SlideShare a Scribd company logo
©2019 Diligent. All rights reserved. Diligent Confidential.
How Higher Ed Boards Can Learn to
Stop Avoiding & Start Loving Cyber Risk
Dottie Schindlinger
Vice President of Thought Leadership
June 19, 2019, 1:30-2:15 PM
2019 AICUP Member Meeting on Collaboration
2
Today’s Agenda
Overview of the board’s
role in cyber risk oversight
Review the latest trends
and research related to
boards and cyber risk
Discuss how boards can
prepare for cyber incidents
Mini-Tabletop Exercise
Cyber Risk by the Numbers
447 million
Number of personal records hackers
stole last year
206 Days
Average # days it took US
companies to detect a data breach
>70% by 2021
Percentage of all cryptocurrency
transactions used for cybercrime
$6 trillion annually by 2021
Annual cost of cybercrime, which is
already greater than illicit drug trade
1 in every 50
Emails contains malicious content
#10 on the Top 10
Education is #10 on the top 10 most
cyber-attacked industries
3
Sources: https://www.ibm.com/security/data-breach; https://www.comparitech.com/vpn/cybersecurity-
cyber-crime-statistics-facts-trends/; https://cybersecurityventures.com/cybersecurity-almanac-2019/
Cybersecurity – programs and processes in place to protect hardware, networks, and data from cyber
incidents
Cyber resilience – the ability to withstand a cyber incident, including:
• Programs & processes in place to ensure operations can continue with minimal disruption both
during & after an incident
• The speed and agility of the organization’s response to cyber incidents
• The ability of the organization to retain & rebuild the trust of stakeholders after a cyber incident
occurs
4
Cybersecurity vs. Cyber Resilience
Are Boards of Trustees
Cyber-Ready?
5
Trustee
Access to
sensitive
docs
Ability to save,
share and store
these docs
A scenario to consider…
7
Cyber-Readiness – Boards Lag Behind
53%
North American directors
use personal email for
board communications
(Global: 56%)
45%
North American directors
lost a device that
contained board records in
the past year
(Global: 29%)
29%
North American board
using secured instant
messaging software
(Global: 47%)
37%
North American boards
find it challenging to share
sensitive documents safely
(Global: 47%)
2018 Forrester, Directors’ Digital Divide Report
8
Cyber-Readiness – Boards Lag Behind
82% 67%
13% 51%
School boards have never
conducted a security audit
of board communication
IT/Data security teams that
oversee the security of
board communications
School boards don’t
require cybersecurity
training
School boards “don’t
know” if there is a cyber
crisis plan in place;
another 39% know there
isn’t one.
2018 NSBA School Board Cyber Risk Report
What Is the Board’s Role in
Cyber Risk Management?
9
Board’s Fiduciary Obligations
Duty of Care
• Acting on an informed basis after consideration of all
available information
Duty of Loyalty
• Putting the organization’s interests above your own &
avoidance of conflicts of interest
Duty of Good Faith
• Exercising care & prudence in business decisions with
adherence to law & policy
10
Who’s Accountable?
11
Administration carries out
day-to-day business, reports
to President
President oversees school &
staff, reports to board
Board: oversees mission,
represents stakeholder
interests, oversees
institution
Stakeholders: students, families,
community, local businesses, elected
officials, government agencies, media, etc.
Questions for the board to consider
12
• Is the institution’s approach to cybersecurity risks and associated privacy
issues able to meet new legal requirements? (e.g. GDPR, US state laws)
• How frequently is the maturity of the institution’s cybersecurity risk
management framework being assessed and evaluated?
• How is the institution monitoring for new and potential cybersecurity
regulatory changes and complying with new legal requirements?
13
5 Cyber “Discussion Starters” for the Board
1 What’s our plan include? (BC/DR, crisis comm’s, cyber risk coverage)
2 How are we protecting consumer data?
3 How do we know our security/privacy program works?
4 What are the biggest vulnerabilities & how are we preparing?
5 Have we received adequate training & have we practiced the plan?
• Divide into teams
• Each team – select a VIP to take notes, someone to be time-keeper, and a team rep.
• Read through the case scenario & discuss:
• What would your board do first, second?
• What unanswered questions need to be resolved?
• Who on the board should be involved and what roles should each person play?
• What reports & data will the board need?
• How should the board’s efforts be coordinated?
14
Exercise: Cyber Crisis
Q&A – What’s On Your Mind?
Contact Me!
16
@GovTechGeek
linkedin.com/in/GovTechGeek
slideshare.net/BoardEffect
boardeffect.com/blog
17
(866) 672-2666
info@boardeffect.com
boardeffect.com
1111 19th Street NW, 9th Floor,
Washington, DC 20036
Contact Us
Thank you!

