{"id":1177,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail193-atl121-mcsv-net\/"},"modified":"2021-12-30T11:38:54","modified_gmt":"2021-12-30T11:38:54","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail193-atl121-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail193-atl121-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail193.atl121.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>Move over CISO: The Chief Data Officer may be sharing part of your job<br \/>\nThe CDO title has been around for almost six years as companies realized the business value of their data, and that they needed someone to rein it in.<br \/>\nNow, as companies move into the post-infrastructure era where data is moving outside the organization and into the cloud, one Gartner analyst suggests that the CDO could be responsible for more than just managing data, understanding where it resides and who uses it.<br \/>\nHe could also focus on \u201cstrategies to improve the protection of that data as it lives in infrastructure that you don\u2019t control anymore,\u201d says Peter Firstbrook, a Gartner research vice president.<br \/>\nToday, there are only about 1,000 chief data and chief analytics officers in the world, according to Gartner.<br \/>\nBy 2019, Gartner predicts that 90 percent of all global enterprises will have appointed a CDO.<br \/>\nBut exactly what the CDO\u2019s responsibilities are and how companies will manage the overlap of duties in the C-suite remain to be seen.<br \/>\nMost financial services organizations need a CDO to manage data risk and compliance.<br \/>\nConsumer packaged goods or healthcare organizations hired CDO to drive cost efficiency and cost reduction, while most media and marketing companies want CDOs to drive extra revenue.<br \/>\nEach responsibility requires different skills, and the ranking of most desired skills has shifted dramatically in the last few years, Cerilli says.<br \/>\n\u201cThe CDO role is an influencing role across the organization,\u201d Cerilli says. \u201cYou can\u2019t have responsibility for all information across all the company because there are different stakeholders in different business units.<br \/>\nThe best of the best CDOs and CISOs realize that they need to work together to drive the change that\u2019s necessary.\u201d<br \/>\nthe CDO role has evolved over the last few years from a technically-driven position to a more visionary role.<br \/>\nIn a recent survey of CEOs by Russell Reynolds, technical depth dropped to sixth place among the most important skills required for a CDO, behind stakeholder management, storytelling and communication skills, being a visionary, the ability to execute and commercial acumen.<br \/>\nOne chief data officer believes that the CDO movement is just industry hype, and that five years from now they will disappear from the C-suite.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3a43b3844c&#038;e=20056c7556<\/p>\n<p>How Should CISOs Report Cyber Risks to Boards?<br \/>\nIn KPMG\u2019s \u201c2015 Global Audit Committee Survey,\u201d audit committee members ranked the quality of the information they received about cyber risks last among the 12 types of risks reported to them.<br \/>\nForty-one percent of respondents rated cyber risk communications as \u201cneeds improvement.\u201d Basically, boards gave CISOs a grade of F or, at best, a D.<br \/>\nKPMG listed the three most important questions for boards to ask as:<br \/>\n&#8211; What are the new cybersecurity threats and risks, and how do they affect our organization?<br \/>\n&#8211; Is our organization\u2019s cybersecurity program ready to meet the challenges of today\u2019s and tomorrow\u2019s cyberthreat landscape?<br \/>\n&#8211; What key risk indicators should I be reviewing at the executive management and board levels to perform effective risk management in this area.<br \/>\nCISOs and their teams should look for tools that \u201cpresent data to the boardroom and specifically the CISO in an actionable state, rather than what is often perceived as noise,\u201d according to the report.<br \/>\nThis means dashboards with near real-time representation of cyber risks and the ability to drill down by business sector to compare one sector with another or identify a source of high risk, and across time periods to see how the risks changed over time.<br \/>\nThe goal for such a tool should be, as the report put it, \u201chelping the CISO engage with the board in terms of risk and budget.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=757c58a72e&#038;e=20056c7556<\/p>\n<p>EFF launches security vulnerability disclosure program<br \/>\nIn a blog post, EFF said the program gives researchers guidelines to follow when submitting bugs or vulnerabilities in software EFF develops &#8212; as well as the software the organization uses to run its sites and services.<br \/>\nEFF is looking for security vulnerabilities in HTTPS Everywhere, Privacy Badger for Chrome and Firefox, Phantom of the Capitol, Action Center, Let&#8217;s Encrypt Agent and the Boulder software.<br \/>\nIn addition, the group has asked researchers to take a look at EFF web services and other &#8220;public facing software&#8221; the group uses on domains including eff.org, savecrypto.org and democracy.io, among others.<br \/>\nIn order to qualify, researchers need to find flaws in the latest public release of EFF software.<br \/>\nThe vulnerabilities EFF is looking for are cross-site request forgery (CSRF\/XSRF), cross-site scripting (XSS), authentication bypass, remote code execution, SQL injection and privilege escalation flaws.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ebf3b2127d&#038;e=20056c7556<\/p>\n<p>\u200bInsurance companies will crack down on cyber security in 2016: Report<br \/>\nPredictions by combined company, Raytheon\/Websense, said cyber insurance will move toward a \u2018must have\u2019 and \u2018evidence based\u2019 model with new minimum level requirements in place for policies.