Cyber Risk Oversight Handbook - WEB
Cyber Risk Oversight Handbook - WEB
DIRECTOR’S
HANDBOOK ON
CYBER-RISK OVERSIGHT
About NACD
The National Association of Corporate Directors (NACD) is the premier membership organization for
board directors who want to expand their knowledge, grow their network, and maximize their potential.
As the unmatched authority in corporate governance, NACD sets the standards of excellence through its
research and community-driven director education, programming, and publications. Directors trust NACD
to arm them with the relevant insights to make high-quality decisions on the most pressing and strategic
issues facing their businesses today.
NACD also prepares leaders to meet tomorrow’s biggest challenges. The NACD Directorship
Certification® is the leading director credential in the United States. It sets a new standard for director
education, positions directors to meet boardroom challenges, and includes an ongoing education
requirement that prepares directors for what is next.
With an ever-expanding community of more than 23,000 members and a nationwide chapter network,
our impact is both local and global. NACD members are driven by a common purpose: to be trusted
catalysts of economic opportunity and positive change—in business and in the communities we serve.
DIRECTOR’S
HANDBOOK ON
CYBER-RISK
OVERSIGHT
Anton Marx
Internet Security Alliance
Katie Swafford
Senior Manager, Digital and Cybersecurity Content
NACD
Dylan Sandlin
Digital and Cybersecurity Content Lead
NACD
Table of Contents
Acknowledgments 4
Foreword 5
Introduction 8
© 2023 by the National Association of Corporate Directors and the Internet Security Alliance. All rights reserved.
Except as permitted under the US Copyright Act of 1976, no part of this publication may be reproduced, modified, or
distributed in any form or by any means, including, but not limited to, scanning and digitization, without prior written
permission from the National Association of Corporate Directors or the Internet Security Alliance.
This publication is designed to provide authoritative commentary in regard to the subject matter covered. It is provided
with the understanding that neither the authors nor the publishers, the National Association of Corporate Directors and
the Internet Security Alliance, is engaged in rendering legal, accounting, or other professional services through this pub-
lication. If legal advice or expert assistance is required, the services of a qualified and competent professional should be
sought.
Cyber-Risk Oversight
3
Acknowledgments
NACD thanks the following staff (in alphabetical order) for their contributions to the creation of this
resource for board members.
Dylan Sandlin
Digital and Cybersecurity Content Lead
Larry Clinton acted as chief author of this Handbook and is president and CEO of ISA. He would like to thank the
following authors for contributing to the Principles in this handbook: Eric Forni and Andrew Serwin, DLA Piper; Nick
Sanna, RiskLens; and Andrew Cotton, EY. Authors of Tools are credited on the first page of each tool.
Contributors
(in alphabetical order by organization name)
Jen Easterly, Eric Goldstein, Matthew R. Grote, Kaiya Luethje, Vincent Noteboom, Ashok
Bob Lord, Cybersecurity and Infrastructure Security Ramkumar, Tim Solanki, Dominique Eric
Agency Varier, Kyley Weigl, and Jakob Zemba,
Meredith Burkart, David Ring, and ISA Research Assistants
Joseph Szczerba, FBI Elena Kvochko, SAP
Camille Amberger, Iselin Brady, Roman Global Investigative Operations Center
Horoszewski, Emaline Keith, Kiyo Larson, (GIOC), US Secret Service
B
usinesses around the world depend increasingly From a short-term business perspective, the financial
on technology, a digital revolution that has created impacts of the cyberattack are tolerable, though the com-
both enormous rewards and exponentially expand- pany, which finds itself in the headlines over a period of
ing risks. The cyber-threat landscape we face today is several weeks, takes a reputational hit. In the longer term,
more complex and dangerous than ever, with cybercrime however, the attack results in significant harm to individu-
expected to cost the world some $8 trillion dollars in 2023.1 als, other businesses, national economic competitiveness,
With corporate reputations and revenue on the line—and and technological innovation.
given the broader implications for our national security,
economic prosperity, and public safety—we must think
differently. We need a new model of sustainable
Consider this hypothetical—but very possible—scenario: cybersecurity. One that starts with
Imagine that a CISO at a US pharmaceutical company a commitment at the board level to
recommends that the company fund a phishing-resistant incentivize a culture of corporate
multifactor authentication (MFA) tool for all employee
cyber responsibility in which
accounts. Company leadership declines, calculating that
the enhanced MFA would be more costly than warrant- managing cyber risk is treated as
ed in the near term, based on their judgment about the a fundamental matter of good
likelihood of a cyberattack. The decision is reviewed and governance and good corporate
approved by the board. Later, when an attacker tricks a
citizenship.
user into revealing their login credentials, data is exfiltrat-
ed and systems are shut down by ransomware, with the
following cascading impacts: For decades, cyber risk was considered part of infor-
X Delayed shipment of critical pharmaceuticals,
mation technology (IT) risk, and its oversight was largely
resulting in delayed surgeries across the country delegated to engineering and security teams within an
organization. More recently, however, in large part thanks
X Theft of sensitive customer data, resulting in identity
to the five principles highlighted in previous versions of
theft and personal financial impact to millions of
this thoughtful handbook, corporate leaders have be-
customers
gun to see cyber risk for what it is: a strategic, enterprise
X Theft of critical intellectual property, eventually sold risk, which they—not their CISOs—own. Today, given our
to an overseas company owned by an adversarial complex, dynamic, and highly interconnected environ-
nation, which brings several competing drugs to ment, boards and company leadership must now consider
market years ahead of schedule, with downstream the broader picture and the critical role they play in their
effects on market share company’s and in society’s resilience.
X Over time, the US health care system begins to We need a new model of sustainable cybersecurity.
rely heavily on the overseas company for the One that starts with a commitment at the board level to
pharmaceuticals, which ultimately damages US incentivize a culture of corporate cyber responsibility in
competitiveness and its leverage in the event of a which managing cyber risk is treated as a fundamental
geopolitical conflict matter of good governance and good corporate citizen-
Cyber-Risk Oversight
5
ship, a recognition highlighted in these pages with the activity is shared proactively with expectations that
inclusion of a sixth core principle for board oversight— government will be responsive and add value, and
the need for boards to encourage systemic resilience that industry will not suffer punitive sanctions for
through collaboration. sharing.
Board members have unique power to drive such a cul- As the nation’s cyber defense agency, CISA’s goal is to ad-
ture of corporate cyber responsibility: vance a new model of sustainable cybersecurity by work-
X They should ensure that CISOs are fully
ing collaboratively with our partners to drive down risk
empowered, with the influence and resources to our nation, enabling the broader safety of consumers.
necessary to drive decisions where cybersecurity Since our establishment in 2018, CISA has been expand-
is effectively prioritized, not subordinated to cost, ing our resources and capabilities, as well as growing our
performance, and speed to market. field forces around the country. You can read more about
our offerings in Tool L, including how to have a probing
X They should ensure that their peers and the senior
conversation with your CISO so that you can better under-
executives that they oversee are well-educated on
stand how to support the cybersecurity team.
cyber risk, that cybersecurity considerations are
appropriately prioritized in every business and CISA commends NACD and the Internet Security Alliance
technology decision, and that decisions to accept (ISA) for producing this handbook. Not only is it chock-
rather than mitigate cyber risks are scrutinized and full of clear and practical suggestions that will enable an
revisited often. organization to create a modern and comprehensive
cyber-risk program, but also and more important: it works.
X They should review their company’s cyber-
As detailed within, Cybersecurity at MIT Sloan found that
risk management framework and ensure the
adopting the measures featured in this handbook would
development of a common set of standards which
materially reduce cyber events without significantly in-
their businesses can use to determine and measure
creasing cost. Separately, this handbook is clear evidence
their exposure to cybersecurity risk.
that robust public/private operational collaboration is the
X They should ensure that the thresholds for reporting pathway to creating a sustainably secure cyber ecosys-
potential malicious activity to senior management tem. In this fight, we are all on the same side and must
are not set too high; rather, they should be briefed work together.
on “near misses” as well as those intrusion attempts
Safer and more resilient critical infrastructure is possible,
that succeed, as such near misses are among the
but it requires us to take deliberate ownership for our col-
most important signals to assess the quality of a
lective cyber defense. Corporate cyber responsibility must
company’s defenses and its reaction to incidents.
be a key pillar of this effort.
X Finally, board members should actively champion
a model of collaboration that presumes a default
position in which information about malicious
ENDNOTE
1
See eSentire’s discussion of the 2022 Official Cybercrime Report by Cybersecurity Ventures.
(https://www.esentire.com/resources/library/2022-official-cybercrime-report)
I
n 2014, NACD, in conjunction with AIG and the Internet time on board meeting agendas.
Security Alliance, published the first edition of the hand- 4. Directors should set the expectation that management
book. Subsequent editions addressed the shifting cy- will establish an enterprise-wide, cyber-risk
ber-risk environment and reflected increased governance management framework and reporting structure with
expectations from key stakeholders, including investors and adequate staffing and budget.
regulators.
5. Board-management discussions about cyber risk
This handbook is one of the very few sets of board should include identification and quantification of
oversight practices in the cybersecurity field that has financial exposure to cyber risks and which risks to
been independently assessed and found to generate accept, mitigate, or transfer, such as through insurance,
important, improved, security outcomes. PwC’s review as well as specific plans associated with each
of the handbook noted that use of the handbook was approach.
related to improved budgeting as well as improved cy-
6. Boards should encourage systemic resilience through
ber-risk management, closer alignment of cybersecurity
collaboration with their industry and government peers
with business goals, and the generation of a culture of
and encourage the same from their management
security within the organization. A study by Cybersecurity
teams.
at MIT Sloan (CAMS) conducted in 2022 used a different
methodology and found that “the CEO who follows the This edition of the handbook offers new guidance for
consensus Cyber Risk Principles is predicted to have up to each of the principles and includes an extensive toolkit
85% fewer cyber incidents . . . compared to the traditional section to help boards and management teams adopt
CEO,” and that adopting the principles “can significantly the principles. The tools focus on the role a director has
improve . . . cyber resilience without raising costs.”1 in overseeing cyber-specific issues such as addressing
insider threats, incident response, and third-party risk
This fourth edition retains the previously identified five
management and offers guidance for understanding new
core principles for board oversight of cybersecurity, with
methods that management teams are using to measure
associated guidance that has been updated consider-
cyber risk in empirical and economic terms.
ing the changing cyber threat landscape. However, this
edition adds an important sixth principle that NACD and While some language in this handbook refers to public
ISA developed in conjunction with the World Economic companies, these principles are applicable to—and im-
Forum in 2020. The expanded set of principles covered in portant for—directors of organizations of all types and siz-
the handbook follow: es, including members of private-company and nonprofit
boards. Every organization has valuable data and related
1. Directors need to understand and approach assets that are under constant threat from cybercriminals
cybersecurity as a strategic, enterprise risk, not just an or other adversaries. No organization is immune.
IT risk.
The six principles for effective cyber-risk oversight detailed
2. Directors should understand the legal implications of in this handbook are presented in a generalized form in
cyber risks as they relate to their company’s specific order to encourage discussion and reflection by boards of
circumstances. directors. Boards are encouraged to adapt these recom-
3. Boards should have adequate access to cybersecurity mendations based on their organization’s unique charac-
expertise, and discussions about cyber-risk teristics, including size, life-cycle stage, strategy, business
management should be given regular and adequate plans, industry sector, geographic footprint, and culture.
ENDNOTE
1
Internet Security Alliance, “As Cyber Attacks Increase, Here’s How CEOs Can Improve Cyber Resilience,” isalliance.org, November 17, 2022.
(https://isalliance.org/as-cyber-attacks-increase-heres-how-ceos-can-improve-cyber-resilience)
Cyber-Risk Oversight
7
Introduction
S
ince the release of the third edition of this handbook toward the virtual. The rapid digitization of corporate
in early 2020, companies have been embattled by assets has resulted in a corresponding transformation
the challenges of working from home to protect of strategies, business models, and attendant risks.
workforces from COVID-19, systemic cyberattacks such as Organizations are taking advantage of entirely new ways
the SolarWinds incident, and the economic ramifications to connect with customers and suppliers, engage with
of Colonial Pipeline’s struggle with a ransomware actor, employees, and improve the efficiency and effectiveness
to name only a few headwinds. Despite these significant of internal processes. It has become a virtual necessity for
events in the cyber-threat landscape and challenges most organizations to engage in digital transformation.
facing organizations, some board-level oversight prac- The competitive need to deploy new and emerging
tices stand the test of time. Boards of directors, with their technologies as a means to lower costs, improve customer
attending fiduciary duties, continue to be responsible for service, and drive innovation is now felt more deeply by
overseeing management’s strategy and their approach companies than ever before.
to enterprise-wide risk, and cybersecurity matters inher- Adopting these technological innovations and capabili-
ently span the enterprise. ties may offer strong returns but can also increase cyber
As cybersecurity challenges grow, the board’s duties may risk. They may also subject the organization to increased
also expand, as regulators and rule makers in state and risk resulting from the loss of intellectual property such as
federal governments scrutinize the role of the board in trading algorithms, destroyed or altered data, decline in
oversight of information security risks—and boards are public confidence, and risk from evolving global regula-
rising to the challenge to provide sound oversight in this tory sanctions that emerge in response to these incidents.
realm. According to the 2022 NACD Public Company In addition, attacks against organizations that are linked
Board Practices and Oversight Survey, 83 percent of to critical infrastructure can result in a series of cascading
boards have significantly improved their understanding of consequences on other organizations in the supply chain
cyber risk compared with two years ago.1 that can lead to systemic risk. This edition of the handbook
But directors do still feel the need for more expertise on includes the adoption of a sixth principle, which highlights
boards. The survey also revealed an increase in boards’ board members’ responsibility to consider cyber risk in rela-
desire to recruit “cybersecurity-savvy directors,” suggesting tion to the shared business ecosystem.
that while directors feel more confident in their under- These competing pressures—competitive opportunity and
standing, boards are struggling to keep pace with over- potential risk exposure—mean that fiduciary and com-
seeing the onslaught of changing cyber threats. prehensive oversight of cybersecurity at the board level
And keep pace they must, as the nature of corporate is essential, requiring ongoing strategic dialogue with
value also continues to shift away from the physical and management.
