Hi All
According to a PWC report, the C-Suite Executives are the greatest risk? What do you think?
Do you concur or do you have another perspective?
Regards
Caute_Cautim
I would like to throw in that the "C" suiters are also the ones controlling the budget - so little to no the experience and the power to spend as needed. It really does sound like a recipe for failure.
Ervin
@nkeaton I do believe that ISACA is correct with that one. Having the CISO under the CIO is very problematic, it limits the ability to conduct oversight as you are telling your "boss" that their primary systems are goofy. The standard belief that CISO should fall under tech is slightly problematic after all we are based upon the tenants of people, processes, and technology. To pigeon hole us into only tech might be part of the overall problem, so yes I definitely agree with placing us either under the CEO or under the board itself. Kudos to ISACA for that one, as far as going down the rabbit hole of losses, 98% of all losses are directly or indirectly attributed to people or processes, while only 3% (rounding error) are caused by failed tech.
Cheers.
Ervin
I think a lot of people are missing the point here....this is NOT a certification problem.
CEO's and CFO's should be LEGALLY liable for break ins. The CEO and CFO of Marks and Spencers and Jaguar Land Rover should be buying fake passports and getting ready to run out of the country right now, but thye won't. Why should a CEO do any certifications? It's totally pointless as they know they are untouchable and even in the unlikely event they get "asked to leave", they know they'll get a sweet parachute and regardless of how bad a job they've done, they'll move onto the next position.
Security is a losing battle unfortunately in the modern capitalist setup. Until there are actual legal consequences (or the Luigi solution) for C-Suite then nothing will get done.
A lot of the replies here also miss the point. When someone like Target does something stupid like store passwords in plain text, or (my pet hate) Developers decide to turn off firewalls because it makes their applications work or people ignore those of us with decades of infrastructure experience (purchasing AND security I'm looking at you), then stuff gets hacked and PEOPLE get hurt. I'm not talking about a slightly lower bonus for the C-suite or a shouting at for the security team..I'm talking people getting details stolen and loans taken out in their name or blackmailed or locked out of social media accounts that they desperately use to keep in touch with family around the World.
LinkedIn requiring the same verification firm that EntraID gives firms the option to use to verify employees is the dumbest thing on the planet..the firm's link to remove your details doesn't work on their website AND they have in their T&C's that they can use your biometric and government ID data, mix it with other data they hold on you and sell it to data brokers. This stuff is serious.
From the basics of the senior management being so stupid that I worked in a place where, when iPad 1 was replaced with Ipad 2, rather than just say to IT "I would like the new shiny one", we had a swathe of broken iPads and "GET ME A NEW ONE NOW!!" to senior management refusing to sign off anything because they'll have to take responsibility, this is fundamental in built stuff in the corporate world.
Purchasing should NOT be allowed to over-ride my decisions on what to buy.
Project Managers should NOT be allowed to over-ride my decisions on what to implement
Cybersecurity teams should NOT be allowed to force through decisions over the Infrastructure SMEs by scaring the management
HR should not be allowed within 100 miles of a technical job description
This is the nature of the world we live in. Hence, zero sympathy for M&S or JLR or any firm that offshores, outsources; that puts "shareholder value" above the long term viability of the company
@vishybear I do understand what you are saying. It was more of a discussion on that we have certifications, and the leaders do not but also that they often do not have the experience or education. Years ago DoD was the one that started this entire mess with certifications. Private industry then followed. Since DoD has changed their focus to what I believe is much more important which is experience and education. Hopefully private industry will follow again. I agree with you that the certification push got out of hand. On the other end of it, people like me are who advise and influence upper management (although not always successfully).
@vishybear @nkeaton Here in New Zealand and within other countries CEO's and Directors are directly responsible for the financial fiduciary "A fiduciary is a professional who manages money or property for other parties and has a legal duty to act only in their client's best interests. Including that of the organisation they manage etc.
CEO's and Directors can be prosecuted under the Companies Act - https://www.legislation.govt.nz/act/public/1993/0105/latest/DLM319570.html
I assume most countries will have similar regulations and laws.
Regards
Caute_Cautim
Sorry to correct but ISC2 came about as a result of the work done by the Data Processing Management Association's Special Interest Group for Computer Security (SIG-CS) beginning in 1988, with ISC2 becoming an entity in 1989. The intent was to create a standardized, vendor-neutral certification for information security professionals.
Founding members included Hal Tipton, Mike Corby, ISSA, Rick Koeing and one other (whose name escapes me at the moment. These folk created the first CBK and the later (1994), the first CISSP exam.
This all happened prior to the DoD gaining interest.
@Caute_cautim Your are absolutely correct, most countries have laws and regulations.
Canada as an example has several regulations and laws (PIPEDA and the Digital Privacy act (sorry working from phone so grabbing links is difficult (also in airport so bandwidth is terrible)). As with New Zealand, corporate executives can be prosecuted.
d