No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Cybersecurity – The New Normal for Boards

by Avani Desai
January 4, 2016
in Cybersecurity
Cybersecurity – The New Normal for Boards

According to Symantec in their Internet Security Threat Report 2015, there were 317 million new pieces of malware released in 2014, as well as 348 million identities exposed. In a report by security specialists Cyber Edge Group in 2014, across the U.S. and Europe, 71 percent of industries surveyed had suffered a successful cybersecurity attack. And with these increasing threats come increasing costs. The price of a cyber breach can be staggering, as shown in a report by HP and the Ponemon Institute on the Global Cost of Cyber Crime, with the average cost of a security breach being $12.7 million per organization, a rise of 96 percent in 2014.

These types of figures have placed cybersecurity firmly on a seat at the Board of Directors table.

Cybersecurity issues are a companywide problem. They affect not only finances, but also the reputation of the company and the Board members themselves. One of the most high-profile cybersecurity incidents in recent years, the Target breach, has resulted in their Board members facing a lawsuit for being negligent in their fiduciary duties of care of internal processes and protection of consumer data (Civil Action No. 0:14-cv-00266-PAM-JJK).  Lawsuits aside, company reputation is often adversely affected by a cybersecurity attack and having to “clean up” afterward is also costly, as exemplified by the recent decision to do a multi-state investigation into JPMorgan’s compliance structure after the company suffered a major data breach in 2014 – something which will be very costly in terms of personnel requirements and general costs for JPMorgan.

This current sweep of data security issues and non-compliance by the law courts has sent ripples through all industries, and according to law firm Akin Gump Strauss Hauer & Feld, “Cybersecurity oversight is the second most important topic for Boards in 2015 — just behind strategic planning.”

But to be insightful in how to tackle an ever increasing cybersecurity threat landscape, cybersecurity and compliance need to be communicated effectively to Board members who may well not specialize in this area. Approaching the often complex arena of cybersecurity and compliance means you need to have a logical approach that’s informative and offers resolutions. Some ideas of where to start in talking to the Board about these issues include:

Defining the Threat

“There are only two types of companies.  Those that have been hacked and those that will be.”  — Robert Mueller, FBI Director

Definition is the most important aspect of communicating cybersecurity and compliance issues to the Board. As with anything in business or life, clarity is key.  To gain a clear picture of the problem at hand, determine the threat landscape for your company; this will be central to your discussion.

Board members are interested in certain areas. They need to understand the risk to the company itself from cyber threats. This needs to be done in clear and understandable language. This is not the time for technical detail. To communicate your company’s cybersecurity efforts, use terms Board members are likely to understand, and ask questions that they see an interest in. Questions which can set the scene for creating this landscape are:

  • An overview of the current trends in security, including the security threat landscape and security tool availability. Use your imagination and make this overview accessible to a non-technical person.
  • What is the business risk to the company? Perhaps use a traffic light system or similar to highlight the criticality of each risk area.
  • What could have the most significant impact on the company’s revenue stream?
  • What areas within the company are protected?
  • Does your company have cybersecurity insurance?
  • Has the company addressed compliance standards and laws surrounding privacy and security of data, including SOC examinations, ISO 27001 certification, PCI-DSS validations and HIPAA assessments? Noncompliance can result in fines and even imprisonment for directors.
  • What areas are vulnerable? This should include discussions around insider threats and employee education on cybersecurity.
  • Will the company brand be adversely affected by a breach?
  • How can any issues be fixed?

Providing Metrics or a Progress Report

Progress reports are vital to communicate the changing situation of security concerns and remedies within an organization. They can inform security strategy going forward. Board members are likely to want to see how the company’s cybersecurity policies are implemented and progressing. For example, if you’ve explained your company’s vulnerabilities, the Board will want to see the progress in closing off those vulnerable areas.

If possible, provide the Board with regular metrics on vulnerability scans, the network of known and authenticated devices and software or business measures. CIO Magazine suggests communicating these metrics with the Board every quarter.

The SANS Institute has an excellent paper on what type of detail should be included in security metrics for Board members.

Know the CEO

The CEO will often be the person who delivers information about cybersecurity to your organization’s Board. Keeping the CEO (or whomever relates this information to the Board) abreast of cybersecurity issues and company vulnerabilities is a vital part of the communication channel; hold regular forums where you can discuss security trends and threats.

Get Everyone Involved

Cybersecurity protection needs to be handled in a holistic manner. The problems we face as organizations when managing the challenge of security and compliance do not just fall on the shoulders of one employee or department — it’s a companywide effort, with employees across the organization playing an important role in security. When communicating this to Board members, make sure stakeholders from your legal, risk and PR departments understand their respective roles and can proficiently execute them both to prevent a breach and to mitigate the loss experienced when there is one.

Concluding Thoughts: Communication as a Form of Security Mitigation

As the cyber crime landscape continues to increase in scale and as criminals use more sophisticated and often more targeted techniques to attack our organizations, communicating effectively with the Board about security and privacy threats becomes ever more important. Cybersecurity is no longer the sole domain of the IT department; it affects the company at all levels, across all layers of infrastructure. The points outlined above go some way toward helping you develop a plan to communicate the challenges of security and compliance with your Board. Getting Board members on board with security policy and strategy will ultimately help to mitigate security breaches.


Tags: Communications Management
Previous Post

Global Trends in Anti-Corruption Legislation: Mexico to Ramp up Enforcement Activity

Next Post

Top Tips for Deterring Fraud – A Guide for Audit Committees

Avani Desai

Avani Desai

January 4 - Avani Desai headshot Avani Desai is a Partner and President at Schellman & Company, LLC, the largest niche CPA firm in the world that focuses on technology and security assessments. She is also CEO and co-founder of MyCryptoAlert, a push notification and portfolio app for cryptocurrency. Avani started her career working at a Big 4 accounting firm (KPMG) for over 10 years, where she led a team and oversaw IT risk management and privacy across national service lines. In addition, Avani managed the development of internal and external privacy programs and related practices, leveraging her deep knowledge with health care and emerging technologies, such as blockchain, cloud computing, artificial intelligence, internet of things and virtualization. Now at Schellman & Company, Avani has been focusing on growth strategies, strategic client and market development, industry analysis and new services for the last seven years.  

Related Posts

stack of newspapers on laptop

The Social Construction of a Scandal

by Michael Toebe
December 9, 2019

Do corporate execs and legal counsel truly understand the role news media plays in establishing the narrative about fault and...

woman holding smartphone with many "like" and "heart" reactions

Engaging Social Media is More Effective Risk Management

by Michael Toebe
October 25, 2019

Social media communication is a rarely implemented risk management tool, but it should get more play. Michael Toebe makes the...

black and white illustration of shark jumping out of water

The Shark in the Wave: Revealing the Lurking Danger of Slack Data

by James Murphy
June 17, 2019

Hanzo’s Jim Murphy explores the danger of Slack data; voluminous, informal, unstructured and context-dependent, it’s a threat hiding in plain...

hand holding whatsapp icon on pink background

The FCPA Compliance Challenges in Using WhatsApp and How Companies Can Address Them

by Matteson Ellis
May 13, 2019

Matteson Ellis describes what a compliance policy for ephemeral communications should look like – a concern for Latin American countries...

Next Post
Finger pointing at the word "fraud" with a strike-through

Top Tips for Deterring Fraud - A Guide for Audit Committees

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance Decision-Making DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring Ransomware RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT