Tag Archive: Cybersecurity

Cyber Savvy: Five Imperatives for a Technology Executive Whose Time Has Come

Published by

Last month when NACD joined the Global Network of Director Institutes (GNDI) to convene a “cyber summit,” the 200-seat event filled quickly with the key to the future: people—namely directors, chief executives, and information executives empowered to build corporate value and form a powerful bulwark against information destruction.

blog image 1
As information technology – including especially cyber security – rises as a board-level priority, the solution for addressing it is talent. Not every board can have a cyber expert, but today directors are all the more eager to hear from IT executives, and to consider them for ever-higher posts of company leadership. Chief technology officers, chief information officers, and chief information security officers form a “cyber-C-suite” that can make a critical difference in companies’ futures.

Board Priorities

Every year NACD surveys corporate directors to find out their views on a number of issues, including their “leading issues” for the coming year. NACD’s governance surveys are still in the field, but preliminary data from this year’s survey shows that information technology currently ranks 14th as a board priority; and a newly added category, “cyber security risk,” currently ranks seventh. Information technology ranked tenth in 2014 and thirteenth in 2013.

The NACD’s current survey results also show that boards are gaining more cyber knowledge. Based on responses received so far this year, 37.1 percent of respondents feel that they do not receive enough information regarding cyber security and IT risk, and 27.7 percent are dissatisfied or very dissatisfied with the quality of information of these matters. This represents an improvement in the situation. In 2014, when this was a new survey question, more than half (52.1 percent) indicated a shortage of information and a little more than one-third (35.5 percent) expressed dissatisfaction with cyber information quality.

Moreover, in NACD’s ongoing survey, 13.0 percent of respondents said their boards have “high level of knowledge” of cyber, 66.6 percent said they had “some knowledge, and 19.7 percent said they “little knowledge.” (Incidence of “no knowledge” was less than 1 percent.) These preliminary findings represent a slight improvement over last year, when only 10.5 percent of respondents claimed advanced knowledge.

Cyber Expert on Board?

So how do boards get cyber expertise? Is having an expert on board the answer? Not every board has room. After all, boards need to cover many areas of expertise with their available seats, and the typical board size is smaller than a dozen (8-11 is the range, depending on company size).

To get a handle on board talent recruitment, we asked directors what two attributes were most desirable for new director candidates to possess. The data collected thus far for the 2015 edition of the NACD Public Company Governance Survey shows that information technology ranked fifth, up from eighth in 2014 and up from ninth in 2013.

Preliminary survey findings – subject to change

blog image 2


Dos and Don’ts for Board Reports

Clearly based on the above trends, information technology experts have an open invitation to give reports to the board – an experience that can enhance any career.

If you are an information technology expert who has an opportunity to give a report at a board meeting, here are five imperatives to consider.

  • Use plain English, not jargon. Present your material in clear, actionable terms.
  • Help the board understand the quality of leadership. This is not a time to stand out as a company savior; if the CEO is not the smartest one in the room, the company has a problem. As the recent cyber summit showed, cyber security should be viewed not as a technological issue, but as an enterprise risk that is addressed like all other risks disclosed in the MD&A. As such, the CEO is the star of this show.
  • Link your comments to the company’s strategy – the more concretely the better. If you work for a public company, one of the best places to find the strategy spelled out will be in the CEO’s annual letter to shareholders. As stated in a recent NACD blog, the CIO—and/or or CISO or CTO—can play a significant a role in strategy and tactical decisions.
  • Help the board prioritize the assets that can be enhanced through IT and protected through cyber security. Companies need to assess their most valuable and vulnerable points, including the potential strengths and weaknesses of third-party contractors.
  • Show them the money! Working with your CEO and CFO, take any opportunity offered to make the business case for a strong IT function. IT and cyber expenditures may not show up on the balance sheet as assets but they are in fact investments in the company’s future and a major contributor to financial value.

If you follow these suggestions, your company, and your career, will be the better for it!


Note: Ted Sikora, NACD Research Analyst, contributed to this report.

This post was originally published on BlueSteps.

Global Cyber Summit Sends Message to Boardrooms

Published by

Corporate directors’ mindsets regarding cybersecurity fundamentally need to change. As one participant at April’s inaugural Global Cyber Summit hosted by the Global Network of Director Institutes (GNDI) noted, “We have to go from ‘is it possible we’ll be attacked?’ to ‘it’s probable;’ from ‘how much does it cost?’ to ‘how much should we invest?’; and from ‘can we control cyber threats?’ to ‘how can we keep pace?’”

