{"id":22738,"date":"2021-04-12T08:27:00","date_gmt":"2021-04-12T08:27:00","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/biggest-mistakes-board-make-around-cyber-security\/"},"modified":"2023-08-26T11:53:48","modified_gmt":"2023-08-26T11:53:48","slug":"biggest-mistakes-board-make-around-cyber-security","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/biggest-mistakes-board-make-around-cyber-security\/","title":{"rendered":"The 3 Biggest Mistakes The Board Can Make Around Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22738\" class=\"elementor elementor-22738\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-9574799 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9574799\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7f67cd3\" data-id=\"7f67cd3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f7bae5 elementor-widget elementor-widget-text-editor\" data-id=\"1f7bae5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"has-medium-font-size\"><em>The protection of the business from cyber threats is something you need to grow, not something you can buy<\/em><\/p>\n<p>The role of the Board in relation to cyber security is a topic we have visited several times since 2015,&nbsp;<a href=\"https:\/\/corixpartners.com\/cyber-security-the-six-questions-the-board-of-directors-needs-to-ask\/\" target=\"_blank\" rel=\"noreferrer noopener\">first<\/a>&nbsp;in the wake of the TalkTalk data breach in the UK, then in&nbsp;<a href=\"https:\/\/corixpartners.com\/cyber-security-revisiting-board-questions\/\" target=\"_blank\" rel=\"noreferrer noopener\">2019<\/a>&nbsp;following the WannaCry and NotPeyta outbreaks and data breaches at BA, Marriott and Equifax amongst others. This is also a topic we have been researching with&nbsp;<a href=\"https:\/\/www.techuk.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">techUK<\/a>, and that collaboration resulted in the start of their Cyber People series and the production of the \u201c<a href=\"https:\/\/www.techuk.org\/resource\/techuk-launches-the-ciso-at-the-c-suite-report.html\" target=\"_blank\" rel=\"noreferrer noopener\">CISO at the C-Suite<\/a>\u201d report at the end of 2020.<\/p>\n<p>Overall, although the topic of cyber security is now definitely on the board\u2019s agenda in most organisations, it is rarely a fixed item. More often than not, it makes appearances at the request of the Audit &amp; Risk Committee or after a question from a non-executive director, or \u2013 worse \u2013 in response to a security incident or a near-miss.<\/p>\n<p>All this hides a pattern of recurrent cultural and governance attitudes which could be hindering cyber security more than enabling it.<\/p>\n<p>There are 3 big mistakes the Board needs to avoid to promote cyber security and prevent breaches.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ba12d1 elementor-widget elementor-widget-heading\" data-id=\"5ba12d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1-Downgrading it<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c01bf8 elementor-widget elementor-widget-heading\" data-id=\"7c01bf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u201cWe have bigger fishes to fry\u2026\u201d<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46c3c5c elementor-widget elementor-widget-text-editor\" data-id=\"46c3c5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Of course, each organisation is different and the COVID crisis is affecting each differently \u2013 from those nearing collapse, to those which are booming.<\/p>\n<p>But pretending that the <a href=\"https:\/\/www.experfy.com\/blog\/ai-ml\/artificial-intelligence-in-cyber-security-the-savior-or-enemy-of-your-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">protection of the business from cyber threats<\/a> is not a relevant board topic now borders on negligence and is certainly a matter of poor governance which non-executive directors have a duty to pick up.<\/p>\n<p>Cyber attacks are in the news every week and have been the direct cause of millions in direct losses and hundreds of millions in lost revenues in many large organisations across almost all industry sectors.