Strongly Somewhat Neither agree Somewhat Strongly Source: 2022 NACD Public Company Board
disagree disagree nor disagree agree agree Practices and Oversight Survey (p. 6).
Cyber-Risk Oversight
9
CYBER THREATS BY THE NUMBERS
X Cybersecurity research statistics reveal that not X According to one study by a penetration testing
only is the cybersecurity challenge stunningly company, 93 percent of companies could be
large, but it is also growing massively on the infiltrated by an outsider.10
global scale. X Email in 2022 was the primary point of entry for
X Eighty-three percent of organizations reviewed malware attacks.11
in one study stated that their company has faced X The cost of credential theft increased from $2.8
more than one breach before.7 Sixty percent of million in 2020 to $4.6 million at the time that a
these companies reported increasing prices to study was published in 2022.12
pass the cost of breaches along to customers.
X Ransomware attacks increased by 13 percent
X Global annual losses from cybercrime are
between 2020 and 2021—a larger jump than in
estimated to reach $8 trillion in 2023 and are the last five years combined.13
projected to rise to $10.5 trillion by 2025.8
X On average, 2022 breaches were not detected
X The United States is the costliest place in the
until 207 days after the breach had occurred.14
world to face a breach.9
X It typically took 70 days to contain a breach in
2022.15
No matter the perpetrator, the majority of cyber incidents tion, financial data, business plans, trade secrets, and in-
are economically motivated.6 Cyberattackers routinely tellectual property. However, any data of value or essen-
attempt to steal, corrupt, or encrypt and hold hostage all tial information system can be a target for a cyberattack.
manner of data. Typical targets include personal informa-
Cyber-Risk Oversight
11
ENDNOTES
1
NACD, 2022 NACD Public Company Board Practices and Oversight Survey (Arlington, VA: NACD, 2022), p. 6.
(https://www.nacdonline.org/insights/publications.cfm?itemnumber=73754)
2
NACD, 2022 NACD Public Company Board Practices and Oversight Survey (Arlington, VA: NACD, 2022), p. 4.
(https://www.nacdonline.org/insights/publications.cfm?itemnumber=73754)
3
The World Economic Forum, Global Risks Report 2023 (Geneva, Switzerland: World Economic Forum, 2023),
p. 6. (https://www.weforum.org/reports/global-risks-report-2023)
4
For more information, see IBM’s Cost of a Data Breach: A Million-Dollar Race to Detect and Respond (IBM,
2022). (https://www.ibm.com/reports/data-breach)
5
See Verizon’s 2022 Data Breach Investigations Report.
(https://www.verizon.com/business/resources/reports/dbir/)
6
See Verizon’s 2022 Data Breach Investigations Report: Results and Analysis–Intro to Patterns.
(https://www.verizon.com/business/resources/reports/dbir/2022/results-and-analysis-intro-to-patterns/)
7
See IBM’s Cost of a Data Breach 2022: A Million-Dollar Race to Detect and Respond.
(https://www.ibm.com/reports/data-breach)
8
Steve Morgan, “Cybercrime to Cost the World 8 Trillion Annually In 2023,” posted on cybersecurityventures.
com on October 17, 2022.
(https://cybersecurityventures.com/cybercrime-to-cost-the-world-8-trillion-annually-in-2023/)
9
See IBM’s Cost of a Data Breach 2022: A Million-Dollar Race to Detect and Respond.
(https://www.ibm.com/reports/data-breach)
10
See Positive Technologies’ Business in the Crosshairs: Analyzing Attack Scenarios.
(https://www.ptsecurity.com/ww-en/analytics/pentests-2021-attack-scenarios/)
11
See Verizon’s 2022 Data Breach Investigations Report.
(https://www.verizon.com/business/resources/reports/dbir/)
12
See the 2022 Ponemon Institute Cost of Insider Threats: Global Report.
(https://www.proofpoint.com/us/resources/threat-reports/cost-of-insider-threats#:~:text=The%20cost%20
of%20credential%20theft,spend%20the%20most%20on%20containment)
13
See Verizon’s 2022 Data Breach Investigations Report.
(https://www.verizon.com/business/resources/reports/dbir/)
14
See IBM’s Cost of a Data Breach: A Million-Dollar Race to Detect and Respond (IBM, 2022).
(https://www.ibm.com/reports/data-breach)
15
Ibid.
16
Privacy Affairs, “Dark Web Price Index 2022,” privacyaffairs.com, September 19, 2022.
(https://www.privacyaffairs.com/dark-web-price-index-2022/)
17
Ibid.
18
See IBM’s Cost of a Data Breach: A Million-Dollar Race to Detect and Respond (IBM, 2022).
(https://www.ibm.com/reports/data-breach)
Historically, instead of individual departments and func- Given the value sustaining and creating potential of
tions being responsible for the security of the data they embedding cybersecurity into all corners of the enter-
handled, the responsibility for information security was prise, boards are dedicating increased attention toward
given to IT: a department that in most organizations is cyber-risk oversight practices. According to the 2022 NACD
strapped for resources and must fight for talent from a Public Company Board Practices and Oversight Survey,
pool too small to cover the need—all while lacking budget more than 80 percent of board members surveyed either
authority. Further, deferring responsibility to IT inhibited somewhat or strongly agreed that their understanding of
critical analysis of and communication about security cyber risk has “significantly improved” over the past two
issues and hampered the adoption of effective, organiza- years.2 This increased awareness and energy directed to-
tion-wide security strategies. ward board-level cyber risk is evidence that board mem-
Over the past several years, the business community’s bers and business leaders are confronting the challenges
increased level of awareness of the importance of infor- posed by digital and technological transformation.
mation security in general and the cross-functional nature Executives and board members now recognize that cy-
of cybersecurity in particular have helped to break down bersecurity is an integral element in the critical and chal-
siloes and operationalize management of cyber risks as lenging transformations required of their organization to
strategic risks. A joint 2021 report from the World Economic grow and compete in the digital age. The key questions for
Forum, NACD, and the Internet Security Alliance found that the board are no longer limited to how technological inno-
“cyber threats are a persistent strategic enterprise risk for vation can enable business processes, but how to balance
all organizations regardless of the industry in which they digital transformation with effective management of cyber
operate.”1 Effective organizational cybersecurity directly risks that may compromise long-term strategic interests.
contributes to strategic value preservation and new op- And the smartest companies are including cybersecurity
portunities for long-term value creation. by design as part of their strategic value proposition.
Cyber-Risk Oversight
13
Proper oversight begins with understanding that cyber risk focused on the concept of long-term value maximization
is not limited to narrow technical domains but stretches and recognize that this strategy is paired with near-term
throughout the enterprise and directly impacts key business risks and the potential for missed opportunities.
outcomes. This includes discussing how the organization Boards and management teams should acknowledge the
will strike the right balance between protecting digital potential tension between the need for strategic innova-
assets and driving digital innovation. In one recent study, tion—increasingly fueled by digital transformation—and
79 percent of CEOs said that investments in long-term the imperatives of preserving security and trust. Recog-
value creation initiatives were supported by investors.3 On nizing the high stakes of successful digital transformation,
the other side of the same token, institutional investors and we believe that cybersecurity should now be viewed as
proxy advisors have turned a keen eye on disclosures about a means for a company to execute its strategy—digital or
cybersecurity controls and governance, and are expecting not. At its best, cybersecurity enables organizations to cre-
companies to mitigate cyber risks both as a strategic en- ate long-term value and sustain trust with their customers
abler and as a means to retain and continue long-term val- and other key stakeholders.
ue creation.4 Business leaders and boards are increasingly
The zero-trust architecture concept was popularized by that no actor, system, network, or service operating out-
Forrester Research in 2010.5 It has since become a lead- side or within the security perimeter is trusted. Instead,
ing approach to cybersecurity being adopted across a we must verify anything and everything attempting to
variety of industries and has been endorsed by the fed- establish access.”7
eral government in Executive Order 14028, Improving the By removing implicit trust with all actors, organizations
Nations Cybersecurity.6 In a memorandum announcing must emphasize the effectiveness and robustness of their
that the US Government was moving toward zero trust identity and access-management programs to establish
cybersecurity principles, Shalanda D. Young, then acting the necessary roles, information access, and credential-
director of the Office of Management and Budget, said ing to appropriately monitor and govern access across
that “the foundational tenet of the Zero Trust Model is the enterprise.
Cyber-Risk Oversight
15
sourcing data storage, companies have limited their ability determine that their management teams are monitoring
to secure the data on their own terms. Companies are these services and taking adequate risk-management
subject to service-level agreements made in partnership steps, such as understanding and monitoring the security
with the cloud provider that merit careful due diligence controls provided by the cloud provider and the results of
against corporate security policies in the contract nego- any third-party audits. (For more on security in the cloud,
tiation phase. Boards need to have sufficient oversight to see Tool K).
ENDNOTES
1
World Economic Forum, Internet Security Alliance, and NACD, Principles for Board Governance of Cyber Risk (Arlington, VA: NACD, 2021), p. 7.
(https://www.nacdonline.org/insights/publications.cfm?ItemNumber=71795)
2
NACD, 2022 NACD Public Company Board Practices and Oversight Survey (Arlington, VA: NACD, 2022), p. 6.
(https://www.nacdonline.org/insights/publications.cfm?itemnumber=73754)
3
EY, The CEO Imperative: Will Bold Strategies Fuel Market-Leading Growth? (EY, 2022), p. 7.
(https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/ceo/ey-ceo-survey-global-report.pdf)
4
Orla Cox and Hetal Kanji, “Building Effective Cybersecurity Governance,” posted on the Harvard Law School Forum on Corporate Gover-
nance November 10, 2022.
(https://corpgov.law.harvard.edu/2022/11/10/building-effective-cybersecurity-governance)
5
See No More Chewy Centers: Introducing the Zero Trust Model (Forrester Research Inc., 2010).
(https://media.paloaltonetworks.com/documents/Forrester-No-More-Chewy-Centers.pdf)
And for more information about the zero-trust security model in general, please see the background available on Wikipedia.
(https://en.wikipedia.org/wiki/Zero_trust_security_model)
6
President Biden, Executive Order on Improving the Nation’s Cybersecurity, posted on whitehouse.gov, May 12, 2021.
(https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/)
7
See the Office of Management and Budget’s Memorandum for the Heads of Executive Departments and Agencies: Moving the US Government
Toward Zero Trust Cybersecurity Principles (M-22-09), issued January 26, 2022.
(https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf)
8
NACD, 2022 NACD Public Company Board Practices and Oversight Survey (Arlington, VA: NACD, 2022), p. 7.
