Questions Business Leaders Should Ask Themselves

PWC survey has found  that only thirty-six percent of board members have confidence in their company’s reporting on cyber security and while directors and senior management do not need to understand all the intricacies of cyber security, they do need to understand the business impact as well as the level of risks they are willing to accept. 
 
To do that effectively,  they need to ask themselves and the people whom they work with some searching questions.
 
Cyber crime is significantly increasing and it is time for the Board, directors and senior management to take more cyber security responsibility because if the organisation is hacked, they will be seen as responsible for the security breach. Cyber security should be a regular agenda item at Board meetings because directors need to gain an understanding of the cyber risks they are facing as an organisation and stay informed on a continual basis. 
 
Cyber security is a highly technical and specialised field, beyond the scope of most directors’ experience and  expertise. However, the role of the director is to ensure that their company is well prepared, has the right procedures in place and a high-quality leadership team that can respond quickly and effectively and that necessarily requires more than a basic understanding. 
 
  • The push towards digital transformation triggered by the coronavirus pandemic has only made companies’ task of protecting their data even more difficult. Recently, boards have been asking security professional for guidance on how to navigate a global pandemic with a workforce unaccustomed to working from home.
  • The rapid acceleration of digital transformation driven by the COVID disruption which has increased competition for talented, technically literate directors means getting knowledgeable talent to join the board has become harder.
  • A cyber attack will hit you when you least expect it and will probably occur in a way that you aren’t expecting. It is also important to recognise that the instigators of cyber attacks are typically sophisticated and well-organised criminals running lucrative businesses.

The key questions that directors should assure themselves they can answer in the event of a major breach. 

Is There A Comprehensive Cyber Security Strategy?    How confident are we that our company’s most important information is being properly managed and is safe from cyber threats? Do directors receive regular information from IT on who may be targeting our company, their methods and their motivations? 

How Are Cyber Attacks Detected And Responded To?     It’s great to know that all your business and customer information is secure but the board of directors would also want to know that there exists a plan of action whenever something gets compromised.  Without a doubt, data loss is seriously detrimental to any business and at times leads to its downfall also. That is why, the management would want to make sure that data backup and recovery plans are correctly put to place so that in case of an information breach, the business has the opportunity to fight back and thrive.
 
Are Accountabilities Clear?   Is there a defined process that identifies who does what when an incursion happens?  Have you confirmed that the business has escalation procedures in place and that these are up to date? How do you manage third-party cybersecurity risks    
 
Do You Have External Help You Can Call On When Attacked? Does the company’s commercial relationship with them guarantee timely access? Does your business have a war room environment ready to go when you are attacked? And do you understand what it can and can not do?
 
Can You Manage Reputational Damage?   Who Is The Public face of the business when you need to communicate a breach?   What is the company’s philosophy about paying a ransom if you are hit by a ransomware attack. What determines the decision to fight or pay?  
 
Does Your Organisation Have Cyber Insurance?    If yes, d do you understand the terms of coverage?  As a Board member, you need to understand the scope and details of the company’s cyber security insurance policy.  Part of an insurance plan is not just to insure your physical assets from a cyber threat. Ask your team if they have the tools and infrastructure that monitor your security parameters on regular if not real-time basis.
 
Cyber attacks are the new normal and the need for cyber  security is business critical. Business leaders have to be sure that they are looking at both the worst-case and best-case scenarios and are prepared to make some compromises to ensure a secure infrastructure.
 
PWC:       CPA Canada:       appknox:     Gartner:      AFR:     Tyler Cybersecurity:     
 
Symantec:         Which 50:      McKinsey:       ramsac
 
For advice and recommendations on your organisation's cyber security needs, contact Cyber Security Intelligence.
 
You Might Also Read: 
 
Get The Best Cyber Security Audits & Training In 2021:
 
« FBI Recover Ransom Paid To Pipeline Hackers
Beware Of Credentials Phishing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Endace

Endace

Endace is a leader in network visibility, network recording and packet capture solutions for security, network and application performance monitoring.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

Eskive

Eskive

Eskive is a Brazilian cyber security awareness and education platform that empowers users and strengthens their company in the face of cyber threats.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.