fbpx
Search
Close this search box.

3 Cyber Security Discussions That Have Moved From the Server Room to the Board Room

Dual monitors with coding.

By 2021, cybercrime will cost the world economy an estimated $6 trillion annually¹. No longer solely the concern of IT departments, the greatest transfer of economic wealth in history must be addressed — as a top priority — by stakeholders of businesses and nonprofits of all sizes.

Indeed, with recent earth-shattering breaches — and increased litigation against executives following privacy breaches — the subject of cyber security is finally getting added to the board meeting agenda.

To help your leadership team clearly establish your company’s cyber security stance, here are 3 conversations moving from the server room to the board room:

1. Have We Already Been Breached?

First, you must rip off the band-aid. The ethical response to the statistics (which say companies of all sizes are likely to have already experienced a breach) is to determine what data has already been exposed and to report it to the appropriate channels.

Action Item: Bring in a legal specialist and a 3rd party security auditor to examine potential breacheswith your IT department.

2. We Are Responsible.

The second point of discussion is to formally acknowledge that all company stakeholders are ultimately responsible for securing your company’s data. Former Equifax CEO Richard Smith, for example, claimed a security staffer failed to complete their responsibilities—this attempted blame shifting is now being thoroughly evaluated by the federal judicial system.

Action Item: With the input of a cyber security consulting firm, renew your chain of responsibility and  implement new weekly reports and check points for increased accountability. Consider designating a board committee to oversee cyber security matters.

3. How Will We Detect and Respond to Future Attacks?

The final point of conversation won’t be limited to a one-time discussion. Evaluate the strength of your essential cyber security practices, personnel, and partners.

Action Item: Document your methodology for detecting and responding to future attacks, ensuring that all vectors of cyber attack are accounted for.

Creating a Unified Response

Before initiating these conversations in the board room, you may need to discuss the real risk posed to companies like yours. We suggest reviewing  Verizon’s 2018 Data Breach Investigation Report to see how companies in your industry are being targeted by hackers.

To provide your executive team and board of directors with an overview of your company’s security policies and risks, consider a Security Framework Assessment. An executive report provided by an unbiased, third-party auditor can take board room conversations and translate them to actionable insights.

Still have questions, comments, or feedback? Email us and one of our Cyber Security Advisors will reach out to you.

¹https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

Business wifi solutions and problems - Corsica Technologies

Business WiFi Solutions: Fixing Common Issues

Wifi solutions can cause headaches for IT. Along with IT services, wifi is essential to support the business, yet it often suffers from various issues. Dropped connections, low signal strength, and interference directly hamper employee productivity—making reliable wifi a business-critical

Read more
Cloud Cost Optimization - 4 Strategies to Win - Corsica Technologies

Cloud Cost Optimization: 4 Strategies To Win

Cloud is all the rage in IT infrastructure—but it gets expensive. Fast. If you don’t break out of legacy thinking, you can lose your shirt on cloud systems. That’s the case whether you’re managing those systems in house or outsourcing

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.