fbpx
Search
Close this search box.

3 Cyber Security Discussions That Have Moved From the Server Room to the Board Room

Dual monitors with coding.
Dual monitors with coding.

By 2021, cybercrime will cost the world economy an estimated $6 trillion annually¹. No longer solely the concern of IT departments, the greatest transfer of economic wealth in history must be addressed — as a top priority — by stakeholders of businesses and nonprofits of all sizes.

Indeed, with recent earth-shattering breaches — and increased litigation against executives following privacy breaches — the subject of cyber security is finally getting added to the board meeting agenda.

To help your leadership team clearly establish your company’s cyber security stance, here are 3 conversations moving from the server room to the board room:

1. Have We Already Been Breached?

First, you must rip off the band-aid. The ethical response to the statistics (which say companies of all sizes are likely to have already experienced a breach) is to determine what data has already been exposed and to report it to the appropriate channels.

Action Item: Bring in a legal specialist and a 3rd party security auditor to examine potential breacheswith your IT department.

2. We Are Responsible.

The second point of discussion is to formally acknowledge that all company stakeholders are ultimately responsible for securing your company’s data. Former Equifax CEO Richard Smith, for example, claimed a security staffer failed to complete their responsibilities—this attempted blame shifting is now being thoroughly evaluated by the federal judicial system.

Action Item: With the input of a cyber security consulting firm, renew your chain of responsibility and  implement new weekly reports and check points for increased accountability. Consider designating a board committee to oversee cyber security matters.

3. How Will We Detect and Respond to Future Attacks?

The final point of conversation won’t be limited to a one-time discussion. Evaluate the strength of your essential cyber security practices, personnel, and partners.

Action Item: Document your methodology for detecting and responding to future attacks, ensuring that all vectors of cyber attack are accounted for.

Creating a Unified Response

Before initiating these conversations in the board room, you may need to discuss the real risk posed to companies like yours. We suggest reviewing  Verizon’s 2018 Data Breach Investigation Report to see how companies in your industry are being targeted by hackers.

To provide your executive team and board of directors with an overview of your company’s security policies and risks, consider a Security Framework Assessment. An executive report provided by an unbiased, third-party auditor can take board room conversations and translate them to actionable insights.

Still have questions, comments, or feedback? Email us and one of our Cyber Security Advisors will reach out to you.

¹https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

Business IT Support - 17 real-life examples - Corsica Technologies

Business IT Support: 17 Real-Life Examples

Who’s going to support your business’s IT systems? If you don’t have people on staff, or if your existing staff can’t cover all your needs, you may choose to work with an MSP (managed IT services provider). This type of

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.

Ready to talk to an expert?

We’ll respond within 1 business day, or you can grab time on our calendar.