Está en la página 1de 7

Stanford Closer LOOK series

critical update needed


cybersecurity expertise in the boardroom
By David F. Larcker, Peter C. Reiss, and Brian Tayan
November 16, 2017

introduction
breach over a three-week period during the holiday shopping
As part of its oversight responsibilities, the board of directors is season. This attack was followed by several high-profile payment-
expected to ensure that management has identified and developed system breaches at the Home Depot, Michaels Stores, Neiman
processes to mitigate risks facing the organization, including risks Marcus, Supervalu, and Staples, as well as franchised owners of
arising from data theft and the loss of proprietary or customer UPS Stores, PF Changs, and Hard Rock Caf. The frequency of
information. Unfortunately, general observation suggests that credit card breaches has been significantly reduced through chip-
companies are not doing a sufficient job of securing this data. Data card requirements introduced by the major payment networks in
theft has grown considerably over the last decade. According to 2016; however, they remain an important point of vulnerability.5
the Identity Theft Resource Center, the number of data breaches Another type of data theft involves penetrating corporate
tripled from 2007 to 2016. The main contributor to this increase networks or employee devices that store the personal information
was theft by third-party hacking, skimming, and phishing schemes of clients and employees. This information is then sold in
(see Exhibit 1).1 anonymous dark markets on the web. Recent examples of
The cost of data theft is significant. According to the Ponemon personal data theft include Morgan Stanley, Scottrade, and
Institute, the average direct organizational cost of a data breach in Standard Charter, where hackers or internal employees download
the United States is $7 million. This includes the cost to identify the personal information of wealth-management clients, including
and contain the breach, notify customers, and loss of business.2 names, account numbers, and investments. Similarly, health
Class-action lawsuits add to this figure, with settlements ranging insurance networks such as Anthem, Primera, and CareFirst
from approximately $1 million for moderate-scale data breaches BlueCross have been targeted by cybercriminals who steal the
to over $100 million for large-scale breaches. One study finds
3
names, birthdays, addresses, social security numbers and health
that the average stock declines 5 percent following the disclosure information of customers. One of the largest breaches of personal
of a breach and performs negatively over the subsequent 90- data occurred in September 2017 when the credit-reporting
day period.4 Clearly, cybersecurity is an important risk facing firm Equifax reported that personal information on 143 million
companies and their shareholders. customers was exposed.
A more unusual example of personal data theft occurred in
Incidents of data theft September 2014 when hackers accessed the Apple iCloud data
Given the cost and likelihood of a successful cyberattack, it is storage accounts of targeted celebrities, such as actresses Jennifer
important to ask whether boards and management have sufficient Lawrence and Kirsten Dunst and model Kate Upton, and stole
understanding and are appropriately prepared to prevent, their personal photos and videos, some of which were released
monitor, and mitigate digital data theft (see Exhibit 2 for survey publicly. The individual responsible for hacking these accounts
data). To shed light on this question, we reviewed prominent was sentenced to 18 months in prison.6 To improve security, Apple
incidents of data theft over the last five years to understand the introduced technology to provide automatic email notification
types of cyberattacks that occur and how companies respond to when an iCloud account is accessed from a new device or browser.7
them. Corporate Systems and Data. Customer data is not the sole
Customer Data. Payment and accounting system breaches are target of cybercriminals. In 2014, the North Korean government
an important source of cyber risk. One of the largest attacks on attacked Sony Pictures IT infrastructure in an attempt to
a payment network occurred at Target in December 2013 when intimidate the company into not releasing a comedy film titled
over 40 million accounts were compromised in a system-wide The Interview, which featured a fictional plot to assassinate

