Skip to content

15 February, 2026

  • Saved Articles
  • My Account
  • Subscribe
  • Log In
  • Log Out

Board Agenda

  • Governance
  • Strategy
  • Risk
  • Ethics
  • News
  • Insight
    • Categories

      • View all
      • Governance
      • Strategy
      • Risk
      • Ethics
      • Board Expertise
      • finance
      • Technology
    • board decisions

      How to take decisions in uncertain times

      Instability is no longer a temporary disruption but a permanent state, so boards must govern...

      ethnic diversity FTSE 350

      Are US anti-DEI policies affecting global boards?

      Chairs must be alert to the issues raised by a shifting picture in diversity, equity...

      mindset

      Transformation begins with board mindset

      Boards cannot lead meaningful change without being prepared to examine and adjust how they think,...

  • Comment
      • View all
    • mindset

      Transformation begins with board mindset

      Boards cannot lead meaningful change without being prepared to examine and adjust how they think,...

      growth in a volatile year

      5 strategies for growth in a volatile year

      A survey of the C-suite in Europe reveals the practical and pragmatic approaches being taken...

      audit reform

      This is the worst time to abandon audit reform

      High-quality audit, accurate corporate reporting and strong governance give investors confidence and help companies operate...

  • Interviews
      • View All Interviews
      • Podcasts
      • Webinars
    • ethnic diversity FTSE 350

      Are US anti-DEI policies affecting global boards?

      Chairs must be alert to the issues raised by a shifting picture in diversity, equity...

      2026 OUTLOOK

      Are you ready for 2026?

      Buckle up: it looks like boards are in for a turbulent time. We interviewed key...

      sustainability report audit

      Thinking of sidelining sustainability? Think again

      Boards that embed sustainability into strategy will be ready to face today’s complex environment, the...

  • Board Careers
      • View All
    • female CEO

      Number of women in leadership stays unchanged

      In 2021, there were only eight female CEOs in the FTSE 100—a figure that is...

      female NED

      UK female non-executives earn £73k less than male NEDs

      Although the UK’s average gender pay gap on boards is shrinking, it is still one...

      directors duties

      3 top tips on directors’ duties

      When directors fall short of their responsibilities, the consequences can be devastating. How can board...

  • Resource Centre
      • White Paper Downloads
      • Book Reviews
      • Board Advisory & Corporate Services
    • Governance Outlook 2026: Governance in transition across Asia-Pacific

      Diligent partnered with the Governance Institute of Australia and the Singapore Institute of Directors for...

      Allianz Risk Barometer 2026

      Allianz Risk Barometer 2026

      For this report, Allianz sought the views of 3,338 respondents from 97 countries and territories,...

      forvis mazars ceo 2026

      C-suite barometer: outlook 2026

      Forvis Mazars collected the views of more than 3,000 C-suite executives across 40 countries, for...

  • Events
  • Search by topic
    • Governance
    • Strategy
    • Risk
    • Ethics
    • Regulation
    • ESG
    • Investor Relations
    • Careers
    • Board Expertise
    • finance
    • Technology

Cyber threats: how the board can prepare & mitigate risk

by James McAlister

Cyber attacks on the IT infrastructure of major firms are hitting the headlines. The risk can be mitigated, but boards need to stay informed.

Cybercrime, data protection, GDPR, cybersecurity

Cybercrime. Photo: European Parliament – Audiovisual Unit

Favorite

In January 2016, Michael Vatis, director of the FBI’s National Infrastructure Protection Center, said: “Companies should be thinking about the legal and managerial decisions that the CEO, the COO and the board will need to make in the event of a cyber-incident.”

Every board member, no matter where they operate in the world, should be aware of the catastrophic impact a cyber-attack could have to their company.

The Business Continuity Institute’s Cyber Resilience Report 2016 states that “…cyber-attacks offer the most significant business risk to organisations”. The report highlights the top-five causes of digital disruptions as being social engineering, malware, spear-phishing attacks, denial of service and out-of-date software.

Symantec, the security software manufacturer, provides some stark statistics in its April 2016 Internet Security Threat Report. It states that zero-day vulnerabilities, such as holes in software that are unknown to the vendor, have increased by 125%; more than half a billion personal records were either stolen or lost in 2015; spear-phishing campaigns rose by 55%; major security issues were discovered in three-quarters of popular websites studied; and ransomware attacks increased by 35%.

Add to this the predictions for the future regarding the increase in attacks on mobile phones from corrupt apps, hacked keyless entry systems in vehicles, vulnerabilities in work products with embedded devices such as webcams and internet phones, and weaknesses in industrial control systems.

Digital strategy

So, armed with the knowledge that digital technology—our saviour—could actually be our downfall, what can you as a board member do about it?

A good place to start is ensuring that the company has an up-to-date cyber-security policy. Many organisations still believe that responsibility for cyber-security sits firmly with the IT department. Board members need to realise that to be effective, the policy aim and objectives must reach into every department, employee and supplier.

Therefore, the policy must bring about a cyber-security cultural change where everyone feels that they are crucial in protecting the organisation and, in turn, their livelihoods. The policy must also provide direction on budgeting, awareness programmes, horizon-scanning for new cyber threats and, naturally, technical solutions.

