0 Results Found
              Back To Results
                Reports

                Board Oversight of Cybersecurity Risk: A Framework for Inquiry

                What Boards Should Ask About Cybersecurity Risk

                Following a steady march of large-scale breach crises at corporations and public entities over the past several years, business leaders and boards of directors have been put on notice that this is a business risk issue, not an IT problem.

                Regulators and stakeholders have made their expectations clear: take action to proactively monitor and mitigate cybersecurity risk, or expect fines and legal intervention. As a result, board committees charged with cybersecurity oversight are seeking more direct access to the Chief Information Security Officer as well as a clear, concise dashboard for monitoring risk levels.

                Board Oversight of Cybersecurity Risk: A Framework for Inquiry discusses:

                • Maxims for doing business in today’s cybersecurity threat environment
                • Guidance for defining top business risks
                • Step by Step discussion guide for developing a risk reporting dashboard

                SecureWorks offers this guide to boards, particularly audit and risk committees, as a tool for improving the board-management dialog on cybersecurity risk management. The included Framework for Inquiry is a non-prescriptive discussion exercise that boards can initiate with the CISO and CIO to gain a deeper understanding of cybersecurity strategy and ensure that the company’s efforts are reasonable in the context of business strategy, risk tolerance and industry expectations. In turn, management can use the framework to craft a better reporting dashboard with metrics that help the board oversee risk and better understand the security programme’s priorities.

                Like what you're reading ?
                Get instant access by completing the form below

                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • > 1000
                • 501 - 999
                • < 500

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing The Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am)
                • Late morning (10am-12pm)
                • Early afternoon (12-3pm)
                • Late afternoon (3-5pm)

                SecureWorks News :

                Related Content