As A Business Leader, You Must Manage Cyber Risk 

Cyber attacks are a key risk for boards and happen more often than people think. Such criminal acts usually make the headlines when they involve large data breaches or significant public disruption. The extensive use of technology in every facet of the business world urgently calls for security solutions that keep corporate networks and user data safe. 

Cyber crime is carried out using tactics such as stealing access credentials and infecting systems with malware, ransomware and phishing – poses a threat to data, processes, systems and customers. Even worse, cyber criminals might initiate a breach and exploit the incident by shorting the shares of their victims. Cyber security is therefore increasingly important for Directors.

Addressing cyber risk is a challenge for nearly any company and its board. Cyber is a complex, technical area with emerging threats occurring almost weekly. Most board members are not cyber experts, yet boards have an obligation to understand and oversee this significant risk. They need active engagement with leadership, access to expertise, and robust information and reporting from management. 

While some companies are keeping pace, many are working to upgrade their infrastructures and can miss key gaps in cyber security. The latest spate of ransomware attacks across large enterprises with deep pockets and public agencies suggests no one is immune. As cyber security is becoming a major focus in many corporate boardrooms, the growing threat of ransomware and systemic risks facing corporations today are making it an even more critical topic. 

Any director seeking to add value to corporate stakeholders should have an appreciation for this growing risk. 

As the US Securities and Exchange Commission (SEC) about to publish new regulations requiring publicly traded corporations to document their risk mitigation measures and name who on the board is a cyber security lead, we expect all boards will be revisiting the optimal ways to manage cyber risk. Corporate Directors should not wait for final rules from the SEC to start gap analysis on how the corporation is managing cyber risk. 

Some steps that can be taken right away:

  • Boards should be talking with management now to make sure there is clarity on current corporate processes and procedures for incident response and for cyber risk mitigation governance. A gap assessment should be conducted to assess the difference between best practices and current corporate practices.
  • All directors should seek to understand and mitigate cyber risk by leveraging expert advice from experienced risk management professionals. External advisors can rapidly evaluate board expertise relevant to the cyber security qualifications and can recommend additional training for the full board or the board designated cyber expert.
  • Every business is different. The threat to your business needs to be contextualised to be mitigated. For most large complex organisations this will probably mean convening a strategy session with key leaders from across the organisation where the new nature of the threat can be discussed. which leads to the next key recommendation, this needs to be treated as a business issue not just a security issue.
  • Ensure planning involves business leadership, not just IT and Security. Cyber attacks against the nation’s infrastructure and against infrastructures of other nations where your business or suppliers operate are issues for all leaders, not just cybersecurity and technology leaders. Leaders should examine topics of business resiliency and disaster response with an attitude towards long term business survival and support actions that will enable improved overall business resilience.
  • Many boards will decide to form cyber security committees so a few designated board members can work issues with management outside of board meetings.
  • Monitor execution, especially on actions requiring people to think differently. The cyber threat is so different it may be cause for actions many organisations never planned for.  For example, organisations may need to rapidly learn to use new “out of band” secure communication systems for executive communications and for communications with staff and all employees. 
  • Organisations may even need to revert to manual paper copy interactions with suppliers, banks and other stakeholders. Boards may need to meet and exercise governance without access to online data of any sort. 

Understanding Cyber Security

Above all, a board of directors must understand that cyber security is a dynamic discipline that requires unending monitoring and innovation. Laying the groundwork for reduced risk is essential but so is the knowledge that risk will always be there. Companies should also assess their existing insurance policies, whether they adequately cover asset value in the event of a breach, and if dedicated cyber insurance may help further mitigate risk. 

No matter the size of your insurance policy, leadership must remain involved and educated in cyber security for the business and prepare policies and procedures in the event of a breach with an eye toward responsibility.

Business leaders need to take action to keep informed of emerging cyber security, geopolitical and technological developments that contribute to systemic risks and that you check the links below and sign up for Cyber Security Intelligence’s Directors Report series, exclusively available to premium subscribers (below).

ZScaler:      IMD:     PWC:   Corporate Governance Institute:     Dataminr:     Oodaloop:  

You Might Also Read: 

Wanted - A New Generation Of Cyber Security Leaders:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Soft Cell Hackers Have New Targets
Selling Digital Insecurity »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

ETI-NET

ETI-NET

ETI-NET is the worldwide leader in managing critical data for industries that never stop.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike is a company based in Tirana that offers full service in the field of cyber and physical security.