SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
INDUSTRY VOICE
         >>>                                                           Stock Options Backdating


In Sync: Network Time


I
           N 2006 hundreds of companies were implicated in             even that did not stop some companies from continuing back-
           stock-option timing scandals, and a number of exec-         dating practices. Accurate timing of transactions — stock or
           utives were indicted for illegally backdating stock         otherwise — is fundamental to any SOX report. Further, begin-
           options. While greed is the primary reason for back-        ning in August 2002, and pursuant to SOX and other securities
           dating, it is abetted by weak enforcement of corpo-         laws, the SEC started requiring companies to disclose their
           rate governance that should prevent the practice in         stock-option awards within two days of options grants.
           the first place. Often, there also is a lack of technical      With new regulations in place, backdating now is a regula-
controls on corporate networks to deter such activities.               tory issue, and, as such, companies can no longer bury their
    Options backdating is the dating of employee stock options         heads in the sand and hope no one notices. It has become
with an earlier date than the actual date of the grant. The            clear that the element of time is now an internal control. Any
objective is to choose a date on which the price of the under-         weaknesses in tracking the time of stock-option grants must
lying stock is lower than the current price, resulting in an           be investigated, reported and corrected.
instant profit to the grantee. When dealing with tens or hun-             Companies now must take the necessary steps to ensure
dreds of thousands of shares, and price differentials in the           that any backdating will be detected. Besides the develop-
range of $50 a share, the amount of illicit gain can be immense.       ment of policies, procedures and standards around backdat-
    This time distortion results not only in the value of the          ing, there are technical solutions that can be implemented to
option being much greater to the employee receiving it, but            support such an endeavor.
in a correlative detriment to shareholders by way of stock
                                                                       Time Synchronization Is Imperative
                >>> About the Author                                   These technical solutions center on time synchronization.
                         Ben Rothke, CISSP ,                           Companies must proactively create a time-synchronization
                   Senior Security Consultant, INS                     mandate and ensure that it is correctly deployed throughout
              Ben Rothke is a senior security consultant at            their IT environments. Fortunately, creating such a time syn-
              Mountain View, Calif.-based INS and the author of        chronization infrastructure is relatively easy, and the ROI on
              “Computer Security: 20 Things Every Employee
              Should Know” (McGraw-Hill, 2006). You can contact        such an undertaking can be significant.
              him at ben.rothke@ins.com.                                   As time-synchronization hardware is a needed investment,
                                                                       properly communicating the need to management is crucial to
price dilution. While backdating of stock options is not nec-          getting funding for the technology. Synchronizing time is a fun-
essarily illegal if the grantor of the stock options properly dis-     damental business and technology decision that should be an
closes the backdating, it remains to be seen whether some              integral part of an effective network and security architecture.
other fiduciary duty has been breached.                                    The need for this is evident in that an enterprise informa-
    Most of the legal issues arising from backdating are a result      tion network and security infrastructure is highly dependent
of the grantor falsifying documents to conceal the backdating.         on synchronized time. In addition, there also are regulatory
According to attorney Louis Brilleman, counsel at Sichenzia            issues that require correct synchronized time — from NASD
Ross Friedman Ference in New York, a law firm specializing in          OATS, FFIEC and GLBA, to Visa CISP and many more.
securities matters, backdating is illegal under most circum-               All of these regulations recognize that correct time is crit-
stances. The practice usually leads to the creation of fraudu-         ical for transactions across a network. Many events on the
lent documents through the disclosure of misleading corpo-             network need the correct time to initiate jobs, complete
rate earnings and the improper reporting of the option grant           transactions, etc. Correct time is critical for billing systems,
under applicable tax rules, Brilleman explains.                        authentication systems, manufacturing, forensics and more.
    Options backdating has been going on for many years. The               Common to all of these regulations is the requirement that
rules changed in 2002 with the passage of Sarbanes-Oxley, but          financial transactions and changes to electronic records be



                                                                                    w w w. w a l l s t r e e t a n d t e c h . c o m   MARCH 2007   41
INDUSTRYVOICE                                                                      >>> Stock Option Backdating

