The insights in this article were extracted from an interview with Caroline Tsay, board director at The Coca-Cola Company, Morningstar, Semrush, and NiCE.
Cyber risk oversight is increasingly becoming an audit committee conversation. In our recent review of S&P 500 proxy and governance disclosures, we found that 79% of companies assign primary board-level cybersecurity oversight to the audit committee, up from 71.2% two years earlier.
The shift to audit often comes with a practical constraint. In audit committee meetings, cyber is added to a packed agenda alongside financial reporting, internal controls, external audit, compliance, and disclosure obligations. The cyber portion of the agenda is rarely a long strategic session, but rather 10 to 15 minutes, once a quarter.
That reality should change how CIOs and CISOs think about briefing the board: the goal is not to be comprehensive, but to give directors what they need to govern.
Why many cyber briefings do not land
A common failure mode is an update that is thorough but not actionable. CISOs too often bring dashboards, metrics, and project lists. Directors hear about activity, but they cannot tell what matters most, what is getting better or worse, and what management needs from them. In a short slot, that kind of reporting simply doesn’t work. If the committee cannot take an action, the discussion becomes a status report.
Context is usually the missing ingredient. Many audit committee members are strong in finance, risk, and controls, but they do not necessarily know how to interpret a wall of security signals. If you show a metric, you need to explain why it matters, what good looks like, and what decision it drives.
What audit committees expect to hear
In a typical quarterly briefing, directors expect three categories of information.
- What is material to the business. That includes incidents and near misses, plus any event that meaningfully changed exposure. Directors want to know whether it mattered, what you learned, and what you changed.
- What changed in the external environment. This should not be a threat briefing. It should be a short description of new vulnerabilities, attacker behavior, or regulatory developments that actually alter your risk profile or priorities.
- Program health. Directors want to know whether the security program is executing across the enterprise. Are the right functions aligned? Are priorities landing with IT, product, and engineering? Is the culture capable of implementing what is required?
The board does not need to know everything you are doing, but when the conversation ends, it needs to be able to validate the top risks, align on priorities, and make decisions. If your update does not drive one or more of those outcomes, you are educating, not governing.
The cybersecurity leaders who consistently earn trust and attention show up as business executives, not technical experts. They speak the language of strategy, risk, and outcomes. They are concise. They connect cybersecurity issues to business impact in plain terms, such as implications for revenue, operations, regulatory exposure, and recovery. They are explicit about tradeoffs because tradeoffs are where directors can add value.
They also demonstrate cross-functional alignment on priorities, roles, and accountability, and are intellectually honest. They say what they do not know, what could go wrong, and how they are managing uncertainty. That honesty builds trust.
Effective oversight is not built in a single quarterly slot. Engagement between meetings with the audit chair, and sometimes other committee members, can be critical. That can include short education sessions, quick check-ins on emerging issues, and briefings on sensitive topics in advance of a meeting. The committee should never be surprised by what it hears in the formal meeting.
A structure that works in 10 to 15 minutes
When time is limited, format becomes strategy. The strongest briefings follow a simple narrative arc and end with an explicit ask.
Start with the top three enterprise risks. For each, state the trend and whether it is within tolerance, then cover what changed since last quarter. Focus on the few shifts that alter exposure, including incidents and near misses, major business changes, or regulatory developments.
Next, go deep on one realistic scenario that maps to how the business operates, and explain what containment and recovery look like under real constraints. Close with two or three proof points on program health. Evidence from exercises, recovery tests, or control effectiveness always beats a long roadmap.
Finally, make the ask. What decision do you need? Approve funding, endorse a timeline, accept a defined risk, support a policy change, or request an independent review. If there is no decision required, be explicit about what you want the committee to take away and what you will report back next time.
The fastest way to elevate cybersecurity at the board level is to respect the board’s time. Amplify the signal, cut the noise, anchor the discussion in business impact, and explicitly ask for what you need. When directors can act, they can move the conversation from awareness to governance: clear direction, clear ownership, and clear accountability.
Rob Sloan will be hosting a panel discussion related to how CIOs/CISOs must engage the board during a cyber crisis at Zenith Live 2026. To find out more, click here.
Read More from This Article: Delivering an impactful 15-minute board briefing
Source: News

