures are starting to form<br />

around around security and technology risks.<br />

Not surprisingly, 96% <strong>of</strong> the survey population said<br />

their boards have an Audit Committee and 78% <strong>of</strong><br />

them have a <strong>Governance</strong>, Compliance, or Ethics<br />

Committee. When polled about the types <strong>of</strong><br />

committees their boards have, respondents indicated<br />

that 56% <strong>of</strong> boards have a Risk/<strong>Security</strong> Committee<br />

and 23% have an IT/Technology Committee. This<br />

shows improvement from the 2010 survey results,<br />

which indicated that only 12% <strong>of</strong> respondents had a<br />

Risk/<strong>Security</strong> Committee and 6% had an<br />

IT/Technology Committee.<br />

Industry & Region Comparison Table: Board Committee Structures<br />

Asian respondents indicated that their boards are way ahead <strong>of</strong> North America and Europe in understanding<br />

the need for both Risk/<strong>Security</strong> Committees (95%) and IT/Technology Committees (38%), while North<br />

America surprisingly lags behind at 28% and 16% respectively. The energy/utilities sector respondents<br />

indicated that they have the fewest Risk/<strong>Security</strong> Committees, but IT/telecom respondents revealed that<br />

their sector does not have any (0%) IT/Technology Committees. This is surprising on both counts, since<br />

energy/utility companies are critical infrastructure subject to security regulations and the IT/telecom industry<br />

relies upon technology and IT systems for its revenue. Not surprisingly, the financial sector again led the way<br />

in understanding the need for these board<br />

committees.<br />

When When asked who was most responsible for<br />

the the oversight <strong>of</strong> risk, about one-third <strong>of</strong> the<br />

respondents respondents (35%) indicated the Audit<br />

Committee, Committee, while an equal number <strong>of</strong><br />

respondents respondents (35%) indicated that the full<br />

board board was responsible. The 2008 survey<br />

revealed that the Audit Committee was<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

Boards have these committees? North<br />

Europe Asia Energy /<br />

Financial IT /<br />

Industrials<br />

America<br />

Utilities<br />

Telecom<br />

Have Risk/<strong>Security</strong> Committee 28% 59% 95% 36% 86% 46% 63%<br />

Have IT/Technology<br />

16% 21% 38% 14% 39% 0% 13%<br />

Committee<br />

7T!


esponsible for risk 65% <strong>of</strong> the time and the full board 22%, while the 2010 survey indicated the Audit<br />

Committee had responsibility for risk 53% <strong>of</strong> the time and the full board had responsibility 22% <strong>of</strong> the time.<br />

The <strong>2012</strong> results indicate a clear shift away from assigning the Audit Committee the most<br />

responsibility for risk. The <strong>2012</strong> survey indicates the Risk Committee has responsibility for risk 30% <strong>of</strong> the<br />

respondents, whereas in 2010 it was only 5% and in 2008 it was 4%. Best practices and industry standards<br />

separate the audit and risk functions. The 2008 and 2010 surveys indicated an over-reliance upon Audit<br />

Committees to manage risk issues, creating segregation <strong>of</strong> duties (SOD) issues at the board level since the<br />

same committee that exercised oversight <strong>of</strong> operational aspects <strong>of</strong> privacy and security also oversaw audits in<br />

these areas. Carnegie Mellon’s Governing for <strong>Enterprise</strong> <strong>Security</strong> Implementation Guide provides step-by-step<br />

guidance on Risk Committee responsibilities for managing IT security risks. 19<br />

responsible for risk 65% <strong>of</strong> the time and the full board 22%, while the 2010 survey indicated the Audit<br />

Committee had responsibility for risk 53% <strong>of</strong> the time and the full board had responsibility 22% <strong>of</strong> the time.<br />

The <strong>2012</strong> results indicate a clear shift away from assigning the Audit Committee the most<br />

responsibility for risk. The <strong>2012</strong> survey indicates the Risk Committee has responsibility for risk 30% <strong>of</strong> the<br />

respondents, whereas in 2010 it was only 5% and in 2008 it was 4%. Best practices and industry standards<br />

separate the audit and risk functions. The 2008 and 2010 surveys indicated an over-reliance upon Audit<br />

Committees to manage risk issues, creating segregation <strong>of</strong> duties (SOD) issues at the board level since the<br />

same committee that exercised oversight <strong>of</strong> operational aspects <strong>of</strong> privacy and security also oversaw audits in<br />

these areas. Carnegie Mellon’s Governing for <strong>Enterprise</strong> <strong>Security</strong> Implementation Guide provides step-by-step<br />

guidance on Risk Committee responsibilities for managing IT security risks.<br />

Industry & Region Comparison Table: Most Responsibility for Cyber Risks<br />

Who has most responsibility North Europe Asia Energy / Financial IT / Industrials<br />

for risk?<br />

America<br />

Utilities<br />

Telecom<br />

Full Board 33% 34% 48% 43% 31% 23% 44%<br />

Audit Committee 42% 41% 14% 43% 11% 54% 25%<br />

Risk Committee 23% 22% 38% 14% 58% 23% 25%<br />

19<br />

responsible for risk 65% <strong>of</strong> the time and the full board 22%, while the 2010 survey indicated the Audit<br />

Committee had responsibility for risk 53% <strong>of</strong> the time and the full board had responsibility 22% <strong>of</strong> the time.<br />

The <strong>2012</strong> results indicate a clear shift away from assigning the Audit Committee the most<br />

responsibility for risk. The <strong>2012</strong> survey indicates the Risk Committee has responsibility for risk 30% <strong>of</strong> the<br />

respondents, whereas in 2010 it was only 5% and in 2008 it was 4%. Best practices and industry standards<br />

separate the audit and risk functions. The 2008 and 2010 surveys indicated an over-reliance upon Audit<br />

Committees to manage risk issues, creating segregation <strong>of</strong> duties (SOD) issues at the board level since the<br />

same committee that exercised oversight <strong>of</strong> operational aspects <strong>of</strong> privacy and security also oversaw audits in<br />

these areas. Carnegie Mellon’s Governing for <strong>Enterprise</strong> <strong>Security</strong> Implementation Guide provides step-by-step<br />

guidance on Risk Committee responsibilities for managing IT security risks.<br />

Industry & Region Comparison Table: Most Responsibility for Cyber Risks<br />

Who has most responsibility North Europe Asia Energy / Financial IT / Industrials<br />

for risk?<br />

America<br />

Utilities<br />

Telecom<br />

Full Board 33% 34% 48% 43% 31% 23% 44%<br />

Audit Committee 42% 41% 14% 43% 11% 54% 25%<br />

Risk Committee 23% 22% 38% 14% 58% 23% 25%<br />

19<br />

responsible for risk 65% <strong>of</strong> the time and the full board 22%, while the 2010 survey indicated the Audit<br />

Committee had responsibility for risk 53% <strong>of</strong> the time and the full board had responsibility 22% <strong>of</strong> the time.<br />

The <strong>2012</strong> results indicate a clear shift away from assigning the Audit Committee the most<br />

responsibility for risk. The <strong>2012</strong> survey indicates the Risk Committee has responsibility for risk 30% <strong>of</strong> the<br />

respondents, whereas in 2010 it was only 5% and in 2008 it was 4%. Best practices and industry standards<br />

separate the audit and risk functions. The 2008 and 2010 surveys indicated an over-reliance upon Audit<br />

Committees to manage risk issues, creating segregation <strong>of</strong> duties (SOD) issues at the board level since the<br />

same committee that exercised oversight <strong>of</strong> operational aspects <strong>of</strong> privacy and security also oversaw audits in<br />

these areas. Carnegie Mellon’s Governing for <strong>Enterprise</strong> <strong>Security</strong> Implementation Guide provides step-by-step<br />

guidance on Risk Committee responsibilities for managing IT security risks.<br />

Industry & Region Comparison Table: Most Responsibility for Cyber Risks<br />

Who has most responsibility North Europe Asia Energy / Financial IT / Industrials<br />

for risk?<br />

America<br />

Utilities<br />

Telecom<br />

Full Board 33% 34% 48% 43% 31% 23% 44%<br />

Audit Committee 42% 41% 14% 43% 11% 54% 25%<br />

Risk Committee 23% 22% 38% 14% 58% 23% 25%<br />

19<br />

Industry & Region Comparison Table: Most Responsibility for Cyber Risks<br />

Who has most responsibility North Europe Asia Energy / Financial IT / Industrials<br />

for risk?<br />

America<br />

Utilities<br />

Telecom<br />

Full Board 33% 34% 48% 43% 31% 23% 44%<br />

Audit Committee 42% 41% 14% 43% 11% 54% 25%<br />

Risk Committee 23% 22% 38% 14% 58% 23% 25%<br />

Interestingly, 54% <strong>of</strong> the IT/telecom sector respondents indicated that the Audit Committee has the most<br />

Interestingly, responsibility Interestingly, 54% for 54% risk, <strong>of</strong> <strong>of</strong> the while the IT/telecom the financial sector sector respondents indicated indicated just indicated the opposite, that that the the Audit with Audit 58% Committee <strong>of</strong> the respondents has has the the most<br />

responsibility saying responsibility that the for most for risk, responsibility while the the financial for risk sector falls sector to indicated the Risk just Committee. just the the opposite, with 58% <strong>of</strong> <strong>of</strong> the the respondents<br />

saying that that the the most responsibility for for risk risk falls falls to to the the Risk Committee.<br />