(https://www.nacdonline.org/insights/publications.cfm?itemnumber=73754)
Directors overseeing cybersecurity should be prepared about the current cyber threat environment, as well as the
to navigate a broad range of sophisticated and evolving compliance and liability issues facing their organizations
legal and regulatory risks. Boards, individual board mem- and the specific industries within which they operate.
bers, and relevant executive officers should stay informed
Cyber-Risk Oversight
17
ered entities and business associates; the US Securities breaches.6 While the court dismissed one of the suits,7
and Exchange Commission (SEC) proposed expanded it stated that cybersecurity can rise to the level of mis-
rules for investment advisors and funds; and the New sion-critical risks in certain circumstances, thus requiring
York Department of Financial Services (DFS) proposed an greater involvement of the board in its oversight. The trend
amendment to its cybersecurity regulations. Each of these indicates that lack of effective cybersecurity oversight and
developments increased requirements on cybersecurity appropriate board structures, practices, and responsi-
programs and governance, and some explicitly addressed bilities presents an opportunity for both regulators and
governance issues. For example, the DFS proposal intends investors to target boards.
to further clarify the role of senior management and cor- Investors also expect companies to be transparent about
porate boards in cybersecurity policy and governance.2 As their cybersecurity processes in public filings and disclo-
the examples above illustrate, each industry faces increas- sures. The Council of Institutional Investors, a group that
ing requirements from US federal regulators. represents public, union, and corporate benefit plans,
endowments, and foundations, has stated that, “Inves-
tors will have greater confidence that [a] company is not
The trend indicates that lack of withholding information if it proactively communicates
the process by which it assesses damage caused by a
effective cybersecurity oversight
cyber incident and the methodology it uses to account for
and appropriate board structures, cyber incidents affecting data and assets. Communicating
practices, and responsibilities such a process will not reveal sensitive information about
presents an opportunity for both a company’s cybersecurity efforts.”8 In response, some
regulators and investors to target public companies are increasing their voluntary disclo-
sures—in the proxy statement and elsewhere—about how
boards.
the board is educated on, informed about, and structured
for cyber-risk oversight. (See Tool J—Enhancing Cybersecu-
The possible adoption of one forthcoming rule spans most rity Disclosures: 10 Questions for Boards.)
industries, while those proposed at other agencies would Outside of the United States, jurisdictions are increasingly
be narrower in focus. The SEC proposed a rule in 2022 adopting their own cyber regulations, such as the recently
that it claims would, if passed, “enhance and standardize updated European Union Network and Information Secu-
disclosures regarding cybersecurity risk management, rity Directive (NISD2); the EU Digital Operational Resilience
strategy, governance, and incident reporting” by public Act (DORA); data security and breach requirements, such
companies.3 The SEC’s public company proposal would as the General Data Protection Regulation (GDPR); and
require that specific information about cybersecurity pro- implementing member state legislation. As these require-
grams and the board’s oversight activities as well as the ments are enacted, interpreted by a variety of regula-
board’s cyber expertise be disclosed in registrants’ 10-Ks tors, and occasionally challenged in court, the definitions
and 10-Qs.4 Further, Congress and the executive branch within them may evolve. For example, in August 2022, the
of the federal government made strides toward passing, European Union’s top court expanded the definition of
adopting, or ordering cybersecurity policy in 2022—includ- sensitive information under GDPR.9 Some of these require-
ing through passing into law the Cyber Incident Reporting ments include governance structures, rapid notification of
for Critical Infrastructure Act of 2022 (CIRCIA).5 incidents, oversight of third-party vendors, disclosure of
Meanwhile, investors have not shied away from initiating material cyber risks, and adequacy of controls. A growing
cyber-risk-focused suits. Consistent with the Delaware list of nations are enacting laws similar to GDPR, including
Chancery Court’s precedent around “mission critical risks,” Australia, Brazil, South Africa, Israel, India, Japan, Argenti-
investors have recently brought Caremark suits against na, and Egypt among others.10
companies that experienced cybersecurity incidents and
Cyber-Risk Oversight
19
such reporting is required to take place. It is also advisable better understand their roles and the company’s response
for directors to participate with management in one or process in the case of a serious incident.
more cyberbreach simulations, or “tabletop exercises,” to
Board members should carry out regular ses- Ensure that management has developed the
sions on legal, regulatory, or contractual trends appropriate level of relationships and line of
and recent developments in cybersecurity. communications with relevant regulatory and
Consider whether any new business endeavors enforcement entities.
or partnerships generate new and differing Ensure that the internal legal team has rela-
legal obligations. tionships with outside counsel to aid in special
Consider whether oversight responsibility for events such as incident response. Define the
cybersecurity should reside with the full board governance structure for disclosing material
or with a board committee. risks and actual incidents to regulatory author-
ities.
Consider whether the board has access to
appropriate cyber expertise, either through its Periodically review with management the
own composition or via access to management information systems and controls related to
experts, consultants, and legal advisers, or a cyber risks.
combination of these resources and assets.
Cyber-Risk Oversight
21
ENDNOTES
1
National Conference of State Legislatures, Cybersecurity Legislation 2021, ncsl.org, Updated July 1, 2021.
(https://www.ncsl.org/technology-and-communication/cybersecurity-legislation-2021)
2
Wilmer Cutler Pickering Hale and Dorr LLP, “NYDFS Proposes a Second Amendment to its Cybersecurity Regulations”
Insights Blog, wilmerhale.com, November 17, 2022.
(https://www.wilmerhale.com/en/insights/blogs/WilmerHale-Privacy-and-Cybersecurity-Law/11172022-nydfs-propos-
es-a-second-amendment-to-its-cybersecurity-regulations)
3
See SEC Fact Sheet 33-11038, FACT SHEET Public Company Cybersecurity: Proposed Rules, p. 1.
(https://www.sec.gov/files/33-11038-fact-sheet.pdf)
4
Sidley Austin LLP, “Newly Proposed SEC Cybersecurity Risk Management and Governance Rules and Amendments for
Public Companies,” Data Matters Blog, datamatters.sidley.com, March 11, 2022.
(https://www.sidley.com/en/insights/newsupdates/2022/03/newly-proposed-sec-cybersecurity-risk-manage-
ment-and-governance-rules)
5
Cyber Incident Reporting for Critical Infrastructure Act of 2022, H.R. 2471, 117th Cong. (2022).
(https://www.congress.gov/117/plaws/publ103/PLAW-117publ103.pdf)
6
See https://cases.justia.com/delaware/supreme-court/2019-533-2018.pdf?ts=1560880896.
7
Constr. Indus. Laborers Pension Fund v. Bingle, C.A. No. 2021-0940-SG (Del. Ch. Sept. 6, 2022) (SolarWinds).
(https://courts.delaware.gov/Opinions/Download.aspx?id=337580)
8
Council of Institutional Investors, Prioritizing Cybersecurity: Five Investor Questions for Portfolio Company Boards (April
2016), p. 5.
(https://www.cii.org/files/publications/misc/4-27-16%20Prioritizing%20Cybersecurity.pdf)
9
Catherine Stupp, “EU Court Expands Definition of Sensitive Data, Prompting Legal Concerns for Companies,” WSJ Pro
Cybersecurity, August 10, 2022.
(https://www.wsj.com/articles/eu-court-expands-definition-of-sensitive-data-prompting-legal-concerns-for-compa-
nies-11660123800?mod=djemCybersecruityPro&tpl=cy)
10
DLA Piper, “Data Protection Laws of the World,” dlapiperdataprotection.com, accessed January 2023.
(https://www.dlapiperdataprotection.com/)
11
See SolarWinds, C.A. No. 2021-0940-SG (Del. Ch. Sept. 6, 2022) (holding that bad faith is not established where a cyber
breach occurs in spite of a Board’s subcommittee presentation of cybersecurity risk so long as that committee is not a
“sham” committee); In re Caremark Int’l Derivative Litig. 698 A.2d 959 (Del. Ch. 1996).
12
See the SEC’s Commission Statement and Guidance on Public Company Cybersecurity Disclosures (p. 1), applicable
February 26, 2018.
(https://www.sec.gov/rules/interp/2018/33-10459.pdf)
13
See the public statement by Chair Jay Clayton, “Statement on Cybersecurity Interpretive Guidance,” February 21, 2018.
(https://www.sec.gov/news/public-statement/statement-clayton-2018-02-21)
14
US Securities and Exchange Commission, “SEC Charges Issuer with Cybersecurity Disclosure Controls Failures,” press
release no. 2021-102, June 15, 2021.
(https://www.sec.gov/news/press-release/2021-102)
15
US Securities and Exchange Commission, “SEC Charges Pearson plc for Misleading Investors About Cyber Breach,” press
release no. 2021-154, August 16, 2021.
(https://www.sec.gov/news/press-release/2021-154)
16
See SEC Fact Sheet 33-11038, FACT SHEET Public Company Cybersecurity: Proposed Rules, p. 1.
(https://www.sec.gov/files/33-11038-fact-sheet.pdf)
17
Ibid.
18
See SEC Fact Sheet 33-11038, FACT SHEET Public Company Cybersecurity: Proposed Rules, p. 1.
(https://www.sec.gov/files/33-11038-fact-sheet.pdf)
Cyber-Risk Oversight
23
FIGURE 2 CYBER-RISK
FIGURE 2 Cyber-RiskOVERSIGHT PRACTICES
Oversight Practices BYBoard
by the THE BOARD.
Reviewed the company’s current approach to protecting its
most critical data assets 72%
Reviewed the most significant cyber threats and the company’s
response plans 64%
Reviewed the scope of cyber insurance coverage in the
case of an incident 62%
Reviewed the company’s response plan in the case of a
cyberbreach 61%
Communicated with management about the types of cyber-risk information
the board requires 58%
Cyber-Risk Oversight
25
Those methods include these:
X Scheduling deep-dive briefings or examinations X Participating in relevant director-education
from independent and objective third-party experts programs, whether provided in-house or externally
validating whether the cybersecurity program is Many boards are incorporating a “report-back”
meeting its objectives item on their agendas to allow directors to share
X Leveraging the board’s existing independent their takeaways from outside programs with
advisors, such as external auditors and outside fellow board members.
counsel, who will have a multi-client and industry-
wide perspective on cyber-risk trends
Questions to Consider
X How are we defining a “cyber expert”? The first tems in a way that is similar to the understanding
principle in this handbook is that cybersecurity that non-lawyers and nonfinancial experts have of
is not simply an “IT” issue, but rather an enter- these systems?
prise-wide risk-management issue. So, is the board X How does having a single cyber expert on the
looking to add an expert in enterprise-wide cyber- board mesh with the cross-functional cyber-man-
security issues? A former CISO? Consider the com- agement structures that are becoming increasing-
pany’s needs and strategy and align accordingly. ly common? (Consider reviewing the “Three Lines
X Is this strategy really deferring to one individual a of Defense” model discussed on page 31.)
responsibility that the full board should undertake? X Does placing a cyber expert on the board set a
Might it be more appropriate for the full board to precedent for assigning seats to other specialized
increase their understanding of cybersecurity sys- oversight areas?
ENDNOTES
1
NACD, 2022 NACD Public Company Board Practices and Oversight Survey (Arlington, VA: NACD, 2022), p. 6.
(https://www.nacdonline.org/insights/publications.cfm?itemnumber=73754)
2
Ibid.
3
NACD, 2022 NACD Public Company Board Practices and Oversight Survey (Arlington, VA: NACD, 2022), p. 7.
(https://www.nacdonline.org/insights/publications.cfm?itemnumber=73754)
4
NACD, NACD Risk Oversight Advisory Council: Current and Emerging Practices in Cyber-Risk Oversight (Arlington, VA: NACD, 2019).
(https://www.nacdonline.org/insights/publications.cfm?ItemNumber=65591)
5
NACD, Report of the NACD Blue Ribbon Commission on Adaptive Governance (Arlington, VA: NACD, 2018), p. 13.
(https://www.nacdonline.org/insights/publications.cfm?ItemNumber=61319)
6
NACD, 2022 NACD Public Company Board Practices and Oversight Survey (Arlington, VA: NACD, 2022), p. 6.
(https://www.nacdonline.org/insights/publications.cfm?itemnumber=73754)
Cyber-Risk Oversight
27
PRINCIPLE FOUR
An Enterprise Framework for Managing Cyber Risk
In order for boards to engage in effective oversight of cyber Directors should seek assurances that management is
risk, they need to fully understand the responsibilities that taking an appropriate, enterprise-wide approach to
lie in the hands of management. As digital technologies managing cybersecurity risk. Specifically, boards should
increasingly underpin growth strategies, management has assess whether management has established both an
taken on the role of deploying, managing, and securing enterprise-wide technical framework as well as a man-
new digital capabilities across the organization. Howev- agement framework that will enable effective gover-
er, cyber-risk reporting structures and decision-making nance of cyber risk. An integrated risk model should
processes continue the legacy of siloed operating models. consider cyber risk not just as a technical problem unique
Management can no longer afford simply to delegate and separate from other business risks, but rather as
cyber-risk management to IT, or to each department and part of a comprehensive, enterprise-risk management
business unit independently. program.
Cyber-Risk Oversight
29
X Information Technology. While this department mitigation as they plan to launch new digital
covers many functions, information security in products and need to understand how to achieve
many organizations falls under IT. The security the right balance between enabling better, value-
function is tasked with protecting the organization driving, customer experiences and protecting the
through the gathering of threat intelligence and the business.
implementation of cybersecurity controls. X Finance. The finance team likewise has a role to
X Risk. Many organizations also have a risk function. play as businesses assess the level of risk that they
This part of the organization is tasked with assessing can tolerate versus the cybersecurity investments
its top cyber risks and insuring against catastrophic needed to protect important assets. Finance may
events. also play a critical role in assessing the financial
X Legal. The legal department or outside counsel
impact and materiality of potential or actual
can help organizations address regulatory and cybersecurity events.
shareholder obligations and concerns related to No one cyber-risk model representing various functions
cyber risks. and stakeholders will apply perfectly to all organizations.
X Line-of-Business Executives. The heads of
Recognizing that organizations will want to tailor their
research/development and of marketing and approach to fit their needs, we offer two different models
other line-of-business executives may also need which can be used as a starting point.
to be represented. They are critical to cyber-risk
Cyber-Risk Oversight
31
KEY CONSIDERATIONS FOR THE BOARD
Boards should expect management to incorporate There are several technical and management
cyber risk into an enterprise risk-management frameworks that can be adopted and adapted
approach. to the unique needs of an organization.
In order to provide full oversight of cyber risks,
management should adopt both technical and
management frameworks.
ENDNOTES
1
National Institute of Standards in Technology, “Cybersecurity Framework: Framework Documents,” posted on nist.gov in April 2018.
(https://www.nist.gov/cyberframework)
2
International Organization for Standards, “ISO/IEC 27000:2018,” posted on iso.org in February 2018.
