Cyber Security Strategic Lever
Transition cyber security capabilities into a strategic advantage. Move from treating cyber security as a cost center to a profit lever
This article is the first in the series of three articles that are designed to equip board directors with three distinct, meaningful and actionable insights outlined below:
Three distinct insights are:
For business leaders, how you look at cyber security capabilities matters, in a significant way. As Henry David Thoreau said “The question is not what you look at, but how you look and whether you see.”
Cyber can be a strategic profit lever and value driver if and when leaders become intentional
Strategic competitive advantage can come from unexpected sources
Cyber Resilience. Emerging Risks.
Business value creation of cyber security
Cost center into profit driver
Brand and reputation damage
Cost efficiencies - paper checks and digital payments secure
Security strategy allows contractors to work remote with productivity gains
Speed - operational speed
Drive down insurance costs
HR was a cost center but now with TSR is a strategic lever. Supply chain was a cost center and is now strategic, (e.g. UPS using AI DeliveryDefense as a differentiatior, customer service call centers? the same thing
Cyber helps you see IT and profit levers - identifying new (business) strategic opportunities
Generate strateic value from cyber. Build cyber capabilities as a strategic value engine
Can a robust and effective cyber security capability create new value for your business; new value proposition for customers or other competitive advantages resulting from operational velcoity? Most of us are doubtful that this is possible because cyber has traditionally been viewed as a cost center and not a profit lever. We’ve historically viewed cyber and IT in a support role/function (vs a core function) that’s somewhat necessary for doing business.
However, in the digital economy, cyber and IT are no longer support functions but are core to the business. Some organizations have not made this shift in mindset yet and understandably so. Because it’s not easy to change mindsets unless there’s a compelling event that forces us in the direction of the mindset change that we should have found ourselves (i.e. absent the event).
Yet there’s a significant benefit if we can make this change from cost-center to profit level without experiencing a compelling event (e.g. data breach, material incident, new regulation, etc.) To implement this change in mindset we’ve outlined some foundational principles and philosophies that are worth considering
Mindset: Out of a single mindset flows a thousand different behaviors. If you view IT and cyber as something to keep the lights on then its difficult to see the opportunities it has to make material contributions to the bottom line. Recognizing that this shift needs to happen is the first step and it begins with the CEO. The CIO and CISO can help but ultimately the CEO has to sustain this perspective for the long-term benefits to be realized
Relationships: currently one-way relationships now for the most part meaning, IT and cyber speak business terms or engage in the business. In some instances, cyber is in reactive mode waiting for IT and business decisions and then implementing cyber practices after the fact. Some cyber chiefs are brought into the conversation at the end of a major business decision (e.g. M&A, business strategy planning). Proactive relationships where both business and cyber are engaged proactively in learning about each other, their respective roles, opportunities and challenges, This should be a two-way street and not just cyber learning about the business but also the business learning about cyber; not to become a cyber expert but to understand the implications of various cyber functions and to be conversationally literate and fluent in the language. Confident to engage but not so much to teach unless interested.
Operational Speed / Velocity - Speed To Value
Develop learning strategies
Apply growth mindset and principles to the challenge
Implement new value shifts and leadership transitions
Model the mindset for other members of the leadership team and even the board
Invest in yourself and future growth and development - digital is here to stay and so is cyber. It’s not going away.
There are different elements of strategic value creation for businesses and these include:
New revenue-creation opportunities
Cost efficiences
Operational Speed
Consumer/Customer trust
Mexico trip analogy -
Unfortunately, my perception of Mexico city had been influenced by reports of violent drug cartels and stories of kidnappings so I was mentally resigned to not visiting the city. And I didn’t see a need to either until I was presented with an opportunity to help a client and was told I needed to visit Mexico city and/or Merida. At first I said no but my client reassured me that they would ensure my safety. I ended up visiting and it was a great experience. As a result, we have new client/customers that we otherwise wouldn’t have without the security offered by my first client. Likewise cyber security does the same thing.