Board Risk and IT Committees rarely hire outside expertise.<br />

Board Risk and and IT IT Committees rarely hire hire outside expertise.<br />

Although 68% <strong>of</strong> the respondents indicated that<br />

Although their Although boards 68% engage <strong>of</strong> <strong>of</strong> the the outside respondents consultants, indicated legal that that<br />

their counsel, their boards or other engage experts, outside they consultants, also said these legal<br />

counsel, experts counsel, are or or primarily other experts, hired they by they the also also Audit, said said these<br />

experts Compensation, experts are are primarily or <strong>Governance</strong> hired by by the the Committees Audit,<br />

or by<br />

Compensation, the Compensation, full board. Risk or or <strong>Governance</strong> and <strong>Governance</strong> IT/Technology Committees or or by by<br />

only the the full hire full board. outside board. expertise Risk and and 16% IT/Technology and 10% <strong>of</strong> Committees the Committees time,<br />

only respectively. only hire hire outside The expertise lower expertise percentage, 16% and and 10% however, <strong>of</strong> <strong>of</strong> the the time, time, may<br />

respectively. be respectively. due to the The The small lower number percentage, <strong>of</strong> board however, Risk and may may IT<br />

be Committees. be be due due to to the the This small is number some number improvement, <strong>of</strong> <strong>of</strong> board Risk though. and and IT IT<br />

Committees. In Committees. 2010, only This 5% This <strong>of</strong> is is some the some respondents improvement, indicted though.<br />

In their In In 2010, Risk only Committee only 5% 5% <strong>of</strong> <strong>of</strong> the hired the respondents outside expertise. indicted<br />

their Risk Committee hired outside expertise.<br />

Less than half <strong>of</strong> boards hire outside experts to<br />

help Less with than risk half half assessments <strong>of</strong> <strong>of</strong> boards hire hire and outside risk management. experts to to<br />

Although help help with 89% risk risk <strong>of</strong> assessments the respondents and and risk indicated risk management.<br />

their<br />

Although boards Although reviewed 89% <strong>of</strong> <strong>of</strong> risk the the assessment respondents reports, indicated only their<br />

46% <strong>of</strong><br />

boards the boards respondents reviewed said risk risk that assessment their boards reports, hire only outside 46% <strong>of</strong> <strong>of</strong><br />

the expertise the the respondents to assist said said with that that risk their assessments boards hire hire and outside<br />

risk<br />

expertise management. expertise to to assist Less with than risk risk one assessments third (30%) and <strong>of</strong> and the risk risk<br />

management. respondents management. indicated Less than this one one expertise third (30%) came <strong>of</strong> from <strong>of</strong> the the risk<br />

respondents services respondents firms, indicated 27% <strong>of</strong> this the this respondents expertise came said from it came risk risk<br />

services firms, 27% <strong>of</strong> <strong>of</strong> the the respondents said said it it came<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

! !<br />

7G!<br />

7G! 7G!


from IT IT security security experts, experts, and and 18% 18% said said insurance insurance brokers brokers provided provided outside outside expertise. expertise. In In the the 2010 2010 survey, survey,<br />

from 17% from 17% <strong>of</strong> <strong>of</strong> IT <strong>of</strong> the the security the respondents respondents experts, indicated indicated and indicated 18% that that said that IT insurance IT security security brokers experts experts provided provided outside outside expertise. expertise, expertise, while In while the 26% 2010 26% indicated indicated<br />

survey,<br />

17% insurance 17% insurance <strong>of</strong> the brokers brokers respondents provided provided indicated these these services, that services, IT security just just the the experts opposite opposite provided <strong>of</strong> <strong>of</strong> the the <strong>2012</strong> outside <strong>2012</strong> survey. survey. expertise, It It is is important while important 26% to to indicated to note note that<br />

that<br />

insurance the insurance the the survey survey brokers did did not not not provided ask ask ask what what these topics topics services, the the the outside outside just experts the experts opposite were were asked <strong>of</strong> asked the to <strong>2012</strong> to address, address, survey. so so it It it is is is possible important possible that that to the note the Audit,<br />

Audit, that<br />

the full the full full survey board, board, did or or or other other not other ask committees committees what topics hired hired the computer computer outside computer experts security security were or or IT asked IT expertise.<br />

expertise. to address, so it is possible that the Audit,<br />

full board, or other committees hired computer security or IT expertise.<br />

Industry & Region Comparison Table: Board Board Use <strong>of</strong> Use <strong>of</strong> Outside <strong>of</strong> Outside Experts Experts<br />

Industry & Region Comparison Table: Board Use <strong>of</strong> Outside Experts<br />

Source <strong>of</strong> <strong>of</strong> outside<br />

North North<br />

Europe Asia Asia Energy / / Financial IT IT / IT / / Industrials<br />

Source risk Source risk risk expertise expertise<br />

<strong>of</strong> outside North America North America<br />

Europe Asia Energy Utilities Energy Utilities / Financial IT Telecom IT Telecom / Telecom Industrials<br />

risk Risk risk Risk Risk expertise Services Services Firm Firm America 36% 23% 30% Utilities 17% 40% Telecom 0% 0% 0% 20% 20%<br />

Risk Insurance Risk Insurance Services Broker Broker Firm 36% 45% 36% 45% 23% 8% 30% 15% 30% 15% 15% 17% 0% 0% 40% 10% 40% 10% 0% 0% 0% 100% 20% 100% 100%<br />

Insurance IT Insurance IT IT <strong>Security</strong> <strong>Security</strong> Broker Experts Experts 45% 36% 45% 36% 39% 8% 39% 15% 50% 0% 50% 10% 20% 10% 20% 33% 0% 33% 33% 100% 20% 20%<br />

IT <strong>Security</strong> Experts 36% 39% 15% 50% 20% 33% 20%<br />

The North American respondents indicated that they they are are clearly clearly more more reliant reliant upon upon insurance insurance brokers brokers to<br />

to<br />

The provide The provide North outside outside American expertise expertise respondents than than Europe Europe indicated or or Asia. Asia. that It they It is is interesting are interesting clearly to more to note, note, reliant however, however, upon that insurance that respondents respondents brokers from from to the<br />

the<br />

provide energy/utilities provide energy/utilities outside and and expertise and IT/telecom IT/telecom than Europe sectors sectors or said said Asia. they they It do do is do interesting not not use use insurance insurance to note, brokers brokers however, brokers at at all that all for for respondents outside outside expertise,<br />

expertise, from the<br />

energy/utilities while while 100% 100% <strong>of</strong> <strong>of</strong> the and the respondents IT/telecom respondents from sectors from the the said industrials industrials they do sector not sector use indicated indicated insurance that that brokers they they use at use all insurance insurance for outside brokers brokers expertise, for for this<br />

this<br />

purpose. while purpose. while purpose. 100% <strong>of</strong> the respondents from the industrials sector indicated that they use insurance brokers for this<br />

purpose.<br />

IT IT IT security security and risk experience becoming more valuable to to boards.<br />

IT security and risk experience becoming more valuable to boards. Twenty-seven Twenty-seven percent percent (27%) (27%)<br />

<strong>of</strong> <strong>of</strong> Twenty-seven <strong>of</strong> the the the respondents respondents percent indicated indicated (27%)<br />

that <strong>of</strong> that <strong>of</strong> that the their their respondents board board had had indicated an an outside<br />

outside<br />

director that director that director their with board with cybersecurity<br />

cyber had security an security outside<br />

expertise, director expertise, director expertise, with up up from cyber from 18% security 18% in<br />

in<br />

2010. expertise, 2010. expertise, 2010. Seventy-three Seventy-three up from 18% percent<br />

percent in<br />

(73%) 2010. (73%) <strong>of</strong> Seventy-three <strong>of</strong> <strong>of</strong> the the the respondents respondents percent said<br />

said<br />

their (73%) their (73%) their boards boards <strong>of</strong> boards the had had respondents had an an an outside outside said<br />

director their director their director boards with with had risk risk an expertise,<br />

outside<br />

compared director compared director compared with with with risk 59% 59% expertise, in in in 2010.<br />

2010.<br />

Fifty-one compared Fifty-one compared Fifty-one percent percent with percent 59% (51%) (51%) in 2010. <strong>of</strong> <strong>of</strong> <strong>of</strong><br />

respondents Fifty-one respondents Fifty-one respondents percent indicated indicated (51%) that<br />

that <strong>of</strong><br />

their respondents their respondents their boards boards retain retain indicated retain pr<strong>of</strong>essional<br />

pr<strong>of</strong>essional that<br />

search their search their search boards firms firms retain to to seek seek pr<strong>of</strong>essional qualified<br />

qualified<br />

candidates search candidates search candidates firms for for to their seek their board.<br />

qualified board.<br />

candidates for their board.<br />

Not Not surprisingly, surprisingly, the the experience deemed most important in in recruiting directors was financial and<br />

management Not management Not management surprisingly, expertise. expertise. the experience IT IT expertise expertise deemed is is becoming becoming most important more more valuable, valuable, in recruiting however. however. directors When When was recruiting, recruiting, financial IT IT and IT expertise expertise was<br />

was<br />

very management very important important expertise. or or or important important IT expertise for for 37% 37% is <strong>of</strong> becoming <strong>of</strong> the the respondents respondents more valuable, and and somewhat somewhat however. important important When recruiting, for for for 42%. 42%. IT It It It is is expertise is encouraging encouraging was<br />

that very that that 64% important 64% <strong>of</strong> <strong>of</strong> the the respondents or respondents important indicated indicated for 37% that that risk <strong>of</strong> risk the and and respondents security security expertise expertise and was was somewhat either either very very important important or for or important important 42%. It and and is 27% encouraging 27% said said it<br />

it<br />

was that was that was somewhat somewhat 64% somewhat <strong>of</strong> the important. important. respondents indicated that risk and security expertise was either very important or important and 27% said it<br />

was somewhat important.<br />

Carnegie Carnegie Mellon Mellon <strong>CyLab</strong> <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

