Вы находитесь на странице: 1из 12

REPORTING

CYBERSECURITY
TO THE BOARD

A CISOS GO-TO GUIDE

REPORTING
CYBERSECURITY
TO THE BOARD
Page 1
INTRODUCTION

INTRODUCTION
Ten to 15 years ago, a board of directors would meet once or
twice a year to be briefed on cybersecurity, check the box,
and move on. Back then, cybersecurity was little more than an
afterthought.

After Targets 2013 data breach, In this guide, well arm you with
advisory firm Institutional Shareholder information to help you before, during,
Services recommended that seven of and after your next board presentation.
the 10 board members be replaced for Along with giving you best practices
failing to adequately oversee cyber on objectives and presentation style,
risk as part of their duties.1 This report well explain how to select and discuss
signaled a major shift in corporate cybersecurity metrics. Whether youre a
cybersecurity policy. Since then, theres CISO, a member of a security team, an
been a heightened interest in securing advisor, or a board member yourself, this
a companys data, and more senior- information is critical to your companys
level responsibilities for cybersecurity sustained security posture.
are in place.

http://www.bloomberg.com/news/articles/2014-05-28/target-investors-should-replace-seven-directors-iss-says
1

REPORTING
CYBERSECURITY
TO THE BOARD
Page 2
COMMUNICATING WITH THE BOARD

COMMUNICATING WITH THE


BOARD: A PREFACE
One of the CISOs primary roles is to convey information about
cyber risk to the board of directors. But to do this effectively,
the CISO needs to be able to convey security risks in business
terms and help the board understand how cybersecurity
impacts the company directly.

The board has to think about many lead to fines, lawsuits, reputational
angles in regard to cybersecurity: damage, and even termination.

 Regulation: Are we meeting our But while many board members want to
regulatory requirements? be focused on cybersecurity, they may
 Fiduciary duty: Are we acting feel completely mystified by the topic.
appropriately with regard to Many dont have the background they
cybersecurity for our customers and need to talk about it with confidence or
shareholders? cant give it the time it needs.
 Company liability: If we perform
poorly in cybersecurity, how does The CISO needs to be able to
it affect our business performance communicate that you cannot prevent
overall? all bad things from happening to your
 Personal liability: If we perform network or your databut the damage
poorly in cybersecurity, how does it can be mitigated through taking the
affect my position as a CISO? right steps. The board should be more
focused on eliminating catastrophic
All in all, the primary question remains: damage and less focused on worrying
Are we taking the right actions to that something might happen to the
be secure? Todays board member network.
understands that a data breach could

REPORTING
CYBERSECURITY
TO THE BOARD
Page 3
BEFORE & AFTER YOUR PRESENTATION

BEFORE & AFTER YOU PRESENT


CYBERSECURITY TO THE BOARD
Cybersecurity doesnt start (or stop) when you enter (or exit)
the boardroom. There are several important tasks that should
take place before and after boardroom presentations.

DETERMINE WHO SHOULD marketing, for example. This type


PRESENT TO THE BOARD AND of integration can be effective to
AT WHAT FREQUENCY. demonstrate to the board that security
has been broadly integrated.
Of course, a great deal of this  Third-party presentations: At times,
determination will be based on the consultants are brought in by the
structure of your organization. And board of directors, the general
while these may be things youve counsel, or the CEO to provide an
already determined, they might be external perspective. This individual
worth revisiting. may actually be helpful to you as the
CISO, as they may be able to use their
 Presenting solo: If youre given experience in your industry to help
a very limited amount of time for with benchmarking. When third parties
your presentation, it may be best are brought in, the board typically
to cover everything on your own. wants to know if the company is
Furthermore, some boards like performing well or not relative to other
reports to come from the head of a organizations.
department only. Either way, make
sure youre comfortable handling The frequency at which you present to
the presentation on your own if the board is always determined on a
necessary. case-by-base basis. You could present
 Co-presentations: Sometimes quarterly, bi-annually, or annually,
you may present with the head depending on your company culture,
of compliance or the director of industry, and a number of other factors.