<br \/>\nThis is expected to disrupt the cyber security industry and place new challenges on IT workers, while also driving improvements in companies\u2019 ability to handle threats.<br \/>\nMoving forward, insurance companies will refuse to pay for breaches caused by ineffective security practices, while premiums and payouts will become more aligned with underlying security postures and better models of the cost of an actual breach, the report said.<br \/>\n\u201cAs cyber insurance becomes still more mainstream, savvy defenders should factor in policy costs with defensive posture buying decisions; considering the impact of verifiable security risk exposure, including the third-party continuous monitoring of corporate networks for risky user behavior.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f33fdccdf3&#038;e=20056c7556<\/p>\n<p>Top Ten Cyber Risks for Oil and Gas<br \/>\nDNV GL has released a study that reveals the top ten most pressing cyber security vulnerabilities for companies operating offshore Norway that is relevant globally.<br \/>\nNorwegian intelligence authorities are warning of an increase in digital threats aimed at Norwegian industry.<br \/>\nEvents over the past few years show that the energy and petroleum sectors are among the most vulnerable.<br \/>\nThe methods are becoming increasingly innovative and the attackers more sophisticated.<br \/>\nThe top ten cyber security vulnerabilities:<br \/>\n&#8211; Lack of cyber security awareness and training among employees<br \/>\n&#8211; Remote work during operations and maintenance<br \/>\n&#8211; Using standard IT products with known vulnerabilities in the production environment<br \/>\n&#8211; A limited cyber security culture among vendors, suppliers and contractors<br \/>\n&#8211; Insufficient separation of data networks<br \/>\n&#8211; The use of mobile devices and storage units including smartphones<br \/>\n&#8211; Data networks between on- and offshore facilities<br \/>\n&#8211; Insufficient physical security of data rooms, cabinets, etc.<br \/>\n&#8211; Vulnerable software<br \/>\n&#8211; Outdated and ageing control systems in facilities.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dce77f8c6f&#038;e=20056c7556<\/p>\n<p>Countdown to the General Data Protection Regulation\u2026<br \/>\nWith the festive season now firmly upon us, there are indications that European Union institutions could soon be delivering an early Christmas present to businesses: the conclusion of trilogue negotiations on the General Data Protection Regulation (\u2018GDPR\u2019).<br \/>\nThe GDPR, according to the latest document to come out of Brussels, aims to \u201creinforce data protection rights of individuals, facilitate the free flow of personal data in the digital single market and reduce administrative burden.\u201d The EU Commission, Parliament and Council are currently locked in closed-door negotiations to agree to the final text of the GDPR, and while some uncertainty remains over the exact provisions that will be included, the latest available text from the European Presidency<br \/>\nOnce the GDPR is finalised, there will be a two-year transition period until it comes into effect.<br \/>\nOrganisations should use this time to fully consider the implications of GDPR on their operations, and to implement any changes necessary to ensure compliance with the increasingly long arm of European data protection law.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a6b70369cd&#038;e=20056c7556<\/p>\n<p>\u200bHackers mastering dark art of cybercrime as businesses prepare for year of attacks<br \/>\nHere are Check Point\u2019s top ten predictions for security threats and trends which it expects to see in 2016:<br \/>\n1) Sniper\u2019 and \u2018shotgun\u2019 malware:<br \/>\n2) More mobile threats on the way:<br \/>\n3) More businesses will turn to advanced threat prevention:<br \/>\n3) More businesses will turn to advanced threat prevention:<br \/>\n4) Critical infrastructures will be highly targeted:<br \/>\n5) IoT and smart devices are still at risk:<br \/>\n6) Wearables won\u2019t be safe, either:<br \/>\n7) Trains, planes, and automobiles:<br \/>\n8) Real security for virtual environments:<br \/>\n9) New environments will bring new threats:<br \/>\n10) Organisations will look to security consolidation:<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=304a75b1b7&#038;e=20056c7556<\/p>\n<p>RCMP Cybercrime Strategy to fight online crimes<br \/>\nThe Canadian law enforcement agency, the Royal Canadian Mounted Police plans to set up a special cyber crime unit to tackle \u201conline threats to Canada\u2019s \u201cpolitical, economic, and social integrity.\u201d<br \/>\nThe Canadian law enforcement agency, the Royal Canadian Mounted Police plans to set up a special cyber crime unit to tackle \u201conline threats to Canada\u2019s \u201cpolitical, economic, and social integrity.\u201d<br \/>\nThe new unit will be based in Ottawa and it will be tasked to \u201cinvestigate the most significant threats to Canada\u2019s political, economic, and social integrity that would negatively affect Canada\u2019s reputation and economy.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=19982e0efb&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage1.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=7a95a266b5)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: Move over CISO: The Chief Data Officer may be sharing part of your job The CDO title has been around for almost six years as companies realized the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1177","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1177"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1177\/revisions"}],"predecessor-version":[{"id":3664,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1177\/revisions\/3664"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}