Suche innerhalb des Archivs / Search the Archive All words Any words

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[infowar.de] US corporate security disclosure plan won't help



Infowar.de, http://userpage.fu-berlin.de/~bendrath/liste.html
-------------------------------------------------------------
http://www.theregister.co.uk/content/55/33478.html

US corporate security disclosure plan won't help
By Mark Rasch, SecurityFocus
Posted: 20/10/2003 at 12:52 GMT

 
In an effort to shore up the security of the US' critical infrastructures, 
the secretary of the Department of Homeland Security recently proposed 
that all publicly-traded companies disclose in their filings with the 
Securities and Exchange Commission precisely what they are doing to 
protect the security, confidentiality, integrity and availability of their 
electronic information and databases. 

Harkening back to the end of the last millennium, Tom Ridge suggested in a 
speech before the Business Software Alliance that cyber security problems 
were similar to the problems presented to publicly traded companies before 
Y2K. Ridge suggested that "we need to talk about some kind of public 
disclosure. What are you doing about your security, physical and cyber 
security? Tell your shareholders, tell your employees, tell the 
communities within which you operate". 

It's a worthy idea to ponder, but two underlying questions remain 
unanswered: are investors really going to make investment decisions based 
upon such disclosures, and wouldn't any meaningful disclosures provide 
hackers and criminals with a roadmap to vulnerabilities? 

All publicly traded companies in the US are required to publicly file 
disclosure statements that reveal all known material events, trends or 
uncertainties that might affect the value of the company. The purpose of 
these disclosures is to alert both shareholders and investors of anything 
that could impact share value. Management is required to explain not only 
the current financial condition of the company, but also, to some extent, 
what it believes will be the future financial condition of the company, in 
light of anticipated trends. 

To do this, the company files with the SEC a disclosure called 
"Management's Discussion and Analysis of Financial Condition and Results 
of Operations" (MD&A). 

Additionally, the anti-fraud provisions of the securities laws require 
companies to publicly reveal any information that could materially affect 
the share price. Essentially, you have to tell investors if there is 
anything you know that could affect the share price. 

In this regard, cyber security can be seen as purple elephant in the 
corner - everyone sees it, but nobody wants to talk about it. Let's face 
it, if there is a significant attack on a company's electronic 
infrastructure, or a significant loss of reputation as a result of an 
attack, the publicly traded company you have just invested your 401(k) 
funds in could turn out to be a complete bust. Sometimes, the company 
cannot recover. When Tim Lloyd's Trojan destroyed all the files of his 
employer, Omega Engineering, in July 1996, the company essentially went 
out of business. A similar result occurred three months later when a 
disgruntled employee wiped out all of the computer files at Digital 
Technologies Group. 

The question is, how much is a company obliged to disclose. The legal test 
here is one of materiality. What would a reasonably prudent investor want 
to know about the state of a company's computer security that could affect 
his or her decision whether or not to invest? 

Y2K a Poor Analogy 
With Y2K, you knew (well, you thought you knew) that something was going 
to happen on 1 January, 2000. You either were prepared for it, or you 
weren't. You either took some effort to remediate, or you didn't. You 
either tested for vulnerability, or you didn't. Or sometimes something in 
between. 

In 1998, with the Y2K bug looming, both Congress and the SEC promulgated 
laws and regulations that required companies to disclose (1) the company's 
state of Y2K readiness; (2) the costs to address the company's Year 2000 
issues; (3) the risks of the company's Year 2000 issues; and (4) the 
company's contingency plans. While the precise nature of the disclosure 
requirements were not set out by the SEC, essentially you told your 
shareholders and investors either 'we are ready for Y2K and this is why', 
or 'we aren't'. 

Cyber security isn't so simple. 

Already companies have to disclose anything that could materially affect 
their stock price - either in the past (things that have already occurred) 
or the future (what the SEC calls "forward looking statements"). Companies 
have estimated the cost of the Nimda worm alone at $2.6 billion, Code Red 
at $1.2 billion, the Melissa virus at $385 million, and the Mafiaboy DDoS 
attacks an additional $1.2 billion. And yet, despite the magnitude of 
these stated losses, not a single company has filed an SEC disclosure 
statement to its investors or potential investors saying, 'Hey, our 
company didn't do as well as expected this quarter because of losses 
resulting from the attack.' 

The reason lies in the test for materiality. While the destruction of its 
entire file system was material to companies like Omega, the diversion of 
corporate resources resulting from attacks like Nimda, or Code Red can be 
swept under the rug by most large institutions as a 'cost of doing 
business'. Indeed, most companies don't keep accurate statistics about the 
true costs of cyber security, much less the costs of not providing it. 

It is therefore difficult for companies to make a business case within the 
institution for dedicating appropriate resources to fight cyber attacks - 
much less convince them to disclose their spending to the public. 

So what would happen if companies were required to disclose to the public 
and the SEC what they were doing in the area of computer security? First, 
you'd see a lot of banal and meaningless statements like, 'We have 
state-of-the-art security,' or, 'We spent four per cent of our overall IT 
budget on security last year' or 'We are substantially modernising our IT 
security'. 

Blueprints for Attacks 
Are such statements really useful to investors? What is the right amount 
of money to be spent on security? What constitutes security spending? Are 
you spending on the right tools, technologies, and training? Are you truly 
secure? What are the threats and risks to you and your industry? Why have 
you picked that level of security spending? Where do you stand in relation 
to others similarly situated? It's pretty complicated stuff for your 
average investor to take in. Moreover, I would hardly ever expect a 
company to voluntarily disclose that their security is inadequate. 

Alternatively, a company could decide to go the other way and disclose a 
great deal of detail about what it is doing for security. Explain the 
nature and extent of its security technology, give exact dollar figures 
spent on security (both totals and percentages), and explain the new 
security strategy to be rolled out next year. The problem with this 
approach is that, the greater the detail about what you are doing, the 
more you tell potential attackers about what you are not doing. The 
disclosure makes you more vulnerable to attack. 

Companies already have a duty to investors to ensure that they are 
protecting all corporate assets, including information assets. Corporate 
officers, directors, and auditors act as a fiduciary to their shareholders 
to make sure that corporate information assets are available, 
confidential, and reliable. While they are entitled to exercise business 
judgment in deciding how much to spend to protect these assets (and how 
exactly to spend it), they are ultimately responsible to the shareholders 
if this judgment proves unsound. 

Furthermore, new regulations and laws like Sarbannes Oxley and the Gramm 
Leach Bliley Act dictate that companies ensure the confidentiality of 
personal financial information, and the reliability of SEC disclosures. 

I think that's enough. 

Secretary Ridge's theory seems to be that if companies had to tell their 
investors what they were doing about security, they would do more. But 
it's clear that a failure to adequately protect information assets against 
foreseeable threats - whether cyber attacks or a malfunctioning sprinkler 
system - is already material to an investor. Additional disclosures won't 
add anything of value, and could cause some damage. 

Mark D. Rasch, JD, is a former head of the Justice Department's computer 
crime unit, and now serves as Senior Vice President and Chief Security 
Counsel at Solutionary, Inc. 

Copyright ? SecurityFocus
---------------------------------------------------------------
Liste verlassen: 
Mail an infowar -
 de-request -!
- infopeace -
 de mit "unsubscribe" im Text.