The drama of cybersecurity attacks - and how to stay strategic when things get crazy
Picture generated by DALL-E

The drama of cybersecurity attacks - and how to stay strategic when things get crazy

In my experience there are two types of CISOs: ones that love the drama of a cyber attack and ones that stay cool under pressure. This post is about how boards of directors can handle a CISO (or someone else in the CISOs organization) that thrives on the drama of an attack.

When a cyber attack occurs at an organization, things can get very chaotic. There is a lot to do to figure out what is happening and what needs to be done. All of this can be exacerbated by a CISO who enjoys being the center of attention and knows that cyber attacks are the time when the spotlight is specifically focused on them.

Luckily, boards have a unique position in that they are often a bit removed from the action. The board has the ability (and luxury) to take a look at the situation from a more strategic point of view.

When a cyber attack happens and the CISO seems to be spinning, the board should make sure a few questions are being answered.

  1. What are the regulatory requirements as far as reporting and responding to this incident?
  2. What assets are at risk? What needs to be done to protect those assets?

Based on the answers to these questions a timeline can be developed and responsible parties can be named to ensure that all of the appropriate steps are being taken at the appropriate time.

Of course, the answers to these questions are fluid. As more information about the attack comes in, some of the answers to these questions will change and the board has to be ready to change both the timeline and the people responsible for dealing with the remediation.

Most CISOs are cool under pressure and can take all of this on themselves. But in the case that a board is dealing with a CISO that is a bit more excitable, it can help to know these are the steps that need to be taken to address the situation.

To view or add a comment, sign in

More articles by Laura Mather

  • A Framework for Evaluating AI Regulations

    A Framework for Evaluating AI Regulations

    How government decides to regulate the advances of AI is still to be seen. Europe has already passed the AI Act - but…

  • Using AI to Combat AI

    Using AI to Combat AI

    As Dennis Marcus pointed out in my post about AI Going Wrong, one of the ways to combat the malfeasance that can arise…

    1 Comment
  • The Problem of AI Going Right

    The Problem of AI Going Right

    In a previous article I talked about the ways that AI can be used to attack websites, companies and people. There is…

    1 Comment
  • How AI Can Go Wrong

    How AI Can Go Wrong

    One of the “jobs” of someone in cybersecurity is to be constantly looking for ways that criminals can create problems…

    1 Comment
  • SB 1047 and Big vs Small Companies

    SB 1047 and Big vs Small Companies

    One thing I forgot to mention in my article about SB 1047 was how it doesn't immediately apply to small companies. The…

  • Will SB 1047 Hinder AI Start Up Innovation?

    Will SB 1047 Hinder AI Start Up Innovation?

    One of the most comprehensive AI bills in the US right now is California AB 1047 - a bill that attempts to put…

    1 Comment
  • Who Will Protect Us from AI?

    Who Will Protect Us from AI?

    Stephen Hawking said, “Success in creating AI could be the biggest event in the history of our civilisation. But it…

    1 Comment
  • The New and Improved Silver Tail Systems

    The New and Improved Silver Tail Systems

    When Mike and I started Silver Tail Systems in 2008 - yes 15 years ago - the cybersecurity industry was in its earliest…

    7 Comments
  • Moving to Zero Trust Security

    Moving to Zero Trust Security

    What security professionals have been preaching for over decade is finally becoming understood by organizations: every…

  • Connecting CISO Direction and Board Strategy

    Connecting CISO Direction and Board Strategy

    With the proposed SEC rule update regarding cybersecurity for public companies, many boards may be wondering what value…

    1 Comment

Insights from the community

Others also viewed

Explore topics