Enterprise Cybersecurity Risk Management

Enterprise Cybersecurity Risk Management

Why the Cybersecurity Disclosure Act of 2017 deserves revival and how enterprise cybersecurity risk management can be a value creator.

The Cybersecurity Disclosure Act of 2017

The Cybersecurity Disclosure Act of 2017 was introduced in the 115th Congress to promote transparency in the oversight of cybersecurity risks at publicly traded companies. Here are some key points:

  1. Transparency: The act aimed to enhance transparency by requiring companies to disclose whether any member of their governing body (such as the board of directors) had expertise or experience in cybersecurity. This disclosure would help investors and stakeholders assess the company's preparedness for cyber threats.
  2. Definitions: The act provided clear definitions, including what constitutes a "cybersecurity threat" and the scope of an "information system."
  3. NIST Integration: It emphasized alignment with the National Institute of Standards and Technology (NIST) guidelines, ensuring a consistent approach to managing cybersecurity risks.

Enterprise Cyber Risk Management (ECRM) as a Value Creator

Now, let's explore how ECRM can drive value:

  1. Shift in Perspective: Traditionally, ECRM focused on risk mitigation. However, organizations should view it as a potential profit center. Companies can create value by managing both the downside (risk reduction) and the upside (leveraging cyber strengths).
  2. The upside of Cyber Strengths: ECRM can positively impact various aspects:
  3. Board and C-Suite Role: Boards and executives are crucial in ECRM.
  4. Developing ECRM Programs and Strategies:

In summary, reviving the Cybersecurity Disclosure Act of 2017 can enhance transparency while embracing ECRM as a value creator aligns with modern business imperatives.

For further reading, consider Bob Chaput's book, "Enterprise Cyber Risk Management as a Value Creator." Bob Chaput provides valuable insights into leveraging cybersecurity for competitive advantage.

Remember, cybersecurity isn't just about defense—it's an opportunity to thrive!

Actionable steps for CEOs, Boards, and CISOs to enhance their approach to enterprise cyber risk management:

For CEOs:

  1. Strategic Alignment: Cybersecurity should be a priority, not just an IT concern. CEOs must ensure that ECRM aligns with overall business goals.
  2. Risk Appetite and Tolerance: Regularly engage with the board to discuss cybersecurity risks, investments, and value creation.
  3. Investment Decisions:
  4. Allocate Resources: CEOs must allocate sufficient resources for cybersecurity initiatives.
  5. Evaluate ROI: Understand the return on investment for cybersecurity spending. Consider both tangible (e.g., breach prevention) and intangible (e.g., brand reputation) benefits.
  6. Leadership by Example:
  7. Champion Security Culture: CEOs should promote a security-conscious culture.
  8. Participate in Training: Attend cybersecurity training sessions to stay informed.

For Boards:

  1. Governance and Oversight:

a)    Board Expertise: Ensure board members have cybersecurity expertise or access to external advisors.

b)    Regular Reporting: Receive reports on cybersecurity posture, incidents, and risk mitigation efforts.

  1. Risk Committees:

a)    Establish Risk Committees: Form dedicated committees to oversee cybersecurity risks.

b)    Risk Appetite Framework: Develop a framework to assess and manage risk appetite.

  1. Collaboration with CISOs:

a)    Direct Interaction: Boards should engage directly with the Chief Information Security Officer (CISO).

b)    Ask the Right Questions: Inquire about incident response plans, breach readiness, and third-party risk management.

For CISOs:

  1. Business Alignment:

a)    Translate Technical Risks: Communicate cybersecurity risks in business terms.

b)    Participate in Strategic Discussions: Be involved in strategic planning sessions.

  1. Risk Assessment and Prioritization:

a)    Quantify Risks: Use risk assessment methodologies to quantify potential impacts.

b)    Prioritize Efforts: Focus on critical assets and vulnerabilities.

  1. Vendor Risk Management:

a)    Third-Party Assessments: Regularly assess third-party vendors for security risks.

b)    Contractual Requirements: Include security requirements in vendor contracts. Cyber Security for Procurement: A Guide to Protect Your Business.: Leber, Dr. Dennis E.: 9798376984666: Amazon.com: Books

  1. Incident Response Preparedness:

a)    Test Response Plans: Regularly test incident response plans through simulations.

b)    Cross-functional coordination: Collaborate with legal, PR, and business teams during incidents.

  1. Scenario Planning:

a)    Tabletop Exercises: Conduct simulated cyberattack scenarios to test response plans.

b)    Stress Testing: Evaluate the impact of cyber incidents on business operations

Cybersecurity is a collective effort. CEOs, boards, and CISOs must collaborate to create a resilient, value-driven security posture.

#Cybersecurity #InfoSec #RiskManagement #ValueCreation #BoardGovernance #CEOLeadership #CISOInsights #ciso #leberconsultingllc #business

Yakir Golan

CEO & Co-founder at Kovrr | Cyber Risk Quantification

6mo

Well said! The only way any organization is going to achieve cyber resiliency is if there is a tangible understanding of the value that cybersecurity investments can bring. One of the reasons for this misunderstanding, or even lack of awareness, is that cyber is often talked about by the CISO in too technical terms, creating a lot of noise in the boardroom. Ultimately, executives and key stakeholders want to learn about cyber risk in terms of the projected impact it will have on the organization - and the way to facilitate this discussion is by translating risk into financial implications; a language that resonates with all business leaders.

To view or add a comment, sign in

More articles by Dennis E. Leber, Ph.D.

Insights from the community

Others also viewed

Explore topics