Sasha Romanosky: It is unclear how an insurer should interpret the responses [to a cyber security questionnaire]. While most people would agree that having a firewall or proper network access control is better than not having a firewall and no access control, it is unclear how an underwriter would interpret and operationalize the answers to these questions.
Symantec: While our processes and approach are based on the industry best practices that we helped create, we have immediately put in place additional processes and technical controls to eliminate the possibility of human error.
Adriel Desautels: The vast majority of vulnerabilities are exploited within days of them becoming known.
Maritza Santillan: Malicious actors began exploiting a patched critical vulnerability found in Joomla -- a popular open-source content management system -- just four hours after its details were disclosed. For popular sites, webmasters likely only have a couple of hours, from disclosure to attack, making it critical for them to react fast.
|