More Related Content

What's hot

Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Stephanie McVitty
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
Citrix
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
Paul Melson
 
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
AIIM International
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Kevin Duffey
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Rahul Boga
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
Dominic Karunesudas
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
siswarren
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
Bradford Bach
 
#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems
DevOps.com
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
Sandra Fathi
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
Kroll
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
Brian K. Dickard
 

What's hot (20)

Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 

Similar to How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!

A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
EMC
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
EMC
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
TraintechTde
 
Websense
WebsenseWebsense
Websense
CMR WORLD TECH
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
SurfWatch Labs
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Joe Bartolo
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
RambilashTudu
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
FahimMuntasir21
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
Leon Fouche
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
Leon Fouche
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
David Sweigert
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
Starttech Ventures
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Jay Kesan
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Ernst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
NishantSisodiya
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 

Similar to How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk! (20)

A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
Websense
WebsenseWebsense
Websense
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

More from Dottie Schindlinger

Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Building Your Best Corporate Boardroom: How to Find the Right Directors for a...Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Dottie Schindlinger
 
Managing School District Policy Documents with BoardDocs
Managing School District Policy Documents with BoardDocsManaging School District Policy Documents with BoardDocs
Managing School District Policy Documents with BoardDocs
Dottie Schindlinger
 
Making Sense - Reframing Problems to Generate Better Board Decisions
Making Sense - Reframing Problems to Generate Better Board DecisionsMaking Sense - Reframing Problems to Generate Better Board Decisions
Making Sense - Reframing Problems to Generate Better Board Decisions
Dottie Schindlinger
 
School Board Governance in the Digital Age
School Board Governance in the Digital AgeSchool Board Governance in the Digital Age
School Board Governance in the Digital Age
Dottie Schindlinger
 
Easing the Superintendent Evaluation Process with BoardDocs
Easing the Superintendent Evaluation Process with BoardDocsEasing the Superintendent Evaluation Process with BoardDocs
Easing the Superintendent Evaluation Process with BoardDocs
Dottie Schindlinger
 
Welcome to Your District's Board Meeting - Now What?!
Welcome to Your District's Board Meeting - Now What?!Welcome to Your District's Board Meeting - Now What?!
Welcome to Your District's Board Meeting - Now What?!
Dottie Schindlinger
 
Making Sense: Generating Better Board Decisions with BoardDocs
Making Sense: Generating Better Board Decisions with BoardDocsMaking Sense: Generating Better Board Decisions with BoardDocs
Making Sense: Generating Better Board Decisions with BoardDocs
Dottie Schindlinger
 
Forrester Report on Boardroom Technology and Board Best Practices
Forrester Report on Boardroom Technology and Board Best PracticesForrester Report on Boardroom Technology and Board Best Practices
Forrester Report on Boardroom Technology and Board Best Practices
Dottie Schindlinger
 
Top 5 Governance Issues Facing Nonprofits for 2019
Top 5 Governance Issues Facing Nonprofits for 2019Top 5 Governance Issues Facing Nonprofits for 2019
Top 5 Governance Issues Facing Nonprofits for 2019
Dottie Schindlinger
 
WASB 2019 Convention: Generating Better Board Decisions with BoardDocs
WASB 2019 Convention: Generating Better Board Decisions with BoardDocsWASB 2019 Convention: Generating Better Board Decisions with BoardDocs
WASB 2019 Convention: Generating Better Board Decisions with BoardDocs
Dottie Schindlinger
 
Governing in a Digital Age - Conference Presentation at Upswell 2018
Governing in a Digital Age - Conference Presentation at Upswell 2018Governing in a Digital Age - Conference Presentation at Upswell 2018
Governing in a Digital Age - Conference Presentation at Upswell 2018
Dottie Schindlinger
 
33 Principles in 33 Minutes: Guide to Good Governance
33 Principles in 33 Minutes: Guide to Good Governance 33 Principles in 33 Minutes: Guide to Good Governance
33 Principles in 33 Minutes: Guide to Good Governance
Dottie Schindlinger
 
