{"id":860,"date":"2021-06-28T16:10:00","date_gmt":"2021-06-28T16:10:00","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=860"},"modified":"2023-10-03T06:20:45","modified_gmt":"2023-10-03T06:20:45","slug":"how-to-explain-cyber-risks-to-your-leadership-team","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/how-to-explain-cyber-risks-to-your-leadership-team\/","title":{"rendered":"How to explain cyber risks to your leadership team"},"content":{"rendered":"\n

When it comes to communicating cybersecurity risks to boards and executive leadership teams, IT professionals need to learn a whole new type of programming language.<\/p>\n\n\n\n

As businesses rapidly digitise virtually every aspect of their operations, the potential fallout of data breaches and ransomware attacks has exponentially increased. But while everyone now understands that cybersecurity is important (at least in theory), not everyone at the top of the org chart is particularly tech-savvy.<\/p>\n\n\n\n

A recent Accenture study<\/a>, for instance, analysed almost 2,000 directors at more than 100 large banks and found that only 10 per cent of board directors and 10 per cent of chief executive officers on boards had any IT experience, and a third of the world\u2019s biggest banks still have absolutely no board members with professional technology experience.<\/p>\n\n\n\n

Jamie Wilson, Executive Chairman and Founder of Cryptoloc, says he sees far too many leadership teams taking a laissez-faire approach to cybersecurity, particularly as businesses migrate to the cloud.<\/p>\n\n\n\n

\u201cWhen you push your operations to the cloud, you\u2019re using third-party providers, and that opens you up to a whole lot of vulnerabilities,\u201d he says. \u201cWhat I often see is that people don\u2019t take enough time to investigate those third-party solutions \u2013 they just trust that their cloud provider is secure, and they\u2019re actually not.\u201d<\/p>\n\n\n\n

Establishing a common language with high-level execs to educate and advise them about cyber risks can be a significant challenge, but it\u2019s often the only way to get the resources you need \u2013 so here are a few ways to get the board on board with cybersecurity.<\/p>\n\n\n\n

Don\u2019t bury your message in technical jargon<\/h3>\n\n\n\n

The technical jargon that tends to be beloved by IT departments can make it difficult for organisations to have the necessary conversations about cybersecurity.<\/p>\n\n\n\n

To avoid falling down a rabbithole of detailed technical explanations and giving yourself a front-row seat to a room full of executives with their eyes glazed over, outline cybersecurity risks in terms of the damage a cyber attack could do to the smooth operation of the business, not to systems that nobody outside the IT department is likely to have a grasp of.<\/p>\n\n\n\n

\u201cYou\u2019ve got to remember that these are not necessarily technical people,\u201d Jamie says. \u201cYou have to be able to explain the problem to your grandmother, and put it in terms that she\u2019ll understand.\u201d<\/p>\n\n\n\n

When explaining the importance of encryption and the risks posed by social engineering scams like phishing, for instance, Jamie says he likes to \u201cpaint a picture of a house\u201d.<\/p>\n\n\n\n

\u201cWhat does the perfect home security system look like? You\u2019ve got CCTV cameras, you\u2019ve got bars and security screens on the windows, you\u2019ve got double deadlocks on the door, you\u2019ve got a massive fence and you\u2019ve got a couple of vicious dogs. Those are your perimeter controls.<\/p>\n\n\n\n

\u201cBut the weakest link in that security system is the person who\u2019s already inside the home, and is scammed into letting a criminal walk through the front door. Well, it\u2019s the same with an employee who opens a phishing email, or connects to the wrong IoT device \u2013 before you know it, the cybercriminals are inside your system, and your perimeter controls that were supposed to stop anyone from getting in can\u2019t protect you.<\/p>\n\n\n\n

\u201cIn that situation, you have to rely on your internal controls, which include encrypting and backing up your data so you don\u2019t lose any sensitive information in the event of an attack.\u201d<\/p>\n\n\n\n

Use the language of risk management<\/h3>\n\n\n\n

Your typical board member might not be able to configure a firewall, but they do understand their fiduciary responsibilities and the ever-present language of risk management.<\/p>\n\n\n\n