! !<br />

!<br />


Industry & Region Comparison Table: Experience Valuable When Recruiting Board Members<br />

Industry & Region Comparison Table: Experience Valuable When Recruiting Board Members<br />

When recruiting board members, how<br />

North<br />

Europe Asia Energy /<br />

Financial IT /<br />

Industrials<br />

valuable<br />

When<br />

valuable<br />

recruiting<br />

is:<br />

board members, how<br />

America<br />

North<br />

America<br />

Europe Asia<br />

Utilities<br />

Energy<br />

Utilities<br />

/ Financial<br />

Telecom<br />

IT<br />

Telecom<br />

/ Industrials<br />

IT valuable IT experience is: – Very imp or imp America 42% 22% 48% Utilities 7% 42% Telecom 62% 31%<br />

Risk/security IT Risk/security experience experience – Very imp – or Very imp imp or imp 63% 42% 63% 56% 22% 56% 62% 48% 62% 50% 7% 75% 42% 75% 69% 62% 69% 50% 31% 50%<br />

Risk/security experience – Very imp or imp 63% 56% 62% 50% 75% 69% 50%<br />

Only 22% <strong>of</strong> European respondents indicated that IT experience was very important or important in<br />

recruiting Only recruiting 22% board <strong>of</strong> European members, respondents while 42% indicated <strong>of</strong> North that American IT experience and 48% was <strong>of</strong> very Asian important respondents or important indicated in it was<br />

very recruiting very important board or members, important. while Only 42% 7% <strong>of</strong> <strong>of</strong> North the respondents American and from 48% the <strong>of</strong> energy/utilities Asian respondents sector indicated found IT<br />

it was<br />

experience very experience important to be or very important. important Only or important, 7% <strong>of</strong> the respondents while other sectors from the ranked energy/utilities it quite high, sector especially found the<br />

IT<br />

IT/telecom experience IT/telecom to sector.<br />

be very important or important, while other sectors ranked it quite high, especially the<br />

IT/telecom sector.<br />

Internal Organizational Roles & Responsibilities<br />

Internal Organizational Roles & Responsibilities<br />

Boards and senior management are lagging in establishing key positions for privacy and security or<br />

appropriately appropriately Boards appropriately and senior assigning management responsibilities.<br />

are lagging in establishing key positions for privacy and security or<br />

appropriately Best practices call assigning for clear responsibilities.<br />

roles and responsibilities with respect to privacy and security. The delineation <strong>of</strong><br />

responsibilities Best responsibilities practices call should for clear serve roles as a and check responsibilities and balance and with protect respect the to company privacy and against security. SOD The issues delineation that could<br />

<strong>of</strong><br />

increase responsibilities increase risk. There should is a serve general as a belief check that and most balance companies and protect do not the understand company against this and SOD are not issues creating that could the<br />

needed increase needed roles risk. or There are inappropriately is a general belief combining that most responsibilities. companies do not So disparate understand disparate are this the and approaches are not creating to IT security,<br />

the<br />

that needed that titles roles for or personnel are inappropriately responsible combining for privacy responsibilities. and security span So four disparate possibilities: are the chief approaches privacy to <strong>of</strong>ficer IT security, (CPO),<br />

chief that chief titles information for personnel security responsible <strong>of</strong>ficer (CISO), for privacy chief and security security <strong>of</strong>ficer span (CSO), four possibilities: and chief risk chief <strong>of</strong>ficer privacy (CRO).<br />

<strong>of</strong>ficer (CPO),<br />

chief information security <strong>of</strong>ficer (CISO), chief security <strong>of</strong>ficer (CSO), and chief risk <strong>of</strong>ficer (CRO).<br />

Organizations Organizations continued to show that they do not have full-time, senior-level personnel in place to<br />

Organizations appropriately appropriately manage continued privacy to show and that security they risks.<br />

do not have full-time, senior-level personnel in place to<br />

appropriately manage privacy and security risks.<br />

! 35% <strong>of</strong> the respondents said their<br />

! organizations 35% organizations <strong>of</strong> the respondents did not have said a CISO<br />

their<br />

! 47% organizations 47% said they did did not not have have a a CISO CSO<br />

! ! 47% 82% said said they they did did not not have have a a CSO CPO<br />

! ! 82% 42% said their they their did organizations not have a did<br />

CPO<br />

! not 42% not have said a their CRO.<br />

organizations did<br />

not have a CRO.<br />

The CRO title is being used by security<br />

savvy The savvy CRO companies title is being that understand used by security the<br />

need savvy need to companies integrate IT, that IT, physical, understand and<br />

the<br />

personnel need personnel to integrate risks and IT, manage physical, them<br />

and<br />

through personnel through one risks position. and manage Less than them two-<br />

through thirds <strong>of</strong> the one Forbes position. Global Less 2000 than companies<br />

two-<br />

responding to the survey have full-time personnel in key roles responsible for privacy thirds and security <strong>of</strong> the Forbes in a manner Global that 2000 is consistent<br />

companies<br />

with responding with internationally to the survey accepted have best full-time practices personnel and standards.<br />

in key roles responsible for privacy and security in a manner that is consistent<br />

with internationally accepted best practices and standards.<br />

It is possible that some respondents indicated that they did not have someone in a particular position because<br />

the It the is person possible in that their some organization respondents did not indicated have that that specific they did title. not have This, someone however, in does a particular not comport position with because best<br />

practices the practices person and in standards. their standards. organization Any organization did not have large that enough specific to be included title. This, in the however, Forbes Global does 2000 not list comport should have with have a best CIO,<br />

CISO/CSO, practices CISO/CSO, and CPO, standards. and CRO. Any The organization percentage large <strong>of</strong> enough <strong>of</strong> companies to be included without in the these Forbes positions Global 2000 was also list should high in have in the a CIO, 2008<br />

and CISO/CSO, and 2010 surveys, CPO, although and although CRO. the The number percentage <strong>of</strong> organizations <strong>of</strong> companies that without do have these CISOs positions jumped was from also 30% high in in 2008 the 2008 and<br />

and 2010 surveys, although the number <strong>of</strong> organizations that do have CISOs jumped from 30% in 2008 and<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />


