Has the cyber risk and security conversation in the boardroom kept pace with the business? Better yet, does the board have the assurance that operations, technology, and risk management are communicating on cyber expectations and priorities?
On the most recent KPMG/NACD Audit Committee Webcast, KPMG Global Cyber Security Co-Leader Greg Bell detailed the components of a cyber maturity framework that can help corporate directors assess the cyber capabilities of their companies.
“Cyber is much more about your company’s business strategy and innovation plans than about technology architecture,” said Bell. “When companies talk about cyber risk, that should be the lens.”
“We’re doing business differently. It’s very rare that all of a company’s business functions exist within their own walls,” said Bell. “Supply chains, business partners, and outsourcing relationships are all handling the company’s critical data, including customer data. How do we protect that information and ensure that we are providing due care?”
For example, Bell recounted separate meetings—held within hours of each other—in which executives at the same company detailed their respective approaches to the use of third-party brokers and agents to acquire new customers. The technology executive was preparing to overhaul the company’s systems to defend against cyber hacks of customer information via the third party’s technology infrastructure. Meanwhile, the business executive had already set plans in place to eliminate third parties altogether.
“The business was moving at such a fast pace that cyber capability just couldn’t catch up,” said Bell. “That’s the risk we all face today.” In fact, of the key cyber-related risks identified in a recent Audit Committee Institute survey, technology systems was only one of the top four challenges. The other three were business-focused: supply-chain vulnerability, people risk, and organizational awareness.
Existing cyber-security frameworks focus very little on governance and the role of the board, said Bell. Extending the reach of a company’s existing cyber-security framework to the board can both define and clarify how the board engages with management on cyber issues.
“The most important element is leadership and governance,” said Bell. “How is the technology organization aligned with the business? Management really needs to make sure they can explain that to the board.”
Bell discussed lines of inquiry across six areas of board oversight as well as related key performance indicators (KPIs) that can serve as a dashboard to help the board assess the cyber environment.
Board oversight
Lines of inquiry
How does the board gain comfort? (Example KPIs)
Leadership and governance
Human factors
Information management
Business continuity and crisis management
Operations and technology
Legal and compliance
Cyber insurance policy benchmarking with peer organizations
Cyber insurance policy benchmarking with peer organizations
Operations and technology
Insights for Directors
Directors need to stay vigilant, but it is more important to stay focused. This is an area that could take up a lot of energy and time. While it is clear that cyber risk is a fact of doing business today—it is going to continue to evolve and pose new challenges.
Boards should consider the following in their discussions with management:
Learn to live with cyber risk. Understand that it is an enterprise-wide challenge and opportunity.
Stay abreast of industry practices and connect with law enforcement. How attuned is the board to industry trends and best practices? Is the company reaching out to law enforcement agencies proactively to understand trends in cyber risk and response?
Have an incident readiness and response plan. Breaches will happen. Does the company have a clear “table-topped” response plan that has been reviewed and tested? Who leads the cyber incident response team? What about business continuity plans?
Webcast Survey Results*
From a board perspective, what is the most significant gap in your company’s ability to manage cyber risk?
21% -Internal people risk
19%-Monitoring and reporting of cyber threats (e.g., dashboard)
19%-Keeping technology systems up to date
15%-Organizational awareness/culture
9%-Talent/expertise
8%-Readiness and response/containment of breaches
6%-No gaps
3%-Other
From a board perspective, which aspect of this cyber maturity framework is the most challenging to monitor and assess?
39%-Human factors
22%-Information risk management
17%-Leadership and governance
13%-Operations and technology
6%-Business continuity
3%-Legal and compliance
*Of 310 directors and senior executives surveyed during the March 23 Webcast.