broken image
broken image
GET IN TOUCH
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
broken image
broken image
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
GET IN TOUCH
broken image

Oversight and Management of Cybersecurity Risks for Board of Directors/Decision Makers

· Technical and Security Deep Dives,Compliance and Regulations

As IoT cybersecurity threats increase in both severity and frequency, every organization’s board of directors is expected to become more involved in the oversight and management of risks. Boards that don’t take this obligation seriously can be held accountable for any data breaches, and face the consequences from multiple directions.

More specifically, directors could be ousted by activist investor campaigns, or become targets of shareholder derivative actions. Let’s have a closer look at what is expected of the board of directors when it comes to management and oversight of cybersecurity risks:

Duties and Obligations of Board Members

Even though the exact responsibilities and obligations of the board of directors revolve around the laws of the state in which the organization operates, the basic principles remain the same. One of the critical obligations of directors is to discharge their duties in good faith, with care, and loyalty to the organization. Avoiding corporate waste is another important duty of directors.

Directors enjoy the benefits of the business judgment rule in courts, which is the assumption that they have indeed acted in good faith and care for the organization unless the plaintiff proves otherwise. It is a significant hurdle for the plaintiffs in most cases, but it’s imperative for directors to protect their liability by ensuring that all eventualities in the case of an cybersecurity breach is covered.

Responsibility of Directors

The directors themselves aren’t expected to manage cybersecurity risks, but rather ensure that the management is doing so by overseeing their processes. Despite being protected by the business judgment rule in general, directors can still be held personally liable for a failure of oversight in case there is a complete and systemic failure at ensuring that cybersecurity risks were managed. Personal liability means litigation — directors can be sued by the shareholders as they would be in breach of their fiduciary duties to the organization.

Overseeing Cybersecurity Management

Directors have a few options at their disposal to protect themselves from potential litigation by doing proper oversight of cybersecurity risk management. The first step is to take some time out of regular board meetings and dedicate it to discussing cybersecurity and encouraging the management to make presentations on the subject. Many directors opt for implementing a cybersecurity plan to cover their bases, and they take great care to monitor how effective the program is, so to adjust and tweak it.

Another good practice is having a chief information security officer or CISO for short. It is the person responsible for helping the board understand how cybersecurity risks might affect the organization at large. A CISO can also regularly report to the board on the state of cybersecurity in the organization and ensure that all necessary steps are being taken to prevent breaches. All of these efforts should be documented in the organization’s reports.

Key Takeaways

Cybersecurity is rapidly becoming one of the main pillars of thriving organizations, but ensuring protection from cybercriminals is still a task fraught with difficulties. For the board of directors of an organization, it’s critical to exercise oversight of cybersecurity risk management to avoid liability and litigation that can have severe consequences.

Very few cybersecurity experts know how to communicate with BoDs and decision makers.
Presenting a business case involves not just economics but also the need for consistent terminology, measurement, and a context in which to make informed decisions. The business is informed by our understanding of the technology but must be framed in a business language and concepts so that it can be easily compared with non-security choices.

So to make convincing business case we need smart communication tools allowing to collect data on the risks and costs of security incidents in an efficient way. These tools are there to help stakeholders build models, decide on the budget and make projections.

Subscribe
Previous
How Safe Are Smart Homes From Cyber Attacks
Next
Why We Need Safety, Resilience and Security Integrated in...
 Return to site
Profile picture
Cancel
Cookie Use
We use cookies to improve browsing experience, security, and data collection. By accepting, you agree to the use of cookies for advertising and analytics. You can change your cookie settings at any time. Learn More
Accept all
Settings
Decline All
Cookie Settings
Necessary Cookies
These cookies enable core functionality such as security, network management, and accessibility. These cookies can’t be switched off.
Analytics Cookies
These cookies help us better understand how visitors interact with our website and help us discover errors.
Preferences Cookies
These cookies allow the website to remember choices you've made to provide enhanced functionality and personalization.
Save