REPORTING
CYBERSECURITY
TO THE BOARD
Page 4
BEFORE & AFTER YOUR PRESENTATION

ESTABLISH THE ROLE OF THE The best way to establish the role of each
BOARD DURING AN INCIDENT. board member during a cybersecurity
incident is to practice. By running a
Your first goal should always be to tabletop exercise before a breach occurs,
prevent and detect security breaches youll be able to prepare board members
but you wont be able to stop them for what their role will be. Its important
all. This is just a part of the threat that everyone in upper management
landscape today. Its important to adopt knows how to respond and that plans are
a mentality of not if, but when. So you in place for notifying law enforcement,
need to be sure that everyone on the forensics firms, customers, and investors
board knows what to do if a breach to help deal with potential financial and
does occur. reputational harm.

Not all board members need to be


directly involved during a breachjust
By running a tabletop one member of the board, the CEO, and
exercise before a their team will suffice. The rest of the
breach occurs, youll be board members should have assigned
able to prepare board responsibilities and objectives to be
members for what their working on. After walking through these
role will be. tabletop exercises, you (and your upper
management) will feel ready to take care
of a problem right away.

This is not an implementation that


should be set in place during the first
breach your organization encounters.
If you wait for that, youre going to
experience mass confusion and
frustration.

REPORTING
CYBERSECURITY
TO THE BOARD
Page 5
DURING YOUR PRESENTATION

DURING YOUR CYBERSECURITY


PRESENTATION TO THE BOARD
You need to know how to present this information. What tone
will you take? What are your primary goals and objectives?
And most importantly, what will you actually present that will
prepare the board with the information they need to know?

Youll need to determine both your To that point, the board will want to know
goals and presentation style as well as if youre just checking boxes or if there
the content of your presentation. Lets is an actual strategy in place. If there is a
start with the former. strategy in place, theyll want to know the
exact steps youre taking to achieve
GOALS & your goals.
PRESENTATION STYLE

What The Board Wants


To Hear There are two
There are two categorizations the board
categorizations the
will be interested in learning about:
board will be interested
compliance and actual security. You in learning about:
and the board both know that there is compliance and
a big difference between the two. You actual security.
may be complying with a particular set
of security standards, but that certainly
doesnt mean your network wont be
compromised.

REPORTING
CYBERSECURITY
TO THE BOARD
Page 6
DURING YOUR PRESENTATION

What The CISO Should Focus On

Now you know what the board is ...it is your responsibility


looking forso what should you focus to be fully aware of
on during the presentation? the risk tolerance
the board is
 Resonance: Making sure the comfortable with.
material youre presenting resonates
with the board is imperative.
Tip: Consider looking at recent
breaches in your industry and
running through how your Building Credibility With
company would have fared in The Board
each particular situation. This will
make the threats real and will Tip #1: Make sure the board understands
put them in perspective. youre there to support the business
 Transparency: The board and that the cybersecurity protections
needs to know flat out how the necessary are in place to protect
company could be affected by its the organizations ability to function
cybersecurity posture. Cybersecurity appropriately.
is a company-wide issue, so the
board should see how it could Tip #2: Let the board know that youre
potentially impact every aspect of there to help facilitate decision-making to
business. determine what the risks are and how to
 Boundaries: It is not up to you as mitigate them.
the CISO or CIO to determine what
risks the company is willing to run,
but it is your responsibility to be
fully aware of the risk tolerance the
board is comfortable with.

REPORTING
CYBERSECURITY
TO THE BOARD
Page 7
DURING YOUR PRESENTATION

Tip #3: Find one member of the board need to be prepared to share that
who is willing to be your champion. information with the board.
This individual should be interested in
learning about cybersecurity and willing Presenting threats is a great way to
to spend time on this topic outside show that youre paying attention to the
board meetings. You cant educate the health of the company and lends to your
entire board on every topic, so this credibility. But you need to be able to
person will help you establish credibility show the board that this information is
with the other board members. real and could very potentially make a
marked impact on the organization.
Tip #4: Create a cybersecurity or IT
committee. Even better than having Tip #1: Dont spend time trying to
one champion is having a whole group! explain who (or what) may pose a threat.
If there are enough board members Cybersecurity is dynamic and is always
interested, feel free to have an open changing and evolvingso frankly, that
dialogue about security at all times. isnt relevant.

Tip #5: Talk to the board in their Tip #2: Address the issue, and get right
languagecut out any cybersecurity to discussion about mitigation. Dont just
jargon. Talk in terms of risk present a problembring a solution.
management, stock price, and bottom
line. Tip #3: Provide the board with actionable
insights backed by data. (Well discuss
Presenting Threats To The Board what those metrics might look like next.)