(https://www.iso.org/standard/73906.html)
3
Center for Internet Security, “The 18 CIS Critical Security Controls,” posted on cisecurity.org.
(https://www.cisecurity.org/controls/cis-controls-list)
4
PCI Security Standards Council, “Standards Overview,” posted on pcisecuritystandards.org.
(https://www.pcisecuritystandards.org/standards/)
5
ANSI and ISA, The Financial Management of Cyber Risk (ANSI, 2008).
(http://isalliance.org/publications/1A.%20The%20Financial%20Impact%20of%20Cyber%20Risk-%2050%20Questions%20Every%20CFO%20
Should%20Ask%20-%20ISA-ANSI%202008.pdf)
6
Thomas Holland and Stacey Floam, “Three Lines of Defense: A New Principles-Based Approach,” posted on guidehouse.com on February 10,
2021.
(https://guidehouse.com/insights/financial-services/2021/public-sector/garp-three-lines-of-defense?lang=en#:~:text=The%20three%20
lines%20of%20defense%20represent%20an%20approach%20to%20providing,relationship%20between%20those%20different%20areas)
7
Jaclyn Jaeger, “Analysis: Comparing the IIA’s new ‘Three Lines Model’ to the old one,” posted on complianceweek.com on July 29, 2020.
(https://www.complianceweek.com/risk-management/analysis-comparing-the-iias-new-three-lines-model-to-the-old-one/29252.article)
When NACD polled its members for its 2022 NACD Public approach to estimating likelihood and the impact of
Company Board Practices and Oversight Survey, the consequences. . . . This may help to better prioritize risks or
report found that only 52 percent of boards are review- prepare more accurate risk exposure forecasts.”2 This does
ing the potential material, financial implications of a not absolve the board from gaining a basic understand-
cyberbreach on their companies—this compared to 72 ing of the technical aspects of cybersecurity, which helps
percent who are reviewing the company’s approach to validate management’s assumptions in quantifying the
protecting its most critical assets.1 These findings support risk.
the claim that in most cases, management still reports While cyber-risk management is a relatively young
on cybersecurity with imprecise scorecards such as discipline compared to other forms of enterprise-risk
“heat maps,” where cyber risk is measured in colors or in management, expectations for mitigating and reporting
high-medium-low terms; security “maturity ratings”; and on it should not be reduced. Management should deliver
highly technical data that are out of step with the met- reports that are
ric-based reporting that is common for other enterprise
X transparent about performance, with economically
risks.
focused results based on easily understood
These legacy practices do not allow management and the methods;
board to understand the materiality of cyber events and
X benchmarked, so directors can see metrics in
to properly assess the adequacy and cost-effectiveness
context to peer companies or the industry; and
of risk mitigation initiatives. According to a NIST publica-
tion focused on integrating cybersecurity into enterprise X decision-oriented, so the board can accurately
risk-management practices, “While qualitative methods evaluate management’s decisions weighed against
are commonplace, companies may benefit from consid- the defined risk appetite, including resource
ering a quantitative methodology with a more scientific allocation, security controls, and cyber insurance.
Cyber-Risk Oversight
33
As discussed in Principle 1, cyber risk should be dis- X Independent security ratings of the company,
cussed in terms of strategic objectives and business benchmarked against peer organizations and
opportunities. In this context, every key performance used alongside other key risk indicators to
and risk indicator should be tracked against a perfor- augment understanding
mance target or risk appetite, as proposed by man- X Third-party and fourth-party risk indicators
agement and approved by the board. Risk appetite
statements should be defined in as clear, objective, and 3. What is our cyber-risk profile as defined by
measurable a way as possible, while also accounting management?
for subjective factors such as the economic environment
Management should provide assessments of the compa-
within which the appetite was initially decided.
ny’s cybersecurity program that spans departments and
While this level of reporting is still aspirational for some functions, using tangible performance and risk metrics
companies, directors can drive their organizations which may include these:
forward by asking the following five questions and
X A NIST-based program maturity assessment
demanding answers that are backed by the sort of
conducted by a third party
metrics and reports that we suggest in this principle
and in Tool F. X The relationship between cyber-risk maturity and
risk-mitigation prioritization
1. How are we measuring the threat environment X Investments made to ensure business resilience
and how prepared are we to meet it?
X Compliance metrics on basic cyber hygiene (the
The chief information security officer or chief risk officer Five Ps): Passwords, Privileged Access, Patching,
should paint a picture of the threat environment (cyber- Phishing, and Penetration Testing
criminals, nation-states, malicious insiders, etc.) that de-
X Percentage of critical systems downtime, and time
scribes what’s going on globally, in our industry, and within
needed to recover
the organization. Examples of good metrics and reports
include these: X Mean time to detect and remediate cyber breaches
As cyber-risk quantification (CRQ) adoption and effectiveness increases, several models have emerged for calcu-
lating cyber risk in economic terms. Many of these approaches rely on two primary quantification methodologies:
asset-based quantification and actuarial-based quantification. Both methods attempt to objectively quantify in
economic terms a company’s cyber-risk exposure, the likelihood of risk event, and the potential loss magnitude of a
given incident.
Questions directors can ask to better understand their organization’s chosen approach and ensure it is best
suited for their company’s needs include these:
X Does the chosen CRQ model have any weak- X Is the approach we are using in line with those of
nesses? How is the cyber-risk management team our sector and industry peers?
mitigating what the model doesn’t cover?
X Is the chosen model flexible enough that we are
regularly updating it to address new vulnerabilities
and recent cybersecurity events?
Cyber-Risk Oversight
35
5. Are we making the right business and and operational decisions, such as risk-adjusted profitabil-
operational decisions? ity analysis of digital businesses and strategies (including
As stated in Principle 1, cybersecurity is not simply a tech- M&A), return on investment of cybersecurity controls and
nology, security, or even a risk issue. Rather, it is a business related technology investments, and cyber-risk insurance
issue and a “cost of doing business” in the digital economy. versus self-insurance.
On the opportunity side, advanced technologies and dig- Board-management discussions about cyber risk
ital innovations can help companies to offer new products should include identification and quantification of those
and services, delight their customers, and streamline or threats that can introduce material financial exposures
disrupt the supply chain. As a top strategic issue, man- to cyber risks and which inform risk acceptance, mitiga-
agement should provide the board with risk and return tion, or transfer decisions.
metrics that can support effective oversight of business
“Risk appetite” is the amount of quantifiable risk an X Stakeholders: What risks are stakeholders willing
organization is willing to accept in pursuit of strategic to bear, and to what level?
objectives. Thus, it should define the level of risk, through X Capacity: What resources are required to manage
measurement, at which appropriate actions are need- those risks?
ed to reduce risk to an acceptable level. When properly
X Financial: Are we able to adequately quantify the
defined and communicated, it drives behavior by setting
effectiveness of our risk management and harmo-
the boundaries for running the business and capitalizing
nize our spending on risk controls?
on opportunities. A 2022 commission on the future of
board practices also found that it is critical to risk over- X Measurement: Can we measure and produce
sight that the board and management “have an agreed reports to ensure that proper monitoring,
and clearly defined risk appetite which provides guard- trending, and communication of reporting is
rails for risk activity.”8 occurring?
A discussion of risk appetite should address the following “Risk appetite is a matter of judgment based on each
questions: company’s specific circumstances and objectives. There
is no one-size-fits-all solution.”
X Corporate values: What risks will we not accept?
Source: PwC, Board oversight of risk: Defining risk appetite in plain English (https://www.pwc.com/us/en/corporate-governance/publica-
tions/assets/pwc-risk-appetite-management.pdf).
Ensure the board understands those cyber It is important for cyber risk to be measured,
threats that are likely to introduce material benchmarked, and reported out in objective
business, operational, and financial harm in or- terms to the board in the language of business.
der to inform effective risk mitigation strategies.
Boards and management should come to an
agreement on a cyber-risk appetite.
ENDNOTES
1
NACD, 2022 NACD Public Company Board Practices and Oversight Survey (Arlington, VA: NACD, 2022), p. 6.
(https://www.nacdonline.org/insights/publications.cfm?ItemNumber=73754)
2
Kevin Stein, et al., NIST CSRC, NISTIR 8286: Integrating Cybersecurity and Enterprise Risk Management (ERM) (Washington, DC: US De-
partment of Commerce, 2020), p. 26.
(https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8286.pdf)
3
To learn more about the National Council of ISACs, please see their web page, “National Council of ISACs” (accessed January 20, 2023).
(https://www.nationalisacs.org/)
4
See the SEC’s Commission Statement and Guidance on Public Company Cybersecurity Disclosures [Release Nos. 33-10459; 34-82746]
(February 26, 2018), p. 15. (https://www.sec.gov/rules/interp/2018/33-10459.pdf)
5
A variety of solutions exist, including the Factor Analysis of Information Risk (FAIR) methodology (https://www.fairinstitute.org/) and the
Center for Internet Security Risk Assessment Method (CIS RAM, available at (https://www.cisecurity.org/insights/white-papers/cis-ram-risk-
assessment-method), which are considered non-proprietary, open-source models for quantifying risk. There is also a growing market of
proprietary cyber-risk analysis models available.
6
Notable CRQ publications include these: D. Hubbard, R. Seiersen (2016), How to Measure Anything in Cybersecurity Risk, Wiley; J. Jones, J.
Freund (2015), Measuring and Managing Information Risk: A FAIR Approach, Butterworth-Heinemann; Ruan, K. (March 2017), “Introducing
Cybernomics: A Unifying Economic Framework for Measuring Cyber Risk,” Computers & Security, Volume 65, p 77-89, ISSN 0167-4048,
(https://www.sciencedirect.com/science/article/pii/S0167404816301407?via%3Dihub)
7
Unal Tatar et al., Quantification of Cyber Risk for Actuaries: An Economic-Functional Approach (Society of Actuaries, May 2020), p. 7.
(https://www.soa.org/globalassets/assets/files/resources/research-report/2020/quantification-cyber-risk.pdf)
8
NACD, The Future of the American Board Report: A Framework for Governing into the Future (Arlington, VA; NACD, 2022), p. 36.
(https://www.nacdonline.org/insights/publications.cfm?ItemNumber=74136)
Cyber-Risk Oversight
37
PRINCIPLE SIX
Encourage Systemic Resilience and Collaboration
In 2021, NACD, ISA, and the World Economic Forum, in col- ment, which calls on organizations to understand their
laboration with PwC, came together to unify their support responsibilities to consider the environmental, social, and
for the previous five principles outlined in this handbook. governance (ESG) impacts of their actions on a broader
The organizations also agreed that corporate governance range of stakeholders. In 2019, the Business Roundtable
had evolved in recent years, and that a new principle was issued a purpose statement that called on companies to
necessary to encourage systemic resilience and collabo- go beyond shareholder primacy and consider the interests
ration around cybersecurity. The organizations made this and expectations of other key stakeholders like employees,
declaration: customers, and suppliers.2 Given the interconnected nature
“The highly interconnected nature of modern or- of cyber risk when it spans disparate companies and in-
ganizations means we run the risk of failures that dustries operating on the insecure structure of the Internet,
spread beyond one enterprise to affect entire in- it is incumbent upon each organization to be “their broth-
dustries, sectors and economies. It is no longer suf- er’s keeper”—in much the same way that the E in ESG relies
ficient just to ensure the cybersecurity of your own on companies to come together to improve our ecological
enterprise; rather, cyber resilience demands that environment.
organizations work in concert. Recognizing that The defining characteristic of the Internet is the massive
only collective action and partnership can meet interconnection of multiple systems. Built without security
the systemic cyber-risk challenge effectively, senior in mind, this interconnection has been exploited since its
strategic leaders must encourage collaboration inception and has in the past decade created effects that
across their industry and with public and private extend well beyond individual entities. In 2017, the NotPetya
stakeholders to ensure that each entity supports attack spread from a malware-infected system in Ukraine
the overall resilience of the interconnected whole.”1 to paralyze global shipping and cause an estimated $10 bil-
This principle is consistent with over-arching trends in cor- lion in damages to a wide variety of industries, from phar-
porate-governance best practice such as the ESG move- maceuticals to construction, from personal care to consum-
Develop a 360-degree view of the organiza- Ensure that management takes into account
tion’s risk and resiliency posture to function risk stemming from broader industry consider-
as a socially responsible party in the broader ations (e.g., third-party vendors and partners—
environment in which the business operates. (see Tool D for further details).
Develop peer networks that include other board Encourage management’s participation in in-
members to share best governance practices dustry groups and knowledge and information
across institutional boundaries. sharing platforms such as sector-specific in-
Ensure that management has plans for effec- formation sharing and analysis centers (ISACs)
tive collaboration and information sharing, and/or cross-sectoral information sharing
especially with the public sector, on improving organizations (ISOs).
security and resilience.
ENDNOTES
1
See Principles for Board Governance of Cyber Risk (World Economic Forum, 2021), p. 12.
(https://www.nacdonline.org/insights/publications.cfm?ItemNumber=71795)
2
The Business Roundtable, “Business Roundtable Redefines the Purpose of a Corporation to Promote ‘An Economy That Serves All Americans,’”
posted on businessroundtable.org on August 19, 2019.