To capture their attention, focus on actual risks to business operations, the likelihood and repercussions of those risks, and the cost of mitigating those risks compared to the cost of doing nothing.<\/p>\n\n\n\n

You could enlist the help of a risk management professional who\u2019s well-versed in couching risks in those terms for executives, but if that\u2019s not possible, make sure you clearly prioritise the risks for the board, instead of presenting them with an amorphous jumble of possible scenarios.<\/p>\n\n\n\n

As noted in a recent ISACA white paper on reporting cybersecurity risks to boards<\/a>, \u201cPresenting a full slate of risk scenarios to the board is not beneficial until the scenarios are ordered and prioritised using quantitative measurement that is in a familiar format for executives.<\/p>\n\n\n\n

\u201cThe members of board committees are adept at managing financial measurements. The more a risk-management measurement resembles the financial statements and income projections that the board typically sees, the easier it is for board members to manage cybersecurity risk.\u201d<\/p>\n\n\n\n

One sticking point here is that many businesses simply don\u2019t understand what\u2019s at risk, because they don\u2019t understand the value of their digital assets.<\/p>\n\n\n\n

\u201cBefore you know it,\u201d Jamie says, \u201cthe board is saying, \u2018well, let\u2019s do something\u2019, because they know it\u2019s their duty to do something, but they\u2019re doing it without understanding the implications.\u201d<\/p>\n\n\n\n

Telstra\u2019s \u2018Five Knows of Cybersecurity\u2019<\/a> provide a guide to the five things organisations must know to effectively manage their risk:<\/p>\n\n\n\n

    \n
  1. Know the value of your data.<\/li>\n\n\n\n
  2. Know who has access to your data.<\/li>\n\n\n\n
  3. Know where your data is.<\/li>\n\n\n\n
  4. Know who is protecting your data.<\/li>\n\n\n\n
  5. Know how well your data is protected.<\/li>\n<\/ol>\n\n\n\n

    If you can answer these five questions for your leadership team, it will underscore just how  crucial cybersecurity is to your organisation and highlight what needs protecting.<\/p>\n\n\n\n

    Give them solutions, not problems<\/h3>\n\n\n\n

    Board members didn\u2019t get where they are by wallowing in problems that can\u2019t be solved. They expect solutions and they expect results, so when you talk to them about cyber risks, make sure you also talk to them about your plan to prevent, detect and mitigate those risks.<\/p>\n\n\n\n

    Of course, they don\u2019t want or need to know every technical detail \u2013 \u201cthat\u2019s information overload,\u201d Jamie cautions. But they do want and need to know their business is going to keep operating in the face of cybersecurity challenges.<\/p>\n\n\n\n

    Be upfront about the costs, and don\u2019t shy away from the fact that cybersecurity is an ongoing investment. While it\u2019s obvious to you that security solutions need to keep pace with changing digital infrastructures and systems, it might not be obvious to an exec who\u2019s expecting a quick set-and-forget fix.<\/p>\n\n\n\n

    To give yourself a benchmark that you can share in relation to how your company performs against its competitors, align your solution with widely-used certifications and frameworks \u2013 Cryptoloc\u2019s patented encryption technology, for instance, is ISO-certified.<\/p>\n\n\n\n

    Make your company\u2019s adherence to best practices a selling point, so that cybersecurity spending stops being something that your leadership team is grudgingly forced to commit to and starts being seen as the worthwhile investment that it is.<\/p>\n\n\n\n

    In today\u2019s business landscape, you\u2019ll find that most boards are willing to be convinced of the importance of cybersecurity \u2013 but it\u2019s up to you to sell them on the right solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"

    When it comes to communicating cybersecurity risks to boards and executive leadership teams, IT professionals need to learn a whole new type of programming language. As businesses rapidly digitise virtually every aspect of their operations, the potential fallout of data breaches and ransomware attacks has exponentially increased. But while everyone now understands that cybersecurity is […]<\/p>\n","protected":false},"author":3,"featured_media":1118,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/860"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=860"}],"version-history":[{"count":1,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/860\/revisions"}],"predecessor-version":[{"id":861,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/860\/revisions\/861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/1118"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}