Experiencing a corporate cyber-attack is not a matter of “if” but “when” and boards of directors are quickly realizing that cybersecurity risk, formerly the province of corporate IT executives, has suddenly become fertile boardroom territory.
Yet cyber-attacks can be extraordinarily complicated and, once identified, demand a host of costly and detailed responses, including digital forensic preservation and investigation, notification of a broad range of third parties and other constituencies, fulfillment of state and federal compliance obligations, potential litigation, engagement with law enforcement, the provision of credit monitoring, crisis management, a communications plan – and the list goes on. And besides the more predictable workflow, a company is exposed to other even more intangible costs as well, including temporary or even permanent reputational and brand damage; loss of productivity; extended management drag; and a negative impact on employee morale and overall business performance.
So what is the role of a board of directors amid all of this complex and bet-the-company workflow? Corporate directors clearly have a fiduciary duty to understand and oversee cybersecurity, but there is no need for board members, many of whom have limited IT experience, to panic. Cybersecurity engagement for members of the board does not mean that board members need to have computer science degrees or personally supervise firewall implementation or intrusion detection system rollouts. Instead, board oversight of cybersecurity entails, most importantly, asking the right questions and being thoughtful, deliberative and informed about cybersecurity and its attendant risks.
By partnering with John Reed Stark Consulting, a board of directors can instantaneously meet its cybersecurity-related fiduciary obligations and oversight responsibilities, and draw upon more than 20 years of cybersecurity and data breach response experience, expertise and independence.
For more information about John Reed Stark’s capabilities and expertise, review his recent articles and webcasts on cybersecurity and incident response in his Publications and in his blog, entitled Stark on IR. A few relevant samples include: