Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Establishing Trust with Your Board—Advice for Security Leaders

By David Faraone, Sr. Consulting Director, Unit 42

For many Chief Information Security Officers (CISOs), reporting to the board of directors has been handled as a reactionary, albeit very necessary task. After all, it’s the board of directors that sit atop the corporate governance model, so it is incumbent upon security professionals to keep them informed. But communicating about security incidents—like the Log4j vulnerability, for example—fielding requests based on regulatory requirements, or answering questions about a breach that happened in the same industry should definitely not be the only moments that CISOs engage their boards.

On the contrary, security professionals should be in regular contact with their boards, keeping them informed and educated and establishing mutual trust. Ultimately, working together with the board of directors helps create a better security posture—something we all need.

The board’s role as the fourth line of defense

While the board is sometimes thought of as just another group that security leaders need to report into, this governance group can actually be much more.

A board of directors can and should be thought of as the fourth line of defense for an enterprise’s security. The first line of defense is the day-to-day security operations and capabilities managed by hands-on operational staff who are triaging incidences. The second line of defense is what we call the cyber governance function, while the third line is the internal audit and reporting function. So, the fourth line of defense is really the board of directors. It is critical that all four lines of defense are communicating effectively to eliminate gaps and create a cohesive cybersecurity operation.

How to proactively build trust with the board

Enabling the board to be a partner for security and an effective fourth line of defense involves both sides trusting one another. For security professionals, this requires navigating what’s important to the board in terms of three main elements:

  1. Brand protection. Make sure that the organization’s brand is protected from an intellectual property, trade secret and reputation perspective.
  2. Profitability. Ensure that the right security controls are in place to ensure that the company is profitable
  3. Risk management. Know what to report to the board that really resonates with how the business could be impacted by cybersecurity threats.

Bring a return on security investment (ROSI) outlook

When communicating with your board, it’s important to make sure that everyone speaks the same language. It’s no secret that board members aren’t often cybersecurity experts. As a result, CISOs often struggle with what level of technical language to use—sometimes even shying away from sharing certain technical information because they really just don’t know how to communicate with these non-technical folks.

I also often see CISOs that really emphasize technical elements but are not being successful at communicating risk from a business standpoint that the board understands. The sweet spot to communicating with the board is keeping the audience engaged and effectively communicating those risks without scaring them.

Within Unit 42, we use a term called ROSI to help communicate the return on security investment. It’s vitally important for CISOs to articulate financially why certain security investments that are critical in the ROSI will be from a return perspective in terms of what assets are being protected and how they’re being protected. The ROSI should also explain what the net gain for objective security maturity is for the organization, not subjective maturity.

The Unit 42 framework for communicating risk to the board

One of the primary responsibilities that a CISO has to the board is to communicate risk in a proactive and meaningful way. Palo Alto Networks Unit 42 has developed a framework for communicating risk to the board that encompasses the following key steps and items:

  • Inventory collection. You cannot protect what you don’t know about, so be sure to have a proper inventory of IT assets.
  • Identify key assets. Discover and identify the most important assets, whether that’s individual data, applications, or specific infrastructure. It’s critical to understand the key assets that sit at the heart of the business.
  • Security tool assessment. The organization needs to understand how well it is using the security tools it has to protect those key assets.
  • Incident response capability assessment. If an incident impacts the key assets is the organization, be equipped to respond in a way that is effective and efficient.
  • Testing and validation. Understand the tools and incident response capabilities. It’s critical to test and validate how those capabilities would look if a threat actor did attack the key assets.
  • Board of directors’ resiliency briefing. The final step of the framework is to communicate to the board how resilient the organization is to potential risk. Aim to give the board actionable and objective results from the analysis and communicate them in a way that really links back to business.

Reporting metrics: Be a leader, not a laggard

We often see organizations reporting mostly operational security operations center (SOC) metrics such as the number of attacks, alerts, closed incidents or how many unpatched operating systems there are to show progress. But really, that doesn’t go far enough to translate cyber risk. Categorically, those SOC metrics should be considered as lagging indicators that result in reactive remediating measures.

We recommend CISOs present leading indicators that promote proactive security initiatives. A good example metric for a proactive leading indicator would be the number of third parties or supply chain risk management resources that have been assessed over the past 12 months. That metric shows not only how many high-risk supply chain resources there are but also how far the company is going in terms of validating the due diligence of those third parties.

Recommendations for successful CISO/Board communications

Building a successful working relationship with any board is a process, but the very first key is to establish the relationship. Get to know your board and understand what resonates with them in terms of business risk. Knowing their focal issues is the only way you’ll be able to communicate to them how you’re protecting their best interests in terms of the business assets and the business imperatives.

Also, take a data-driven approach to what is communicated to the board. Eliminating subjectivity wherever you can places you in a better position, as you’re simply stating the facts. That said, simply throwing up numbers on a slide doesn’t work either. What works is storytelling. Board members like to understand the introduction, the plot, the climax, and the resolution. So don’t just present data, but actually present the story behind it.

And fundamentally, remember: the board is part of the solution. They’re the fourth line of defense. As such, be sure to help enable and create a culture of empowerment, where leaders across the organization understand that security is everyone’s responsibility.

To learn more, visit us here.

About David Faraone:

David is a senior director at Unit 42, leading the North America East Region Consulting Team. He is a highly accomplished cybersecurity consultant with deep expertise serving large organizations in areas such as CISO advisory support, cloud security strategy, network security architecture and design, and Internet of Things security.


Read More from This Article: Establishing Trust with Your Board—Advice for Security Leaders
Source: News

Category: NewsFebruary 14, 2022
Tags: art

Post navigation

PreviousPrevious post:Why Secure SD-WAN Should Be Delivered from the CloudNextNext post:How the Hybrid Workplace is Reshaping Enterprise Networks

Related posts

Barb Wixom and MIT CISR on managing data like a product
May 30, 2025
Avery Dennison takes culture-first approach to AI transformation
May 30, 2025
The agentic AI assist Stanford University cancer care staff needed
May 30, 2025
Los desafíos de la era de la ‘IA en todas partes’, a fondo en Data & AI Summit 2025
May 30, 2025
“AI 비서가 팀 단위로 지원하는 효과”···퍼플렉시티, AI 프로젝트 10분 완성 도구 ‘랩스’ 출시
May 30, 2025
“ROI는 어디에?” AI 도입을 재고하게 만드는 실패 사례
May 30, 2025
Recent Posts
  • Barb Wixom and MIT CISR on managing data like a product
  • Avery Dennison takes culture-first approach to AI transformation
  • The agentic AI assist Stanford University cancer care staff needed
  • Los desafíos de la era de la ‘IA en todas partes’, a fondo en Data & AI Summit 2025
  • “AI 비서가 팀 단위로 지원하는 효과”···퍼플렉시티, AI 프로젝트 10분 완성 도구 ‘랩스’ 출시
Recent Comments
    Archives
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.