Competitive
Mindsets and principles
Cultivate business relationships proactively. Requires value shifts and trust building
Create value for relevant stake holders. A give mindset and not a stop or take (things away) mindset
Out of a single mindset, flows a thousand different behaviors
Values influence mindsets
This article is the first in the series of three articles that are designed to equip board directors with three distinct, meaningful and actionable insights outlined below:
Three distinct insights are:
Compliance is crucially important but it can produce a false sense of trust.
Compliance without commitment (to the underlying intent) can have compounded second-order implications.
Compliance and commitment offers a better strategic approach than compliance alone.
In this article, we focus on the first. The primary objective of this article is to help directors avoid the common pitfall of focusing on compliance (in this case SEC Cyber rules) and inadvertently neglecting the required commitment to the underlying intent and stakeholder trust. Ultimately, our hope is that these insights will inform intentional actions that will increase effectiveness of cyber risk oversight.
1. Redefine How You Look At Cyber & What You See
For business leaders, how you look at cyber security capabilities matters, in a significant way. As Henry David Thoreau said “The question is not what you look at, but how you look and whether you see.”
How you look at cyber security matters and it matters a lot! Most organizational leaders look at cyber as a necessary evil, an operational necessity, something they have to have to be compliant and to reduce the risk of bad things (e.g. data breaches, business disruptions from ransom-style attacks) happening. With all the frequent and negative headlines reporting cyber incidents and data breaches, it’s no wonder the focus of leaders is on the risk management side.
Some organizations look at cyber risk as something that can be outsourced or transferred to cloud providers and/or managed services-security providers (MSPs). Still others only look at or see what they can get away with or without doing. They concentrate on doing the bare minimum to avoid or manage future cyber trouble. And again, it’s hard not to have this view point/mindset. Very smart leaders arrive at these behaviors based on their view that cyber is really an operational necessity to deal with as efficiently as possible.
The problem with this view of cyber is that it often fails to uncover the true and hidden business potential of cyber capabilities. It’s like those companies years ago that had a similar view about Information Technology (IT). Arguably, some organizations still have this view about IT. They maintained that IT was just a necessity and leveraged IT primarily from an operational cost-center view point to help with employee productivity. The same could be said of the HR function and capabilities, most looked at HR as the function to handle employee onboarding and benefits as opposed to leveraging HR as a strategic talent capability for the business
This sight problem is not limited to just business functions within organization but extends to entire businesses and industries as whole. For example, some CEOs said we’re in the train business and not the transportation business.
It’s difficult to look at cyber and see anything but a cost center to minimize risk. It’s difficult to uncover the hidden potential of cyber but it’s possible and those who can maintain a broader perspective can expect to reap significant rewards when they do so.
We, you, won’t see the innovation opportunities unless you look for them and redefine how you look at cyber
Transition to: Cyber can be a strategic profit lever and value driver if and when leaders become intentional
2. Cyber As Strategic Value Driver
Cyber can be a strategic profit lever and value driver if and when leaders become intentional
There are different elements of strategic value creation for businesses and these include:
The strategic value driver of cyber is often overlooked or neglected by business leaders as we’ve outlined above because there’s a central focus on risk mitigation and rightfully so. However, the hidden potential and opportunities remain buried for most organizations. So what are these opportunities? There are several but here we focus on four essential strategic opportunities to consider:
New revenue-creation opportunities
Cost efficiencies
Operational Speed
Consumer/Customer trust
New Revenue-creation opportunities - leverage security for above the basic foundational security for products/services. may fall into the following categories:
Premium offerings of digital products and services. The central idea here is to leverage your organization’s strong cyber capabilities to fulfill unarticulated customer needs. We recommend adopting the jobs to be done approach popularized by the late Clayton Christensen to understand the functional, emotional and social needs or jobs to be done. The objective is to combine your cyber capabilities with existing organizational competencies to form a new value proposition and premium offering for customers. Best buy offers a remote patient monitoring service (combining health, convenience & data security) that provides a high touch customer experience for example. This offering involves a significant amount of data and undoubtedly factors into develop such an offering. Best-buy has the geek squad to leverage here.