accurately time-stamped. To provide accurate time stamps,               Without a policy, there will be no impetus for staff to achieve
all network devices must be synchronized relative to nation-            accurate, synchronized time. Often, a simple policy, such as,
al and international time standards                                     “Time synchronization to an accurate time source is required
    At the application and operating system level, most appli-          on all enterprise network devices,” is a sufficient first step.
cations and networking pro-
tocols require correct syn-
chronized time. Vendors
such as Microsoft, Cisco, Ora-
                                       >>>
                                         “Synchronizing time is a
                                        fundamental business and tech-
                                                                                                        Step 4: Architecture
                                                                                                        The first step to architecting
                                                                                                        an accurate time-synchro-
cle, Red Hat, Novell and Baan                                                                           nization solution is to estab-
all state that their systems              nology decision that should be                                lish a network time source,
must be configured to an
authoritative time server for
                                          an integral part of an effective                              known as a reference clock,
                                                                                                        for tracability to national and
proper and secure use.                    network and security architecture.”                           international standards. A
    Time servers cost from                                                                              typical reference clock would
$2,000 to $10,000, depend-                                                                              use GPS (Global Positioning
ing on the level of accuracy and redundancy required. Time              System) to receive time from satellites. Second, create a
servers, which take but a few hours to install, provide addi-           downstream topology for all network components to use the
tional benefits, such as reduced downtime and the ability to            reference clock as the network’s master source of time.
mitigate legal exposure.
    Options backdating is the problem, and time synchroniza-            Step 5: Auditability
tion is the solution. But getting from solution to implementa-          Steps 1 through 4 are important from a technical perspective.
tion takes proper planning and project management. With that,           But even with the most sophisticated timing device, you still
the following five steps can be used as a high-level framework          need to have independent and auditable time controls in
for implementing synchronized time in your organization.                place. As part of this, you must be able to prove to auditors
                                                                        and regulators that the time on any monitored system was
Step 1: Risks and Requirements                                          correctly synchronized with a specified time source.
The first step is to formally determine the risk to your compa-             Also, it is important to note that time synchronization will
ny if you do not have synchronized time. Don’t underestimate            not magically cure a regulatory material weakness leading to
the risks; if you don’t practice due care pertaining to the time        an internal controls problem. Those in control of time syn-
on your network system, you can be legally liable for negligence        chronization still can manipulate time and/or data. It
and held accountable for the ramifications of that negligence.          becomes an issue, at least in part, of taking control over this
   Next, determine how accurate your clocks need to be. This            material weakness away from insiders. With that, it is imper-
can be anywhere from milliseconds to a few seconds. Finally,            ative to ensure that insiders are not engaging in any time-
advise management of the risks of nonsynchronized time and              based data manipulation.
get their approval for the purchase of time-synchronization                 Also, if something goes to court, you need to prove that all
equipment and the initiation of a time-synchronization project.         your devices on your network are synchronized and that all
                                                                        transactions that took place are able to provide an accurate,
Step 2: Hardware and Software                                           authenticated time source. This requires that all logs are han-
Start meeting with vendors of time-synchronization equipment            dled within the context of digital forensics and staff members
to determine the solution that best fits your organization and          are following the appropriate rules of evidence.
specific needs. Some of the leading vendors in this space
include Spectracom, Symmetricom and EndRun Technologies.                Conclusion
                                                                        The backdating fiasco demonstrates that the need for syn-
Step 3: Policy                                                          chronized time is a crucial business and technology require-
If policies for time synchronization are not in place already,          ment. As such, it is an integral part of an effective network and
work with the information security department to ensure that            security architecture. Ensuring accurate time is relatively inex-
time synchronization becomes part of the global enterprise              pensive and offers a significant ROI. And it is a great way to
information technology policy. Time synchronization must be             stop your company from getting negative press — not to men-
made part of the corporate IT systems and security policies.            tion to keep your management team from being indicted. <<<



42   MARCH 2007      w w w. w a l l s t r e e t a n d t e c h . c o m

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)Gabby Nizri
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?Adlan Hussain
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalNicholas Cramer
 
CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasCNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasAdlan Hussain
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 

Was ist angesagt? (10)

Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
 
CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasCNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & Gas
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
SEC Alert
SEC AlertSEC Alert
SEC Alert
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 

Andere mochten auch

NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project PresentationAndrew McGarry
 
Network Time Synchronization
Network Time SynchronizationNetwork Time Synchronization
Network Time SynchronizationBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 

Andere mochten auch (7)

NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project Presentation
 
Network Time Synchronization
Network Time SynchronizationNetwork Time Synchronization
Network Time Synchronization
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 

Ähnlich wie Stock Options Backdating Requires Time Synchronization

How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureNetwrix Corporation
 
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New RegulationsBy Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulationsassure360
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an IntroductoryMNorazizi HM
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxcatheryncouper
 
Cloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA ProfessionCloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA ProfessionBharath Rao
 
It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012John Weiler
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNIIT Technologies
 
SaaS for Credit Origination
SaaS for Credit OriginationSaaS for Credit Origination
SaaS for Credit OriginationInfraRisk
 
Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshowvjairam
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxdanas19
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe Economist Media Businesses
 
Cyber_Management_Issues.pdf
Cyber_Management_Issues.pdfCyber_Management_Issues.pdf
Cyber_Management_Issues.pdfAliAhmed675993
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Complianceseanpizzy
 