Stanford Closer LOOK series 1


Critical Update Needed

North Koreas real leader. Hackers inserted a malware program, used for insider trading. Similarly, the servers of accounting
which wiped out half of the companys computers and servers firm Deloitte were hacked and files for a small number of clients
with a sophisticated algorithm that made data recovery nearly were accessed. In 2017, the Securities and Exchange Commission
impossible. Sony withheld release of the movie from most theaters revealed that Edgar, the database that stores the corporate filings
but later made it available on demand and in select locations. 8
of all publicly traded companies listed in the U.S., had been
Similarly, in 2017, rumors circulated that hackers had infiltrated accessed, although the agency did not detail what information was
Disney Studios and stole a copy of a forthcoming sequel to the stolen.
movie Pirates of the Caribbean. Reports alleged that the hackers Finally, companies and their supply chains have been
demanded an enormous amount of money in Bitcoin in order compromised by ransomware attacks in which cybercriminals
not to release the firm.9 Disney, in cooperation with the FBI, disrupt computing systems or demand payment under threat of
eventually determined that the hack had not been successful. disrupting systems. Two major attacks occurred in 2017. The
Company products also are subject to cyber threats when first involved a ransomware program called WannaCry which
hackers access and assume control over products. The variety infected computers running Microsoft Windows operating
of products vulnerable to such attacks is remarkably broad. system. The program automatically encrypted computer data
For example, in 2015 Fiat Chrysler recalled 1.4 million Jeep and demanded payment in Bitcoin for its release. Over 200,000
vehicles after it was determined that a cybersecurity flaw allowed computers in 150 countries were affected.13 FedEx and Nissan
hackers to remotely assume control of the car through wireless reported being materially impacted.14 A second malware
communication systems. The company had been aware of the attack in July 2017 took down the computing systems of major
security flaw but issued the recall when it discovered that hackers multinational corporationssuch as Merck, Mondelez, and
could remotely control the cars brakes, transmission, and other Maerskand disrupted business operations over multiple days.
electronics.
10
In 2016, a short-selling research firm released a Maersk announced that widespread computer outages prevented
report that cardiac implants produced by medical device company the companys shipping subsidiary from booking new shipments
St. Jude Medical were vulnerable to cyberattack. A third party and providing quotes at selected terminals.15 Mondelez estimated
confirmed that in proprietary testing it was successful in gaining that the attack reduced second-quarter revenue growth by 3
control over the companys Merlin@home implantable cardiac percentage points.16
devices that wirelessly monitor patient heartbeat and was able
to remotely turned off the devices or, alternatively, deliver an corporate response to cyberattacks
extreme shock that would lead to cardiac arrest. 11
The company What actions do corporations take in response to cyberattacks
subsequently updated product software to reduce the risk of such as these? Many announce steps to improve data security.
remote access. When customers are affected, they make assurances about their
Companies are also vulnerable to the theft of proprietary commitment to data protection and offer free credit or identity-
technology or methods of production. In 2016, US Steel was theft monitoring. Almost invariably, the company is sued and
attacked by hackers allegedly linked to the Chinese government enters into a settlement (see Exhibit 3).
who stole methods for producing lightweight steel. That same Beyond this, however, surprisingly little happens in terms
year, Monsanto discovered that an employee had been working of holding individuals accountable or structural changes that
with a foreign government to steal information on the companys improve cybersecurity expertise at the senior-executive and
advanced seed technology. The employee loaded highly board levels. For example, among a sample of approximately 50
sophisticated and unauthorized software on his computer that cybersecurity breaches over the last five years, we find that the
allowed a foreign government to monitor his activity remotely CEO is fired or steps down in only a handful of cases. Exceptions
and transmit proprietary data.12 include massive data breaches such as those at Target, Equifax, and
More mundane but potentially more lucrative cybercrimes the website Ashley Madison, in which hackers stole and published
involve the theft of corporate information shared between the names of 32 million (potentially unfaithful) clients. Executive
companies and their advisors. For example, in 2016, prominent pay is almost never reduced. The CEO of Target received no
law firms Cravath Swaine and Weil Gotshal were among a number bonus and forfeited $5 million in pension benefits after 40 million
of law firms hacked by cybercriminals who stole nonpublic credit card accounts were stolen; however, the CEO of the Home
information on corporate clients, which could potentially be Depot suffered no decrease in compensation after more than 50