Sometimes cyber can be the core of the premium offering and doesn’t need to combine with other strengths of the organization as in the case of some web hosting services that offer premium security protections for websites. In this case, it’s like the incremental offering of a safety deposit box offered by banks. In some other cases, cyber can serve as a competitive differentiator where cyber risk mitigation is highly valued. Dr. Manuel Hepfer, Head of Knowledge and Insights at ISTARI and a Research Affiliate at Oxford University's Saïd Business and contributor at the World Economic forum shares his perspective - In my research at Oxford University, I spoke with executives who have started to view cybersecurity as a strategic asset. These leaders, having guided their company through a survival-threatening cyber attack, began using their cybersecurity accreditations to create new value propositions for customers…One CIO told me, “We have won two significant bits of business and we won because we are one of the only companies that are accredited to security standards. That is starting to become a differentiator for us.”
We ourselves have experienced the benefits of clients valuing select consulting firms over their competitors based on their ability to provide cyber expertise through partners or collaborators. Whatever form it takes, exploring how strong cyber capabilities can open the doors for new premium offerings is worth the time in our view.
Remember to include blackberry and wealth/investment management examples.
Cost Efficiencies - How does strong cyber capabilities create cost efficiencies and operational speed advantages for an organization? Before outlining three examples that illustrate these advantages, it’s important to highlight the foundational assumption here that these advantages only exist for organizations that have considerable operational digital assets and capabilities. In other words, if an organization employs only limited digital assets and capabilities, then having a strong cyber risk mitigation and/or resilience capabilities won’t provide any meaningful or substantive advantage
There are three main cost and speed advantages of having a strong cyber posture
Cyber Insurance Premiums - these are lower when strong cyber capabilites are present
Operational Speed & Agility - product launches, M&T timing and new Opportunities. Operational velocity can be a competitive advantage and a key differentiator. And cyber strategy can either accelerate it or slow it down. For example being able to ensure adequate cyber security for products (e.g. Johnson Controls) before product launches or delays in product launches due to cyber risk concerns. Leaders whoe are sensitive to such false product starts will delay launches until adequate cyber is in place. Alternatively cyber that’s integrated and included into business operations and product launches from the start relatively speed up the product launch cycles comparatively. Organizations can get left behind if they don’t have the capabilities to meet market demands in a timely fashion and if security puts on the brakes because of significant cyber risks, then competitors can gain market share and mind share
Incident Resolution Times - incident investigation and resolution time. The more direct costs related cyber are those that are tied to material cyber incident and data breaches. In other words, if you don’t have cyber, the likelihood of these incidents and associated costs go up. Other indirect or hidden costs include incident investigation and resolution times.
Consumer/Customer trust :
Brand Trust: Strong cyber capabilities can help influence/contribute to brand trust across two broad dimensions. There are two broad dimensions that are important to consider when exploring how to leverage strong cyber capabilities to influence brand trust. They are the reactive and proactive dimensions and we explain each below.
Reactive: A common example of reactive brand trust in the context of cyber capabilities and digital trust is the response of an organization to a data breach or material cyber incident. In simple terms, trust is either elevated or diminished based on the organization’s response to a material cyber incident. For example, data breaches and poor response to them.
Some/Most organizations however, don’t leverage these incidents successful and effective responses as a strategic asset for the company. They’re not intentional about marketing their response capabilities to other customers that may care about cyber, rightfully so, as some don’t want to invite unnecessary attention to their cyber capabilities. This is very tricky and most prefer not to steer clear of the incident altogether. However, for public companies that have to disclose material incidents to the public via the SEC cyber rules, this strategy may be worth considering. The incident and response will already be available to the public who will begin to form their own narrative of your brand trust. It may be worth considering how to utilize these successes (assume they are successes) to influence and enhance trust in your brand.
Cyber incidents are going to occur, the main differentiator is going to be how organizations respond. Of course, to respond effectively, you’ll need strong cyber capabilities and strategy. You can’t makret secure 1-day delivery if you can’t deliver shipments in 1 day or less. And if you can consistently deliver in 1 day but nobody knows that, then you’re not effectively influencing your brand. Imagine if Amazon could ship in 1 day but nobody knew about it.