<\/p>\n<p>Data privacy regulators have suffered&nbsp;<a href=\"https:\/\/corixpartners.com\/gdpr-fines-regulators-show-muscles\/\" target=\"_blank\" rel=\"noreferrer noopener\">setbacks<\/a>&nbsp;in 2020: They have been forced to adjust down some of their fines (BA, Marriott), and we have also seen a first successful challenge in Austria leading to a multi-million fine being&nbsp;<a href=\"https:\/\/www.dataguidance.com\/news\/austria-federal-administrative-court-overturns-18m-fine\" target=\"_blank\" rel=\"noreferrer noopener\">overturned<\/a>&nbsp;(EUR 18M for Austrian Post). Nevertheless, fines are now reaching the millions or tens of millions regularly; still very far from the 4% of global turnover allowed under the GDPR, but the upwards trend is clear as DLA Piper highlighted in their&nbsp;<a href=\"https:\/\/www.dlapiper.com\/en\/uk\/insights\/publications\/2021\/01\/dla-piper-gdpr-fines-and-data-breach-survey-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">2021 GDPR survey<\/a>, and those number should register on the radar of most boards.<\/p>\n<p>Finally, the COVID crisis has made most businesses heavily dependent on digital services, the stability of which is built on sound cyber security practices, in-house and across the supply chain.<\/p>\n<p>Cyber security has become as pillar of the \u201cnew normal\u201d and even more than before, should be a regular board agenda, clearly visible in the&nbsp;<a href=\"https:\/\/corixpartners.com\/cyber-security-revisiting-board-questions\/\" target=\"_blank\" rel=\"noreferrer noopener\">portfolio<\/a>&nbsp;of one member who should have part of their remuneration linked to it (should remuneration practices allow). As stated above, this is fast becoming a plain matter of good governance.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a1190f elementor-widget elementor-widget-heading\" data-id=\"0a1190f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2-Seeing it as an IT problem<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7df4bc1 elementor-widget elementor-widget-heading\" data-id=\"7df4bc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u201cIT is dealing with this\u2026\u201d<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eabed5 elementor-widget elementor-widget-text-editor\" data-id=\"7eabed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is a dangerous stance at a number of levels.<\/p>\n<p>First, cyber security has never been a purely technological matter. The protection of the business from cyber threats has always required concerted action at people, process and technology level across the organisation.<\/p>\n<p>Reducing it to a tech matter&nbsp;<a href=\"https:\/\/corixpartners.com\/first-100-days-new-ciso-firefighting\/\" target=\"_blank\" rel=\"noreferrer noopener\">downgrades<\/a>&nbsp;the subject, and as a result the calibre of talent it attracts. In large organisations \u2013 which are intrinsically territorial and political \u2013 it has led for decades to an endemic failure to address cross-silo issues, for example around identity or vendor risk management \u2013 in spite of the millions spent on those matters with tech vendors and consultants.<\/p>\n<p>So it should not be left to the CIO to deal with, unless their profile is sufficiently elevated within the organisation.<\/p>\n<p>In the past, we have advocated alternative&nbsp;<a href=\"https:\/\/corixpartners.com\/digital-transformation-role-ciso\/\" target=\"_blank\" rel=\"noreferrer noopener\">organisational models<\/a>&nbsp;to address the challenges of the digital transformation and the necessary reinforcement of practices around data privacy in the wake of the GDPR. They remain current, and of course are not meant to replace \u201cthree-lines-of-defence\u201d type of models.<\/p>\n<p>But here again, caution should prevail. It is easy \u2013 in particular in large firms \u2013 to over-engineer the three lines of defence and to build monstrous and inefficient control models. The three lines of defence can only work on&nbsp;<a href=\"https:\/\/corixpartners.com\/grc-model-only-works-on-trust\/\" target=\"_blank\" rel=\"noreferrer noopener\">trust<\/a>, and must bring visible value to each part of the control organisation to avoid creating a culture of suspicion and regulatory window-dressing.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf04d51 elementor-widget elementor-widget-heading\" data-id=\"bf04d51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3-Throwing money at it<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-934b5ae elementor-widget elementor-widget-heading\" data-id=\"934b5ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u201cHow much do we need to spend to get this fixed?\u201d<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4dbb43 elementor-widget elementor-widget-text-editor\" data-id=\"b4dbb43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The protection of the business from cyber threats is something you need to grow, not something you can buy \u2013 in spite of what countless tech vendors and consultants would like you to believe.