Stanford Closer LOOK series 2


Critical Update Needed

million credit card accounts were stolen.17 We found only one instance of a company making changes to
Furthermore, executives below the CEO are also rarely fired an executive compensation plan to incorporate cybersecurity risk.
or penalized. The chief information officer (CIO) of Target was JPMorgan added cybersecurity as part of the annual performance
terminated along with that companys CEO. The chief information plans of both its CEO and COO.
security officer (CISO) of credit agency Experian was fired after Whether governance changes such as these are sufficient to
information on 15 million customers was exposed. At Equifax, compensate shareholders for the costs incurred in a cyberattack
both the CIO and CISO were terminated along with the CEO. The is unclear. Verizon Communications reduced the amount that it
head of Sony Pictures was fired after the North Korean hack of offered to pay for Yahoo!s internet properties by $350 million
the companys movie studio; however, Sonys CISO kept his job. after Yahoo! disclosed that hackers had stolen the birthdays, email
We see no evidence of executive terminationsCEO, CFO, CIO, addresses, and passwords of over 1 billion users (later increased to
CISO, or other C-suite level executivefollowing dozens of other 3 billion users). A spokesperson for Yahoo! described the reduced
high-profile cyberattacks. purchase price as a fair and favorable outcome.20
Some companies hire forensics firms or cybersecurity experts To decrease the risk of a cyber threat, some experts recommend
in the aftermath of data breaches. Cybersecurity firms are the following:
brought in to assess how the breach happened and what assets
Elevate cybersecurity within the companys risk framework.
were compromised. Cybersecurity experts are brought in to fill
The board should ensure that management and employees take
gaps in the firms internal ranks. For example, JPMorgan hired cybersecurity seriously. They should periodically review the
a former cybersecurity executive from Lockheed Martin a year companys potential exposure and cybersecurity policies.
after the bank discovered that hackers gained access to more than
Develop an action plan to respond to a breach in customer data.
90 bank servers after stealing the login credentials of a JPMorgan
The plan should outline employee and board responsibilities,
employee. The company also announced plans to increase its data
who should be contacted and when, how the company will
security budget from $250 million to $500 million.18 Fiat Chrysler
communicate to the public, and how the breach will be assessed.
took additional steps. After it was discovered that cybercriminals
could remotely gain control over its Jeeps, the company developed Implement additional safeguards to protect corporate data.
a program of hiring hackers to identify vulnerabilities in its Management and the board should review who has access to
products and offered to pay between $150 and $1500 for each critical corporate data and trade secrets, and develop policies
around how this information is documented, stored, accessed
legitimate security flaw identified.19
and shared within the company. The board should have its own
Few companies add a cybersecurity expert to the board
cybersecurity policies to protect director communications,
following data breaches. The Home Depot added an IT executive
documents, and conversations.21
from Lockheed Martin. Neiman Marcus added the chief digital
offer from Starbucks after Neimans payment systems were Why This Matters
compromised. Uber recruited the former director of the U.S.
Secret Service to serve on an advisory boardnot the formal 1. In recent years, cyberattacks on corporate data have increased
board of directorsa year after hackers stole personal information in frequency and cost. At the same time, experience has
on 50,000 of its drivers. The hire, however, was part of a broader shown that a wide variety of datanot just customer but also
effort to reduce risk and increase safety for riders, drivers, and the corporate dataare the target of such attacks. What steps
public and not specifically heralded as an increase in security of can the board and management teams take to prepare for and
the companys systems. respond to cyber threats? What practical steps can they take to
We find little less evidence of formal governance changes mitigate or prevent them?
following cyberattacks. The most commonly observed change is 2. Observation suggests that companies make very few governance
increased disclosure in the proxy. Following hacks, the boards changes in response to major cyberattacks. Senior executives
of Coca-Cola, Monsanto, Home Depot, and Staples added are rarely terminated. Their pay packages are rarely reduced or
specific mention of cybersecurity as a responsibility of the audit restructured to reward data protection. Cyber expertise is not
committee. Morgan Stanley added language that cybersecurity a central qualification or requirement of most board members.
is a responsibility of its operations and technology committee. Why? Do boards not appreciate the scope and severity of cyber
Standard Charter added it to its risk review. Target added data threats? Or do they believe that they have sufficient policies in
security as a collective experience of the board. place to deal with them?

Stanford Closer LOOK series 3


Critical Update Needed

3. Cyberattacks represent a major risk to organizations: David Larcker is Director of the Corporate Governance Research Initiative at
the cost of a breach is high, the variety of attacks broad, the Stanford Graduate School of Business and senior faculty member at the Rock
Center for Corporate Governance at Stanford University. Peter Reiss is MBA
and the technological issues sophisticated. What data,
Class of 1963 Professor of Economics at the Stanford Graduate School of Business.
metrics, and information should board members review
Brian Tayan is a researcher with Stanfords Corporate Governance Research
to satisfy themselves that management has taken proper Initiative. Larcker and Tayan are coauthors of the books A Real Look at Real
steps to minimize cyber risks? What qualifications should World Corporate Governance and Corporate Governance Matters. The
a board member have in order to constructively contribute authors would like to thank Michelle E. Gutman for research assistance in the
to boardroom discussions on cybersecurity? How preparation of these materials.