Proactive Dimension: The second is the proactive dimension and this can be more challenging for some organizations. Proactively influencing brand trust using cyber means not waiting for an event/incident or data breach to trigger the effort to demonstrate cyber trust. It means proactively demonstrating cyber trust signals that stakeholders, including customers, value. It’s important that stakeholders value these signals and their underlying value. Otherwise, this will be ineffective. The concept of non-cyber trust signals and markers is used in a variety of industries, services and products today already. These include USDA, FDA, FDIC, Visa Secure, Bond ratings (Triple AAA, etc.). Hyundai used warranties effectively as a trust signal/marker to elevate the brand recognition.
Not the same as compliance without commitment , although compliance does play an important role.
For technology providers, these include SOC2, CMM -maturity models. US Cyber trust mark used for IoT or consumer products is another example in the IoT space. These markers help to differentiate the organization, product and/or service and signals to those that value data and digital security that the organization takes cyber seriously enough to make every effort to keep their data safe but more importantly to respond effectively to reduce the impact and provide meaningful remedies at no cost to the customer or client.
Additional ways to leverage cyber trust to proactively influence brand trust include:
Cyber trust warranties
Periodic client/consumer cyber awareness training - not for internal but for clients
As noted earlier, for these markers to make a significant difference in brand reputation, the customers/clients must value cyber security.
Business customers may value this more in making a selection for their service providers, etc. …include Examples
Move to conclusion and wrap up
In summary, cyber security/trust has a substantial contribution to, can play a more significant role as a strategic asset for organizations. A role that goes beyond the operational necessity of keeping the lights on and preventing/remediating loss but of contribution to value creation and realizing gains. This can be derived from new and combined sources of revenue, cost efficiencies, operation agility/speed and brand reputation. This reframing requires a subtle but needed change in mindset; from cost center to profit lever. If the role of cyber and technology remains that of order taker from the business, subservient to the business, realizing this shift in mindset becomes more difficult. Instead, the role of cyber can and should be redefined as serving customers/clients in ways that work for the business as product manager author Marty Cagan states. This is different from serving the business because it focuses on driving value creation for the end customer/client and not just providing what the business asks for. Why? Because, sometimes the business may not be aware of what’s possible and therefore limit their requests to what they know is possible, which often times is different from what is truly possible with cyber security capabilities. May we gain the wisdom, and courage to explore how to leverage cyber as a strategic asset specifically for our unique circumstances and organizations.
…include Examples
Cyber can be a strategic profit lever and value driver if and when leaders become intentional
Cyber Resilience. Emerging Risks.
Business value creation of cyber security
Cost center into profit driver
Brand and reputation damage
Cost efficiencies - paper checks and digital payments secure
Security strategy allows contractors to work remote with productivity gains
Speed - operational speed
Drive down insurance costs
HR was a cost center but now with TSR is a strategic lever. Supply chain was a cost center and is now strategic, (e.g. UPS using AI DeliveryDefense as a differentiatior, customer service call centers? the same thing
Cyber helps you see IT and profit levers - identifying new (business) strategic opportunities
Generate strateic value from cyber. Build cyber capabilities as a strategic value engine
Can a robust and effective cyber security capability create new value for your business; new value proposition for customers or other competitive advantages resulting from operational velcoity? Most of us are doubtful that this is possible because cyber has traditionally been viewed as a cost center and not a profit lever. We’ve historically viewed cyber and IT in a support role/function (vs a core function) that’s somewhat necessary for doing business.
However, in the digital economy, cyber and IT are no longer support functions but are core to the business. Some organizations have not made this shift in mindset yet and understandably so. Because it’s not easy to change mindsets unless there’s a compelling event that forces us in the direction of the mindset change that we should have found ourselves (i.e. absent the event).
