Insights: Article

Cyber from the Break Room to the Board Room

By Jon Ault

February 25, 2017

The theme for this year’s FBI National Cybersecurity Awareness Month (NCSAM)  is “Our Shared Responsibility”.  All too often, cybersecurity is viewed as an “IT problem”; however, the most effective cybersecurity programs rely on much more than technical solutions to protect an organization’s information.  In today’s environment, cybersecurity is truly a shared responsibility, across all people, processes and technology controls.  Everyone in the organization, from the break room to the board room, has a critical role to play.

Board Room Roles
According to a recent report from Taniam & Nasdaq only 10% of the high vulnerable board members felt that they were regularly updated on cybersecurity risks for their business.  (The Accountability Gap: Cybersecurity & Building a Culture of Responsibility).  The list of risks and concerns for a board seem endless; however, it is important to understand the proper roles for a board in managing cybersecurity risk:

  • Prioritize – Directing management to give cybersecurity the appropriate attention sets the tone for the entire organization.
  • Assess – Expect the organization to complete a formal assessment of cybersecurity risks, utilizing outside experts and following guidance from a proven risk assessment framework.  (Examples:  NIST 800-53 or SANS 20 Critical Controls)
  • Monitor – Establish expectations that the board will be updated on cybersecurity risk management updates on a regular basis.

 
Executive Roles
Executive management plays a critical role in establishing day-to-day priorities for an organization’s cybersecurity efforts.  Establishing cybersecurity as a critical function within the organization and assigning appropriate resources (people and budget) are critical first steps for executive management.  Specifically, executive management should take responsibility for the following in their cybersecurity risk management program:

  • Organize – Assign responsibility for coordinating your cybersecurity efforts and build security into your day-to-day processes.
  • Communicate – Act as a champion for your organization’s cybersecurity efforts.  When staff see that executive management has made cybersecurity a priority, it will naturally become a priority for everyone.
  • Prepare – Cybersecurity risk management programs are not complete if you don’t have plans in place to respond to an incident or breach in your environment.

 
Staff Roles
The list of cybersecurity threats targeting people (not technology) vulnerabilities is growing.  Everyone in an organization need to do their part to reduce the risks against phishing emails, spyware, ransomware and every other threat to an organization’s critical information assets.  Key strategies for reducing social engineering and staff-related risks across your organization include:

  • Training – Attend all available staff training events on acceptable use of company computers and resources.
  • Awareness – Pay attention to news stories about cyber-crime.  Often times just simply knowing about the latest attack methods can change an individual’s behavior and reduce risk.
  • Confirm – Think before opening attachments or clicking on links in emails, especially when they are from unsolicited sources.

As you can see, everyone in an organization plays a critical role in the cybersecurity risk management strategy.  Cybersecurity is not simply an “IT problem” and, as the NCSAM theme says cybersecurity is clearly “our shared responsibility”.  The best risk management programs take into account the right roles & responsibilities for everyone in your organization.

Latest Insights

November 15, 2018
Article
Until recently, many businesses weren’t overly concerned about sales tax. They knew they needed to collect and remit in the state in which they resided, but beyond that, their compliance burden was limited.
November 12, 2018
Article
This insight explores what dealerships can expect from the proposed section 199A regulations under tax reform.
November 8, 2018
Article
Are you a business taxpayer with annual gross receipts of $25 Million or less? If so, you may be eligible to take advantage of new Small Taxpayer Safe Harbors that could generate significant tax savings and simplify your tax returns in future years!
November 8, 2018
Article
Considered the most significant tax code overhaul in over three decades, the Tax Cuts and Jobs Act passed in 2017 includes provisions affecting both individuals and businesses.
November 7, 2018
Recorded Webinar
State and local sales tax compliance is always evolving, making it important to stay up-to-date on changes affecting your tax liability and responsibilities. This session will cover what you need to know regarding the recently enacted state and…
November 7, 2018
Article
“Why is my portfolio underperforming the market?” This question may be on your mind.
November 5, 2018
Article
Identify your implementation methodology. There are four practical expedients available. We'll explore each option.
November 5, 2018
Article
Deeper dive into ASU 2016 liquidity.
November 5, 2018
Article
There are many forms individuals and businesses need to consider as they work to comply with the ACA. Receiving and completing the appropriate form at the right time is key.