(https://www.businessroundtable.org/business-roundtable-redefines-the-purpose-of-a-corporation-to-promote-an-economy-that-
serves-all-americans)
3
US GAO, “SolarWinds Cyberattack Demands Significant Federal and Private-Sector Response (Infographic),” posted on gao.gov on April 22,
2021. (https://www.gao.gov/blog/solarwinds-cyberattack-demands-significant-federal-and-private-sector-response-infographic)
Cyber-Risk Oversight
39
TOOLKIT
TOOL A
Ransomeware Readiness
By Mike Woods, GE
Cyber-Risk Oversight
41
b. Have our front-line managers worked with IT and information security to communicate alternative
methods for business-critical functions (e.g., email, payroll, production)?
1. How are our system backups maintained, tested, and measured for resiliency? Here’s one follow-up
question to consider asking:
a. Does the implementation of backups include reporting, metrics, and ongoing monitoring require-
ments?
2. In the event of a ransomware attack, are we confident that our IT systems can be restored within our
specified recovery plan objectives? Are we including third-party systems and capabilities (e.g., cloud-
based software) within our recovery plan?
3. Do our system backup and recovery partners’ response times align with our current timelines in our
recovery plan?
1. Do we monitor critical third parties (those we share data with and/or have network connectivity to)
for ransomware attacks? When receiving answers about this question, boards can look for details
about the following:
a. Whether we train supply-chain personnel to recognize cybersecurity risk and enable mitigation
activities.
b. Ensure third-party due diligence throughout the proposal, selection, and onboarding processes.
c. Put a vendor-risk management framework in place with appropriate stakeholders involved and
with a direct owner of this function.
2. Do we require specific ransomware and/or incident reporting from third parties within our contracts
and agreements? Directors can consider asking for a follow-up:
a. Is cybersecurity expertise leveraged during the negotiating and contracting process?
3. As part of our enterprise vendor risk management program, do we assess (and reassess
incrementally) any third parties to understand their cyber-risk posture?
Response Exercises
1. Is there a clearly communicated line of accountability in the event of an attack? Are there plans for
ransomware tabletops/simulation exercises so that our organization can form muscle memory
around their role?
2. Are there clear thresholds related to the materiality of an attack, including triggers for engagement
of senior management and/or the board?
3. Are we ready to coordinate with law enforcement in the event of a ransomware attack? Directors
can ask senior management if their organizations have an established understanding of who to
contact, based on the jurisdictions that they fall within:
a. US state, local, tribal, and territorial government agencies can report ransomware attacks to the
Multi-State Information Sharing and Analysis Center (MS-ISAC).
Communications
1. Is there a concise communications plan across cybersecurity and technology teams and senior
management? Here are some items for boards to consider asking follow-up questions about:
a. When and how will company officers and employees be notified of the disruption?
b. When and how will business partners and key external parties be notified?
c. Who will be responsible for preparing and delivering a public statement on the disruption?
d. What will be the timeline for acting on regulatory, disclosure, or compliance requirements, and
who will be involved?
2. Does the plan include holding statements for various audiences (e.g., employees, customers,
regulators, media)?
a. Keep company officers, employees, business partners, and the public informed as the incident
investigation progresses.
ENDNOTES
1
Sophos.com, “Ransomware Hit 66% of Organizations Surveyed for Sophos’ Annual ‘State of Ransomware 2022.’”
(https://www.sophos.com/en-us/press-office/press-releases/2022/04/ransomware-hit-66-percent-of-organiza-
tions-surveyed-for-sophos-annual-state-of-ransomware-2022)
2
Ibid.
3
Simon Migliano, “Dark Web Market Price Index: Hacking Tools” updated on top10vpn.com on September 1, 2021.
(https://www.top10vpn.com/research/dark-web-prices/hacking-tools/)
Cyber-Risk Oversight
43
TOOL B
Assessing the Board’s Cyber-Risk
Oversight Effectiveness
By Jason Escaravage, Thomson Reuters
This tool helps directors identify which questions to ask themselves to assess their own understanding of
the organization’s cybersecurity and to ask senior management to assess their effectiveness, and out-
lines a numerical scale for assessing the board’s cyber-risk oversight effectiveness.
Board leaders wishing to incorporate a cybersecurity component into their board’s recurring self-evalu-
ation can use the questions in the table below as a starting point.
Cyber-Risk Oversight
45
CASES IN POINT
Unidentified Risk During Acquisition Due-Diligence Led Marriott Directors to Face
Violation of Security Law Claims and Personal Liability Lawsuits
In August 2018, Marriott International acquired Starwood Hotels and Resorts Worldwide for $13 billion to
expand the hotel chain to the world’s largest, merging loyalty programs as a differentiator for corporate
travel departments.1 However, Marriott’s board failed to identify a data breach in the Starwood guest
reservation database from 2014, resulting in the loss of sensitive data for more than 380 million peo-
ple. Sensitive data included names, payment card data, passport information, travel companions, and
home addresses. Even though the breach occurred two years prior to the acquisition, Marriott learned
about the breach in September 2018, one month post acquisition.
All 50 states’ and District Court Attorneys General the SEC, FTC, and US Senate and Congress committees,
along with others, opened investigations. Marriott directors were personally named in US court filings, and
they defended their oversight in court.2 It was determined that the Marriott board acted in good faith to
fulfill their oversight duties. However, the litigation inclusion of Marriott’s directors with claims of violating
the securities law related to data breaches and claims of personal liability demonstrate that all firms are
expected to monitor cyber risk, and directors can be found liable if lack of oversight occurs.3
These lawsuits, fines, and consequent reputational damage could have potentially been avoided or
more effectively managed if Marriott had identified this data breach during the acquisition due dili-
gence process, prior to acquisition of Starwood.
Investors Sue SolarWinds Directors Claiming Failure to Monitor Known Cyber Risks
In the spring of 2020, SolarWinds sent out an update to its network-monitoring Orion software which was
intended to deliver a routine fix of bugs and to patch errors within the software. However, malicious code
was embedded into the update, creating backdoor access to customer systems. An estimated 18,000 busi-
nesses were affected, and the attack went beyond the private market to impact government agencies.
In November 2021, pension funds and individual shareholders filed a lawsuit claiming current and
former board directors breached their fiduciary duty of care and loyalty by failing to monitor known
security risks.4 Heightened supply chain attacks occurring around the time of the cyberbreach bolstered
claims, as plaintiffs viewed it was reasonable for directors to be familiar with the trend and to provide
oversight given the current trend.
In October 2022, SolarWinds settled in court to pay shareholders $26 million, receiving notification of an
SEC enforcement notice, alleging violations of US federal security laws with respect to cybersecurity dis-
closures and public statements, as well as its internal controls and disclosure controls and procedures.5
While the lawsuit settlement resolves claim against the company and named directors included in the
class action litigation, the final settlement agreement has not been executed, and SEC enforcement is
poised to continue. Director knowledge of cybersecurity and frequent reviews of cybersecurity risks and
associated policies, processes, and controls proves to be key in providing adequate oversight.
Cyber-Risk Oversight
47
TOOL C
The Cyber-Insider Threat
By Niall Brennan, SAP
Mitigation of the insider threat poses one of the greatest challenges to managing cyber risk. Precisely
because the delivery of this threat involves leveraging the legitimate access of “trusted insiders” (employ-
ees, contractors, vendors, and others) to an organization’s network, systems, and data, it can be harder
to detect than other threats in which the forensic indicators of compromise are more immediate and
obvious. This tool defines the insider threat and outlines the categories of insider incidents and the types
of insider threat actors. Finally, it proposes questions that boards should be asking to ensure executive
management is adequately addressing insider threats.
X What are the most effective controls, and which ones should be prioritized?
X Is there a comprehensive incident response plan in place involving all stakeholders (human
resources, general counsel, compliance, security, and others) in the event of an insider incident?
Does it align with other internal incident response frameworks?
Are there in-house forensic capabilities, or is an outside firm on retainer?
Do appropriate relationships currently exist with law enforcement partners to assist with the
response?
Do appropriate relationships exist with regulators that may require reporting about such
incidents?
X Does the organization have a backup and recovery program? Could it recover its systems and
critical data if access was hindered or data corrupted in the main system?
X Does the organization have strong controls around critical vendor relationships to prevent
unauthorized access?
Cyber-Risk Oversight
49
How are third-party vendors monitored to control unauthorized access?
For third-party cloud and software-as-a-service providers that are critical to business
processes, what controls are in place to prevent unauthorized access while also enabling
the business? (Reference Tool D, Supply Chain and Third-Party Risks, and Tool J, Securing the
Cloud, for more in-depth practices, controls, and questions.)
X How does the organization measure the effectiveness of its insider threat mitigation plan? Does it
periodically test the plan with internal assets and external parties to validate its effectiveness?
Does its insider threat mitigation plan maintain procedures to properly document incidents or
insider threat activity?
Does it maintain metrics to identify and analyze patterns of insider threat activity to assist with
reducing vulnerability?
X Does the organization have adequate programs in place to sensitize employees to insider risks
and train them to detect, report, and mitigate potential incidents?
Do we have a security awareness program in place? Are we tracking metrics of this program
to identify progress or problem areas?
Is there a disciplinary or continuing education framework for employees failing tests? Does it
show improvement in employee behavior?
ENDNOTE
1
See the cisa.gov web page, “Defining Insider Threats.”
(https://www.cisa.gov/defining-insider-threats#:~:text=The%20Cyber%20and%20Infrastructure%20Security)
Cyber-Risk Oversight
51
5. How difficult/costly will it be to establish and maintain a viable cyber-vulnerability and penetration-
testing system for our supply chain?
6. How difficult/costly will it be to enhance monitoring of access points in the supplier network?
7. Do our vendor agreements bring new legal risks or generate additional compliance requirements
(e.g., FTC, HIPAA, CCPA, GDPR, etc.)? Are we indemnified against security incidents on the part of
our suppliers/vendors?
CASE IN POINT
Despite being warned by researchers of their software vulnerabilities, in 2021 a major US IT manage-
ment firm suffered a ransomware attack on its virtual system administrator software.
Although the company initially said that only 0.1 percent of its clientele had been affected, the compa-
ny’s software was used by large IT companies that offered services to hundreds of small- and medi-
um-sized businesses (SMBs). As a result, the company told nearly 40,000 customers to disconnect their
services.4 Given the large network created through managed service providers, nearly 1,500 business-
es—predominately SMBs—had their operations disrupted worldwide by ransomware. The attack—
arguably the largest ransomware attack yet—was successful in disrupting global supply chains over the
long Independence Day weekend.
Cyber-Risk Oversight
53
TOOL E
Incident Response
By Greg Montana, FIS
Since not all incidents can be prevented, response is a critical component of a cybersecurity program. In
2022, the Cyber Incident Reporting for Critical Infrastructure Act went into effect, making reporting to the
US Cybersecurity and Infrastructure Security Agency (CISA) mandatory for any cyberattacks against critical
infrastructure organizations. However, having incident response capability is necessary for all organizations
regardless of size or sector as virtually all organizations are now possible targets of cyberattacks. This tool
outlines steps boards should take to ensure that their organizations have an effective incident response
program.
The business capabilities and functions required to support incident response are these:
X Governance: Knowledge of assets and where they reside with appropriate controls and data
protection, and with regular risk assessment and management; policies; and procedures
X Protective Capabilities: Policies, employee awareness, and education; control procedures to
validate access; information protection procedures; and continual validation
X Detection Capabilities: Set of capabilities to detect anomalies and events, and continuous
monitoring for effectiveness
X Response: Response playbook; regular cyber exercises; coordinated efforts across technology
teams, business, legal, communication, and law enforcement
X Recovery: Speedy remediation and after-action improvement
X Customers
Cyber-Risk Oversight
55
7. Mitigating Losses
a. What can we do to mitigate the losses from an incident?
b. Does senior management know who has the authority to swiftly disable large groups of machines
or servers if they are infected by malware?
c. What reporting mechanism is in place to ensure we are investing sufficient resources into our data
recovery capacity?
8. Measuring Incident Response Effectiveness
a. What are the critical, key performance indicators used to measure incident response effectiveness
(e.g., time to detect and time to respond)?
b. What kind of metadata monitoring, collecting, and reporting mechanism is in place? What is the
cost of this mechanism, and what benefit has it returned?
c. Do we simulate how long a recovery procedure would take and what kind of cost the business
would incur?
9. Post-Incident Response
a. What key steps do you follow after a critical incident?
b. What steps do you follow to ensure this type of incident doesn’t occur again?
c. How are we educating our employees to be more aware of our policies, procedures, and report-
ing mechanisms?
d. Do we require a post-mortem evaluation based on findings of the forensics investigation as part
of the incident response plan?
CASE IN POINT
X After investigation, the provider reported that the damage was not vast, doubling down on the
fact that transparent customer communication is vital even after “small” attacks.4
X The provider then cut off all ties with their third-party processing company.5
Summary:
X A software provider effectively communicated with the public after a cyberattack by an infamous
hacking organization, ensuring that the breach was minimal, with only a single employee account
being compromised.8
X The provider stated that their cybersecurity team was on the case immediately after the hackers
disclosed their attack and stated that the provider’s cybersecurity experts were able to stop the
hack mid-operation.9
X The hacked company then shared information with the public regarding the tactics the hackers
used to conduct their attacks.10
X The software provider then revealed that their cybersecurity teams had been “studying” the
hacking organization and the attack techniques that the hacker group had used in the past.11
Cyber-Risk Oversight
57
ENDNOTES
1
Charlie Osborne, “As Lapsus$ comes back from ‘vacation,’ Sitel clarifies position on data breach,” posted on zdnet.com on
March 30, 2022.