39%<br />

39%<br />

39%<br />

39%<br />

in<br />

in<br />

in<br />

in<br />

2010<br />

2010<br />

2010<br />

2010<br />

to<br />

to<br />

to<br />

to<br />

64%<br />

64%<br />

64%<br />

64%<br />

in<br />

in<br />

in<br />

in<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

The<br />

The<br />

The<br />

The<br />

number<br />

number<br />

number<br />

number<br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

organizations<br />

organizations<br />

organizations<br />

organizations<br />

that<br />

that<br />

that<br />

that<br />

have<br />

have<br />

have<br />

have<br />

CSOs<br />

CSOs<br />

CSOs<br />

CSOs<br />

also<br />

also<br />

also<br />

also<br />

gained<br />

gained<br />

gained<br />

gained<br />

from<br />

from<br />

from<br />

from<br />

16%<br />

16%<br />

16%<br />

16%<br />

in<br />

in<br />

in<br />

in<br />

2008<br />

2008<br />

2008<br />

2008<br />

and<br />

and<br />

and<br />

and<br />

36%<br />

36%<br />

36%<br />

36%<br />

in<br />

in<br />

in<br />

in<br />

2010<br />

2010<br />

2010<br />

2010<br />

to<br />

to<br />

to<br />

to<br />

51%<br />

51%<br />

51%<br />

51%<br />

in<br />

in<br />

in<br />

in<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

The<br />

The<br />

The<br />

The<br />

CPO<br />

CPO<br />

CPO<br />

CPO<br />

position<br />

position<br />

position<br />

position<br />

is<br />

is<br />

is<br />

is<br />

the<br />

the<br />

the<br />

the<br />

most<br />

most<br />

most<br />

most<br />

baffling.<br />

baffling.<br />

baffling.<br />

baffling.<br />

Only<br />

Only<br />

Only<br />

Only<br />

7%<br />

7%<br />

7%<br />

7%<br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

the<br />

the<br />

the<br />

the<br />

respondents<br />

respondents<br />

respondents<br />

respondents<br />

indicated<br />

indicated<br />

indicated<br />

indicated<br />

they<br />

they<br />

they<br />

they<br />

had<br />

had<br />

had<br />

had<br />

a CPO<br />

CPO<br />

CPO<br />

CPO<br />

in<br />

in<br />

in<br />

in<br />

2008,<br />

2008,<br />

2008,<br />

2008,<br />

18%<br />

18%<br />

18%<br />

18%<br />

said<br />

said<br />

said<br />

said<br />

they<br />

they<br />

they<br />

they<br />

did<br />

did<br />

did<br />

did<br />

in<br />

in<br />

in<br />

in<br />

2010,<br />

2010,<br />

2010,<br />

2010,<br />

and<br />

and<br />

and<br />

and<br />

only<br />

only<br />

only<br />

only<br />

11%<br />

11%<br />

11%<br />

11%<br />

did<br />

did<br />

did<br />

did<br />

in<br />

in<br />

in<br />

in<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

<strong>2012</strong>.<br />

Clearly,<br />

Clearly,<br />

Clearly,<br />

Clearly,<br />

this<br />

this<br />

this<br />

this<br />

is<br />

is<br />

is<br />

is<br />

an<br />

an<br />

an<br />

an<br />

area<br />

area<br />

area<br />

area<br />

that<br />

that<br />

that<br />

that<br />

requires<br />

requires<br />

requires<br />

requires<br />

more<br />

more<br />

more<br />

more<br />

board<br />

board<br />

board<br />

board<br />

attention.<br />

attention.<br />

attention.<br />

attention.<br />

Industry<br />

Industry<br />

Industry<br />

Industry<br />

& Region<br />

Region<br />

Region<br />

Region<br />

Comparison<br />

Comparison<br />

Comparison<br />

Comparison<br />

Table:<br />

Table:<br />

Table:<br />

Table:<br />

Organizations<br />

Organizations<br />

Organizations<br />

Organizations<br />

with<br />

with<br />

with<br />

with<br />

Privacy<br />

Privacy<br />

Privacy<br />

Privacy<br />

& <strong>Security</strong><br />

<strong>Security</strong><br />

<strong>Security</strong><br />

<strong>Security</strong><br />

Personnel<br />

Personnel<br />

Personnel<br />

Personnel<br />

Percentage <strong>of</strong> companies North Europe Asia Energy / Financial IT / Industrials<br />

Percentage <strong>of</strong> companies<br />

North<br />

Europe Asia Energy /<br />

Financial IT /<br />

Industrials<br />

that have:<br />

America<br />

Utilities<br />

Telecom<br />

that have:<br />

America<br />

Utilities<br />

Telecom<br />

CISO 58% 72% 52% 50% 81% 69% 50%<br />

CISO 58% 72% 52% 50% 81% 69% 50%<br />

CSO 47% 63% 38% 50% 75% 69% 50%<br />

CSO 47% 63% 38% 50% 75% 69% 50%<br />

CPO 23% 3% 5% 7% 17% 0% 13%<br />

CPO 23% 3% 5% 7% 17% 0% 13%<br />

CRO 49% 56% 57% 57% 89% 54% 25%<br />

CRO 49% 56% 57% 57% 89% 54% 25%<br />

With<br />

With<br />

With<br />

With<br />

the<br />

the<br />

the<br />

the<br />

European<br />

European<br />

European<br />

European<br />

Union’s<br />

Union’s<br />

Union’s<br />

Union’s<br />

strong<br />

strong<br />

strong<br />

strong<br />

emphasis<br />

emphasis<br />

emphasis<br />

emphasis<br />

on<br />

on<br />

on<br />

on<br />

privacy,<br />

privacy,<br />

privacy,<br />

privacy,<br />

it<br />

it<br />

it<br />

it<br />

is<br />

is<br />

is<br />

is<br />

interesting<br />

interesting<br />

interesting<br />

interesting<br />

to<br />

to<br />

to<br />

to<br />

note<br />

note<br />

note<br />

note<br />

that<br />

that<br />

that<br />

that<br />

23%<br />

23%<br />

23%<br />

23%<br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

the<br />

the<br />

the<br />

the<br />

North<br />

North<br />

North<br />

North<br />

American<br />

American<br />

American<br />

American<br />

respondents<br />

respondents<br />

respondents<br />

respondents<br />

indicated<br />

indicated<br />

indicated<br />

indicated<br />

that<br />

that<br />

that<br />

that<br />

their<br />

their<br />

their<br />

their<br />

organization<br />

organization<br />

organization<br />

organization<br />

has<br />

has<br />

has<br />

has<br />

a CPO,<br />

CPO,<br />

CPO,<br />

CPO,<br />

while<br />

while<br />

while<br />

while<br />

only<br />

only<br />

only<br />

only<br />

3%<br />

3%<br />

3%<br />

3%<br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

the<br />

the<br />

the<br />

the<br />

European<br />

European<br />

European<br />

European<br />

respondents<br />

respondents<br />

respondents<br />

respondents<br />

indicated<br />

indicated<br />

indicated<br />

indicated<br />

that<br />

that<br />

that<br />

that<br />

they<br />

they<br />

they<br />

they<br />

do,<br />

do,<br />

do,<br />

do,<br />

but<br />

but<br />

but<br />

but<br />

Europe<br />

Europe<br />

Europe<br />

Europe<br />

had<br />

had<br />

had<br />

had<br />

a higher<br />

higher<br />

higher<br />

higher<br />

percentage<br />

percentage<br />

percentage<br />

percentage<br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

CISOs<br />

CISOs<br />

CISOs<br />

CISOs<br />

and<br />

and<br />

and<br />

and<br />

CSOs<br />

CSOs<br />

CSOs<br />

CSOs<br />

than<br />

than<br />

than<br />

than<br />

North<br />

North<br />

North<br />

North<br />

America.<br />

America.<br />

America.<br />

America.<br />

The<br />

The<br />

The<br />

The<br />

low<br />

low<br />

low<br />

low<br />

rate<br />

rate<br />

rate<br />

rate<br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

CISOs/CSOs<br />

CISOs/CSOs<br />

CISOs/CSOs<br />

CISOs/CSOs<br />

for<br />

for<br />

for<br />

for<br />

the<br />

the<br />

the<br />

the<br />

energy/utilities<br />

energy/utilities<br />

energy/utilities<br />

energy/utilities<br />

sector<br />

sector<br />

sector<br />

sector<br />

is<br />

is<br />

is<br />

is<br />

also<br />

also<br />

also<br />

also<br />

puzzling,<br />

puzzling,<br />

puzzling,<br />

puzzling,<br />

since<br />

since<br />

since<br />

since<br />

they<br />

they<br />

they<br />

they<br />

are<br />

are<br />

are<br />

are<br />

a highly<br />

highly<br />

highly<br />

highly<br />

regulated<br />

regulated<br />

regulated<br />

regulated<br />

critical<br />

critical<br />

critical<br />

critical<br />

infrastructure<br />

infrastructure<br />

infrastructure<br />

infrastructure<br />

sector,<br />

sector,<br />

sector,<br />

sector,<br />

with<br />

with<br />

with<br />

with<br />

energy<br />

energy<br />

energy<br />

energy<br />

grids<br />

grids<br />

grids<br />

grids<br />

subject<br />

subject<br />

subject<br />

subject<br />

to<br />

to<br />

to<br />

to<br />

mandatory<br />

mandatory<br />

mandatory<br />

mandatory<br />

security<br />

security<br />

security<br />

security<br />

regulations.<br />

regulations.<br />

regulations.<br />

regulations.<br />

It<br />

It<br />

It<br />

It<br />

is<br />

is<br />

is<br />

is<br />

also<br />

also<br />

also<br />

also<br />

surprising<br />

surprising<br />

surprising<br />

surprising<br />

that<br />

that<br />

that<br />

that<br />

the<br />

the<br />

the<br />

the<br />

IT/telecom<br />

IT/telecom<br />

IT/telecom<br />

IT/telecom<br />

respondents<br />

respondents<br />

respondents<br />

respondents<br />

indicated<br />

indicated<br />

indicated<br />

indicated<br />

that<br />

that<br />

that<br />

that<br />

none<br />

none<br />

none<br />

none<br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

them<br />

them<br />

them<br />

them<br />

have<br />

have<br />

have<br />

have<br />

CPOs<br />

CPOs<br />

CPOs<br />

CPOs<br />

since<br />

since<br />

since<br />

since<br />

they<br />

they<br />

they<br />

they<br />

are<br />

are<br />

are<br />

are<br />

subject<br />

subject<br />

subject<br />

subject<br />

to<br />

to<br />

to<br />

to<br />

numerous<br />

numerous<br />

numerous<br />

numerous<br />

privacy<br />

privacy<br />

privacy<br />

privacy<br />

laws<br />

laws<br />

laws<br />

laws<br />

and<br />

and<br />

and<br />

and<br />

regulations.<br />

regulations.<br />

regulations.<br />

regulations.<br />

Organizations tend to overlap privacy and security responsibilities, not understanding the inherent<br />

SOD issues.<br />

It is important that privacy and security<br />

responsibilities be separated to prevent a<br />

single point <strong>of</strong> failure, which can occur<br />

(a) when security personnel do not<br />

understand compliance requirements or<br />

needed privacy controls, or (b) when<br />

privacy personnel do not understand the<br />

technical security configuration or<br />

technical controls. 20 Organizations tend to overlap privacy and security responsibilities, not understanding the inherent<br />

