No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Featured

Heed the Wake-Up Call: Cyber Attacks Are Imminent

Preparation for Cyber Attacks is No Longer a Luxury

by Johnny Lee
January 16, 2018
in Featured, Risk
cyber attacks

Information security is not enough. Preparation for cyber attacks is no longer a luxury, and now is the time for organizations to pivot from defense to resilience.

It is now axiomatic that questions of a data breach are a function of “when not if”. Despite countless headlines, soaring costs, a plethora of insurance products and the well-documented risks of getting it wrong, many organizations remain somewhat unfocused on the critical importance of adequate controls related to their data privacy and information security risks.

Rather than recite the many prominent breaches and the internal control failures that may have contributed to same, now is the time to encourage proactive action to minimize the impact of such events in the future. In alignment with this observation, 72 percent of legal departments define cyber threats as the top priority risk issue according to Grant Thornton’s 2017 Corporate General Counsel Survey. In a word, it’s time to encourage a pivot from defense to resilience.

To ensure that we proceed from this encouragement with a proper grounding, we should set the context of these risks appropriately. Today’s context is materially different than it was a mere three to five years ago. Specifically, while information security has been the primary control structure to combat cybercrime in decades past, information security controls alone are insufficient to address the manifold risks facing organizations today, and they are a manifestly insufficient focus for organizations seeking to recover from a data compromise.

The reason for this hinges upon two driving factors in the cybercrime “ecosystem” today: sophistication and commoditization. Like any unregulated market that operates without a referee and/or regulating authority, the cybercrime market has evolved from rather blunt, brute-force attacks to highly automated and heavily tailored attacks that seek to exploit environment-specific vulnerabilities that abound in organizations today. These vulnerabilities are not merely technological; they exist within our current policies and practices, within our trusted vendors and contractors, and even – or perhaps especially – within our employee base.

Organizations combatting this sophistication have their efforts compounded by high levels of commoditization within the cybercrime ecosystem. Bad actors come in many forms, and the level of sophistication within this eco-system has enabled market demand for highly specialized services, resulting in commoditization – i.e., in specific cybercrime services for hire. This means that a bad actor seeking to compromise an organization need not have the technological wherewithal to accomplish such a compromise; that actor merely needs to know where to shop for such capabilities within this criminal ecosystem.

A Holistic Approach

So where do these compounding phenomena (of sophistication and commoditization) leave organizations? That depends largely on whether an organization is chasing the figment of a purely defensive posture or whether it is focused on a more rational goal: resilience.  Organizations seeking to maintain reasonable preventive measures but bolster their ability to recover from a cyber compromise are employing a multi-disciplinary approach that contemplates several broad risk categories.

To be sure, information security controls continue to factor prominently among these risk categories. That said, organizations that do not couple information security controls with an analysis that delineates between insurable and un-insurable risk will find that their resilience falls short of satisfactory levels.

Indeed, many organizations learn of the exclusions or limitations in their coverage only during or after their operations are hobbled by a compromise. Accordingly, organizations would do well to engage specialists to assist in navigating the panoply of new insurance products designed to address very tailored needs in very novel ways. They would likewise do well to revisit the contractual protections that they can obtain via the parties with whom they regularly contract – especially if sensitive data transfers and/or infrastructure components are involved with such parties.

Likewise, the ability to bring varied skill sets into a unified incident response team bolsters the resilience factor for organizations. We see this in situations where organizations are dealing with a rogue employee, a business email compromise, a tailored phishing attack, a malware attack or something even more sophisticated and impactful. In fact, the key to resuming normal business operations after a data incident hinges upon this ability to incorporate multiple disciplines into a cohesive incident response protocol.

This is true for a host of reasons, but primary among these is the ability to consider risk from many different perspectives. For more on this perspective, please see Grant Thornton’s white paper on Taking AIM at Cyber Risk. To illustrate, involving counsel in the planning of (and response to) an incident allows for the contemplation of the role of the attorney-client privilege throughout the investigation and – heaven forbid – any downstream legal or regulatory exposure. Counsel can also provide much-needed guidance on how (or whether) to involve law enforcement in a given incident response, including an analysis of whether (and how) the attorney-client privilege might be affected by such involvement.

Likewise, incorporating your vendor management teams in incident planning and response ensures that the organization treats third parties in a manner commensurate with these third-party risk profiles, thereby avoiding monitoring controls that are neither overbearing nor inadequate to the task. Similarly, involving crisis management specialists ensure that communications are controlled, based upon known facts, tailored to a specific purpose and transmitted via the medium that is most appropriate given the stakes.

Resilience Through Collaboration

The examples above are but a few of the benefits of a well-rounded incident response team. Once the organization assembles this multi-disciplinary group, it should work to unify this group as much as possible – ideally through the regular practice of incident-response scenarios. Indeed, the more this group collaborates, the better the results – because each discipline looks through a different risk lens at the same underlying facts presented. These differing perspectives, combined with a collaborative approach working toward a shared goal, allow the organization to resume its normal business operations in a far more efficient, defensible and sustainable fashion. Put differently, the greater the collaboration and the more multi-disciplinary the team, the stronger the resilience.

 


Tags: Data Breach
Previous Post

Criminal Background Checks: A Comprehensive Guide to the Criminal Record Screening Process from First Advantage

Next Post

Trend Report: Risk and Data Management

Johnny Lee

Johnny Lee

Johnny Lee, Principal & National Practice Leader, Forensic Technology Services at Grant Thornton LLP. Johnny is a forensic investigator, management consultant, and former attorney, specializing in data analytics, digital forensics, and electronic discovery in support of investigations, data breach response, and litigation.  He also provides advisory services to companies working to address complex Cybersecurity, Information Governance, and Data Privacy issues.

Johnny is a frequent speaker, author, panelist, and contributor on issues involving CyberSecurity, Forensic Investigations, eDiscovery, Data Analytics, Information Governance, Records Management, and the effective use (and risk management) of Information Technology.  Johnny received his Juris Doctorate from the Georgia State University College of Law and his Bachelor’s degree from Emory University.  In 2000, he was admitted to the State Bar of Georgia, where he maintains an active law license. He has delivered solutions (in both the public and private sector) addressing the effective mitigation of business, compliance, and litigation risk to Law Firms; General Counsel; Boards of Directors; Audit Committees; and Chief Financial, Compliance, Information, and Operations executives.  He has led project teams across a variety of industries, including financial services, healthcare, retail, insurance, advanced technology, communications, private equity / venture capital, hospitality, manufacturing, construction, transportation, and legal.

Related Posts

new york and us flags

New York Tightens the Breach Clock: 30 Days to Notify

by Melissa Crespo and Reiley Porter
May 12, 2025

State joins growing national trend toward broader personal information definitions and stricter notification timelines for data compromises

group looking at data breach details digital art collage

Navigating Data Breach Compliance & Communication

by Salim Gheewalla
October 28, 2024

Compliant response starts well before an incident occurs

sec building

News Roundup: SEC Finalizes New Cybersecurity Rules for Broker-Dealers, Others

by Staff and Wire Reports
May 16, 2024

OFAC launches public-facing sanctions database

characters breaking into padlock

Navigating Personal Liability: Post–Data Breach Recommendations for Officers

by Daniel B. Garrie and Richard A. Kramer
April 16, 2024

Executives may be on the hook if info is compromised

Next Post
laptop graph

Trend Report: Risk and Data Management

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights