{"id":45269,"date":"2022-02-11T15:00:00","date_gmt":"2022-02-11T15:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/what-cisos-should-tell-the-board-about-log4j"},"modified":"2022-02-11T15:00:00","modified_gmt":"2022-02-11T15:00:00","slug":"what-cisos-should-tell-the-board-about-log4j","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/","title":{"rendered":"What CISOs Should Tell the Board About Log4j"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt784b52dfba6f8599\/61fafa9f1b0ed22e88594a26\/Boardroom_Rawpixel_Ltd_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cyberattacks on corporations are now a common and increasingly frequent occurrence, which should lead their boards of directors to take notice and recognize the need to increase funding and enable other security measures. But a recent <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-11-18-gartner-survey-finds-88-percent-of-boards-of-directors-view-cybersecurity-as-a-business-risk\" target=\"_blank\" rel=\"noopener\">Gartner report<\/a> finds that 88% of boards of directors view cybersecurity as a business risk, not a technology risk, yet only a fraction have a dedicated, board-level cybersecurity committee, which means cybersecurity isn&#8217;t viewed as a critical executive function.<\/p>\n<p>With Log4j taking up a lot of security attention in the last month, it is imperative to revisit not only the cybersecurity funding conversation but also how to get the board to pay more nuanced attention to cybersecurity.<\/p>\n<p>Log4j is a library of open source code that lets hackers run any code on vulnerable systems or hack into applications that use the Apache Log4j framework. The vulnerability, also called Log4Shell, is indeed a serious issue, so serious that the federal Cybersecurity and Infrastructure Security Agency (CISA) has issued <a href=\"https:\/\/www.cisa.gov\/uscert\/apache-log4j-vulnerability-guidance\" target=\"_blank\" rel=\"noopener\">guidance on remediating Log4j<\/a>. The Federal Trade Commission (FTC) also said it would <a href=\"https:\/\/www.ftc.gov\/news-events\/blogs\/techftc\/2022\/01\/ftc-warns-companies-remediate-log4j-security-vulnerability\" target=\"_blank\" rel=\"noopener\">take action against companies<\/a> that don\u2019t take steps to protect consumer data from exposure due to this vulnerability.<\/p>\n<p>The FTC\u2019s announcement appears to send a warning to boards more than security practitioners about the need for them to do their due diligence and take corporate ownership of risk impact. &#8220;When vulnerabilities are discovered and exploited, it risks a loss or breach of personal information, financial loss, and other irreversible harms. The duty to take reasonable steps to mitigate known software vulnerabilities implicates\u202flaws including, among others,&#8221; the FTC stated.<\/p>\n<p>So it behooves <a href=\"https:\/\/www.darkreading.com\/careers-and-people\/actionable-tips-for-engaging-the-board-on-cybersecurity\" target=\"_blank\" rel=\"noopener\">CISOs to get in front of their boards of directors<\/a> and explain the potential implications of complacency and inaction. Most people (security practitioners included) are likely experiencing cyber-breach fatigue and may be inclined to downplay Log4j as just the flaw of the month. To do so would be dangerous and irresponsible.<\/p>\n<p>Boards never want to hear &#8220;I don&#8217;t know&#8221; or \u201cIt&#8217;s not my responsibility\u201d from their CISO. And CISOs certainly don\u2019t want to appear before the board and give the impression that an issue isn&#8217;t under control. But the <a href=\"https:\/\/www.darkreading.com\/edge-threat-monitor\/how-risky-is-the-log4j-vulnerability-\" target=\"_blank\" rel=\"noopener\">Log4j vulnerability<\/a> requires a new approach that relies on comprehensive runtime analysis to detect, prioritize, and remediate all instances of the Log4Shell instances. CISOs should reframe this as an opportunity to elevate security posture as a whole.<\/p>\n<p><strong>How to Get Board Buy-In On Log4j\u2019s Importance<\/strong><strong><br \/><\/strong>An increasing number of CISOs now <a href=\"https:\/\/www.wsj.com\/articles\/cybersecurity-chiefs-are-in-high-demand-as-companies-face-rising-hacking-threats-11627551000\" target=\"_blank\" rel=\"noopener\">present to their boards<\/a> on a variety of strategic topics because security is no longer seen as just a technology function. The key is to speak in layperson\u2019s terms and get some salient points across. The first is to emphasize that Log4j slowly but surely nests in the corporate networks and is one of the most critical zero-day vulnerabilities in recent history.<\/p>\n<p>Board members aren&#8217;t interested in the operational or tactical aspects of cybersecurity; rather, they are focused on the holistic impact of the risk that the vulnerability poses.<\/p>\n<p>What will also get the board\u2019s attention is that this vulnerability affects some of the <a href=\"https:\/\/cisomag.eccouncil.org\/log4j-explained\/\" target=\"_blank\" rel=\"noopener\">world\u2019s largest IT companies and tech vendors<\/a>, including Amazon Web Services, Oracle, Cisco, IBM, Fortinet, VMware, and others.<\/p>\n<p>There is widespread deployment of Log4j, from simple, everyday devices to high-end space vehicles. The proliferation of Log4j is akin to Russian nesting dolls; boards need to be aware that instances of the vulnerability can be hidden with multiple transitive dependencies, making remediation equally complex. And what they don\u2019t know can hurt them.