SOD issues.<br />

It is important that privacy and security<br />

responsibilities be separated to prevent a<br />

single point <strong>of</strong> failure, which can occur<br />

(a) when security personnel do not<br />

understand compliance requirements or<br />

needed privacy controls, or (b) when<br />

privacy personnel do not understand the<br />

technical security configuration or<br />

technical controls.<br />

The <strong>2012</strong> survey<br />

respondents indicated that 58% <strong>of</strong><br />

CISOs and 47% <strong>of</strong> CSOs are responsible<br />

for both privacy and security. Forty-four<br />

percent (44%) <strong>of</strong> CROs have both areas<br />

<strong>of</strong> responsibility. Interestingly, none (0%) <strong>of</strong> the respondents assigned security responsibilities to their CPO.<br />

20 Organizations tend to overlap privacy and security responsibilities, not understanding the inherent<br />

SOD issues.<br />

It is important that privacy and security<br />

responsibilities be separated to prevent a<br />

single point <strong>of</strong> failure, which can occur<br />

(a) when security personnel do not<br />

understand compliance requirements or<br />

needed privacy controls, or (b) when<br />

privacy personnel do not understand the<br />

technical security configuration or<br />

technical controls.<br />

The <strong>2012</strong> survey<br />

respondents indicated that 58% <strong>of</strong><br />

CISOs and 47% <strong>of</strong> CSOs are responsible<br />

for both privacy and security. Forty-four<br />

percent (44%) <strong>of</strong> CROs have both areas<br />

<strong>of</strong> responsibility. Interestingly, none (0%) <strong>of</strong> the respondents assigned security responsibilities to their CPO.<br />

20 Organizations tend to overlap privacy and security responsibilities, not understanding the inherent<br />

SOD issues.<br />

It is important that privacy and security<br />

responsibilities be separated to prevent a<br />

single point <strong>of</strong> failure, which can occur<br />

(a) when security personnel do not<br />

understand compliance requirements or<br />

needed privacy controls, or (b) when<br />

privacy personnel do not understand the<br />

technical security configuration or<br />

technical controls.<br />

The <strong>2012</strong> survey<br />

respondents indicated that 58% <strong>of</strong><br />

CISOs and 47% <strong>of</strong> CSOs are responsible<br />

for both privacy and security. Forty-four<br />

percent (44%) <strong>of</strong> CROs have both areas<br />

<strong>of</strong> responsibility. Interestingly, none (0%) <strong>of</strong> the respondents assigned security responsibilities to their CPO.<br />

20 The <strong>2012</strong> survey<br />

respondents indicated that 58% <strong>of</strong><br />

CISOs and 47% <strong>of</strong> CSOs are responsible<br />

for both privacy and security. Forty-four<br />

percent (44%) <strong>of</strong> CROs have both areas<br />

<strong>of</strong> responsibility. Interestingly, none (0%) <strong>of</strong> the respondents assigned security responsibilities to their CPO.<br />

There<br />

There<br />

There<br />

There<br />

are<br />

are<br />

are<br />

are<br />

few<br />

few<br />

few<br />

few<br />

differences<br />

differences<br />

differences<br />

differences<br />

between<br />

between<br />

between<br />

between<br />

the<br />

the<br />

the<br />

the<br />

2008<br />

2008<br />

2008<br />

2008<br />

and<br />

and<br />

and<br />

and<br />

2010<br />

2010<br />

2010<br />

2010<br />

survey<br />

survey<br />

survey<br />

survey<br />

results<br />

results<br />

results<br />

results<br />

on<br />

on<br />

on<br />

on<br />

overlapping<br />

overlapping<br />

overlapping<br />

overlapping<br />

responsibilities<br />

responsibilities<br />

responsibilities<br />

responsibilities<br />

that<br />

that<br />

that<br />

that<br />

are<br />

are<br />

are<br />

are<br />

noteworthy.<br />

noteworthy.<br />

noteworthy.<br />

noteworthy.<br />

The<br />

The<br />

The<br />

The<br />

percentage<br />

percentage<br />

percentage<br />

percentage<br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

<strong>of</strong><br />

CISOs<br />

CISOs<br />

CISOs<br />

CISOs<br />

and<br />

and<br />

and<br />

and<br />

CSOs<br />

CSOs<br />

CSOs<br />

CSOs<br />

responsible<br />

responsible<br />

responsible<br />

responsible<br />

for<br />

for<br />

for<br />

for<br />

both<br />

both<br />

both<br />

both<br />

privacy<br />

privacy<br />

privacy<br />

privacy<br />

and<br />

and<br />

and<br />

and<br />

security<br />

security<br />

security<br />

security<br />

has<br />

has<br />

has<br />

has<br />

remained<br />

remained<br />

remained<br />

remained<br />

very<br />

very<br />

very<br />

very<br />

high.<br />

high.<br />

high.<br />

high.<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />


Industry & Region Comparison Table: <strong>Security</strong> Personnel Also Responsible for Privacy<br />

Industry & Region Comparison Table: <strong>Security</strong> Personnel Also Responsible for Privacy<br />

Industry Person also & assigned<br />

Region Comparison North<br />

Europe Table: Asia <strong>Security</strong> Energy Personnel /<br />

Financial Also Responsible IT /<br />

Industrials<br />

for Privacy<br />

privacy<br />

Person<br />

privacy<br />

Person also<br />

responsibilities<br />

also<br />

responsibilities<br />

assigned<br />

America<br />

North<br />

America<br />

North Europe Asia Utilities<br />

Energy<br />

Utilities<br />

Energy /<br />

Financial Telecom<br />

IT<br />

Telecom<br />

IT /<br />

Industrials<br />

privacy<br />

CISO Person<br />

privacy<br />

CISO also<br />

responsibilities<br />

assigned<br />

America<br />

North<br />

America<br />

44% Europe 48% Asia<br />

Utilities<br />

82% Energy<br />

Utilities<br />

43% / Financial<br />

Telecom<br />

76% IT<br />

Telecom<br />

78% / Industrials 25%<br />

CISO<br />

CSO privacy CISO<br />

CSO responsibilities America 44% 48% 82% 35% 40% 63% Utilities 43% 76% 38% 63% Telecom 78% 25%<br />

67% 33%<br />

CSO<br />

CRO CISO CSO 35%<br />

CRO 48% 44% 35% 40%<br />

48% 22% 48% 40% 63%<br />

22% 67% 82% 63% 38%<br />

67% 43% 38% 63%<br />

0% 56% 76% 63% 67%<br />

56% 86% 78% 67% 33%<br />

86% 25% 33%<br />

0%<br />

CRO CSO CRO 48% 35% 48% 22% 40% 22% 67% 63% 67% 38% 0% 56% 63% 56% 86% 67% 86% 33% 0%<br />

CRO 48% 22% 67% 0% 56% 86% 0%<br />

Asian respondents indicated that their CISOs, CSOs, and CROs, are much more likely to be responsible for<br />

Asian respondents indicated that their CISOs, CSOs, and CROs, are much more likely to be responsible for<br />

both privacy and security than those in North America and Europe. The financial and IT/telecom industry<br />

both Asian both privacy respondents and security indicated than that those their in CISOs, North America CSOs, America and and CROs, Europe. are much The financial more likely and to IT/telecom be responsible industry<br />

for<br />

sectors also are especially likely to double up on privacy and security responsibilities. Interestingly, neither the<br />

sectors both sectors privacy also are and especially security than likely those to double in North up on America privacy and and Europe. security responsibilities. The financial and Interestingly, IT/telecom neither industry the<br />

energy/utilities or industrials industry sectors ever assign privacy responsibilities to their CROs.<br />

energy/utilities sectors energy/utilities also are or especially or industrials likely industry to double sectors up on ever privacy assign and privacy security responsibilities responsibilities. to their Interestingly, CROs.<br />

neither the<br />

energy/utilities or industrials industry sectors ever assign privacy responsibilities to their CROs.<br />

There are also SOD issues at line responsibility<br />

There are also SOD issues at line responsibility<br />

levels when CISOs/CSOs report to chief<br />

levels There levels when are also CISOs/CSOs SOD issues report at line to responsibility<br />

to chief<br />

information <strong>of</strong>ficers (CIOs) because the CIO then<br />

information levels information when CISOs/CSOs <strong>of</strong>ficers (CIOs) report because to chief the CIO then<br />

controls the budget for the security program and<br />

controls information controls the <strong>of</strong>ficers budget for (CIOs) the security because program the CIO and<br />

then<br />

may override security configuration decisions or<br />

may controls may override the budget security for configuration the security program decisions and or<br />

policies in favor <strong>of</strong> his/her own infrastructure<br />

policies may policies override in favor security <strong>of</strong> his/her configuration own infrastructure<br />

decisions or<br />

architecture preferences, thereby compromising<br />

architecture policies architecture in favor preferences, <strong>of</strong> his/her thereby own infrastructure<br />

compromising<br />

security. In addition, the CIO may interfere with<br />

security. architecture security. In addition, preferences, addition, the thereby CIO may compromising interfere with<br />

security procurements by favoring certain vendors<br />

security security. security procurements In addition, the by CIO favoring may certain interfere vendors<br />

with<br />

or products without understanding the<br />

or security or products procurements without understanding by favoring certain the<br />

vendors<br />

technological differences between the products.<br />

technological or technological products without differences understanding between the the products.<br />

