Houston Chronicle

CEOs are the top cybersecur­ity targets. Here’s how to protect them.

- By Dwight Silverman STAFF WRITER

A company’s chief executive typically has access to the most sensitive informatio­n about the organizati­on. That makes the CEO a highly prized target for online evildoers bent on malfeasanc­e.

And top executives are human, just like their underlings. They can be as vulnerable to social engineerin­g, malware or losing data as the people who work for them. But because they sit at the very top of the corporate informatio­n food chain, the stakes are higher if they are hacked.

SPECIAL TRAINING: CEOs need extra training in defeating phishing attacks, business email compromise­s and doxxing threats that are aimed specifical­ly at them. The best defense is more knowledge.

“There are a different set of security concerns because of who these people are,” said Caleb Barlow, vice president of threat intelligen­ce at IBM Security.

Modern CEOs use email and search the web — rare is the chief executive that has an assistant print out emails these days — and so they are just as likely to run into malicious websites and phishing emails, Barlow said.

And with CEOs at bigger companies, they are likely to be older and not immersed in digital culture.

“There is a generation­al gap there,” he said. “These people didn’t grow up with computers. They know M&A, finance and corporate management because they came up learning these issues. But that’s not always true with cybersecur­ity.”

Barlow said there are three types of cyberthrea­ts CEOs and other C-suite executives face.

Phishing attacks

Phishing involves sending an email that appears to come from a trusted source in an attempt to get the recipient to take some action.

They may contain a link to a malicious website, or request personal or proprietar­y informatio­n, or may try to get the recipient to take some other type of imprudent action. Highly specific phishing emails, aimed at highvalue targets, are known as “spear phishing,” and a target as big as a CEO is considered “whale.”

“CEOs meet a lot of people,” Barlow said. “A CEO might get an email that says, ‘Hey, I met you at the XYZ conference, remember we talked about how your wife and mine both went to Stanford? I’ve been meaning to talk to you about a deal.’ It’s easy to figure out what a CEO is into, and get this kind of informatio­n about them.”

Business email compromise

Known by the acronym BEC, this involves a hacker getting into a company’s email system, then using that access to spoof the CEO and order employees to perform some action. A 2017 FBI report indicated that this type of cybercrime is among the most rapidly growing, with a 1,300 percent increase in complaints and more than $3 billion in losses.

“The bad guy sends an email, it looks like it came from the CEO, and it says, ‘Hey, I am working on a deal, please keep this confidenti­al, and I need you to wire $2 million from this account to another account,’” Barlow said. “This has resulted in some of the largest losses we’ve seen.”

Doxxing

This is the practice of digging up detailed personal informatio­n about a person and making it public. Because CEOs of larger companies have been in the corporate and public spotlight for a while, a lot is known about them. That makes them a target for doxxing, which can be used to gain leverage on a CEO.

“You can find out things like where their children go to school, you might post health records, or anything that could cause problems for a CEO,” Barlow said.

The best way to prevent these from happening to a CEO is a coordinate­d training effort not just for the chief executive, but also for the people around him, Barlow said. The CEO needs training similar to what all employees get, but it also needs to be coordinate­d with training for the people around him.

For example, the direct reports to the CEO need to know that “I am never going to ask you by email to wire money someplace,” he said. That’s true of other C-suite executives and those who report to them.

As part of its cybersecur­ity training products, IBM has built a mobile security command center that is aimed at teaching executives how to respond to a breach at their companies.

It’s similar to the mobile command operations set up by the military or police, complete with an 18-wheeler loaded up with computers and wall-sized screens.

“CEOs are used to making decisions slowly and deliberate­ly, with lots of research and informatio­n available to them,” Barlow said. “This teaches them what it’s like to make important decisions in real-time when they are on the right side of a security breach.”

 ?? Spencer Selvidge / Contributo­r ?? The IBM Security X-Force Command training truck awaits trainees in Austin on Oct. 23. INNOVATION­S
Spencer Selvidge / Contributo­r The IBM Security X-Force Command training truck awaits trainees in Austin on Oct. 23. INNOVATION­S
 ??  ?? The IBM Security X-Force Command training truck stands ready, as Ben Poernomo, with IBM Security, helps trainees in a simulated cyberattac­k inside the truck.
The IBM Security X-Force Command training truck stands ready, as Ben Poernomo, with IBM Security, helps trainees in a simulated cyberattac­k inside the truck.
 ?? Photos by Spencer Selvidge / Contributo­r ??
Photos by Spencer Selvidge / Contributo­r

Newspapers in English

Newspapers from United States