Yet there’s a significant benefit if we can make this change from cost-center to profit level without experiencing a compelling event (e.g. data breach, material incident, new regulation, etc.) To implement this change in mindset we’ve outlined some foundational principles and philosophies that are worth considering
Mindset: Out of a single mindset flows a thousand different behaviors. If you view IT and cyber as something to keep the lights on then its difficult to see the opportunities it has to make material contributions to the bottom line. Recognizing that this shift needs to happen is the first step and it begins with the CEO. The CIO and CISO can help but ultimately the CEO has to sustain this perspective for the long-term benefits to be realized
Relationships: currently one-way relationships now for the most part meaning, IT and cyber speak business terms or engage in the business. In some instances, cyber is in reactive mode waiting for IT and business decisions and then implementing cyber practices after the fact. Some cyber chiefs are brought into the conversation at the end of a major business decision (e.g. M&A, business strategy planning). Proactive relationships where both business and cyber are engaged proactively in learning about each other, their respective roles, opportunities and challenges, This should be a two-way street and not just cyber learning about the business but also the business learning about cyber; not to become a cyber expert but to understand the implications of various cyber functions and to be conversationally literate and fluent in the language. Confident to engage but not so much to teach unless interested.
Operational Speed / Velocity - Speed To Value
Develop learning strategies
Apply growth mindset and principles to the challenge
Implement new value shifts and leadership transitions
Model the mindset for other members of the leadership team and even the board
Invest in yourself and future growth and development - digital is here to stay and so is cyber. It’s not going away.
There are different elements of strategic value creation for businesses and these include:
New revenue-creation opportunities
Cost efficiences
Operational Speed
Consumer/Customer trust
Mexico trip analogy -
Unfortunately, my perception of Mexico city had been influenced by reports of violent drug cartels and stories of kidnappings so I was mentally resigned to not visiting the city. And I didn’t see a need to either until I was presented with an opportunity to help a client and was told I needed to visit Mexico city and/or Merida. At first I said no but my client reassured me that they would ensure my safety. I ended up visiting and it was a great experience. As a result, we have new client/customers that we otherwise wouldn’t have without the security offered by my first client. Likewise cyber security does the same thing.
Competitive
Mindsets and principles
Cultivate business relationships proactively. Requires value shifts and trust building
Create value for relevant stake holders. A give mindset and not a stop or take (things away) mindset
Out of a single mindset, flows a thousand different behaviors
Values influence mindsets
2. The Right Focus
The right focus helps get/make the most out of director’s time, which is in very short supply. Often directors are dealing with crucial decisions related to a variety of topics ranging from capital allocation, geographical expansion, M&A and/or divestitures and more. Today a typical management cyber presentation to the board doesn’t maximize the board’s time. It basically attempts to inform the board of risk mitigating activities and/or their results and effectiveness.
For example, we do phishing simulations and 85% of our employees don’t click on malicious phishing links. Those that do (15%) are directed to attend more training. Or, we conducted x number of third-party risk assessments with no material findings or the results of our penetration testing exercise uncovered x number of vulnerabilities that we’re working to remediate. These are all good data points to be aware of and these functions within a cyber program are definitely required, but we believe this approach does not have the clarity and context that would be most effective and time efficient for the board.
We therefore encourage board directors to guide and coach management to consider alternative approaches and one of these is the one outlined below that was adapted from Ram Charan, the world renowned corporate governance expert and author.
Clearly Articulate what the issue or objective is. For example, current of future decision. Also clearly define the expectation from the board, what is or will be the ask from the board. Is it a board decision or not?
Provide relevant context surround the issue or objective. Relevant in terms of business implications that board members can relate to.
Outline the potential solution options and alternative actions that management has analyzed and considered
Share your recommendation and point of view on the way forward
Invite discussion, alternative view points and encourage engagement
Reframing the presentation using the approach above, we believe, will maximize director’s time. The updates from cyber functions can also be integrated or better still can be provided ahead of the board meeting for directors.
that we believe is more effective than a read out of cyber program functions.