Although such reporting relationships are against best<br />

Although technological Although such reporting differences relationships between are the against products. best<br />

practices, 38% <strong>of</strong> the respondents indicated that the CISO/CSO reported to the CIO in their organization. Twenty-two<br />

practices, Although practices, 38% such reporting <strong>of</strong> the respondents relationships indicated are against that the best CISO/CSO reported to the CIO in their organization. Twenty-two<br />

percent (22%) <strong>of</strong> the respondents indicated that the CISO/CSO reported to the CEO and 13% indicated that<br />

percent practices, percent (22%) 38% (22%) <strong>of</strong> <strong>of</strong> the the respondents respondents indicated indicated that the that CISO/CSO that the CISO/CSO reported to reported the CIO in to their the organization. CEO and 13% Twenty-two indicated that<br />

the CISO/CSO reported to the CFO.<br />

the percent the CISO/CSO (22%) <strong>of</strong> reported the respondents to the CFO.<br />

indicated that the CISO/CSO reported to the CEO and 13% indicated that<br />

the CISO/CSO reported to the CFO.<br />

Industry & Region Comparison Table: CISO/CSO <strong>Report</strong>ing Lines<br />

Industry & Region Comparison Table: CISO/CSO <strong>Report</strong>ing Lines<br />

Industry & Region Comparison Table: CISO/CSO <strong>Report</strong>ing Lines<br />

CISO/CSO<br />

North<br />

Europe Asia Energy /<br />

Financial IT /<br />

Industrials<br />

reporting<br />

CISO/CSO<br />

reporting<br />

CISO/CSO<br />

to<br />

America<br />

North<br />

America<br />

North Europe Asia Utilities<br />

Energy<br />

Utilities<br />

Energy /<br />

Financial Telecom<br />

IT<br />

Telecom<br />

IT /<br />

Industrials<br />

reporting to America<br />

Utilities<br />

Telecom<br />

CIO CISO/CSO<br />

to America<br />

CIO North 44% Europe 50% Asia<br />

Utilities<br />

19% Energy 50% / Financial<br />

Telecom<br />

42% IT 15% / Industrials 25%<br />

CIO 44% 50% 19% 50% 42% 15% 25%<br />

CEO reporting CEO to America 44% 50% 19%<br />

5% 13% 57% Utilities 50% 42%<br />

7% 28% Telecom 15% 25%<br />

54% 19%<br />

CEO 5% 13% 57% 7% 28% 54% 19%<br />

CFO CIO CFO 23% 44% 5% 13%<br />

23% 50% 57%<br />

3% 19% 5% 14% 50% 7% 28%<br />

14% 42% 54%<br />

3% 15% 19%<br />

8% 44% 25% 44%<br />

CFO CEO CFO 23% 5% 13% 3% 57% 5% 14% 7% 28% 3% 54% 8% 44% 19% 44%<br />

CFO 23% 3% 5% 14% 3% 8% 44%<br />

While almost half <strong>of</strong> North American (44%) and European (50%) respondents indicated that their<br />

While almost half <strong>of</strong> North American (44%) and European (50%) respondents indicated that their<br />

organizations’ CISO/CSOs reported to the CIO, Asia showed a clear preference not to establish such<br />

organizations’ While organizations’ almost half CISO/CSOs <strong>of</strong> North American reported to (44%) the CIO, and European Asia showed (50%) a clear respondents preference indicated not to establish that their such<br />

reporting lines, with 57% <strong>of</strong> the CISO/CSOs reporting to the CEO. The North American respondents<br />

reporting organizations’ reporting lines, CISO/CSOs with 57% <strong>of</strong> reported the CISO/CSOs to the CIO, reporting Asia showed to the CEO. a clear The preference North American not American to establish respondents<br />

such<br />

indicated that the CFO is a favored second choice for CISO/CSO reporting, but Europe preferred the CEO.<br />

indicated reporting indicated that lines, that the with CFO 57% is <strong>of</strong> a favored the CISO/CSOs second choice reporting for CISO/CSO to the CEO. reporting, The North but American Europe preferred respondents the CEO.<br />

The IT/telecom industry also favored CEO reporting with 54% <strong>of</strong> their CISO/CSOs reporting to the CEO<br />

The indicated The IT/telecom that the industry CFO is also a favored favored second CEO choice reporting for CISO/CSO with 54% <strong>of</strong> reporting, their CISO/CSOs but Europe reporting preferred to the the CEO<br />

CEO.<br />

and only 8% to the CFO. The industrials sector showed a leadership role with 44% <strong>of</strong> CISO/CSOs<br />

and The and only IT/telecom 8% to the industry CFO. also The favored industrials CEO sector reporting showed with a leadership 54% <strong>of</strong> their role CISO/CSOs with 44% <strong>of</strong> reporting CISO/CSOs<br />

to the CEO<br />

reporting to the CFO and 19% reporting to the CEO.<br />

reporting and reporting only 8% to the to the CFO CFO. and 19% The 19% industrials reporting to sector the CEO.<br />

showed a leadership role with 44% <strong>of</strong> CISO/CSOs<br />

reporting to the CFO and 19% reporting to the CEO.<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />

!<br />

!<br />

!<br />

!<br />

!<br />

!


Organizations are showing significant gains in cross-organizational communication.<br />

One Organizations <strong>of</strong> the most are significant showing improvements significant gains from in the cross-organizational 2008 and 2010 <strong>Governance</strong> communication. Surveys is in the<br />

establishment One <strong>of</strong> the most <strong>of</strong> internal significant cross-organizational improvements from groups the 2008 for communicating and 2010 <strong>Governance</strong> about privacy Surveys and is in security the issues.<br />

In establishment 2008, only 17% <strong>of</strong> internal <strong>of</strong> the cross-organizational respondents indicated groups that their for communicating organizations had about a cross-organizational privacy and security team; issues. in<br />

2010, In 2008, 65% only <strong>of</strong> 17% the organizations <strong>of</strong> the respondents did; and indicated in <strong>2012</strong>, that 72% their <strong>of</strong> the organizations respondents had indicated a cross-organizational that such a committee team; in had<br />

2010, been established. 65% <strong>of</strong> the organizations This is very encouraging did; and in <strong>2012</strong>, and indicates 72% <strong>of</strong> that the respondents companies are indicated learning that that such cross-organizational<br />

a committee had<br />

communication been established. is This essential is very to addressing encouraging insider and indicates threats, combating that companies external are learning attacks, closing that cross-organizational<br />

governance gaps,<br />

and communication reducing legal is essential liability. to addressing insider threats, combating external attacks, closing governance gaps,<br />

and reducing legal liability.<br />

Industry & Region Comparison Table: Cross-Organizational Committees<br />

Industry & Region Comparison Table: Cross-Organizational Committees<br />

Organizations with cross- North Europe Asia Energy / Financial IT / Industrials<br />

Organizational committee America<br />

Utilities<br />

Telecom<br />

Organizations with cross- North Europe Asia Energy / Financial IT / Industrials<br />

72% 72% 71% 50% 86% 92% 50%<br />

Organizational committee America<br />

Utilities<br />

Telecom<br />

72% 72% 71% 50% 86% 92% 50%<br />

The benefit <strong>of</strong> cross-organizational committees is realized across the globe; all geographic regions indicated<br />

that The 71% benefit or <strong>of</strong> more cross-organizational organizations have committees a cross-organizational is realized across team. the It globe; is a different all geographic story within regions industry indicated<br />

sectors, that 71% however. or more organizations The energy/utilities have a and cross-organizational industrials sectors team. each indicated It is a different that only story 50% within <strong>of</strong> the industry<br />

organizations sectors, however. have The such energy/utilities teams. and industrials sectors each indicated that only 50% <strong>of</strong> the<br />

organizations have such teams.<br />

CONCLUSIONS<br />

CONCLUSIONS<br />

The following conclusions can be drawn from the findings <strong>of</strong> the <strong>2012</strong> <strong>CyLab</strong> <strong>Governance</strong> Survey:<br />

The following conclusions can be drawn from the findings <strong>of</strong> the <strong>2012</strong> <strong>CyLab</strong> <strong>Governance</strong> Survey:<br />

! Boards are actively addressing risk management, but there is still a gap in understanding the linkage<br />

! between Boards are cybersecurity actively addressing risks and risk enterprise management, risk management. but there is still a gap in understanding the linkage<br />

! Boards between are cybersecurity not undertaking risks and key governance enterprise risk activities management. that would help protect their organizations<br />

! from Boards some are not <strong>of</strong> the undertaking highest risks: key the governance reputational activities and financial that would losses help flowing protect from their theft organizations <strong>of</strong><br />

confidential from some <strong>of</strong> and the proprietary highest risks: data the or reputational security breaches and financial involving losses personally flowing identifiable from theft information. <strong>of</strong><br />

! Organizationally, confidential and proprietary improvements data are or security seen in (1) breaches the increased involving number personally <strong>of</strong> boards identifiable with Risk information.<br />

! Committees Organizationally, responsible improvements for privacy are and seen security in (1) the risks, increased and (2) number the high <strong>of</strong> percentage boards with <strong>of</strong> Risk companies that<br />

