The Board and cybersecurity; is your organization ready?

How do you prepare your board to champion and adequately respond to the rising cybersecurity threat?

If the board does not take the right decisions, it lets down the organization. At the end of the day, everything goes back to the board. When something goes wrong at the organization, everyone asks where was the board.

One of the primary roles of the board is risk oversight – anticipating what could go wrong and proactively preventing it from happening. Cyber threat risk is one of the emerging risks because organizations are automating at the core and therefore increasingly exposed to high risks of cyber attacks resulting in breaches which compromise confidentiality, integrity and availability.

Unlike the traditional business models where the board would be concerned about physical safety for example money in the strong room, an attacker can now go online and get to extract details about your company through what is called footprinting or reconnaissance or intelligence techniques. The attackers get to know about your business, board members, and management team. They then craft a scheme where the organization could lose money in fictitious payments or put your critical ICT systems down. If you are a financial institution, the magnitude of the loss could be big given that services are run on ICT systems. They are several attack vectors that could exploit your vulnerabilities or weaknesses.

The board has to deliberately put cyber threats as part of risk management on the agenda. The board must discuss what are mission-critical systems, how are they automated and what threats could bring them down in terms of exploiting any vulnerabilities.

Increasingly, boards are expected to have a cyber security expert who advises them on cybersecurity hygiene or strategy or the board must continuously undergo cybersecurity training from a policy and high-level point of view. Organizations with the desire to transform their cybersecurity maturity level conduct continuous cybersecurity maturity risk assessments covering a spectrum of infrastructure, people, processes, and threat incidents, among others.

On a scale of 1 to 5, how strong or weak is the organization’s cyber security maturity? Given the state of your organization and the threats, you are exposed to, what should be your level of security? Once you understand where you are and the gap that must be closed, you can create an adequate implementation program and budget to close the gaps and vulnerabilities. This gives the board clarity and direction. Any digitization program should have a cybersecurity budget. The board needs to drive digitization securely.

A good board must continuously ask:

  1. What are the company’s critical business processes, and what assets support them? Are they cyber secure? When did we last conduct a business impact assessment? Who did it?
  2. Is our Cybersecurity strategy aligned with the business technology strategy and corporate strategy?
  3. How often do we undertake cybersecurity assessments?
  4. What is the cybersecurity budget vs the physical security budget? What is the digital value at risk?
  5. How often does the board receive cybersecurity updates? Are they adequate and comprehensive?

For more questions and board-level briefing about their Cybersecurity roles, contact Mr Strategy using any contact option on this website.

Copyright Mustapha B Mugisa, Mr Strategy, 2022. All rights reserved.


Share this



Related Articles

Annual IFIS cybersecurity event an eye-opener

The Cybersecurity and Risk Management Conference 2019, with the theme “Big Data in Cybersecurity” is the latest milestone in a series of events held

Linux still rules supercomputing

The latest Top500 list of supercomputers is out and Linux, as ever, is the top pick for the world’s fastest computers. The latest list

How government is letting the country down!

Whereas the Government of Uganda is ‘innovatively’ taxing every penny out of Ugandans, it continues to waste taxpayers’ money in poor procurement processes. Most

Lesson 3: Sorting a range on colour

Welcome back to this, a continuation from the lesson “Sorting a range on multiple columns“. Sorting data by colour is a great way to

About Author