Cloud ROI and Implementation - A TechBlocks Solutions Guide
Cloud ROI and Implementation - A TechBlocks Solutions GuideCloud ROI and Implementation - A TechBlocks Solutions Guide
Cloud ROI and Implementation - A TechBlocks Solutions GuideTechBlocks
 
RegTech and blockchain: Only as strong as your weakest link
RegTech and blockchain: Only as strong as your weakest link RegTech and blockchain: Only as strong as your weakest link
RegTech and blockchain: Only as strong as your weakest link Cris Mattoon, J.D., CCEP, MCM
 
Reasons to have a contract labour management system
Reasons to have a contract labour management systemReasons to have a contract labour management system
Reasons to have a contract labour management systemEmsphere Technologies
 

Ähnlich wie Stock Options Backdating Requires Time Synchronization (20)

How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
Host your Cloud – Netmagic Solutions
Host your Cloud – Netmagic SolutionsHost your Cloud – Netmagic Solutions
Host your Cloud – Netmagic Solutions
 
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New RegulationsBy Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
 
It Budget Tips
It Budget TipsIt Budget Tips
It Budget Tips
 
Cloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA ProfessionCloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA Profession
 
It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
SaaS for Credit Origination
SaaS for Credit OriginationSaaS for Credit Origination
SaaS for Credit Origination
 
Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshow
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
 
FINAL VER - 2015_09
FINAL VER - 2015_09FINAL VER - 2015_09
FINAL VER - 2015_09
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journey
 
Cyber_Management_Issues.pdf
Cyber_Management_Issues.pdfCyber_Management_Issues.pdf
Cyber_Management_Issues.pdf
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Cloud ROI and Implementation - A TechBlocks Solutions Guide
Cloud ROI and Implementation - A TechBlocks Solutions GuideCloud ROI and Implementation - A TechBlocks Solutions Guide
Cloud ROI and Implementation - A TechBlocks Solutions Guide
 
RegTech and blockchain: Only as strong as your weakest link
RegTech and blockchain: Only as strong as your weakest link RegTech and blockchain: Only as strong as your weakest link
RegTech and blockchain: Only as strong as your weakest link
 
Reasons to have a contract labour management system
Reasons to have a contract labour management systemReasons to have a contract labour management system
Reasons to have a contract labour management system
 

Mehr von Ben Rothke

E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke
 

Mehr von Ben Rothke (20)

E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
 

Kürzlich hochgeladen

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Kürzlich hochgeladen (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Stock Options Backdating Requires Time Synchronization