Committees have established responsible cross-organizational for privacy and committees security risks, to focus and on (2) privacy the high and percentage security risks. <strong>of</strong> companies that<br />

! Although have established most boards cross-organizational hire outside expertise, committees less to than focus half on hire privacy it for assistance and security with risks. risk assessments<br />

! and Although risk management. most boards There hire outside is a higher expertise, reliance less upon than IT half security hire it for experts assistance than risk with services risk assessments firms.<br />

! and The risk majority management. <strong>of</strong> boards There are not is evaluating a higher reliance the adequacy upon IT <strong>of</strong> security their organizations’ experts than insurance risk services coverage firms. for<br />

! cyber The majority risks. <strong>of</strong> boards are not evaluating the adequacy <strong>of</strong> their organizations’ insurance coverage for<br />

! Boards cyber risks. are recognizing that IT security and risk expertise are important skills when recruiting board<br />

! members. Boards are recognizing that IT security and risk expertise are important skills when recruiting board<br />

! members. Less than two-thirds <strong>of</strong> the Forbes Global 2000 companies responding to the survey have full-time<br />

! personnel Less than two-thirds in key roles <strong>of</strong> responsible the Forbes for Global privacy 2000 and companies security in responding a manner that to the is consistent survey have with full-time<br />

internationally personnel in key accepted roles responsible best practices for privacy and standards. and security For organizations in a manner that that is do consistent have these with roles<br />

assigned, internationally there accepted is a serious best lack practices <strong>of</strong> functional and standards. separation For <strong>of</strong> organizations privacy and security that do responsibilities.<br />

have these roles<br />

! assigned, CISO/CSOs there still is a tend serious to report lack <strong>of</strong> to functional CIOs more separation than to CEOs <strong>of</strong> privacy or CFOs. and security responsibilities.<br />

Carnegie Mellon <strong>CyLab</strong><br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

!<br />

! CISO/CSOs still tend to report to CIOs more than to CEOs or CFOs.<br />


Regional Regional Conclusions<br />

Carnegie Carnegie Mellon Mellon <strong>CyLab</strong><br />

<strong>CyLab</strong><br />

!<br />

! ! European European boards pay less attention to IT operations operations and and computer computer and and information information security security than<br />

than<br />

North North American American and Asian boards.<br />

! ! Other Other than than receiving receiving privacy/security privacy/security and and breach/data breach/data loss loss reports, reports, North North American American boards boards lag<br />

lag<br />

behind behind European European and and Asian Asian boards boards in in undertaking undertaking key key activities activities associated associated with with privacy privacy and and security<br />

security<br />

governance.<br />

governance.<br />

! ! Asian Asian boards boards are are much much more more likely likely to to have have board board Risk Risk Committees Committees responsible responsible for for privacy privacy and<br />

and<br />

security security than than North North American American and European European boards.<br />

! ! Across Across all all regions, regions, 56-58% 56-58% <strong>of</strong> <strong>of</strong> boards boards are not reviewing their organization’s cyber cyber insurance insurance coverage.<br />

coverage.<br />

! ! North North American American boards boards are much more reliant upon insurance broker risk expertise than risk<br />

services services firms firms or or IT IT security security experts experts when when seeking seeking assistance assistance with with risk risk assessments assessments and and risk<br />

management.<br />

management.<br />

! ! North North American American and and Asian Asian boards boards value value board board member member IT IT experience experience much much more more highly highly than<br />

than<br />

European European boards. boards. All All geographical geographical regions regions value value risk and security expertise.<br />

! ! Although Although Europe Europe leads leads globally globally in in privacy privacy regulation regulation and and enforcement, enforcement, few few European European organizations<br />

organizations<br />

have have a a CPO CPO (3%), (3%), with with Asia Asia only only slightly slightly ahead ahead (5%). (5%). European European companies, companies, however, however, have have a a higher<br />

higher<br />

percentage percentage <strong>of</strong> <strong>of</strong> CISOs CISOs and and CSOs CSOs than than North North American American or or Asian Asian organizations.<br />

organizations.<br />

! ! Asian Asian organizations organizations (82%) (82%) are are much much more more likely likely to to have have privacy privacy and and security security responsibilities responsibilities assigned<br />

assigned<br />

to to key key personnel personnel than than North North American American and and European European organizations organizations (44% (44% and and 48%, 48%, respectively).<br />

respectively).<br />

Asians Asians are are less less likely, likely, however, however, to to have have the the CISO/CSO CISO/CSO report report to to the the CIO.<br />

CIO.<br />

Industry Industry Sector Conclusions<br />

! ! The The financial financial sector sector has has better better privacy privacy and and security security governance governance practices practices than than the the energy/utilities,<br />

energy/utilities,<br />

IT/telecom, IT/telecom, and and industrials industrials industry industry sectors. sectors. It It also also has has a a high high rate rate <strong>of</strong> <strong>of</strong> board board IT/Technology<br />

IT/Technology<br />

Committees Committees and and Risk Risk Committees Committees separate separate from from the the Audit Audit Committee, Committee, which which are are assigned assigned oversight<br />

oversight<br />

<strong>of</strong> <strong>of</strong> privacy privacy and and security.<br />

security.<br />

! ! Unlike Unlike the the financial financial sector, sector, the the IT/telecom IT/telecom sector sector tends tends to to assign assign the the Audit Audit Committee Committee responsibility<br />

responsibility<br />

for for cybersecurity cyber security and and privacy privacy risks.<br />

risks.<br />

! ! The The IT/telecom IT/telecom industry industry sector sector respondents respondents indicated indicated that that none none <strong>of</strong> <strong>of</strong> their their organizations organizations have have a a board<br />

board<br />

IT/Technology IT/Technology Committee.<br />

Committee.<br />

! ! The The energy/utilities energy/utilities and and IT/telecom IT/telecom respondents respondents indicated indicated that that their their organizations organizations never never (0%) (0%) rely<br />

rely<br />

upon upon insurance insurance brokers brokers to to provide provide outside outside risk risk expertise, expertise, while while the the industrials industrials sector sector relies relies upon<br />

upon<br />

them them 100%. 100%. The The financial financial sector sector seldom seldom does.<br />

does.<br />

! ! Energy/utilities Energy/utilities and and IT/telecom IT/telecom sector sector boards boards are are not not adequately adequately reviewing reviewing cyber cyber insurance<br />

insurance<br />

coverage.<br />

coverage.<br />

! ! The The energy/utilities energy/utilities sector sector places places a a much much lower lower value value on on board board member member IT IT experience experience than than financial,<br />

financial,<br />

IT/telecom, IT/telecom, and and industrials industrials industry industry sectors.<br />

sectors.<br />


Carnegie Carnegie Carnegie Mellon Mellon Mellon <strong>CyLab</strong> <strong>CyLab</strong><br />

!<br />

! Zero Zero percent (0%) <strong>of</strong> <strong>of</strong> the the IT/telecom industry sector sector said they have CPOs, even even though though they have<br />

some some <strong>of</strong> <strong>of</strong> the the most stringent stringent privacy compliance requirements. requirements. Likewise, Likewise, none (0%) <strong>of</strong> the<br />

respondents from the the energy/utilities and and industrials industrials sectors sectors indicated they have CROs. CROs.<br />

III. Recommendations<br />

Recommendations<br />

!<br />

The survey revealed that governance <strong>of</strong> <strong>of</strong> enterprise security is still lacking in most most corporations, corporations, with with gaps gaps gaps in<br />

critical critical areas. areas. If If If boards boards and and senior senior management management take take the the following following 12 12 actions, actions, actions, they they could could significantly significantly<br />

improve improve their their organizations’ organizations’ security security security posture posture and and reduce reduce risk: risk:<br />

1. Establish Establish a board Risk Committee Committee separate from the Audit Committee and assign it responsibility responsibility for<br />

enterprise risks, including IT risks. Recruit directors with security and IT governance and cyber risk<br />

expertise. expertise.<br />

2. 2. 2. Ensure that privacy and security security roles roles within within the organization organization organization are separated and that responsibilities<br />

are appropriately appropriately assigned. assigned. assigned. The The The CIO, CIO, CISO/CSO, CISO/CSO, and and CPO CPO CPO should should report report independently independently to senior senior<br />

management.<br />

management.<br />

3. 3. Evaluate the existing organizational structure and establish establish establish a a cross-organizational cross-organizational team that that is is is<br />

required to meet meet meet at at least least monthly monthly to to coordinate coordinate coordinate and and communicate communicate on on privacy privacy and security security issues.<br />

This team should include include include senior senior senior management management from from human human resources, resources, public relations, legal, and<br />

procurement, as well as the CFO, CFO, the CIO, CIO, CISO/CSO, CISO/CSO, CRO, CRO, the CPO, and business line line<br />

executives. executives.<br />

4. 4. Review Review existing existing top-level top-level policies policies to to create create a a culture culture <strong>of</strong> <strong>of</strong> <strong>of</strong> security security and and respect respect for for privacy. privacy.<br />