PSBA Learning Lab BoardDocs
PSBA Learning Lab BoardDocsPSBA Learning Lab BoardDocs
PSBA Learning Lab BoardDocs
Dottie Schindlinger
 
Engaging the School Community in Decisions with BoardDocs
Engaging the School Community in Decisions with BoardDocsEngaging the School Community in Decisions with BoardDocs
Engaging the School Community in Decisions with BoardDocs
Dottie Schindlinger
 
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
Dottie Schindlinger
 
Maximize Efficiency & Time - Board Management Solutions that Work
Maximize Efficiency & Time - Board Management Solutions that WorkMaximize Efficiency & Time - Board Management Solutions that Work
Maximize Efficiency & Time - Board Management Solutions that Work
Dottie Schindlinger
 
The Clear Picture on Board Transparency: Why It’s so Important
The Clear Picture on Board Transparency: Why It’s so ImportantThe Clear Picture on Board Transparency: Why It’s so Important
The Clear Picture on Board Transparency: Why It’s so Important
Dottie Schindlinger
 
What Can You Do with PSBA BoardDocs ?!
What Can You Do with PSBA BoardDocs ?!What Can You Do with PSBA BoardDocs ?!
What Can You Do with PSBA BoardDocs ?!
Dottie Schindlinger
 
The Clear Picture on School Board Transparency: Why It’s so Important
The Clear Picture on School Board Transparency: Why It’s so ImportantThe Clear Picture on School Board Transparency: Why It’s so Important
The Clear Picture on School Board Transparency: Why It’s so Important
Dottie Schindlinger
 
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
Dottie Schindlinger
 

More from Dottie Schindlinger (20)

Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Building Your Best Corporate Boardroom: How to Find the Right Directors for a...Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
 
Managing School District Policy Documents with BoardDocs
Managing School District Policy Documents with BoardDocsManaging School District Policy Documents with BoardDocs
Managing School District Policy Documents with BoardDocs
 
Making Sense - Reframing Problems to Generate Better Board Decisions
Making Sense - Reframing Problems to Generate Better Board DecisionsMaking Sense - Reframing Problems to Generate Better Board Decisions
Making Sense - Reframing Problems to Generate Better Board Decisions
 
School Board Governance in the Digital Age
School Board Governance in the Digital AgeSchool Board Governance in the Digital Age
School Board Governance in the Digital Age
 
Easing the Superintendent Evaluation Process with BoardDocs
Easing the Superintendent Evaluation Process with BoardDocsEasing the Superintendent Evaluation Process with BoardDocs
Easing the Superintendent Evaluation Process with BoardDocs
 
Welcome to Your District's Board Meeting - Now What?!
Welcome to Your District's Board Meeting - Now What?!Welcome to Your District's Board Meeting - Now What?!
Welcome to Your District's Board Meeting - Now What?!
 
Making Sense: Generating Better Board Decisions with BoardDocs
Making Sense: Generating Better Board Decisions with BoardDocsMaking Sense: Generating Better Board Decisions with BoardDocs
Making Sense: Generating Better Board Decisions with BoardDocs
 
Forrester Report on Boardroom Technology and Board Best Practices
Forrester Report on Boardroom Technology and Board Best PracticesForrester Report on Boardroom Technology and Board Best Practices
Forrester Report on Boardroom Technology and Board Best Practices
 
Top 5 Governance Issues Facing Nonprofits for 2019
Top 5 Governance Issues Facing Nonprofits for 2019Top 5 Governance Issues Facing Nonprofits for 2019
Top 5 Governance Issues Facing Nonprofits for 2019
 
WASB 2019 Convention: Generating Better Board Decisions with BoardDocs
WASB 2019 Convention: Generating Better Board Decisions with BoardDocsWASB 2019 Convention: Generating Better Board Decisions with BoardDocs
WASB 2019 Convention: Generating Better Board Decisions with BoardDocs
 
Governing in a Digital Age - Conference Presentation at Upswell 2018
Governing in a Digital Age - Conference Presentation at Upswell 2018Governing in a Digital Age - Conference Presentation at Upswell 2018
Governing in a Digital Age - Conference Presentation at Upswell 2018
 
33 Principles in 33 Minutes: Guide to Good Governance
33 Principles in 33 Minutes: Guide to Good Governance 33 Principles in 33 Minutes: Guide to Good Governance
33 Principles in 33 Minutes: Guide to Good Governance
 