(https://www.zdnet.com/article/as-lapsus-comes-back-from-vacation-sitel-clarifies-position-on-data-breach/)
2
Faife, Corin. 2022. “Okta sys security protocols limited hack, but response came too slow” The Verge. Retrieved from:
https://www.theverge.com/2022/3/23/22992894/okta-hack-cso-security-protocol-sitel-lapsus; Kan, Michael. 2022.
“Okta Says Hack From LAPSUS$ Group May Have Ensared 366 Brands” PC Magazine. Retrieved from: https://www.pc-
mag.com/news/okta-says-hack-from-lapsus-group-may-have-ensnared-366-brands.
3
Liam Tung, “Okta: We made a mistake over Lapsus$ breach notification,” posted on zdnet.com on March 28, 2022.
(https://www.zdnet.com/article/okta-we-made-a-mistake-over-lapsus-breach-notification/)
4
Corin Faife, “Okta says security protocols limited hack, but response came too slow,” posted on theverge.com on March
23, 2022.
(https://www.theverge.com/2022/3/23/22992894/okta-hack-cso-security-protocol-sitel-lapsus)
5
Robert Lemos, “Okta Wraps Up Lapsus$ Investigation, Pledges More Third-Party Controls,” posted on darkreading.com
on April 20, 2022.
(https://www.darkreading.com/cloud/okta-wraps-up-lapsus-investigation-pledges-more-third-party-controls)
6
The Gross Law Firm. (2022). “Shareholder Alert: The Gross Law Firm Notifies Shareholders of Okta, Inc. of a Class Action
Lawsuit and a Lead Plaintiff Deadline of July 19, 2022 – (NASDAQ: OKTA)” Cision PR Newswire. Retrieved from: https://www.
keloland.com/business/press-releases/cision/20220608NY82425/shareholder-alert-the-gross-law-firm-notifies-share-
holders-of-okta-inc-of-a-class-action-lawsuit-and-a-lead-plaintiff-deadline-of-july-19-2022-nasdaq-okta/; Gately,
Edward. 2022. “Okta Data Breach Could Impact Hundreds of Corporate Customers” Channel Futures. Retrieved from:
https://www.channelfutures.com/security/okta-data-breach-could-impact-hundreds-of-corporate-customers; Barsky,
Noah. 2022. “Okta’s Fearful Cyber Response Worse Than Hackers’ Peek – How 3 Tempting Tech Crisis Shortcuts Cost More”
Forbes. Retrieved from: https://www.forbes.com/sites/noahbarsky/2022/06/01/okta-fearful-cyber-response-worse-
than-hackers-peek/?sh=222740d05ab7.
7
Kelly Sheridan, “Do Cyberattacks Affect Stock Prices? It Depends on the Breach,” posted on darkreading.com on April 27,
2021.
(https://www.darkreading.com/threat-intelligence/do-cyberattacks-affect-stock-prices-it-depends-on-the-breach)
8
Alexander Culafi, “Microsoft confirms breach, attributes attack to Lapsus$,” posted on techtarget.com on March 23, 2022.
(https://www.techtarget.com/searchsecurity/news/252515022/Microsoft-confirms-breach-attributes-attack-to-Lapsus)
9
Pete Swabey, “Microsoft confirms Lapsus$ breach and reveals hacking group’s tactics,” posted on techmonitor.ai on
March 23, 20222.
(https://techmonitor.ai/technology/cybersecurity/microsoft-confirms-lapsus-breach-and-reveals-hacking-groups-tac-
tics)
10
ibid.
11
Microsoft, “DEV-0537 criminal actor targeting organizations for data exfiltration and destruction,” posted on microsoft.com
on March 22, 2022.
(https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-da-
ta-exfiltration-and-destruction)
Cyber-Risk Oversight
59
be helpful with benchmarking when they provide strategic context or information about the impact on
business performance and strategic risk positions. It is the role of management to avoid using overly
technical concepts and to translate them in business impact terms that the board understands and can
use as part of its oversight role.
Below are more detailed questions board members should be asking management to ensure proper
metrics are being collected on the enterprise’s cyber risk, grouped in five categories as outlined in
Principle 5. Directors will work with management to determine the level of depth required, depend-
ing on each organization’s size and circumstances.
X How many cyber incidents has our company experienced in the last reporting period?
X Are there any new emerging threats that are affecting our business performance (e.g., trends in
ransomware, zero-day-attacks, new attack patterns)?
X Are our threat intelligence capabilities adequate, and how do they compare to our peers?
X What are the security ratings of our strategic partners and suppliers?
X What are the findings of the latest penetration testing performed by our external provider?
X How mature are our cyber-risk management practices as assessed by a leading cyber
consultancy?
X Are there any outside sources for assessing our security posture that we may not be including?
What about our audit firm?
X Are these metrics acceptable or not? How are they trending? What are our target goals?
X What is the probable frequency and the probable magnitude of these top cyber events?
X What cyber risk quantification model or models are we using to assess cyber risk? Have these
models been independently validated?
X What are the forms of loss that we can experience, and how are we measuring and reporting on
those losses? (For example, productivity, response costs, replacement costs, fines and judgements,
reputational loss)
X What is the level of risk that we can tolerate as a business, and how are we tracking against it?
X Is our cybersecurity spending adequate given the threats we face and our risk appetite targets?
X Which key controls are most cost effective? Which ones are the least cost effective? Are
there any (possibly older/outdated) initiatives eating up resources that would be better spent
elsewhere?
Cyber-Risk Oversight
61
TOOL G
Cybersecurity Concerns
During M&A Phases
By Andrew Cotton, EY
This tool reviews cybersecurity risks at key stages of a merger or acquisition transaction and provides
suggested questions for board members to discuss with management at each stage.
INTRODUCTION
Over the past few years, numerous high-profile cybersecurity incidents have emerged during or after
large mergers and acquisitions (M&A) deals. These incidents have raised concerns among corporate
executives, investors, and regulators.
Corporate executives and M&A professionals will point to improved processes and outsourced services
to identify and prevent security issues. However, despite heightened awareness and the existence of
various vendors who can assist in the cybersecurity elements of the M&A process, the cyber risks for ac-
quirers are only increasing. This is due to factors such as increased online connectivity within companies
and with their suppliers and customers in addition to a more distributed workforce, digital transforma-
tion, and increased cloud adoption. All of the above serve to increase the attack surface, resulting in an
elevated threat environment.
The decision makers in an M&A transaction often tend to approach the strategy, finance, legal, or operational
risks before accounting for cyber risks. As noted by Rob Gurzeev of TechCrunch,1
“With limited time and little background in cybersecurity, M&A teams tend to focus on more ur-
gent transactional areas of the deal process, including negotiating key business terms, business
and market trend analysis, accounting, debt financing and internal approvals. With only 2-3
months to evaluate a transaction before signing, cybersecurity typically only receives a limit-
ed amount of focus. . . . [I]t’s no coincidence that a recent poll of IT professionals by Forescout
showed that 65% of respondents expressed buyer’s remorse due to cybersecurity issues. Only
36% of those polled felt that they had adequate time to evaluate cybersecurity threats.”2
Timely identification of cyber risks allows appropriate quantification of the valuation considerations,
including estimated onetime and recurring costs to remediate cyber vulnerabilities or gaps in regulatory
compliance. It also enables renegotiation of deal terms that either build the cost of remediation into the
arrangement price or provide for insurance or other means of clawback if the identified vulnerability
becomes an incident.
During each phase of the transaction, directors should expect to receive from management as much
certainty and quantification as possible about the scale of inherited risks.
Cyber-Risk Oversight
63
Directors should expect management to conduct a cyber-risk assessment for each phase of the trans-
action life cycle to confirm systems and processes are secure, and to quantify the risks that may impact
the company after the deal closes, impacting revenues, profits, market value, and brand reputation.
The table on page 63 outlines a few suggested steps that directors can ask members of management
at each phase of the deal cycle. Further details are provided on the following pages.
X Cybersecurity-related terms and conditions in customer and supplier contracts that have a
potential financial impact or that could result in litigation for noncompliance
X Noncompliance with cybersecurity-related data privacy laws or other applicable regulations and
requirements
X Recent data breaches or other cybersecurity incidents
The acquirer’s assessment would review the security architecture, conduct forensic analysis on key
network devices, and review logs looking for any indication the target might already be compromised.
It should also include a review of recent or ongoing breach responses, tools, policies, and regulatory
positions to identify security gaps, risks, and potential liabilities.
Acquirers may consider establishing a contingency fund to be held in escrow for potential exposures that
may occur after closing. Where there has been a recent breach, the assessment should also reveal if the
target has appropriately remediated to prevent a recurrence. Boards should not, however, assume that
on-site assessments are guaranteed to identify all deficiencies. The nature of due diligence means the
assessment team may not be given access to interview key security personnel who are not aware of the
potential acquisition. Additionally, the assessment represents only a snapshot in time and may well lack
historical context of past issues.
Cyber-Risk Oversight
65
Prioritization will certainly be a necessary key judgment. Some issues may need to be addressed imme-
diately if the acquired company is going to be integrated within the short term. If the entity is to be run
as a separate, wholly owned subsidiary, however, the target’s risks may potentially be “quarantined.”
Acquirers should fully understand the target company’s requirement for domestic and global compli-
ance and reporting. The acquirer must not only understand any new regulatory requirements, but must
also demand information on any recent, current, or anticipated engagements with regulators due to
cyber incidents.
Acquirers should consider conducting “dark web” (anonymously run and difficult-to-access websites
favored by hackers) searches about the target, their systems, data, and intellectual property. This helps
identify whether the company is already on attackers’ radars, whether its systems or credentials are
already compromised, or whether its sensitive data is for sale or being solicited.
Acquirers should also consider engaging vendors specializing in researching malware infections to look
for infections in the target company and for any holes in their defenses that are visible from the outside.
This cybersecurity hygiene-related information is publicly available and can be used to compare one
company to another, allowing management to save time and energy by not pursuing companies whose
risk profile is unacceptably high.
Evolution in the legal landscape must be taken into account for effective due diligence. For example, the
US Securities and Exchange Commission’s 2018 Cybersecurity Guidance states that companies should
consider disclosing risks arising from acquisitions in the Risk Factors section of their periodic filings.
Moreover, a proposed SEC rule that could be adopted in 2023 includes instituting a four-day timeframe
after a determination that the incident is material for publicly disclosing significant cybersecurity inci-
dents. Understanding the acquiree’s processes for internal escalation and evaluation may help deter-
mine if such a timeframe would be achievable.
After the public deal announcement and before close and subsequent integration, new threats may
emerge. Malicious actors know that there will be security audits in this period and an associated
granting of temporary network access to outsiders. They may look to take advantage of the situation to
penetrate networks in this period.
INTEGRATION PHASE
Once the organization has made the decision to acquire, it needs a plan to remediate compliance
concerns, address risk exposure, and integrate security operations—where appropriate. This starts with a
consolidated technology, security, and operations road map.
Acquirers should consider the merits of maintaining discrete operations with separate business and
operating models. If the assets of the target will merge with core business operations, then integration is
called for.
Aside from traditional post-deal integration challenges related to people, processes, systems, and
culture, an additional cyber risk accrues to both companies on the day the deal is announced. On Day
One, they become a target for social engineering attacks by those seeking to use the acquiree as a back
Over the first six months post integration, boards should pay particular attention to integration project
milestones slipping due to lack of funding, which is often a result of overly optimistic cost estimates. Such
underestimation is common when estimates are created from incomplete knowledge inherent in a
closely held due diligence process.
However, there must also be a Day One integration plan to extend as much of the acquirer’s cyber
protections as possible to the target company immediately. At a minimum, the plan should include these
steps:
X Exchange of threat information to include Internet domains to be blocked.
X Conduct employee awareness training emphasizing the risk of phishing attacks mimicking emails
from the new parent company and other new risks. As companies combine their IT departments,
hackers may use this time to impersonate administrators.
X Perform a much deeper on-site assessment to further refine risks and integration costs.
X Reengagement with the open-source research vendors recommended during due diligence to
identify spikes in indicators of cyber risk—a sudden increase in hygiene-related traffic after an
announcement could be an indirect measure of other malicious activity.
X Ideally, routing the target company’s email through the parent company’s email screening
process if that capability exists is desirable.
During this phase, it is also important to perform an operation-focused gap analysis to determine if one
company has certain cyber capabilities or processes that the other does not have or that the combined
organization could benefit from long term. If this is the case, the transaction is an ideal time for business
changes or transformational activities to add value to the combined organization.
Acquirers should consider the benefits of leveraging cloud services to integrate the combined compa-
nies’ applications and data faster. This can result in more rapid realization of synergies, less reliance
upon third-party services, and potentially a reduction in overall risk through an organization hosting its
own data applications.