Engagement
Commitment
Decisions
Clarity : Clear Outcome or Objective
Board Leadership Commitment
Engagement
Board directors sometimes, actually often, ask us if the cyber update given by the cyber chief (CISO/CIO) or respective leader was a good or great one. Generally speaking, the update they’re referring to typically involves a 15-20 minute presentation that talks about some key risk indicators or risk numbers (e.g. phishing rates, patching, vulnerabilities, etc) or updates on large security projects and/or “material” incidents. At the end of the presentation or during maybe, the one board member with a cyber background asks a couple of questions or may decide to go into the weeds about why a particular security project is delayed while the rest of the board (out of respect) waits impatiently to move on to more pressing items on the agenda. This is characteristic of a typical cyber board briefing update and we don’t consider this a great or even good briefing because it lacks the key ingredients of great briefings and the resulting effective cyber oversight.
A great one looks like this and this is why you care about great briefings and how to create one on a regular basis (at least quarterly for medium-high risk profile organizations)
There are three foundational and fundamental elements of a great board briefing on cyber risk. These assume you’re already committed to cyber and have board members who are actively engaged in their board governance and oversight roles.
A - Engagement : A great briefing has an unmistakable energy of engagement displayed by a majority of board members. You can feel the progress in the boardroom. Discussions, though cyber focused, inevitably connect with critical business strategy elements of the business. And this is why even directors without cyber expertise can engage passionately in the discussion. For example, a cyber briefing could be discussing the primary risk of business disruption by bad actors and the impact to the business and not just that the cyber team stopped a certain number of ransomware attempts
Talent - or talking about attracting and retaining cyber talent which naturally evolves into touchpoints with culture, employee engagement, compensation, etc.
A great briefing connects the dots and this is reflected in the engagement from board members. To create this level of engagement - three things :
a - Effective communication
b - Cyber expertise
c - Relationships
Decisions : Is it possible to have good board engagement and ineffective cyber oversight? Yes
Ultimately, strategic decisions about risk mitigation investments and potential opportunities must be made for effective cyber oversight. Thses typically will take on the form of proactive measures to reduce risk and potentially explore how to leverage such investments to elevate the brand or increase value to clients, customers and consumers. Some of these decisions may involve staying ahead of new cyber regulation and crisis preparedness. Whateever the form, these decisions are made by the board, effectively and decisively
There’s a clear understanding and awareness of the implications of these decisions on the business and all relevant stakeholders and these decisions are not reactive but proactive and they anticipate where the business is going and the associated risk velocity of the business. To create and allow for effective strategic decisions, here is what’s required:
Business strategy and vision : You can’t mitigate risk that doesn’t align with where the business is going. Well, you can but it’s not effective.
Courage to Challenge other perspectives and this courage is encouraged by establishing a safe zone; psychologically safety. Multiple perspectives helps. Challenging the effectiveness of existing investments
3. Board Engagement
Engagement
High level of engagement looks like what? Low level of engagement looks like the board session described earlier in the article. Once you have board leadership and the right focus, you have the foundation for having and sustaining a high level of engagement during a board briefing but it doesn’t happen automatically or without being intentional about it.
High levels of engagement on cyber creates a high level of effectiveness in the board room. The ingredients (in our view) of great board engagement include:
Digital & Cyber Expertise
Effective Communication
Good Relationships with Management
Digital & Cyber Expertise - Board members should be deliberate about increasing their knowledge and expertise in digital and cyber risk/security. This begins with intellectual curiousity about the benefits and risks of digital capabilities. Several board directors are naturally curious about a lot of topics and cyber and digital should be no different. There’s often some trepidation and anxiety for directors that believe they’re not tech savvy and are intimidated by the technology. But this should be an excuse to resign or neglect the required efforts to be at least curious about the benefits and to have a basic understanding of the implications . The goal is not to be an expert but to at least be able to carry on a meaningful conversation (at a dinner party if need be). We beleive this can be done and it can also be incredibly effective and fun for directors.
There are several ways to acquire expertise ranging from independent reading of cyber articles in board-focused publications such as the NACD, Directors and Boards, PDA, etc.) to more formal training courses such as the MIT courses. But where to begin. We suggest hosting a board learning clinic focused on cyber and the organizational cyber risks and challenges. This allows board directors to learn through meaningful stories and experience the learning collectively as a board. In this group format (in person preferrably for the first), questions from one director will trigger other thoughts from others and build on each others’ understanding. It can also be directed to the organizational struggles and provide context, etc.