In the words of another participant, “Yesterday’s approach to cyber at many companies was compliance. Today, the approach is risk management, and the imperative for the future is resiliency.” With the passage of last week’s Protecting Cyber Networks Act and National Cybersecurity Protection Advancement Act, the nation moved one step closer to greater resiliency. Both bills made clear lawmakers’ expectation that companies should share information regarding cyber breaches not just with the government, but also with each other. By sharing information about cyber hacks with peers—via information sharing and analysis centers (ISACs) or information sharing and analysis organizations (ISAOs)—and the Department of Homeland Security, companies may be able to improve their cyber defense. Experts at the summit discussed information sharing in light of the massive threat cyber-breaches pose. While information sharing is important to an effective cyber defense, corporate directors should not view it as a panacea. Instead, “it is another tool in the company’s toolbox.”

At April’s summit, the GNDI, the National Association of Corporate Directors (NACD), and the Washington Board of Trade convened more than 200 directors and cyber experts from around the world for a three-day conference to explore the board’s role in effectively overseeing their companies’ cyber defenses. Supported by AIG, the Center for Audit Quality (CAQ), and KPMG, the event provided directors the opportunity to gain insight from experts including Shawn A. Bray, director of INTERPOL Washington; Larry Clinton, president and CEO of the Internet Security Alliance; Richard Knowlton, director of the Internet Security Alliance for Europe and group corporate security director at Vodafone; Jan Hamby, rear admiral, U.S. Navy (Ret.) and chancellor of the National Defense University; Tim McKnight, chief information security officer of General Electric; and Arne Shönbohm, president of the Cyber-Security Council Germany.

Five boardroom imperatives emerged from the event:

  1. View cybersecurity as an enterprise-wide risk issue. Without a doubt, cyber-risk poses a significant threat to companies of all shapes and sizes. From the boardroom perspective, however, it should be viewed not as a technological issue, but as an enterprise risk that is addressed like all other risks disclosed in the MD&A. “Security—not merely cybersecurity—is the key.” Directors should ensure that the company is properly structured to respond to an attack and has plans for both breach prevention and cyberattack response. And don’t be complacent. As one participant at the cyber summit advised, “If you ask management how we’re doing on cyber-risk management and they say, ‘great,’ don’t accept that as an answer.”
  2. Identify your critical assets. Throughout the summit, speakers noted the interdependent nature of cyberattacks. No company is an island, so achieving a perimeter-defense strategy that attempts to protect the entire enterprise is virtually impossible. Instead, management must identify what assets, if breached, would bring the company down: the “crown jewels.” Directors should ensure that defense efforts identify and prioritize them. As part of this identification process, the company also can assess its most vulnerable points, making sure to account for third-party contractors’ potential weaknesses. If a vendor in your supply chain is hacked, are your assets still protected?
  3. Ensure adequate resources for your information technology (IT) teams. Cybersecurity should be viewed as an investment in the company’s future, not as a cost center. Panelists noted a growth in the use of a chief information security officer (CISO), separate from a chief information officer (CIO). Regardless of the leadership structure employed, however, directors must remember that cybersecurity is largely a human issue. Does the c-suite have the staff and training needed to effectively defend the company against hacks? If the company is not going to develop an internal security defense program, how will it acquire one from outside? Is the IT team staffed with both technology professionals and security experts? Broadly, the company should run ongoing employee cybersecurity education programs throughout the enterprise.
  4. De-jargon the board dialogue. The technical nature of cybersecurity can create a formidable barrier to effective board oversight. While it is critical for the board to receive reports on the company’s cyber efforts on a continuous basis, CIOs, chief technology officers (CTOs), or CISOs may deliver the reports in jargon. Panelists noted that the solution, however, is not necessarily to invite a cyber expert to sit on the board. Instead, the entire board should comprise directors who are equipped to ask the probing questions necessary for effective oversight. The board can invite experts to speak to the board on cyber issues and ask management to provide “de-jargoned” reports in clear, actionable terms.
  5. Incorporate cyber into your strategy and every business decision. Panelists stressed the need for directors to address cyber issues proactively—starting with prevention—rather than waiting to respond to a breach. To do so, cyber should be an aspect of the front-end of business decisions: strategy, legal, and financial. Does the CIO (or CISO, CTO) play a role in strategy and tactical decisions? Does the CIO have a working relationship with the IT teams at third-party vendors? In an M&A scenario, do you assess the cyber vulnerabilities of the target company? These questions can help bring cyber-consciousness to board decisions.

For more on guidance on the board’s role in cyber-risk oversight, download the NACD Cyber-Risk Oversight Handbook here. Kate Iannelli, Alexandra Lajoux, and Ashley M. Marchand contributed to this report.

What to Expect from a Security Assessment

Published by

Corey E. Thomas

As information security becomes increasingly visible and accepted as a core business function, senior executives need to have a thorough understanding of the organization’s overall security posture as well as a way to identify areas needing improvement.

A security assessment increases awareness and understanding of security issues, but more importantly, it helps key decision-makers make smart security investments by highlighting high-importance and high-payoff tasks to work on. Security assessments are not just hunting expeditions to find security weaknesses. A security assessment is a top-down analysis of existing security controls and processes. It provides an understanding of the status of each control, highlighting both the positive levels of maturity and areas of improvement based on the organization’s specific need as well as recognized best practices.