<\/p>\n<p>Boards should also understand that Log4j is a growing and complex security problem that promises to be around for years to come. CISOs need to explain that not taking this flaw seriously could result in a data breach, data loss, productivity loss, and ultimately, loss of reputation.<\/p>\n<p>Some key questions that the CISO should ensure can be addressed with the board include:<\/p>\n<ul>\n<li>Who is the person(s)\/organization(s) responsible?<\/li>\n<li>Do we understand the true impact of this vulnerability on our organization?<\/li>\n<li>Do we have visibility into all Java-based applications so that true risk and financial impact can be gauged?<\/li>\n<li>Do we have enough resources from tools and talent perspectives to detect, address, and remediate vulnerabilities?<\/li>\n<li>Is the supply chain affected and are there contingency plans?<\/li>\n<li>Is there a remediation plan in place? Is there a business continuity plan in the event of a disruption?<\/li>\n<\/ul>\n<p>Ultimately, the board will want to know what the short-term plan is to address the immediate <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/log4j-a-ciso-s-practical-advice\" target=\"_blank\" rel=\"noopener\">threat of Log4j<\/a>, as well as what is being done over the long term to prevent future attacks.<\/p>\n<p>Also, make sure the board understands the big picture. As Log4jshell evolves as a vulnerability and as organizations put countermeasures and mitigations in place to prevent attacks, threat actors are also working to find workarounds and new threat vectors. The impact of threat actors gaining access to your network cannot be clearly defined at this moment.<\/p>\n<p>Log4j is not a simple vulnerability. It is proving to be mutational and organizations need to be ready to address this if they want to stay ahead and be safe. Depending on the industry, the impact can range from data loss to ransomware, loss of profits, and production woes, so security leaders must have the funding and resources they need to deal with this vulnerability.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/what-cisos-should-tell-the-board-about-log4j\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s time for a reset with the board of directors. Very few have a dedicated, board-level cybersecurity committee, which means cybersecurity isn&#8217;t viewed as a critical executive function.Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/what-cisos-should-tell-the-board-about-log4j\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-45269","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What CISOs Should Tell the Board About Log4j 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What CISOs Should Tell the Board About Log4j 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-11T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt784b52dfba6f8599\/61fafa9f1b0ed22e88594a26\/Boardroom_Rawpixel_Ltd_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What CISOs Should Tell the Board About Log4j\",\"datePublished\":\"2022-02-11T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/\"},\"wordCount\":923,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt784b52dfba6f8599\\\/61fafa9f1b0ed22e88594a26\\\/Boardroom_Rawpixel_Ltd_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/\",\"name\":\"What CISOs Should Tell the Board About Log4j 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt784b52dfba6f8599\\\/61fafa9f1b0ed22e88594a26\\\/Boardroom_Rawpixel_Ltd_Alamy.jpg\",\"datePublished\":\"2022-02-11T15:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt784b52dfba6f8599\\\/61fafa9f1b0ed22e88594a26\\\/Boardroom_Rawpixel_Ltd_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt784b52dfba6f8599\\\/61fafa9f1b0ed22e88594a26\\\/Boardroom_Rawpixel_Ltd_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cisos-should-tell-the-board-about-log4j\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What CISOs Should Tell the Board About Log4j\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What CISOs Should Tell the Board About Log4j 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/","og_locale":"en_US","og_type":"article","og_title":"What CISOs Should Tell the Board About Log4j 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-11T15:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt784b52dfba6f8599\/61fafa9f1b0ed22e88594a26\/Boardroom_Rawpixel_Ltd_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What CISOs Should Tell the Board About Log4j","datePublished":"2022-02-11T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/"},"wordCount":923,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt784b52dfba6f8599\/61fafa9f1b0ed22e88594a26\/Boardroom_Rawpixel_Ltd_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/","url":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/","name":"What CISOs Should Tell the Board About Log4j 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt784b52dfba6f8599\/61fafa9f1b0ed22e88594a26\/Boardroom_Rawpixel_Ltd_Alamy.jpg","datePublished":"2022-02-11T15:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt784b52dfba6f8599\/61fafa9f1b0ed22e88594a26\/Boardroom_Rawpixel_Ltd_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt784b52dfba6f8599\/61fafa9f1b0ed22e88594a26\/Boardroom_Rawpixel_Ltd_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/what-cisos-should-tell-the-board-about-log4j\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"What CISOs Should Tell the Board About Log4j"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45269"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45269\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}