As a CISO, youre concerned with


gathering threat intelligence information
using a variety of methods. When
youve gathered information about a
credible threat or threat actor, youll

REPORTING
CYBERSECURITY
TO THE BOARD
Page 8
DURING YOUR PRESENTATION

METRICS: HOW TO SELECT & a quarter or yearmaybe four or five in


PRESENT THEM each category below. Begin introducing
them to the board, and track their success
Knowing the best practices on how to during the year. Four quarters later, when
present cybersecurity to the board is the board is comfortable seeing those
one thingbut without substantive data, metrics and their result over time, you can
you wont have a very compelling (or add another few.
helpful) presentation.
There are two broad categorizations
The first thing you need to keep in of cybersecurity metrics that you
mind regarding metrics is context. might present to the board: audit and
Board members likely dont know compliance metrics and operational
what it means if you say that 500,000 effectiveness metrics.
intrusions hit the detection system.
You need to focus on being concise Category #1: Audit &
with your explanation and show them Compliance Metrics
how the metric impacts the health
of the company. Youll want to focus Some companies have a legal
on showing metrics over time that requirement to be audited with respect to
demonstrate if youre getting better and IT security, making audit and compliance
anything that shows cause and effect. metrics highly relevant and important.
Some examples include:
Determining Which (& How
Many) Metrics To Present  Are we ISO-27001-compliant?
 Do we have a vendor risk
Remember, the board doesnt have the management program?
time to learn about every metric you
track. The metrics you select should
provide context, gain traction, and tell a
story.

Tip: We suggest beginning with a small


number of metrics at the beginning of

REPORTING
CYBERSECURITY
TO THE BOARD
Page 9
DURING YOUR PRESENTATION

 Do we have any outstanding high- Category #2: Operational


risk findings open from our last Effectiveness Metrics
audit or assessment?
This is subjective. What really These are quantitative, no-kidding, reality-
constitutes high risk? Even of-the-situation-type metrics. Operational
if you complete the high-risk metrics are backed with actionable data.
findings, something bad could Examples include:
still happen on your network or
to your data the next day.  How quickly can we remove
 What percentage of the NIST employee network access?
framework are we implementing?  How quickly can we (or our
The NIST framework has roughly vendors) identify and respond to
80 questions associated with it. incidents?
If a board member asks if youre  What percentage of our users click
doing the NIST framework, you on spear-phishing training emails?
might say, Today were doing Its very common for IT security
60% of it. teams to send out fake phishing
emails to employees. If the
Tip: Youre likely going to be asked employees click on them, a
by the board about some audit and screen may pop up and explain
compliance metrics, so there are good that what theyve done is a major
reasons to be prepared to talk about security issue. From an operational
them. But as a CISO, you also need to standpoint, this metric gives your
be able to pivot and say, These are team some real insight into internal
important questions, but they dont security practices.
tell you what is actually happening
in regard to cybersecurity. And that
is where operational effectiveness
measures come in.

REPORTING
CYBERSECURITY
TO THE BOARD
Page 10
DURING YOUR PRESENTATION

 How did we compare to our peers How & When To Give Additional
across X time span? Details
BitSight Security Ratings allow
you to easily compare your Keeping your metric explanation brief is
performance to a number of idealbut some members of the board
your competitors over a period may want to go deeper. This is where
of time. The image below shows an appendix comes in handy. With an
the graphic comparison you appendix, you can easily tell the board
could generate for your board members to flip to a particular page for
with the click of a button. more detailed information, which they can
review during or after the meeting.

Tip: Any metric that doesnt merit a


yes/no or red, yellow, green status-
indicator answer should be accompanied
by a visual. For example, the peer
benchmarking example we showed
on the left demonstrates a dynamic,
performance-based comparison over time
and is very helpful for the board.

The portfolio level view in the BitSight


Security Ratings portal.

REPORTING
CYBERSECURITY
TO THE BOARD
Page 11
IN REVIEW

IN REVIEW
Cybersecurity has only recently come into the spotlight for
boards. Today, it is considered a critical aspect of company
operations by the board of directors.

The modern CISO must be able to make


the case for how cybersecurity impacts
their business directlyand one of the
most effective ways to accomplish that
is through data. This is where BitSight
can help.

If you want to see how BitSights


Security Rating platform can monitor
your (and your vendors) cybersecurity
performanceand give you the tools
you need to create compelling metrics
at the click of a buttonrequest a free
demo today.
REQUEST FREE DEMO

REPORTING
CYBERSECURITY
TO THE BOARD
Page 12

Вам также может понравиться