For some organizations, security assessments aren’t optional as they may be subject to one of the many governmental regulations—HIPAA, PCI, FISMA, Sarbanes-Oxley, Gramm-Leach Bliley, to name a few—which require deploying a set of security controls. Even for organizations who don’t have that regulatory stick, independent assessments help guide the organizations towards improving and strengthening internal security practices.

Getting Started

An assessment starts before the team arrives on-site. It should begin with a kick-off call to handle logistics, introduce the primary point of contact and members of the team, and to discuss the scope of the assessment. Agreeing on the scope and timeline of the assessment beforehand makes sure everyone’s expectations are met by the end of the process. Depending on the size of the organization under review, an assessment should take a few weeks to a few months.

Collect Documents

In this phase, the organization pulls together all the documentation referencing their processes, security policies, guidelines, and standards. These documents—which include network architecture diagrams, process diagrams, and workflows for specialized teams such as incident response—should be delivered to the assessment team beforehand so that the team has the opportunity to review them and identify any gaps that need to be addressed in the form of additional documentation or formal interviews. These documents help the assessor to understand the organization before scheduling the actual visit.

Having this information available to study ahead of time saves the assessment team time because the on-site time is spent on face-to-face interviews. It’s not a problem if the documents are rough and only informal materials are available, as the assessment is not evaluating how well the processes are documented.

Focus the Conversation

Having the information in advance means the team can identify the right people to set up meetings with and target the discussions specific to the organization’s environment. For example, if there are 20 areas under review, but only five of them have in-depth technical documents, the assessment team can then set up meetings to review the controls in place for those five areas, and focus the bulk of the time in conversations over the remaining 15 areas. There is no need to waste time digging into what’s already known and well-understood.

Understanding the Roadmap

When undergoing a security assessment, the organization typically is looking at the controls from a top-down perspective. The assessor is not there to perform a technical hands-on test or find out which vulnerabilities need to be patched.

After the assessment is complete, the organization will be able to identify areas needing immediate attention and will have the direction for evolving its security strategy over the next three to five years.

Security Assessment in a Nutshell

Information security is a dynamic field with rapidly changing technology and evolving threats. The number of threats is growing every day and attackers rapidly adopt new techniques. Attackers have different goals, whether they are after financial gain, espionage, blackmail, or just plain publicity. Nearly every organization—independent of size—is a target, especially as attackers piggy-back on smaller companies to reach larger ones.

Board members and executives need to become more involved in ensuring their organizations are making the right investments in people, processes, and technology to provide adequate security for the risks and threats they face. A security assessment is one of the best ways to ensure you are on the right path and give you the visibility you need.

How to Select the Right Team for Your Security Assessment

A security assessment is a critical part of understanding the organization’s security maturity and the security strategy, so selecting a trusted assessor is critical. Here are some of the things to keep in mind when interviewing a security assessment team.

  1. Look for a team comprised of individuals with a broader understanding of information security processes. These are people that understand security operations, enterprise networking, and architecture. Look for experience dealing with security applications, including security information and event (SIEM)/log management, governance risk compliance (GRC), identity access management, IDS/IPS, advanced persistent threats, antivirus, vulnerability management, and business intelligence.
  2. It’s important the assessor understands the industry, but make sure the assessor is also familiar with security topics outside the industry vertical. Not specializing in one specific sector will ensure the broadest level of knowledge.
  3. Ask to see samples of deliverables. Ensure the assessment will end with deliverables outlining a roadmap and a detailed picture of what the security controls look like. The report needs to have information that will be used at both operational and management levels. It should include action items that define relevant steps on what to do next. The final deliverable must have specific recommendations for addressing gaps or issues identified, a list of steps that need to be taken, and a timetable of when they need to be performed. Also, ask what kind of executive-facing deliverables will be available, with detailed executive summaries about the issues identified and strategic recommendations on closing the gaps.
  4. Will the team perform the assessment on-site, or remotely? There is a value to performing an assessment on-site, but there may be circumstances preventing the team from being able to conduct face-to-face conversations. Ask what the remote assessment will entail. On the other hand, be wary if the assessor insists on a large on-site team for an extended period of time. Many firms use assessments as training ground for junior staff members. This will result in a team of, for example, six assessors with an effective throughput of two or three. At the same time, you’ll be paying a premium for senior members of their team to train junior staff on your dime.

Rapid7 cybersecurity analytics software and services reduce threat exposure and detect compromise for 3,500 organizations, including 30 percent of the Fortune 1000. From the endpoint to cloud, they provide comprehensive real-time data collection, advanced correlation, and unique insight into attacker techniques to fix critical vulnerabilities, stop attacks, and advance security programs. For more information, call 866-7-Rapid7 or visit their website.