Effective Communication - The next ingredient is effective communication, which is a lot of listening and asking questions. There’s a tendency for some board directors, ourselves included, to want to speak instead of listen. Instead of listening intently with our ears, eyes, heads and hearts, we try to focus on our point and what we want to say. But listening is what’s really needed for high levels of engagement. Humble inquiry is the mental frame of mind or model that should be employed here. For example, managemnet or cyber chief shares with the board that a 3rd party parter had a cyber incident but that some of the organization’s customers and suppliers may have been impacted but the organization itself was not impacted and hasn’t really suffered any material attack or data breach.
Aft first glance, it seems there’s no major action for the organization or the board, other than ensuring the organization is not vulnerable to the same thing as the the source of the incident at the 3rd party. Some questions to ask here include
If customers are impacted, does our cyber insurance policy cover these types of incidents and related remediation efforts that may be required?
What proactive steps can the organization take?
How does this incident potentially affect our brand or product launch?
Management Relationships - The last ingredient is to cultivate good relationships with cyber / digital chief. This is important for two main reasons. First it provides a baseline to ask tough questions in the boardroom without the cyber/digital chief thinking and felling they’ve been unfairly targeted or mistreated. When management officers know that board directors care about them and that they are genuinely interested in their success as well as the success of the organization, it makes a difference. Management wants the board to be engaged and they’d like to receive the benefit of an outside view and independent perspectives. Without such relationships, the psychological safety required in the boardroom required to actively and proactively engage is limited at best.
This relationship also provides learning for the directors and this in turn increases their confidence in dealing with digital and cyber topics and the value they can add and provide to the organization. How to cultivate these relationships? There are several ways to do this including :
X, Y and Z
But we recommend a simple informal method, one-on-one lunch
Commitment
Decisions
Clarity : Clear Outcome or Objective
Board Leadership Commitment
Engagement
A - Engagement : A great briefing has an unmistakable energy of engagement displayed by a majority of board members. You can feel the progress in the boardroom. Discussions, though cyber focused, inevitably connect with critical business strategy elements of the business. And this is why even directors without cyber expertise can engage passionately in the discussion. For example, a cyber briefing could be discussing the primary risk of business disruption by bad actors and the impact to the business and not just that the cyber team stopped a certain number of ransomware attempts
Talent - or talking about attracting and retaining cyber talent which naturally evolves into touchpoints with culture, employee engagement, compensation, etc.
A great briefing connects the dots and this is reflected in the engagement from board members. To create this level of engagement - three things :
a - Effective communication
b - Cyber expertise
c - Relationships
Decisions : Is it possible to have good board engagement and ineffective cyber oversight? Yes
Ultimately, strategic decisions about risk mitigation investments and potential opportunities must be made for effective cyber oversight. Thses typically will take on the form of proactive measures to reduce risk and potentially explore how to leverage such investments to elevate the brand or increase value to clients, customers and consumers. Some of these decisions may involve staying ahead of new cyber regulation and crisis preparedness. Whateever the form, these decisions are made by the board, effectively and decisively
There’s a clear understanding and awareness of the implications of these decisions on the business and all relevant stakeholders and these decisions are not reactive but proactive and they anticipate where the business is going and the associated risk velocity of the business. To create and allow for effective strategic decisions, here is what’s required:
Business strategy and vision : You can’t mitigate risk that doesn’t align with where the business is going. Well, you can but it’s not effective.
Courage to Challenge other perspectives and this courage is encouraged by establishing a safe zone; psychologically safety. Multiple perspectives helps. Challenging the effectiveness of existing investments
In summary here are the principles and practices that increase the odds in your favor if you desire to have effective cyber board briefings.
Summarize the required practices and actions.
This is what makes great briefings, great!
In summary here are the principles and practices that increase the odds in your favor if you desire to have effective cyber board briefings.
Summarize the required practices and actions.
This is what makes great briefings, great!