Insights: Article

Cyber from the Break Room to the Board Room

By Jon Ault

February 25, 2017

The theme for this year’s FBI National Cybersecurity Awareness Month (NCSAM)  is “Our Shared Responsibility”.  All too often, cybersecurity is viewed as an “IT problem”; however, the most effective cybersecurity programs rely on much more than technical solutions to protect an organization’s information.  In today’s environment, cybersecurity is truly a shared responsibility, across all people, processes and technology controls.  Everyone in the organization, from the break room to the board room, has a critical role to play.

Board Room Roles
According to a recent report from Taniam & Nasdaq only 10% of the high vulnerable board members felt that they were regularly updated on cybersecurity risks for their business.  (The Accountability Gap: Cybersecurity & Building a Culture of Responsibility).  The list of risks and concerns for a board seem endless; however, it is important to understand the proper roles for a board in managing cybersecurity risk:

  • Prioritize – Directing management to give cybersecurity the appropriate attention sets the tone for the entire organization.
  • Assess – Expect the organization to complete a formal assessment of cybersecurity risks, utilizing outside experts and following guidance from a proven risk assessment framework.  (Examples:  NIST 800-53 or SANS 20 Critical Controls)
  • Monitor – Establish expectations that the board will be updated on cybersecurity risk management updates on a regular basis.

 
Executive Roles
Executive management plays a critical role in establishing day-to-day priorities for an organization’s cybersecurity efforts.  Establishing cybersecurity as a critical function within the organization and assigning appropriate resources (people and budget) are critical first steps for executive management.  Specifically, executive management should take responsibility for the following in their cybersecurity risk management program:

  • Organize – Assign responsibility for coordinating your cybersecurity efforts and build security into your day-to-day processes.
  • Communicate – Act as a champion for your organization’s cybersecurity efforts.  When staff see that executive management has made cybersecurity a priority, it will naturally become a priority for everyone.
  • Prepare – Cybersecurity risk management programs are not complete if you don’t have plans in place to respond to an incident or breach in your environment.

 
Staff Roles
The list of cybersecurity threats targeting people (not technology) vulnerabilities is growing.  Everyone in an organization need to do their part to reduce the risks against phishing emails, spyware, ransomware and every other threat to an organization’s critical information assets.  Key strategies for reducing social engineering and staff-related risks across your organization include:

  • Training – Attend all available staff training events on acceptable use of company computers and resources.
  • Awareness – Pay attention to news stories about cyber-crime.  Often times just simply knowing about the latest attack methods can change an individual’s behavior and reduce risk.
  • Confirm – Think before opening attachments or clicking on links in emails, especially when they are from unsolicited sources.

As you can see, everyone in an organization plays a critical role in the cybersecurity risk management strategy.  Cybersecurity is not simply an “IT problem” and, as the NCSAM theme says cybersecurity is clearly “our shared responsibility”.  The best risk management programs take into account the right roles & responsibilities for everyone in your organization.

Latest Insights

March 15, 2019
Article
An emergency fund may help alleviate the stress associated with a financial crisis.
March 15, 2019
Article
A recent FASB update will significantly affect the accounting for operating leases. Here’s a breakdown of the changes.
March 13, 2019
Article
Properly documenting opioid use in patients is critical to avoiding a denial. Here are seven strategies that should be present in every entry in a patient's health record.
March 13, 2019
Article
Think you know the difference between an email from a friend and an email from a hacker? You may be surprised to find out the answer.
March 12, 2019
Article
When fraud is suspected, analyzing your organization’s data can be difficult. A fraud examiner can help you break down the information, so you can detect and prevent questionable activity.
March 11, 2019
Article
Taxpayers and businesses dealing with first-time tax debt may qualify for relief through the Fresh Start initiative.