BROWSE BY TOPIC
- Bad Brokers
- Compliance Concepts
- Investor Protection
- Investments - Unsuitable
- Investments - Strategies
- Investments - Private
- Features/Scandals
- Companies
- Technology/Internet
- Rules & Regulations
- Crimes
- Investments
- Bad Advisors
- Boiler Rooms
- Hirings/Transitions
- Terminations/Cost Cutting
- Regulators
- Wall Street News
- General News
- Donald Trump & Co.
- Lawsuits/Arbitrations
- Regulatory Sanctions
- Big Banks
- People
TRENDING TAGS
Stories of Interest
- Sarah ten Siethoff is New Associate Director of SEC Investment Management Rulemaking Office
- Catherine Keating Appointed CEO of BNY Mellon Wealth Management
- Credit Suisse to Pay $47Mn to Resolve DOJ Asia Probe
- SEC Chair Clayton Goes 'Hat in Hand' Before Congress on 2019 Budget Request
- SEC's Opening Remarks to the Elder Justice Coordinating Council
- Massachusetts Jury Convicts CA Attorney of Securities Fraud
- Deutsche Bank Says 3 Senior Investment Bankers to Leave Firm
- World’s Biggest Hedge Fund Reportedly ‘Bearish On Financial Assets’
- SEC Fines Constant Contact, Popular Email Marketer, for Overstating Subscriber Numbers
- SocGen Agrees to Pay $1.3 Billion to End Libya, Libor Probes
- Cryptocurrency Exchange Bitfinex Briefly Halts Trading After Cyber Attack
- SEC Names Valerie Szczepanik Senior Advisor for Digital Assets and Innovation
- SEC Modernizes Delivery of Fund Reports, Seeks Public Feedback on Improving Fund Disclosure
- NYSE Says SEC Plan to Limit Exchange Rebates Would Hurt Investors
- Deutsche Bank faces another challenge with Fed stress test
- Former JPMorgan Broker Files racial discrimination suit against company
- $3.3Mn Winning Bid for Lunch with Warren Buffett
- Julie Erhardt is SEC's New Acting Chief Risk Officer
- Chyhe Becker is SEC's New Acting Chief Economist, Acting Director of Economic and Risk Analysis Division
- Getting a Handle on Virtual Currencies - FINRA
ABOUT FINANCIALISH
We seek to provide information, insights and direction that may enable the Financial Community to effectively and efficiently operate in a regulatory risk-free environment by curating content from all over the web.
Stay Informed with the latest fanancialish news.
SUBSCRIBE FOR
NEWSLETTERS & ALERTS
When Government Can’t Protect Your Firm from a Cyberattack
This is a WSJournal Q&A with Samar Ali, an attorney at Bass Berry & Sims who also is a professor of law at Vanderbilt and previously worked in the Obama administration on counterterrorism and cybersecurity issues.
Ms. Samar speaks about why companies shouldn’t rely on the government to protect them against cyberattacks, and what they should be doing to take responsibility for their own defense.
Was it wrong for companies to assume to the government could protect them from cyberattacks? How has the government’s approach fallen short?
Ms. Ali: The government’s role in cybersecurity is a bit controversial because the global digital environment primarily is owned by the private sector. That makes it difficult for what the government can and cannot do. We are used to relying on the government, relying on the intelligence apparatus, to protect us from attacks coming from other countries or from individuals living outside the U.S. But the government can’t prevent all cyberattacks, it just can’t. We cannot rely on that.
Part of the defense rests with us as individuals and in the private sector. We need to get smarter on international threats, to think about how we protect ourselves. The government will do what it can, it will use diplomatic measures…it will try to create consequences for governments trying to break into private companies’ accounts. But it has to be realistic about what it can and cannot do.
What do companies need to do then?
Ms. Ali: There are four key players that should be at the table and three types of plans companies should have to deal with a cyberattack—a “before” plan, a “during” plan and an “after” plan. You need a tech expert, usually the chief information officer or the chief technology officer; a legal representative, usually the general counsel; someone from the executive suite, usually the chief operating officer; and someone from public relations. And maybe a human resources person for the individual training component and to think about disciplinary actions if someone breaches the cybersecurity policy. Each person brings a different skill to the table and all those skills are necessary for approaching cybersecurity.
Companies cannot just throw technology at the problem but that doesn’t mean they should leave the door unlocked. Even if you have a lock and somebody can break that lock, that doesn’t mean you don’t lock the door. You try to get the best alarm system but you also do other measures that are preventative—and those won’t be foolproof, either.
What else should they do?
Ms. Ali: Every person in the company should be getting trained around how to manage cybersecurity, especially on the “before” plan because each employee plays a role in that process. People, when they take their laptop or iPad on a business trip, need to be aware if they are signing into their bank account or a client account. If they are accessing company devices outside the U.S., what does that mean? What kind of risk exposure has that created? A lot of people don’t understand that.
People need to analyze, what is my risk level, what is my level of vulnerability? Ask why someone would want to hack you. If you are a bank and you say our software prevented 100 hacks today from IP addresses coming out of China, ask why they are trying to get in. Maybe they are trying to copy you, trying to learn. Or maybe they’re trying to get information to sell on the black market. If they are coming from Russia, is it the government there looking to control or influence, or individuals from seeking monetary gains?
Make cybersecurity a board priority. On boards that I sit on I ask how many people in the room know our cyber plan? Many are not yet comfortable with that terrain for discussion…but we need to make it our point to become experts. It can be intimidating at first but I don’t think the learning curve is as high as everyone thinks. When addressing cybersecurity, leadership and management are the keys. If you have a travel policy, there needs a section on cybersecurity. What electronics are you taking in and taking out of that country? Should you instead get a cell phone upon arrival? If you are using your own phone, make sure to turn the GPS off. There are best practices for everybody and there are best practices per industry.
[You may need a WSJ subscription to the read the entire piece.]