Cyber-Risk Oversight
67
CONCLUSION
Cybersecurity diligence during M&A calls for a two-pronged approach. Companies must conduct rigor-
ous due diligence on the target company’s cyber risks and assess their related business impact through-
out the deal cycle to protect the transaction’s return on investment and the entity’s value post transac-
tion. In addition, all parties involved in the deal process need to be aware of the increased potential for
a cyberattack during the transaction process and should vigilantly maintain their cybersecurity efforts.
Applying this two-pronged approach during M&A will serve to ultimately protect stakeholder value.
ENDNOTES
1
Rob Gurzeev, “It’s time to better identify the cost of cybersecurity risks in M&A deals,” posted on techcrunch.com on
September 10, 2020.
(https://techcrunch.com/2020/09/10/its-time-to-better-identify-the-cost-of-cybersecurity-risks-in-ma-deals/)
2
Forescout Technologies, The Role of Cybersecurity in Mergers and Acquisitions Diligence (Forescout Technologies, 2019).
(https://www.forescout.com/resources/cybersecurity-in-merger-and-acquisition-report/)
3
Julian Meyrick, Julio Gomes, Nick Coleman, and Stephen Getty, Assessing Cyber Risk in M&A: Unearth Hidden Costs
Before You Pay Them (IBM Corporation, 2020) (https://www.ibm.com/downloads/cas/RJX5MXJD)
INTRODUCTION
As corporate information security functions mature, board directors must ask themselves how they can
effectively communicate with the security team. The individual occupying the lead position, typically
the chief information security officer (CISO), manages vast numbers of operational, reputational, and
monetary risks. The scope and importance of the CISO’s work behooves directors to form a candid
relationship with this functional leader in the interest of performing effective cyber-risk oversight. Accord-
ingly, many board members are establishing an ongoing relationship with the CISO not only through
full-board and committee meetings, but also outside the boardroom.
Different organizations and business processes require unique strategies and assessment depending on
inputs like size, industry, value, risk tolerance, and threats. To help the board assess risk the CISO should
have clear and consistent communication with the board that conveys the health and maturity of the
cybersecurity program and calibrates risk tolerance for the corporation. This will also help the CISO
effectively manage cybersecurity governance, performance, and risk management.
The board building strong working relationships with the CISO and their cybersecurity team goes hand-
in-hand with establishing a strong culture of cybersecurity throughout the company—and including
within the board itself. Having a visible relationship between the board and the CISO makes it very clear
to the whole company that cybersecurity is worthy of their time. Today’s CISOs need to be much more
than just technical specialists in “security.” To be effective, they need to be program managers, people
developers, relationship builders, culture leaders, risk managers, strategists, industry luminaries, and
growth oriented.
This tool offers guidance on how boards can more effectively establish a relationship with their organi-
zation’s CISO and security team in order to establish an agreed-upon risk tolerance profile for the orga-
nization, and assist in defining a requisite culture of cybersecurity. The questions below are stated as if
a board member were asking the CISO a question. Most questions are followed by a bullet explaining
the “why” behind the question to be asked. Because not every question will have relevance for every
organization, directors should select those most appropriate to the issues and circumstances at hand.
Cyber-Risk Oversight
69
X Who are you reporting to now, and has that changed in the past five years?
There is no clear industry consensus on this topic. By far, the largest percentage report
to the CIO, although there is a growing perspective that reporting to the CIO might not
be the right answer. It is certainly true that a CIO might well have a conflict of interest
between IT service delivery pressures, cost, customer experience, and security. Those
factors need to be weighed against the value of having the CISO’s supervisor being
able to understand the technology and business risks and being capable of arbitrating
trade-offs without escalating issues to the CEO for resolution. Some technology-oriented
companies are now having the CISO report to the chief technology officer (CTO) to help
ensure that cybersecurity is not just another risk management issue, but is also more
directly incorporated into product development life cycles and portfolio strategies,
frequently as a differentiator among the company’s market competitors. Ultimately, the
age-old tension between user experience and security remains, regardless of whom the
CISO reports to, and an enlightened CISO understands that all solutions need to be both
safe and performant. A key consideration for CISO reporting lines is whether or not that
person has a strong voice on the executive leadership team to advocate appropriately
for security. If the person representing the CISO at the executive level cannot influence
the CEO and CFO, a security program cannot succeed.
X How is the organization’s cybersecurity budget determined? What is its size and how does this
figure compare with leading practice in a company’s particular industry and generally? Is
the level of funding aligned to the desired performance maturity for the information security
program? Is the level of funding commensurate with the expected risk profile for the company?
Comparing these figures with industry spending trends is probably the best way to understand
the adequacy of funding. CISOs will not typically ask the board for funding—that is a
responsibility for management to address—but directors can certainly do their homework to
understand whether or not the CISO’s role can actually be effective given the funding levels
provided by the organization and influence the CEO and CFO as required.
X How much of the security infrastructure is outside of your budget or directive authority as CISO?
Threats always evolve faster than the budget cycle. If a CISO is in the position of frequently
asking others in the IT organization to upend their annual plans to accommodate emerging
security needs, the chances of the changes being rejected are increased. Conversely, the more
the CISO is in a position to make budget trade-offs internally in real time, the more rapid the
response and the lower the risk. This situation is particularly true outside upper management,
where the lines of business frequently have more decision-making authority for product
security trade-offs. For this reason, many leading organizations are approaching cyber-risk
budgeting on a team basis as opposed to strictly as part of the IT budget.
X Which security tools or other investments were below the “cut” line in the budget?
Management is always eager to tell a board what they are doing, but are less eager to discuss
what they are not doing. A conversation about what fell below the cut line and what decision
process was used to evaluate trade-offs will always be illuminating. This conversation should
Cyber-Risk Oversight
71
SPEND TIME WITH THE CISO AND THE CYBERSECURITY TEAM
OUTSIDE OF THE BOARDROOM
With packed board meeting agendas, it is unrealistic to think that the board can get sufficient insight into
a company’s cybersecurity posture through quarterly presentations. Board members should arrange
to visit the security team and receive orientations firsthand from personnel situated on the front lines of
cybersecurity. These sessions will provide valuable insights and learning opportunities for board mem-
bers far beyond what they could obtain from highly scripted board presentations. The security team will
appreciate it, too, since visits like this can increase its visibility, raise morale, and reinforce the need to fo-
cus on this area. The board’s greater familiarity with the team’s mission and key security leaders will pay
huge dividends when a crisis occurs. A crisis is the wrong time for directors to get acquainted with the
CISO and key staff, their programs, and their relationship network across industry, customers, suppliers,
and partners that may be able to help.
X Many security teams routinely produce internal reports for management and senior leadership
on cyberattack trends, incidents, and threats. Directors can discuss with the CISO, corporate
secretary, and board leaders whether this information might be relevant and useful to include in
board materials.
X CISOs spend a great deal of time assessing risk, building threat models, and conducting exercises
to test the effectiveness of cybersecurity controls. This is a great area for directors to engage the
CISO and their team outside of the boardroom, not only to directly deepen their engagement
but also to indirectly learn about potential future business risks that might not normally come up
during a more formal briefing to the board.
Boards should not assume that high-performing organizations track maturity in only one
way, or that the measure of a mature cybersecurity program occurs by simply counting
all the tools that they have deployed or how many people that they have on their team.
Maturing cybersecurity programs focus not just on defensive technology, alerting, and
incident response; they also focus on improving processes that help to incorporate
standard cybersecurity practices throughout all of the critical business workflows and
activities. They focus on talent, risk, and culture. They have a mindset of continuous
improvement and innovation. The board can tap into this understanding to help build
synergy and partnership with the CISO on moving the needle on key enterprise risks.
Cyber-Risk Oversight
73
X Do you or the information security team participate in cybersecurity information-sharing
initiatives (e.g., industry-focused, cyber-community-focused, or public-private partnerships)? How
is the information that is gathered from participation in such initiatives used and shared within the
organization to improve understanding and capability maturity?
As challenges increase in complexity and scale, industry cooperation and information sharing
about threats will become a valuable tool in the CISO’s kit.
X Do you or a partner in your team have relationships with public-sector stakeholders such as
law enforcement agencies (e.g., FBI, INTERPOL, US Secret Service, DHS/CISA, NSA), regulatory
agencies’ cybersecurity divisions, the US Computer Emergency Response Team (US-CERT), etc.?
Similar to cooperation with private industry partners, cooperation before an attack happens
is becoming a pillar of sound security practices. See Principle 6 for more reasons to engage in
cooperative relationships with these agencies.
X How often do you chat with CISO peers in your network about the challenges they are facing?
What kind of peer exchange groups do you participate in that touch on risks facing our industry?
Cyber capability can definitely be a competitive differentiator for companies in cyber product
markets, but when it comes to dealing with common adversaries across any industry, it is
important that the CISO and their team establish very strong, noncompetitive relationships
with peer companies for threat intelligence information sharing for collective defense.
These relationships are essential for both program and cultural maturity at all levels of the
cybersecurity team, and work toward cooperative security.
Cyber-Risk Oversight
75
TOOL I
Enhancing Cybersecurity Oversight
Disclosures—10 Questions for Boards
By Robyn Bew, EY
Note: This tool was adapted from How Cyber Governance and Disclosures are Closing the Gap, a publi-
cation released by EY’s Center for Board Matters, September 2022.
This tool provides questions for directors to consider in preparing proxy statement or other disclosures
related to the board’s oversight of cybersecurity. It includes proxy statement disclosure data from US
large-cap companies between 2018 and 2022, which boards can use for benchmarking purposes.
Cybersecurity remains front and center on corporate agendas, as risks and regulatory requirements
both continue to proliferate. In global surveys of CEOs and business leaders, cyber incidents are consis-
tently named as a top threat to business, edging out pandemic-related health risks, supply chain disrup-
tions, and even macroeconomic volatility.1
Investors and other stakeholders are paying attention, seeking more information on how boards and
company leaders are overseeing and managing cyber risks. BlackRock, the world’s largest asset man-
ager, has stated, “[We believe] that data security is a material issue for more and more companies and
regularly [engage] boards and management teams regarding the oversight and management of data
privacy and security, crisis preparedness and response as well as related company disclosures.”2 In
2021, Institutional Shareholder Services (ISS) added 11 factors concerning oversight and management of
information-security risk to its Governance QualityScore rating methodology.3 And in March 2022, the US
Securities and Exchange Commission (SEC) proposed new rules that would require expanded cyberse-
curity-related reporting by public companies, including board oversight disclosures (see sidebar below).
X Whether and how the board considers cybersecurity risks in conjunction with business strate-
gy, financial oversight, and broader risk management oversight
X The cybersecurity expertise resident on the board, if any, and the nature of such expertise
The proposal includes numerous other reporting requirements around cybersecurity incidents, inci-
dent materiality, company risk management and strategy, and management-level cybersecurity gov-
ernance. The SEC stated in early January 20234 that it is aiming to publish a final rule by April 2023.
1. Do we understand the priorities of our company’s major investors and other key stakeholders
(suppliers, customers, employees, regulators, etc.) as they relate to cybersecurity, data privacy, and
other key technology risk and strategy issues?
2. What feedback has senior management and/or investor relations received from our major
investors? What questions are our top shareholders asking about how the company approaches
information security and data privacy?
3. How is the company using disclosures to effectively communicate the rigor of our cybersecurity risk
management program, and related board oversight activities, to investors and other stakeholders?
What changes would be required in order to comply with relevant pending regulatory requirements,
such as the SEC’s proposed rules on cybersecurity disclosures issued in March 2022?
4. Is cybersecurity mentioned in the risk oversight section of the proxy statement?
5. Do we describe which board committee or committees have responsibility for oversight of
cybersecurity matters? Do we describe how the full board is involved in cybersecurity oversight, in
addition to the activities of key committees?
6. Is cybersecurity included in our board skills matrix, or other description of skills resident on the
board? Do we identify one or more directors as having cybersecurity expertise, and the criteria
by which the board defines such expertise? How does professional cybersecurity experience,
credentials, or other knowledge appear in directors’ biographies? Do we disclose any education
board members receive on cybersecurity topics, such as briefings from external advisors, law
enforcement, or other third-party experts?
7. Do we describe how the board and/or key committees receive information from management
about cybersecurity matters? Do we describe how the board and/or key committees consider
Cyber-Risk Oversight
77
cybersecurity matters as part of their deliberations on strategy, financial oversight, and enterprise
risk management?
8. How does the relative prominence and/or specificity of the cybersecurity risk factors in our quarterly
and annual reports compare with those in our current enterprise risk assessments?
9. How do we describe cybersecurity risk management activities, including these:
a. Policies and procedures
b. Response planning, disaster recovery, or business continuity
c. Simulations and tabletop exercises related to cyberattacks or breaches
d. Education and training efforts
e. Information-sharing with industry peers, law enforcement, etc.
f. Use of an external independent advisor to support management and/or attest to cybersecurity
assessment findings
10. How do our disclosures on board cybersecurity oversight compare to those of our competitors and
industry peers?