PSBA Learning Lab BoardDocs
PSBA Learning Lab BoardDocsPSBA Learning Lab BoardDocs
PSBA Learning Lab BoardDocs
 
Engaging the School Community in Decisions with BoardDocs
Engaging the School Community in Decisions with BoardDocsEngaging the School Community in Decisions with BoardDocs
Engaging the School Community in Decisions with BoardDocs
 
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
 
Maximize Efficiency & Time - Board Management Solutions that Work
Maximize Efficiency & Time - Board Management Solutions that WorkMaximize Efficiency & Time - Board Management Solutions that Work
Maximize Efficiency & Time - Board Management Solutions that Work
 
The Clear Picture on Board Transparency: Why It’s so Important
The Clear Picture on Board Transparency: Why It’s so ImportantThe Clear Picture on Board Transparency: Why It’s so Important
The Clear Picture on Board Transparency: Why It’s so Important
 
What Can You Do with PSBA BoardDocs ?!
What Can You Do with PSBA BoardDocs ?!What Can You Do with PSBA BoardDocs ?!
What Can You Do with PSBA BoardDocs ?!
 
The Clear Picture on School Board Transparency: Why It’s so Important
The Clear Picture on School Board Transparency: Why It’s so ImportantThe Clear Picture on School Board Transparency: Why It’s so Important
The Clear Picture on School Board Transparency: Why It’s so Important
 
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
 

Recently uploaded

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!

  • 1. ©2019 Diligent. All rights reserved. Diligent Confidential. How Higher Ed Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk Dottie Schindlinger Vice President of Thought Leadership June 19, 2019, 1:30-2:15 PM 2019 AICUP Member Meeting on Collaboration
  • 2. 2 Today’s Agenda Overview of the board’s role in cyber risk oversight Review the latest trends and research related to boards and cyber risk Discuss how boards can prepare for cyber incidents Mini-Tabletop Exercise
  • 3. Cyber Risk by the Numbers 447 million Number of personal records hackers stole last year 206 Days Average # days it took US companies to detect a data breach >70% by 2021 Percentage of all cryptocurrency transactions used for cybercrime $6 trillion annually by 2021 Annual cost of cybercrime, which is already greater than illicit drug trade 1 in every 50 Emails contains malicious content #10 on the Top 10 Education is #10 on the top 10 most cyber-attacked industries 3 Sources: https://www.ibm.com/security/data-breach; https://www.comparitech.com/vpn/cybersecurity- cyber-crime-statistics-facts-trends/; https://cybersecurityventures.com/cybersecurity-almanac-2019/
  • 4. Cybersecurity – programs and processes in place to protect hardware, networks, and data from cyber incidents Cyber resilience – the ability to withstand a cyber incident, including: • Programs & processes in place to ensure operations can continue with minimal disruption both during & after an incident • The speed and agility of the organization’s response to cyber incidents • The ability of the organization to retain & rebuild the trust of stakeholders after a cyber incident occurs 4 Cybersecurity vs. Cyber Resilience
  • 5. Are Boards of Trustees Cyber-Ready? 5
  • 6. Trustee Access to sensitive docs Ability to save, share and store these docs A scenario to consider…
  • 7. 7 Cyber-Readiness – Boards Lag Behind 53% North American directors use personal email for board communications (Global: 56%) 45% North American directors lost a device that contained board records in the past year (Global: 29%) 29% North American board using secured instant messaging software (Global: 47%) 37% North American boards find it challenging to share sensitive documents safely (Global: 47%) 2018 Forrester, Directors’ Digital Divide Report
  • 8. 8 Cyber-Readiness – Boards Lag Behind 82% 67% 13% 51% School boards have never conducted a security audit of board communication IT/Data security teams that oversee the security of board communications School boards don’t require cybersecurity training School boards “don’t know” if there is a cyber crisis plan in place; another 39% know there isn’t one. 2018 NSBA School Board Cyber Risk Report
  • 9. What Is the Board’s Role in Cyber Risk Management? 9
  • 10. Board’s Fiduciary Obligations Duty of Care • Acting on an informed basis after consideration of all available information Duty of Loyalty • Putting the organization’s interests above your own & avoidance of conflicts of interest Duty of Good Faith • Exercising care & prudence in business decisions with adherence to law & policy 10
  • 11. Who’s Accountable? 11 Administration carries out day-to-day business, reports to President President oversees school & staff, reports to board Board: oversees mission, represents stakeholder interests, oversees institution Stakeholders: students, families, community, local businesses, elected officials, government agencies, media, etc.
  • 12. Questions for the board to consider 12 • Is the institution’s approach to cybersecurity risks and associated privacy issues able to meet new legal requirements? (e.g. GDPR, US state laws) • How frequently is the maturity of the institution’s cybersecurity risk management framework being assessed and evaluated? • How is the institution monitoring for new and potential cybersecurity regulatory changes and complying with new legal requirements?
  • 13. 13 5 Cyber “Discussion Starters” for the Board 1 What’s our plan include? (BC/DR, crisis comm’s, cyber risk coverage) 2 How are we protecting consumer data? 3 How do we know our security/privacy program works? 4 What are the biggest vulnerabilities & how are we preparing? 5 Have we received adequate training & have we practiced the plan?
  • 14. • Divide into teams • Each team – select a VIP to take notes, someone to be time-keeper, and a team rep. • Read through the case scenario & discuss: • What would your board do first, second? • What unanswered questions need to be resolved? • Who on the board should be involved and what roles should each person play? • What reports & data will the board need? • How should the board’s efforts be coordinated? 14 Exercise: Cyber Crisis
  • 15. Q&A – What’s On Your Mind?
  • 17. 17 (866) 672-2666 info@boardeffect.com boardeffect.com 1111 19th Street NW, 9th Floor, Washington, DC 20036 Contact Us

