Skip to main content

Preparing for a Boardroom Discussion - Expect the Expected

April 08, 2015

One of the roles of the Office of the CISO for Accuvant and FishNet Security is to inform and provide practical guidance about information security risk management. On most days, the individuals with whom we interact are information security practitioners and other IT leaders. Increasingly, the topic of our discussions has been how to prepare for an audit committee or board-level meeting. 

While it is not a substitute for direct advice from your colleagues, especially those who have presented to their boards, one of the simplest things you can do to prepare for a board-level discussion is to read the cyber-risk guidance provided by the National Association of Corporate Directors (NACD). If you are not familiar with this organization, the NACD is an independent, not-for-profit whose mission is to deliver insights and resources to enable its more than 15,000 members to effectively address complex business challenges such as cyber-risk. In addition to research, the NACD provides director education programs and national peer exchange forums to promote director professionalism, ultimately enhancing the economic sustainability of the enterprise and bolstering stakeholder confidence. 

The Cyber-Risk Oversight Handbook, a 25-page document prepared in collaboration with NACD, AIG, the Internet Security Alliance and security thought leaders, is a basic ‘how-to manual’ for preparing for an executive or board-level conversation. This guidance defines five key principles that serve as a starting point for conversations to enable board members to better perform their role in providing effective guidance (oversight). This document is a basic roadmap that will help a board member assess whether an organization’s cybersecurity strategy is appropriately managed given the strategic mission and the realities of the business ecosystem in which it operates. 

The five principles are:

  1. Directors need to understand and approach cyber security as an enterprise-wide risk management issue, not just an IT issue. 
  2. Directors should understand the legal implications of cyber risks as they relate to their company’s specific circumstances. 
  3. Boards should have adequate access to cyber security expertise, and discussions about cyber-risk management should be given regular and adequate time on the board meeting agenda.
  4. Directors should set the expectation that management will establish an enterprise-wide cyber-risk management framework with adequate staffing and budget.
  5. Board-management discussion of cyber risk should include identification of which risks to avoid, accept, mitigate, or transfer through insurance, as well as specific plans associated with each approach.


At face value, these principles seem simple enough. Therefore, implementing an information security program and being prepared to address the board should be relatively easy, right? Let us say this with great gusto and in all caps: NOT SO FAST. The NACD cyber-risk guidance along with the other articles and material referenced on their website requires heavy lifting. To address these principles the security leader will need to work collaboratively with key stakeholders in the organization as well as establish a strategy that identifies the crown jewels; and it must be appropriate given the risk appetite of the organization. We have read this document numerous times and each time seem to learn something new about what a board member might expect to discuss. 

As part of doing your research, before you go into a board meeting you should also have a full understanding of the below questions.

  • Who is the audience?
  • Who might be influencing the board and their questions?
  • What frameworks are we following and what does it matter to the board?
  • What are leading practices for cyber security, and where do our practices differ?
  • How do I establish myself as the board’s go-to expert?

To be blunt, preparing for a board-level discussion is not like studying at the last minute for a mid-term or even final exam. 

In closing, it is not uncommon for companies to seek board members who have experience with information risk and security. We know several companies where board members include the CEO of an insurance company, the CEO of an information security company and a former CISO. If you have not already read the guidance, we highly recommend you take the time to do so. If you have read the guidance, and you believe that you can address the sample questions posed above, congratulations! If you think you might have some more work to do in order to prepare for a board-level discussion, we suggest starting now. 


    James Robinson

By: James Robinson

Vice President, Third-Party Risk Management

See More

Related Blogs

March 08, 2018

Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks

In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security strate...

See Details

October 01, 2014

CISO Perspective: Successful Secure Application Development

Organizations must focus on many areas within the business to ensure corporate data and assets are secure. Even though there are competing priorities,...

See Details

November 12, 2014

Empowering the CISO

A security-focused business culture can empower the CISO to effectively perform their job, and allow them to become a respected member of the “C” leve...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

RELATED INSIGHTS

November 12, 2014

Empowering the CISO

A security-focused business culture can empower the CISO to effectively perform their job, and allow them to become a respected member of the “C” leve...

See Details

June 20, 2018

Information Risk Management

Optiv Security helps you evaluate current practices, identify needs and gaps and map your security goals to business objectives.

See Details

November 07, 2017

GDPR Part 3: GDPR and the Information Security Program

In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security progra...

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.