  • 1. INDUSTRY VOICE >>> Stock Options Backdating In Sync: Network Time I N 2006 hundreds of companies were implicated in even that did not stop some companies from continuing back- stock-option timing scandals, and a number of exec- dating practices. Accurate timing of transactions — stock or utives were indicted for illegally backdating stock otherwise — is fundamental to any SOX report. Further, begin- options. While greed is the primary reason for back- ning in August 2002, and pursuant to SOX and other securities dating, it is abetted by weak enforcement of corpo- laws, the SEC started requiring companies to disclose their rate governance that should prevent the practice in stock-option awards within two days of options grants. the first place. Often, there also is a lack of technical With new regulations in place, backdating now is a regula- controls on corporate networks to deter such activities. tory issue, and, as such, companies can no longer bury their Options backdating is the dating of employee stock options heads in the sand and hope no one notices. It has become with an earlier date than the actual date of the grant. The clear that the element of time is now an internal control. Any objective is to choose a date on which the price of the under- weaknesses in tracking the time of stock-option grants must lying stock is lower than the current price, resulting in an be investigated, reported and corrected. instant profit to the grantee. When dealing with tens or hun- Companies now must take the necessary steps to ensure dreds of thousands of shares, and price differentials in the that any backdating will be detected. Besides the develop- range of $50 a share, the amount of illicit gain can be immense. ment of policies, procedures and standards around backdat- This time distortion results not only in the value of the ing, there are technical solutions that can be implemented to option being much greater to the employee receiving it, but support such an endeavor. in a correlative detriment to shareholders by way of stock Time Synchronization Is Imperative >>> About the Author These technical solutions center on time synchronization. Ben Rothke, CISSP , Companies must proactively create a time-synchronization Senior Security Consultant, INS mandate and ensure that it is correctly deployed throughout Ben Rothke is a senior security consultant at their IT environments. Fortunately, creating such a time syn- Mountain View, Calif.-based INS and the author of chronization infrastructure is relatively easy, and the ROI on “Computer Security: 20 Things Every Employee Should Know” (McGraw-Hill, 2006). You can contact such an undertaking can be significant. him at ben.rothke@ins.com. As time-synchronization hardware is a needed investment, properly communicating the need to management is crucial to price dilution. While backdating of stock options is not nec- getting funding for the technology. Synchronizing time is a fun- essarily illegal if the grantor of the stock options properly dis- damental business and technology decision that should be an closes the backdating, it remains to be seen whether some integral part of an effective network and security architecture. other fiduciary duty has been breached. The need for this is evident in that an enterprise informa- Most of the legal issues arising from backdating are a result tion network and security infrastructure is highly dependent of the grantor falsifying documents to conceal the backdating. on synchronized time. In addition, there also are regulatory According to attorney Louis Brilleman, counsel at Sichenzia issues that require correct synchronized time — from NASD Ross Friedman Ference in New York, a law firm specializing in OATS, FFIEC and GLBA, to Visa CISP and many more. securities matters, backdating is illegal under most circum- All of these regulations recognize that correct time is crit- stances. The practice usually leads to the creation of fraudu- ical for transactions across a network. Many events on the lent documents through the disclosure of misleading corpo- network need the correct time to initiate jobs, complete rate earnings and the improper reporting of the option grant transactions, etc. Correct time is critical for billing systems, under applicable tax rules, Brilleman explains. authentication systems, manufacturing, forensics and more. Options backdating has been going on for many years. The Common to all of these regulations is the requirement that rules changed in 2002 with the passage of Sarbanes-Oxley, but financial transactions and changes to electronic records be w w w. w a l l s t r e e t a n d t e c h . c o m MARCH 2007 41
  • 2. INDUSTRYVOICE >>> Stock Option Backdating accurately time-stamped. To provide accurate time stamps, Without a policy, there will be no impetus for staff to achieve all network devices must be synchronized relative to nation- accurate, synchronized time. Often, a simple policy, such as, al and international time standards “Time synchronization to an accurate time source is required At the application and operating system level, most appli- on all enterprise network devices,” is a sufficient first step. cations and networking pro- tocols require correct syn- chronized time. Vendors such as Microsoft, Cisco, Ora- >>> “Synchronizing time is a fundamental business and tech- Step 4: Architecture The first step to architecting an accurate time-synchro- cle, Red Hat, Novell and Baan nization solution is to estab- all state that their systems nology decision that should be lish a network time source, must be configured to an authoritative time server for an integral part of an effective known as a reference clock, for tracability to national and proper and secure use. network and security architecture.” international standards. A Time servers cost from typical reference clock would $2,000 to $10,000, depend- use GPS (Global Positioning ing on the level of accuracy and redundancy required. Time System) to receive time from satellites. Second, create a servers, which take but a few hours to install, provide addi- downstream topology for all network components to use the tional benefits, such as reduced downtime and the ability to reference clock as the network’s master source of time. mitigate legal exposure. Options backdating is the problem, and time synchroniza- Step 5: Auditability tion is the solution. But getting from solution to implementa- Steps 1 through 4 are important from a technical perspective. tion takes proper planning and project management. With that, But even with the most sophisticated timing device, you still the following five steps can be used as a high-level framework need to have independent and auditable time controls in for implementing synchronized time in your organization. place. As part of this, you must be able to prove to auditors and regulators that the time on any monitored system was Step 1: Risks and Requirements correctly synchronized with a specified time source. The first step is to formally determine the risk to your compa- Also, it is important to note that time synchronization will ny if you do not have synchronized time. Don’t underestimate not magically cure a regulatory material weakness leading to the risks; if you don’t practice due care pertaining to the time an internal controls problem. Those in control of time syn- on your network system, you can be legally liable for negligence chronization still can manipulate time and/or data. It and held accountable for the ramifications of that negligence. becomes an issue, at least in part, of taking control over this Next, determine how accurate your clocks need to be. This material weakness away from insiders. With that, it is imper- can be anywhere from milliseconds to a few seconds. Finally, ative to ensure that insiders are not engaging in any time- advise management of the risks of nonsynchronized time and based data manipulation. get their approval for the purchase of time-synchronization Also, if something goes to court, you need to prove that all equipment and the initiation of a time-synchronization project. your devices on your network are synchronized and that all transactions that took place are able to provide an accurate, Step 2: Hardware and Software authenticated time source. This requires that all logs are han- Start meeting with vendors of time-synchronization equipment dled within the context of digital forensics and staff members to determine the solution that best fits your organization and are following the appropriate rules of evidence. specific needs. Some of the leading vendors in this space include Spectracom, Symmetricom and EndRun Technologies. Conclusion The backdating fiasco demonstrates that the need for syn- Step 3: Policy chronized time is a crucial business and technology require- If policies for time synchronization are not in place already, ment. As such, it is an integral part of an effective network and work with the information security department to ensure that security architecture. Ensuring accurate time is relatively inex- time synchronization becomes part of the global enterprise pensive and offers a significant ROI. And it is a great way to information technology policy. Time synchronization must be stop your company from getting negative press — not to men- made part of the corporate IT systems and security policies. tion to keep your management team from being indicted. <<< 42 MARCH 2007 w w w. w a l l s t r e e t a n d t e c h . c o m