Business Daily Media

How to Communicate Cyber Risk to the Board

  • Written by Adam Palmer, Chief Cybersecurity Strategist, Tenable



While today’s digitally-connected world has elevated the global economy to new heights, one cannot ignore the fact that cyberattacks and data breaches have also become a frequent problem. Research has shown that cyberattacks are on the rise among organisations, with cybercrime costing the

Australian economy over $1 billion per year. The potential for cyber threats to cost organisations millions of dollars in cleanup, lost business and reputational damage clearly demonstrates the relationship between cyber risk and business risk. With so much at stake, CISOs, the entire C-suite, and the Board require insight into cyber exposure in the same way as other risks.

This practical guide will help CISOs communicate cyber risk to the C-suite and board of directors in a way that fosters a business-based dialogue for better, more informed decision making that focuses on maximising risk reduction.

Focus on critical risks

There’s a tendency to mistakenly follow a traditional “check-the-box” approach to addressing every risk. This is akin to chasing your own tail because it provides no visibility of actual risks and consumes valuable resources and time on vulnerabilities that have a low likelihood of being exploited.

Mature organisations have evolved from this archaic approach toward risk-based vulnerability management. Utilising threat intelligence, vulnerability research, and probability data allows a CISO to focus on critical risks. These are vulnerabilities that are actually at high risk of being exploited.

A 2019 study by McKinsey Consulting found that risk-based vulnerability management allows companies a potential risk reduction of 7.5 times above their original program, at no added cost.
                                                                              
Present the board with clear answers

Let’s be honest, when the C-suite or board of directors asks a CISO, “How secure are we?” the last thing they want is a long-winded answer. They expect insight into cyber risk in the same way as other operational areas, and with the same accuracy and predictability. 

Therefore, this is an opportunity for the CISO to present a measurable view of the organisation’s cyber risk exposure using internal and external comparative benchmarks. Consider using concise and understandable language suitable to guide strategic leadership decision-making by the board.

Cyberattacks have the ability to destroy an organisation’s reputation or competitive advantage, both of which are critical to the health of the business. Therefore, CISOs must be prepared to effectively communicate this message to the board and clearly explain how this risk is being addressed across the business unit, asset, and geo-location.

Channel resources appropriately

An effective CISO should measure success by risk reduction, not milestones or tool deployment. In a crisis, it is critical to know what controls are really effective. Demand assurance that the security team is focused on identifying and reducing critical vulnerabilities that pose a business risk.

Remediation actions should be prioritised to reduce the organisation’s cyber exposure. A CISO should drill down into specific vulnerabilities or assets to identify and support controls that are more effective and truly reduce risk.

Make cybersecurity risk management a living strategy

Consider meeting with the C-suite frequently to review risk priorities and strategy. Without a solid internal governance structure, organisations will have trouble building any success. 

Oversight of security may be led by the CISO, but the entire C-suite should drive a cross-team leadership approach. Security is a team effort and a moving process. It is linked to every part of business operations and therefore requires a cross-team governance structure to support the program and resolve critical decisions.

This also assures that the security strategy will be a flexible, living strategy, with critical internal leadership support. Utilise the insights from a risk-based vulnerability management approach to adjust strategy and investment based on critical vulnerabilities that pose the greatest business risk. 

Successfully get ahead of attackers

In the fast-moving environment of cybersecurity, where the entire business may be at risk,  organisations need to understand where to focus resources and investment to maximise their cyber risk reduction. At the same time, C-suite and boards of directors require a means to objectively measure cyber exposure. This should be in non-technical terms and allow business leaders to understand how they compare to their industry peers or other organisations with best-in-class security.

Adam Palmer, Chief Cybersecurity Strategist, Tenable

Business Daily Media Business Development

How Microsoft's Activision Blizzard takeover will drive metaverse gaming into the mass market

Ready Player 1,000,000,0001?Sergey NivensMicrosoft was positioning itself as one of the pioneers of the metaverse even before its US$75 billion deal to buy online gaming giant Activision Bli...

Theo Tzanidis, Senior Lecturer in Digital Marketing, University of the West of Scotland - avatar Theo Tzanidis, Senior Lecturer in Digital Marketing, University of the West of Scotland

Some of the super-rich want to pay more tax – but society cannot afford to depend on them

Shutterstock/PilgujDemands for the super wealthy to pay more taxes are not new. But they don’t usually come from billionaires or millionaires.Yet on January 19 2022, around 100 of the ...

Peter Bloom, Professor of Management, University of Essex - avatar Peter Bloom, Professor of Management, University of Essex

A killer app for the metaverse? Fill it with AI avatars of ourselves – so we don't need to go there

Ready avatar one?Athitat ShinagowinBig numbers coming. Microsoft’s US$75 billion (£55 billion) acquisition of Activision Blizzard has landed – true to Call of Duty vernacul...

Alex Connock, Fellow at Said Business School, University of Oxford, University of Oxford - avatar Alex Connock, Fellow at Said Business School, University of Oxford, University of Oxford

Labelling Equipment; Prayers Have Been Heard and, Answered

If you are an instrumental part of a management team for a business that now requires labels for their products or goods, then traditionally you’d have had one of three choices, if the...

Business Daily Media - avatar Business Daily Media

Leading Australian Microsoft partner Satalyst acquired by Canon

Satalyst, one of the leading Microsoft cloud and security partners in Australia, has today announced that effective immediately it has been acquired by Canon Australia. Satalyst will joi...

Business Daily Media - avatar Business Daily Media

How Timeline Maker Helps Business Owners On Their Targets

With many businesses today, the challenge is to make the audience know what you are all about. You can never go wrong with a website or an online presence for it is one of the most effecti...

Business Daily Media - avatar Business Daily Media



NewsServices.com

Content & Technology Connecting Global Audiences

More Information - Less Opinion