Editor's Notes

  1. 159,700 Number of cyberattacks reported by organizations in 2017 – estimated to actually be closer to 300,000 including those that were unreported $6.5 million Average total cost of a cyber breach, including the cost of scrubbing systems, damages, etc. But it does not include ongoing litigation, increases in cyber risk insurance coverage, new fines imposed by regulators. 3.5 million Number of unfilled cybersecurity jobs by 2021 $6 trillion Annual cost of cyber crime damages by 2021 1 in every 131 Emails is malicious – most common are phishing, malware including skimmers & ransomware 93% Cyber attacks that could be prevented by updating software & training – for example, still using Internet Explorer which is no longer being fully patched/supported by Microsoft, not being vigilant about using strong passwords, using the same password on multiple sites
  2. Dottie to provide a brief introduction to the data from the survey: “Before we dive into the survey data, I want to provide some context on cyber risk. Imagine a scenario where you have a group of part-time employees who are only on-site a handful of days each year. These employees mostly operate outside your firewall, but their job entails receiving, reviewing and responding to some of the most sensitive information your company has. These individuals also may have the ability to take this incredibly sensitive information and save it to local drives, print copies, and potentially email others using personal email accounts on service providers that might be completely unsecured. Even if the systems they use have security, since they are not managed by your company’s data security team, you have no access to of control over the systems these folks are using. Unfortunately, this scenario is a fairly accurate picture of how boards of directors communicate and operate at many companies.”
  3. These are based on Delaware corporate law, which influences the largest number of corporations in the US and has therefore become the standard. Duty of Care: Coming prepared to meetings, ready to deliberate, actively visiting the board portal Taking the time to research & reflect Adhering to professional standards – even when you’re off duty Staying informed on risks, opportunities, finances, activities, successes & challenges Anticipating consequences of decisions Duty of Loyalty: Advocating for the org’s mission & its stakeholders interests above your own Networking, opening doors, leveraging social media NOTE: Private opinions tend not to stay private for long Providing support & care for the CEO Disclosing & avoiding potential conflicts of interest Maintaining confidentiality & helping others do the same Supporting board decisions in public, regardless of personal feelings Duty of Obedience: Being a “good student” of the bylaws, policies, laws governing the org. and board Ensuring others adhere to the rules Knowing the org’s core documents, ensuring they are current & accurate Being a “good citizen” – keep the health and welfare of your org.’s stakeholders top of mind
  4. What’s at stake? Into effect 11/1/2018. Among the new rules are a requirement that companies must keep accurate data about cybersecurity safeguards for two years following, in case breaches are revealed down the line. The law also calls for "appropriate" digital safeguards at all parts of the business, including dealings with third party contractors. The rules call for stiff penalties, too — up to $100,000 per violation — a sum that should be enough to frighten many businesses into updating their IT infrastructure. But many will have problems complying with the new rules, partly because of a lack of awareness.