Aller au contenu principal

Préoccupations des C.A. eu égard à la cybersécurité ?

31 janvier 2014

Voici un document du National Association of Corporate Directors (NACD) qui aborde une question cruciale sur le rôle des conseils d’administration en matière de prévention et de réactions à la suite de problèmes de sécurité informatique.

computer security

computer security (Photo credit: justonlysteve)

Le document de 10 pages est disponible gratuitement sur le site du NACD si vous vous inscrivez. Je vous invite à prendre connaissance des principales questions qu’un administrateur devrait poser à la direction.

Voici un extrait de l’article, notamment les questions concernant la planification d’une attaque à la sécurité, et d’autres questions concernant les mesures à prendre à la suite de ces problèmes.

Cybersecurity: Boardroom Implications

Ten Questions Directors Can Ask Management in Planning for a Breach

    1. How will we know we have been hacked or breached, what makes us certain or how will we find out?
    2. What are best practices for cybersecurity and where do our practices differ?
    3. In management’s opinion, what is the biggest weakness in our IT systems? If we wanted to deal the most damage to the company, how would we go about it?
    4. Does our external auditor indicate we have deficiencies in IT? If so, where?
    5. Where do management and our IT team disagree on cybersecurity?
    6. Were we told of cyber attacks that already occurred and how severe they were? For significant breaches, is the communication adequate as information is obtained regarding the nature and type of breach, the data impacted, and potential implications to the company and the response plan?
    7. What part of our IT infrastructure can contribute to a significant deficiency or material weakness?
    8. What do we consider our most valuable assets; how does our IT system interact with those assets; do we think there is adequate protection in place if someone wanted to get them or damage them; what would it take to feel comfortable that they were protected? Do we believe we can ever fully protect those assets? How should we monitor the status of their protection?
    9. Are we investing enough so our corporate operating and network systems are not easy targets by a determined hacker?
    10. Where can we generate more revenue and marginal profitability by making changes in IT?


Ten Questions Directors Can Ask Management Once a Breach Is Found

    1. How did we learn about the breach? Were we notified by an outside agency or was the breach found internally?
    2. What do we believe was stolen?
    3. What has been affected by the breach?
    4. Have any of our operations been compromised?
    5. Is our crisis response plan in action, and is it working as planned?
    6. Whom do we have to notify about this breach (materiality), whom should we notify, and is our legal team prepared for such notifications?
    7. What steps is the response team taking to ensure that the breach is under control and the hacker no longer has access to the internal network?
    8. Do we believe the hacker was an internal or external actor?
    9. What were the weaknesses in our system that allowed it to occur (and why)?
    10. What steps can we take to make sure this type of breach does not happen again,
Enhanced by Zemanta
Laisser un commentaire

Qu'en pensez-vous ?

Entrer les renseignements ci-dessous ou cliquer sur une icône pour ouvrir une session :


Vous commentez à l’aide de votre compte Déconnexion /  Changer )

Photo Google

Vous commentez à l’aide de votre compte Google. Déconnexion /  Changer )

Image Twitter

Vous commentez à l’aide de votre compte Twitter. Déconnexion /  Changer )

Photo Facebook

Vous commentez à l’aide de votre compte Facebook. Déconnexion /  Changer )

Connexion à %s

%d blogueurs aiment ce contenu :