Board Information Security Risk Oversight

Board members are increasingly being held personally accountable for security breaches through shareholder derivative litigation. In this case shareholders sue for breaches of a directors’ fiduciary responsibilities to the corporation. The risk of personal liability increases when the board has not engaged properly in the oversight of their corporations’ information security risk.   Some of the more notable cases include Target Corporation, Wyndham Worldwide Corporation, TJX Companies, Inc., and Heartland Payment Systems Inc. As a result, the Department of Justice, Department of Homeland Security, Securities and Exchange Commission, Financial Industry Regulatory Authority all identify enterprise-wide information security risk management oversight as a crucial component of a boards fiduciary responsibility to act in good faith, with the care that a responsibly prudent person that makes decisions in the best interest of the corporation (business judgement rule).

Security incidents have a reputational, strategic, financial, and legal impact. Recent high profile attacks discussed in this article demonstrate that security incidents can significantly affect capital and earnings. So how can a board protect itself from information security litigation and demonstrate its compliance with the business judgement rule? Research indicates the following key components for effective information security risk management oversight:

  1. The board must understand what information security risk is and that it is an enterprise-wide risk management issue. An information security expert should exist on the board and information security risks should be addressed as part of a holistic enterprise-wide governance process that establishes appropriate accountability and oversight. The information security expert can be a member of the board or an external information security expert who provides on-going advisory services to the board.
  2. The board must allocate the budget and resources necessary for management to design, implement, and monitor a information security risk management framework. The National Institute of Standards and Technology (NIST) issued the Information security Framework as a model for information security assurance.
  3. The board must oversee information security incident management and resilience. Information security expertise must be readily available to provide real-time support for breach investigation, resolution and notification.
  4. The board must monitor information security risk and compliance through periodic security risk assessments and metrics. A cyber risk appetite should be defined and relevant metrics developed for information security related activity investment, information security program effectiveness, number of breaches, and information security awareness program effectiveness.
  5. The board members need to receive on-going information security training.

There is no doubt that boards will continue to find themselves on the frontlines of regulator, class plaintiff, and shareholder scrutiny. Proactive information security risk oversight will both protect the board against claims to meet the business judgement rule as well as strengthen the resiliency of their organizations’ ability to detect, respond, and recover from information security incidents.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Intelligence and Insights

Boost Business Value

From Compliance to Advantage: Using PCI 4.0 Certification to Boost Business Value

In this comprehensive guide, we explain in simple terms every aspect of complying with the NIST Cybersecurity Framework 2.0 …
financial institutions

5 Major Cybersecurity Risks Banks and Financial Organizations Face

In this article, we outline some of the most common cybersecurity attacks that banks and financial institutions can be vulnerable to …
How Merchants Can Become PCI-DSS Certified

Follow These 4 Steps to Achieve PCI DSS Certification

For all organizations that process payment cards, the Payment Card Industry Data Security Standard (PCI-DSS) certification is high up the data security and compliance priority list …