<\/p>\n<p>As a matter of fact, most of the breached organisations of the past few years (BA, Marriott, Equifax, Travelex etc\u2026 the list is long\u2026) would have spent collectively tens or hundreds of millions on cyber security products over the last decades\u2026<\/p>\n<p>Where cyber security maturity is low and profound transformation is required, simply&nbsp;<a href=\"https:\/\/corixpartners.com\/4-pillars-lasting-cyber-security-transformation\/\" target=\"_blank\" rel=\"noreferrer noopener\">throwing money<\/a>&nbsp;at the problem is rarely the answer.<\/p>\n<p>Of course, investments will be required, but the real silver bullets are to be found in corporate culture and governance, and in the true embedding of business protection values in the corporate purpose: Something which needs to start at the top of the organisation through visible and credible board ownership of those issues, and cascade down through middle management, relayed by incentives and remuneration schemes.<\/p>\n<p>This is more challenging than doing ad-hoc pen tests but it is the only way to lasting long-term success.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The protection of the business from cyber threats is something you need to grow, not something you can buy<\/p>\n","protected":false},"author":529,"featured_media":19131,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[871,945,943,462],"ppma_author":[3178],"class_list":["post-22738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-board-support","tag-c-suite","tag-ciso","tag-cyber-security"],"authors":[{"term_id":3178,"user_id":529,"is_guest":0,"slug":"jean-christophe-gaillard","display_name":"Jean-Christophe Gaillard","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_b55e5afa-fb86-428a-a054-3be0451df2a4-150x150.jpg","user_url":"https:\/\/www.corixpartners.com","last_name":"Gaillard","first_name":"Jean-Christophe","job_title":"","description":"Jean-Christophe Gaillard\u00a0is Managing Director and Founder at Corix Partners. He is also a Non-Executive Director with\u00a0<a href=\"https:\/\/www.stratasecurity.co.uk\/\">Strata Security Solutions<\/a>, a specialized cybersecurity firm. He has been co-president of the Cyber Security group of the\u00a0<a href=\"https:\/\/www.telecom-paristech.org\/\">Telecom Paris Tech alumni association<\/a>\u00a0since May 2016. He is the author of \u201c<a href=\"http:\/\/www.blurb.co.uk\/b\/9015902-cyber-security-the-lost-decade-2018-edition\" target=\"_blank\" rel=\"noopener\">Cyber Security: The Lost Decade<\/a>\u00a0\u2013 A Security Governance Handbook for the CISO and the CIO\u201d, He contributes regularly to\u00a0<a href=\"http:\/\/www.thedigitaltransformationpeople.com\/authors\/jc-gaillard\">The Digital Transformation People<\/a>,\u00a0<a href=\"http:\/\/www.business2community.com\/author\/jc-gaillard\">Business 2 Community<\/a>, and\u00a0<a href=\"https:\/\/www.iotforall.com\/\">IoTforAll<\/a>\u00a0platforms, as well as the\u00a0<a href=\"https:\/\/www.thebtn.tv\/\">Business Transformation Network<\/a>. He is an expert contributor on the\u00a0<a href=\"https:\/\/ciowatercooler.co.uk\/members\/jean-christophe-gaillard\/activity\/\">CIO Water Cooler<\/a>\u00a0and has previously published articles on\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/bridging-gap-security-it-operations\/\">InfoSecurity<\/a>\u00a0Magazine, \u00a0<a href=\"http:\/\/www.computing.co.uk\/ctg\/opinion\/2396800\/how-to-achieve-effective-cyber-security-in-a-hyperconnected-world\">Computing<\/a>, the C-Suite.co.uk,\u00a0<a href=\"http:\/\/www.informationsecuritybuzz.com\/?s=gaillard\">Info Sec Buzz<\/a>\u00a0and the\u00a0<a href=\"http:\/\/www.director.co.uk\/blog-cyber-insurance-what-do-you-think-youre-buying-20323\/\">IoD Director<\/a>\u00a0websites."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/529"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=22738"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22738\/revisions"}],"predecessor-version":[{"id":31605,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22738\/revisions\/31605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/19131"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=22738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=22738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=22738"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=22738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}