difficult is it to find board candidates with these skills? The Stanford Closer Look Series is a collection of short case studies that explore
topics, issues, and controversies in corporate governance and leadership.
1
Identity Theft Resource Center (ITRC), Breach Statistics 2005-2016. The Closer Look Series is published by the Corporate Governance Research
2
Ponemon Institute, 2016 Cost of Data Breach Study: Global Analysis, Initiative at the Stanford Graduate School of Business and the Rock Center
(2016). for Corporate Governance at Stanford University. For more information, visit:
3
See Alexander H. Southwell, Eric Vandevelde, Ryan Bergsieker, and http:/www.gsb.stanford.edu/cgri-research.
Jeana Bisnar Maute, Gibson Dunn Reviews U.S. Cybersecurity and
Data Privacy, The CLS Blue Sky Blog (Columbia Law School), (February
Copyright 2017 by the Board of Trustees of the Leland Stanford Junior
3, 2017).
University. All rights reserved.
4
Ponemon Institute, The Impact of Data Breaches on Reputation and
Share Value, (May 2017).
5
According to data from Visa, chip-enabled merchants experienced a
26 percent drop in counterfeit fraud year-over-year in January 2016,
following the first rollout of new credit and debit card chip technology.
See Andrew Meola, Visa Is Significantly Reducing Fraud, Business
Insider (June 9, 2016).
6
Andrew Blankstein, Pennsylvania Man Is Charged in Celebrity Hack,
Reaches Plea Deal, NBC News (March 15, 2016).
7
Russell Brandom, Apple Just Added Another Layer of iCloud Security, a
Day before iPhone 6 Event, The Verge (September 8, 2014).
8
Peter Elkind, Inside the Hack of the Century, Fortune (June 25, 2015).
9
Anita Busch, Hackers Holding Disneys Latest Pirates of the Caribbean
for Ransom, Deadline Hollywood (May 15, 2017).
10
Mike Spector and Danny Yadron, After Cyber Hack, Big Chrysler
Recall, The Wall Street Journal (July 25, 2015).
11
Jim Finkle, Hired Experts Back Claims St. Jude Heart Devices Can Be
Hacked, Reuters (October 24, 2016).
12
Jacob Bunge, Monsanto Alleges Worker Stole Data, The Wall Street
Journal (June 18, 2016).
13
Unprecedented Cyberattack Hits 200,000 in at Least 150 Countries,
and the Threat is Escalating, CNBC (May 14, 2017).
14
Brandon Vigliarolo, 10 Major Organizations Affected by the WannaCry
Ransomware Attack, TechRepublic (May 19, 2017).
15
Nick Kostov and Costas Paris, Cyberattacks Fallout Fuels Scramble,
The Wall Street Journal (June 29, 2017).
16
Update on Cyber-Attack and Preliminary Estimate of Financial
Impacts, Mondelez press release (July 6, 2017).
17
At the time of the data breach, the company was in the middle of a
CEO transition. Neither the outgoing CEO nor his successor saw a
reduction in bonus or performance awards as a result of the breach.
Key performance indicators (KPIs) for the annual bonus plan were sales,
operating profit, and inventory turns; KPIs for long-term equity awards
were three-year return on invested capital and operating profit. Neither
payment was decreased because of the data breach.
18
Steve Morgan, Why J.P. Morgan Chase & Co. Is Spending a Half Billion
Dollars on Cybersecurity, The New York Times (January 30, 2016).
19
Kristen Korosec, Fiat Chrysler Is Paying the Public to Find Security
Flaws in Its Cars, Fortune (July 13, 2016).
20
Scott Moritz, Verizon Reaches Deal for Lowered Yahoo Price After
Hacks, Bloomberg (February 21, 2017).
21
Adapted from: Peter Reiss, Cybersecurity and the Board, presentation
made at the Directors Consortium at Stanford Graduate School of
Business (April 7, 2017).

Stanford Closer LOOK series 4


Critical Update Needed

Exhibit 1 data breaches by category

1,072

812
772
Number of Breaches

493 504
455

355 354 354


321

2007 2008 2009 2010 2011 2012 2013 2014 2015 2016

Insider Theft Hacking, Phishing Data on the Move Internet Exposure


3rd Party Exposure Employee Error, Negligence Physical Theft

Data breach is defined as an incident in which an individual name plus social security number, drivers license number, medical record, or financial record
(including credit or debit card numbers) is potentially at risk because of exposure.

Source: Identity Theft Resource Center (ITRC).

Stanford Closer LOOK series 5


Critical Update Needed

Exhibit 2 Survey Data: Board of Directors on Cybersecurity

How confident are you that your companies are properly secured against cyberattacks?

4%

29%
Very confident
Confident
Less than confident
66%

How often are cybersecurity matters discussed during board meetings?

Every meeting 35%

Most meetings 46%

Only after internal


18%
or industry incident

Never 1%

Source: Veracode and New York Stock Exchange, A 2015 Survey: Cybersecurity in the Boardroom, (2015).

Stanford Closer LOOK series 6


Critical Update Needed

Exhibit 3 Cost to Settle Class Action Lawsuits for Data Theft (selected)

Source: Alexander H. Southwell, Eric Vandevelde, Ryan Bergsieker, and Jeana Bisnar Maute, Gibson Dunn Reviews U.S. Cybersecurity and Data Privacy, The CLS
Blue Sky Blog (Columbia Law School), (February 3, 2017). Selected data 2013 to 2016.

Stanford Closer LOOK series 7

También podría gustarte