In the first part of this series, I introduced the research Kudelski Security did on the subject of board communications and metrics in collaboration with our Client Advisory Council. The report is available in full here, but as with all meaty reports there’s a lot of content, so this article seeks to cover some interesting insight that didn’t make the final cut.
There were a few questions we explored in depth, based on a response from an initial survey on frequent questions CISOs are asked by the board.
The full list of questions that formed the basis of our research is listed below:
The broad consensus from our Council Members was that this question: “Are we secure? How do we know” was the most challenging and frequent question that boards ask CISOs. As with all strategies, there was not a one-size-fits-all approach, so the report ends up offering a range of strategies that need to be evaluated and implemented based on your unique organizational profile and board requirements. Worth noting that CISOs spend an average of 10-20 hours preparing their response to this question, so in the interests of saving time, it’s a useful question to consider.
Here are five key takeaways:
- One fortune 500 CISO suggests this is not a simple black or white answer as there is no such thing as 100% secure; we are always going to have more vulnerabilities, as the threats constantly change. He prefers to talk about security as a journey using a maturity model, a framework to measure progress.
- It was commonly agreed that this question needs to be bridged to an industry framework; the board needs to understand that you are measuring and aligning the maturity of your company’s capabilities to what the industry norm is.
- Start by presenting the cybersecurity maturity model – a best practice framework for your industry (like NIST CSF, ISO etc.) you are aligned to – and show where you’re at today on that journey, ultimately according to company’s maturity goals.
- Continue by presenting where you want to get to and pivot your answer to a risk management discussion by showing the level of current risk. You should be able to explain the board if this level is above, at or below the company’s risk profile, risk tolerance, or risk acceptance levels.
- Next, show the board how you reduced risk of compromise to critical assets using metrics that attest to improvement trends, as it is key to validate your state of security. Provide direct, fact-based answers that you can validate with metrics, such as event monitoring results, or with third-party audits. One of our CAC members, a CISO in the Computer Hardware industry said:
“Always have data to back up your recommendations. Stay away from opinions”
What was a particularly interesting outcome from our discussion with the Client Advisory Council CISOs was that a key metric and focus for the CISO must be the ability to respond and recover from attacks, and not just any attack, but the more targeted attacks.
This is a good way to confirm the defenses are operating well. As Pete Naumovski, VP and CISO, BCBSA states: “in a perfect world, the absolute metric for a CISO to have is the MTTD / MTTR of a more targeted attack”. Or as Ginny Davis, CIO and CSO Technicolor puts it: “Your ability to respond and recover is equally important to how secure you are”.
And while we are on presentations, here is a summary of the top-5 presentation tips:
- Keep the same format for each board presentation, a focused message on each slide and leave plenty of white space
- Use a heatmap to demonstrate risk drivers or a spider graph to show multiple data points
- Keep the message on each slide focused and leave plenty of white space
- Show progress over time, including trends, outcomes, and risk reduction
- Show improvements in ability to respond and recover from an attack with examples of dwell time reduction for threat actors like phishing or malware.
Read the full report and get Enterprise CISOs perspectives, examples, meaningful metrics and a range of strategies to prepare CISOs for the challenging questions from the Boardroom. Look out for part 3 of this series for a more detailed focus on peer comparison.
Latest posts by Shiri Band (see all)
- CISO by Design: A Blueprint for Becoming a CISO - August 5, 2020
- 3 CISO Strategies on How to Answer the Board Question “How Do We Compare With Peers?” - September 11, 2018
- Answering the Board’s Most Challenging Questions - September 5, 2018