Area
of Topic Disclosure 2022 2021 2020 2019 2018
focus
CATEGORY: BOARD OVERSIGHT
Disclosed a focus on cybersecurity in
Risk oversight
the risk oversight section of the proxy 95% 88% 89% 86% 76%
approach
statement
Risk factor Included cybersecurity as a risk factor 100% 100% 100% 100% 100%
disclosure
Included data privacy as a risk factor 99% 99% 99% 97% 93%
CATEGORY: RISK MANAGEMENT
Referenced efforts to mitigate
cybersecurity risk, such as
99% 97% 93% 91% 85%
the establishment of processes,
procedures, and systems
Disclosed alignment with external
18% 9% 3% 3% 1%
framework or standard
Cybersecurity Referenced response readiness, such as
SEC risk planning, disaster recovery, or business 66% 65% 61% 57% 53%
ISS management continuity considerations
efforts Stated that preparedness includes
simulations, tabletop exercises, or 9% 5% 7% 3% 3%
response readiness tests
Stated that the company maintains a
51% 43% 36% 36% 31%
level of cybersecurity insurance
Included cybersecurity in executive
7% 11% 5% 1% 0%
compensation considerations
Cyber-Risk Oversight
79
Area
of Topic Disclosure 2022 2021 2020 2019 2018
focus
Education and Disclosed use of education and training
ISS 45% 36% 30% 26% 18%
training efforts to mitigate cybersecurity risk
Engagement
with outside Disclosed collaborating with peers,
15% 12% 11% 12% 7%
security industry groups, or policymakers
community
ENDNOTES
1
See the Allianz Risk Barometer 2022 (Allianz Global Corporate and Specialty SE, 2022), p. 3
(https://www.agcs.allianz.com/content/dam/onemarketing/agcs/agcs/reports/Allianz-Risk-Barometer-2022.pdf), and
Tim Human, “CEOs name cyber-risk as top threat in 2022, survey finds,” Corporate Secretary, Feb. 2, 2022. (https://www.
corporatesecretary.com/articles/technology-social-media/32890/ceos-name-cyber-risk-top-threat-2022-survey-finds).
2
BlackRock Investment Stewardship, Our approach to data privacy and security (BlackRock Inc., 2022), p. 2.
(https://www.blackrock.com/corporate/literature/publication/blk-commentary-our-approach-to-data-privacy-and-se-
curity.pdf)
3
Chuck Seets and Pat Niemann, “How cyber governance and disclosures are closing the gaps in 2022,” posted on ey.com.
(https://www.ey.com/en_us/board-matters/how-cyber-governance-and-disclosures-are-closing-the-gaps-in-2022)
4
See more about the proposed rulings at this URL: https://www.reginfo.gov/public/do/eAgendaMain?operation=OP-
ERATION_GET_AGENCY_RULE_LIST¤tPub=true&agencyCode=&showStage=active&agencyCd=3235&cs-
rf_token=3E2CBC6FB8F5C172183CFD451BB972376A7E3CEC1B3F3B25CAC19245031A81368C69BF9DA8091F129A9842E-
71542A76E8F2
CASE IN POINT
A US-Based Financial Corporation Exposed 100+ Million Personal Records Due to a
Misconfigured Cloud Resource
A large financial corporation agreed to pay $190 million to settle a class-action lawsuit that customers
filed against the firm after a hacker broke into its cloud-computing systems and stole their personal
information.
The hacker broke into the company’s cloud-computing systems and stole files containing the customers’
personally identifiable information (PII), including credit card applicants, payment card transaction his-
tory, contact information, and credit scores, along with more than 100,000 Social Security numbers. The
unauthorized access took place on March 22–23, 2019, when the attacker exploited a firewall misconfig-
uration which permitted commands to reach the impacted server. Overall, the cyberattack exposed the
personal data of more than 100 million customers.
Source: “Capital One Settles Class-Action Cyber Lawsuit for $190 Million” Jennifer Surane on Bloomberg, December 23, 2021.
Cyber-Risk Oversight
81
QUESTIONS BOARDS SHOULD ASK MANAGEMENT ABOUT THEIR
CLOUD SECURITY STRATEGY AND CONTROLS
The questions below are designed to help directors gain an understanding of their organization’s cloud
computing strategy and the programs, controls, capabilities, and resources that the organization and its
management have employed to mitigate the risks associated with the strategy.
1. Are we adopting cloud-first strategy (i.e., all new assets in the cloud) or hybrid strategy (where
we have some assets in cloud and some in traditional data centers)? Additional follow-ups include
these:
a. What percentage of our total assets are based in the public cloud today versus our existing data
centers (e.g., 50-50%, 70-30%, 90-10%?)? What is our forecast over the next three years?
b. What percentage of our revenue-generating assets are hosted in public cloud environments to-
day, and what is our forecast over the next three years?
2. What were the major factors that drove the decision to migrate and expand adoption of cloud
services?
a. Elasticity: Was the ability to rapidly scale to support increasing customer demands, integrate new
acquisitions, or expand to new geographies critical to the decision?
b. New Innovations: Was there the desire to take advantage of the cloud service providers’ invest-
ments in emerging capabilities and services?
c. Compliance and Security: Did the significant investment in security controls and existing compli-
ance with prevailing standards and frameworks (e.g., ISO, NIST, FISMA) that cloud providers are
held to play a role in the decision?
d. Reduce Cost by Divesting Our Expensive Data Centers: Were we able to increase capacity re-
quirement with this choice? Did it allow the reduction of constant technology changes (hardware
and software refreshes), data center contract renewals, and other challenges?
3. What types of business processes are we using cloud-based resources to create or refine? Is it our
plan to
a. use limited Software as a Service (SaaS) for employee productivity and back-office processing;
b. use cloud services to store, process, and manage our sensitive confidential information;
c. host, process, and control our customers’ sensitive information in cloud services, and/or
d. exit our current data centers and shift all hosting services to public cloud service provider environ-
ments?
4. Do we understand our SaaS ecosystem, and how and where each cloud service provider is storing
our sensitive data for each of these functions?
a. Corporate Systems (e.g., ERP, HR, Payroll)
b. Productivity Tools (e.g., MS Office, Google Suite)
c. Sales & Marketing (e.g., pricing, orders, etc.)
d. Customer Master Data (e.g., customer lists)
e. Products and Applications (hosted environments)
Cyber-Risk Oversight
83
12. How are we measuring our cloud spend and savings generated? Consider asking management if
the following standards are being met during measurement:
a. Processes are established to monitor trends and modify the license agreement
b. Enforcing tagging standards across the organization
c. Persistent tracking with a cloud cost management tool that is also shared with users to monitor
their own cloud consumption and spend
Cyber-Risk Oversight
85
X Build connections with the federal government. Your company can maintain a person-to-
person relationship with CISA through our regional offices8 located across the nation. These
advisors can connect your company with CISA’s services and resources, as well as provide a direct
point of contact in times of emergency.
Cyber-Risk Oversight
87
(which often handles vendor accounts—another gap worthy of discussion). If the CISO doesn’t mention
some of these struggles, they may need to do some additional research.
Possible answers:
“As I mentioned before, our call-center network is connected to our production network, so
a compromise of any one system there gives an attacker access to networks containing our
customer data. It’s not uncommon for criminals to bribe call center employees, or to have an
accomplice get a job in a call center for just this purpose. They very well might start there.”
“We just acquired that small company and haven’t imposed our security controls on them yet.
Their network is separate, but they have privileged access in our development environment.
Not only might we not be able to prevent the attack, but we also probably couldn’t detect it.
That might be a good attack path for an attacker.”
Answers that require more investigation: Every security professional should have several ideas on how
such an attack might happen. If the CISO doesn’t have any ideas or is overly confident in the security
posture of the company, it may be because they are overly focused on building defenses and need to
spend time thinking from the opponent’s perspective. Conducting a tabletop exercise can generate cre-
ativity and deeper insights, as one example of a way to view the security program from the perspective
of a hacker.
The proposed attacks should be relatively simple and not rely on advanced attacks using multiple ze-
ro-day vulnerabilities. When they are compromised, most organizations are not attacked by intelligence
agencies spending millions of dollars. Far too many organizations are compromised because they ran
unpatched software, didn’t segment their networks, did not implement MFA, and allowed users to run
arbitrary software on their laptops.
The Cybersecurity and Infrastructure Security Agency (CISA) is the newest agency in the federal government,
established in 2018 to be America’s Cyber Defense Agency. We serve as the National Coordinator for critical infra-
structure security and resilience, leading the effort to understand, manage, and reduce risk to the cyber and physical
infrastructure that Americans rely on every hour of every day. As the majority of our nation’s critical infrastructure is
owned and operated by the private sector, operational collaboration is foundational to our efforts. We work with a
wide array of partners across the globe—from every industry, to federal, state, local, tribal, territorial and interna-
tional governments, to non-profits, academia, and the research community—connecting them together and to the
resources, tools, and information that will help them fortify their security and resilience against current and emerging
threats.
Cyber-Risk Oversight
89
ENDNOTES
1
See the “Cybersecurity Alerts & Advisories” web page posted on cisa.gov.
(https://www.cisa.gov/uscert/ncas/alerts)
2
For more information, see the “Known Exploited Vulnerabilities Catalog” web page posted on cisa.gov.
(https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
3
Please see CISA’s “Cross-Sector Cybersecurity Performance Goals” web page.
(https://www.cisa.gov/cross-sector-cybersecurity-performance-goals)
4
To learn more about the program, visit CISA’s “Cyber Information Sharing and Collaboration Program (CISCP)” web
page. (https://www.cisa.gov/resources-tools/programs/cyber-information-sharing-and-collaboration-program-ciscp)
5
To learn more about the program or to join your sector’s ISAC, visit CISA’s “National Council of ISACs” web page.
(https://www.nationalisacs.org/)
6
To report an incident, visit the “Report to CISA” web page.
(https://www.cisa.gov/report)
7
Report a cyber crime to the FBI by filing a complaint via the “Internet Crime Complaint Center (IC3)” web page.
(https://www.ic3.gov/)
8
For a list of CISA’s regional offices, visit CISA’s “CISA Regions” web page. (https://www.cisa.gov/about/regions)
Share valuable insights from other investigations that may help mitigate damage
and prevent future incidents.
X Disclosing information about an incident to the FBI enables investigators to make connections
among related incidents.
X This enhances the FBI’s abilities to share valuable insights and information regarding the
perpetrator’s tactics, tools, and techniques. Such information may allow you to better protect
your company’s network and assist the FBI in identifying and warning you (and others) of future
malicious activity.
Cyber-Risk Oversight
91
X Proactive reporting to law enforcement may help your organization deal with government
regulators such as the Federal Trade Commission, which has declared that it will look more
favorably on a company that has reported a cyber incident to law enforcement and cooperated
with the investigation than it will look on companies that have not.
X If an incident becomes public, cooperation may strengthen your organization’s position with
shareholders, insurers, lawmakers, and the media.
X Forensic reports from any incident response firm that has been contracted
Cyber-Risk Oversight
93
Domestic Security Alliance Council (DSAC):
X DSAC is a partnership between the US government and the US private industry that enhances
communication and the timely and effective exchange of security and intelligence information
between the federal government and the private sector.
The National Security Cyber Specialist (NSCS) is a nationwide network of the DOJ headquarters and field personnel
trained and equipped to handle national security-related cyber issues. It includes specially trained prosecutors from
every US Attorney’s Office, along with experts from the National Security Division and the Criminal Division.
To contact a NSCS representative, email DOJ.Cyber.Outreach@usdoj.gov or NSCS_Watch@usdoj.gov.
Cyber-Risk Oversight
95
7. How easy will it be for an adversary to execute an attack on the system based on the technical
characteristics?
8. What is the organization’s strategy to validate data set collection practices?
9. How will the company prevent inaccuracies that may exist in the data set?
10. What will be the damage incurred from an attack on the system in terms of the likelihood and the
ramifications of the attack?
11. How frequently will the company review and update its data policies?
12. What is the organization’s response plan for cyberattacks involving these systems?
13. What is the company’s plan to audit the AI system?
14. Should the company create a new team to audit the AI or ML system?
15. Should the company build an educational program for its staff to learn about the use and risks of AI
and ML in general?
Cyber-Risk Oversight
97
TOOL N
US Secret Service’s Role
in Stopping Financial Loss
By Global Investigative Operations Center Staff, US Secret Service
Phishing attacks both broad and targeted to deploy malware and steal login credentials
Scraping the dark web to harvest login credentials from prior data breaches
Gaining access to email accounts through social engineering schemes
X Once email accounts are compromised, email rules and settings, such as auto-forwarding, are
typically established to forward emails to other accounts.
X This allows criminals to surreptitiously monitor communications.
X The spoofed email accounts are often manipulated by changing an email’s display name (i.e.,
send mail as) settings to mask a criminal’s true email address.
X Stolen funds are laundered by several methods, including these:
X Update and practice your incident response plan (IRP), including with law enforcement partners.
X When aware of an incident, contact your bank to reverse transaction, for hold harmless and
indemnification.
X As a reminder–Immediately report an incident to law enforcement, including your local US Secret
Service Field Office (https://www.secretservice.gov/contact/field-offices).
For more information on BECs and how to prepare for other common cyber incidents, visit the USSS website.2
Cyber-Risk Oversight
99
ENDNOTES
1
For information about the US Secret Service’s Field Offices, visit their “Field Offices” web page.
(https://www.secretservice.gov/contact/field-offices)
2
See the US Secret Service’s web page, “Preparing for a Cyber Incident.”
(https://www.secretservice.gov/investigation/Preparing-for-a-Cyber-Incident)