Organizations can enhance their their their reputation by valuing valuing cybersecurity cyber security and and the protection <strong>of</strong> privacy<br />

and viewing it as a corporate corporate social social social responsibility.<br />

responsibility.<br />

5. 5. Review Review assessments assessments <strong>of</strong> <strong>of</strong> the the organization’s organization’s security security program program and and ensure ensure that that that the it comports program with comports best<br />

practices with best and practices standards and standards and includes and incident includes response, incident response, breach notification, breach breach notification, notification, disaster recovery, disaster and<br />

crisis recovery, communications and crisis communications plans. plans.<br />

6. 6. Ensure Ensure that that privacy privacy and and security security requirements requirements for for vendors vendors (including (including cloud cloud and and s<strong>of</strong>tware-as-a-service<br />

s<strong>of</strong>tware-as-a-service<br />

providers) are based upon key aspects aspects <strong>of</strong> the the organization’s organization’s security security program, including annual audits<br />

and and control requirements. Carefully review notification procedures procedures in the event event <strong>of</strong> <strong>of</strong> <strong>of</strong> a a breach breach or or or<br />

security security incident.<br />

7. 7. Conduct an annual audit <strong>of</strong> the the the organization’s organization’s organization’s enterprise enterprise security program, to be reviewed reviewed by the the<br />

Audit Audit Committee.<br />

8. 8. Conduct an annual annual review review <strong>of</strong> <strong>of</strong> the the enterprise enterprise security security program program program and effectiveness effectiveness <strong>of</strong> <strong>of</strong> controls, controls, to to be<br />

reviewed by the board board Risk Risk Committee, and ensure that identified gaps gaps or weaknesses weaknesses weaknesses are are addressed. addressed.<br />

9. 9. 9. Require regular reports reports from senior senior management management on on privacy privacy and and security security risks.<br />

10. 10. Require Require annual annual board board review review <strong>of</strong> <strong>of</strong> budgets budgets for for privacy privacy and and security security risk management.<br />

management.<br />

11. 11. Conduct Conduct annual privacy compliance compliance audits and review test incident response, breach breach notification, notification, disaster<br />

recovery, and crisis communication communication plans. plans.<br />

12. 12. Assess Assess cyber cyber risks risks and and potential potential loss loss valuations valuations and and and review review adequacy adequacy <strong>of</strong> <strong>of</strong> cyber cyber insurance insurance coverage.<br />

coverage.<br />


Endnotes<br />

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br />

1 Jody R. Westby & Julia Allen, Governing for <strong>Enterprise</strong> <strong>Security</strong> Implementation Guide, Carnegie Mellon University,<br />

S<strong>of</strong>tware Engineering Institute, Technical Note CMU/SEI-2000-TN-020, 2007,<br />

http://www.sei.cmu.edu/publications/documents/07.reports/07tn020.html (hereinafter “Westby & Allen”).<br />

2 Board Briefing on IT <strong>Governance</strong>, 2 nd ed., IT <strong>Governance</strong> Institute, 2003 at 10,<br />

http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Board-Briefing-on-IT-<br />

<strong>Governance</strong>-2nd-Edition.aspx (emphasis added).<br />

3 Convergence <strong>of</strong> <strong>Enterprise</strong> <strong>Security</strong> Organizations, American Society for industrial <strong>Security</strong>, Information Systems<br />

<strong>Security</strong> Association, and Information Systems Audit and Control Association, 2003 at 2,<br />

www.asisonline.org/newsroom/alliance.pdf. !<br />

4 See Jody R. Westby, Testimony Before the House Committee on Government Reform, Subcommittee on<br />

Technology, Information Policy, Intergovernmental Relations and the Census, Sept. 22, 2004,<br />

http://www.cccure.org/Documents/<strong>Governance</strong>/westby1.pdf . For a discussion regarding the fiduciary<br />

duty <strong>of</strong> boards and <strong>of</strong>ficers and the extension <strong>of</strong> that duty to protect the digital assets <strong>of</strong> their organizations,<br />

see Jody R. Westby, ed., International Guide to Cyber <strong>Security</strong>, American Bar Assn., Privacy & Computer Crime<br />

Committee, 2004 at 189-93.<br />

5 Sarbanes-Oxley Act <strong>of</strong> 2002, Pub. Law 107-204, Sections 302, 404,<br />

http://news.findlaw.com/hdocs/docs/gwbush/sarbanesoxley072302.pdf. The SEC has taken a narrow<br />

interpretation <strong>of</strong> Sarbanes-Oxley to the point that information security and risk management pertain only to<br />

the financial statements <strong>of</strong> a company. The Federal Reserve has countered this by saying a broader<br />

interpretation is needed to include all <strong>of</strong> the operational risks since there are many aspects that can impact the<br />

financial standing <strong>of</strong> an organization that can affect the integrity and accuracy <strong>of</strong> the financials.<br />

6 “CF Disclosure Guidance: Topic 2, Cybersecurity,” Securities and Exchange Commission, Division <strong>of</strong><br />

Corporate Finance, Oct. 13, 2011, http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm.<br />

7 “Legal Resources,” Critical Energy Infrastructure Information (CEII) Regulations, Federal Energy<br />

Regulatory Commission, http://www.ferc.gov/legal/maj-ord-reg/land-docs/ceii-rule.asp.<br />

8 See, e.g., Jody Westby, “Cyber Legislation Will Cost Businesses and Hurt Economy,” Feb. 27, <strong>2012</strong>,<br />

Forbes.com, http://www.forbes.com/sites/jodywestby/<strong>2012</strong>/02/27/cyber-legislation-will-cost-businesses-and-hurt-economy/.<br />

9 Kevin Coleman, “Battle Damage Increases From Widespread Attacks,” Defense Systems, Aug. 1, 2011,<br />

http://defensesystems.com/Articles/2011/07/18/Digital-Conflict-cyberattacks-economysecurity.aspx?Page=1;<br />

Brian Cashell, William D. Jackson, Mark Jickling, Baird Webel, The Economic Impact <strong>of</strong><br />

Cyber-Attacks,” Congressional Research Service, RL32331, Apr. 1, 2004,<br />

www.cisco.com/warp/public/779/.../images/CRS_Cyber_Attacks.pdf; A. Marshall Acuff, Jr., “Information<br />

<strong>Security</strong> Impacting Securities Valuations: Information Technology and the Internet Changing the Face <strong>of</strong><br />

Business,” Salomon Smith Barney, 2000, at 3-4.<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />


!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br />

10 2011 Cost <strong>of</strong> Data Breach Study: United States, Ponemon Research Institute & Symantec Corp., Mar. <strong>2012</strong>,<br />

http://www.symantec.com/about/news/release/article.jsp?prid=<strong>2012</strong>0320_02.<br />

11 Reputation Impact <strong>of</strong> a Data Breach: U.S. Study <strong>of</strong> Executives & Managers, Ponemon Research Institute &<br />

Experian Corp., Nov. 2011, http://www.experian.com/blogs/data-breach/<strong>2012</strong>/01/17/how-data-breachesharm-reputations/.<br />

12 In re Citigroup Inc. Shareholder Derivative Action, No. 3338-CC, 2009 WL 481906 (Del. Ch. Feb. 24, 2009),<br />

http://www.delawarelitigation.com/uploads/file/int99(1).pdf ; Stone v. Ritter, 911 A.2d 362, 366–67 (Del.<br />

2006), http://caselaw.lp.findlaw.com/data2/delawarestatecases/93-2006.pdf.<br />

13 Council <strong>of</strong> Europe Convention on Cybercrime – Budapest, 23.XI.2001 (ETS No. 185) (2002),<br />

http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CL=ENG, Council <strong>of</strong> Europe<br />

Convention on Cybercrime Explanatory <strong>Report</strong>, Nov. 8, 2001,<br />

http://conventions.coe.int/Treaty/en/<strong>Report</strong>s/Html/185.htm.<br />

14 Proposal for a Council Framework Decision on attacks against information systems, Commission <strong>of</strong> the European<br />

Communities, Article 9, Apr. 19, 2002, COM(2002) 173 final, 2002/0086 (CNS), http://europa.eu.int/eurlex/en/com/pdf/2002/com2002_0173en01.pdf;<br />

see also Proposal for a Directive <strong>of</strong> the European Parliament and <strong>of</strong><br />

the Council on attacks against information systems and repealing Council Framework Decision 2005/222/JHA, European<br />

Commission, COM(2010) 517, http://europa.eu/rapid/pressReleasesAction.do?reference=MEMO/10/463.<br />

15 John H. Nugent, “Corporate Officer and Director Information Assurance (IA) Liability Issues: A Layman’s<br />

Perspective,” Dec. 15, 2002.<br />

16 Id. (citing Dr. Andrew Rathmell, Chairman <strong>of</strong> the Information Assurance Advisory Council, “Information<br />

Assurance: Protecting your Key Asset,” http://www.iaac.ac.uk).<br />

17 See Internet World Stats, http://www.internetworldstats.com.<br />

18 Jody R. Westby, ed., International Guide to Cyber <strong>Security</strong>, ABA Publishing, American Bar Assn., 2004 at 18<br />

(consequential infrastructure includes the information and communication systems that, when manipulated,<br />

could cause a catastrophic event with enormous consequences).<br />

19 Westby & Allen at 57-58.<br />

20 For a full discussion on the appropriate assignment <strong>of</strong> roles and responsibilities for all organizational<br />

personnel and boards <strong>of</strong> directors, see Westby and Allen at 19-31, Appendix C.<br />

Carnegie Mellon <strong>CyLab</strong><br />

!<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!