Board members need to be aware that due diligence must be carried out on the supply chain, to ensure that third-party contractors have equal or greater cyber-security measures in place.

Next should be an effective cyber-incident response plan, which should address the following:

  • What is our definition of a cyber-incident?
  • What must the organisation protect?
  • How will we address technical and end-point protection?
  • What will the composition and responsibilities of the incident team members be?
  • Who has the ultimate responsibility for a cyber-incident?
  • What will our incident management framework look like (detection, containment, mitigation, recovery, closure and follow-up)?
  • Who are interested parties, and how will we communicate with them during and after an incident?
  • When should we inform regulators and/or the police?

Outsourcing of non-mission-critical services such as IT, payroll, accounting and financial services, which typically involve the transfer of sensitive data, is now standard company practice. But while the burden of the task can be handed over to the third party, the responsibility and accountability for a cyber-security incident cannot.

Board members need to be aware that due diligence must be carried out on the supply chain, to ensure that third-party contractors have equal or greater cyber-security measures in place. These actions should not just involve software solutions but how the suppliers would deal with an incident, how they would initially notify you, keep you updated and also how they would continue to provide you with the outsourced service during the incident.

Expert incident advice

Obtaining expert incident advice is another area often overlooked by organisations. There are three primary areas the organisation should focus on procuring prior to the incident taking place. First, legal advisors can provide counsel on issues such as data protection legislation, and for potential civil litigation for failing to take reasonable security precautions when storing customer information.

Second, digital forensics/data-breach-response expertise is vital during and after a cyber-incident. Very few companies have the luxury of employing personnel with the technological expertise to understand and remediate today’s cyber-attacks. Engaging an independent investigator ensures integrity of response and creates a defensible record if challenged later by interested parties.

I cannot stress enough the importance of securing prompt crisis communications assistance via an experienced PR firm.

And finally, I cannot stress enough the importance of securing prompt crisis communications assistance via an experienced PR firm. They will provide communication strategies to mitigate damage to brand, reputation, interested party confidence and share price.

Employees are an organisation’s biggest asset and also the greatest risk for cyber-resilience. Good education from strategic to operational-level personnel, including temporary workers and suppliers, is key to ensuring the company does not suffer the “insider threat”, whether through incompetence, malice or criminality. Basic common-sense awareness training that instils good security habits is really all that is needed.

Cyber-security specialist Kaspersky Lab provides guidance for staff and suggests regular updates on current cyber threats, the importance of every staff member’s role in cyber-defence, the dangers of social media, what an attack might look like and how to raise the alarm.

Cyber-insurance

Cyber-insurance can assist in easing the financial pain of an attack. Items that can be covered by insurance include recovery costs in case of data loss, potential loss of turnover, additional costs associated with the detection and resolution of incidents, and incident communication costs. It is worth remembering that there are two critical areas that cannot be insured against: loss of customers and reputation, so prevention is always better than cure.

A cyber-incident may never happen to your company but the first time you experience one should be a practice-run. Preparing your incident teams for an attack via “exercising” is a realistic, low-risk and cost-effective way of ensuring your organisation knows what to do when it is your turn to be attacked. Exercising can be at any or all levels of response.

The FBI’s Michael Vatis believes that “…in the very near future, cyber-security exercises are going to be absolutely expected of all companies by regulators”.

For example, the C-suite focusing on crisis decision-making and communications; tactical-level work on implementing the incident management framework of detection, containment, mitigation and recovery; and operational personnel providing hands-on technical solutions.

The FBI’s Michael Vatis believes that “…in the very near future, cyber-security exercises are going to be absolutely expected of all companies by regulators”.

Top management cannot bury their heads in the sand and consider cyber-security to be someone else’s problem. As Ginni Rommety, CEO of IBM New York, states: “Cybercrime is the greatest threat to every company in the world.” Incidents are inevitable, but boards can mitigate risk and damages by staying informed and ensuring that, in the event of an incident, their organisation is prepared to respond.

Cyber threats: a glossary

Social engineering
This is the art of manipulating people to reveal confidential information, which will then allow someone else to access information systems such as passwords or access to a computer. This may include “phishing” attempts, or sending thousands of fake emails purporting to come from an authoritative organisation and inviting people to click suspect links or reveal private information.

Spear Phishing
Much like phishing, but rather taking a shotgun approach. The suspect emails are highly targeted and focus on a few individuals, depending on the goal of the attack. Selection of targeted individuals will usually be preceded by research through social media channels such as LinkedIn, Twitter and Facebook. Small companies may be targeted as gateways to gain information that will enable attacks on much larger corporates.

Malware
An abbreviation of “malicious software”, the aim of these attacks is to plant a piece of software that will enable attackers to either damage or access computer systems secretly. The designation “malware” is therefore based on the intent behind the use of software rather than the type of software itself. The best advice here is to be very careful about which email attachments you open.

Denial of service
The objective here is to make a machine, network or internet service dysfunctional for its users. The is done by flooding or overloading the network or site with numbers of digital requests. A distributed denial-of-service attack sees criminals secretly co-opt multiple systems or machines to target a victim. One recent example was an attack on bookmaker William Hill, while another headline event saw internet service provider Dyn attacked from multiple servers, affecting millions of servers and affecting scores of high-profile brand names.

James McAlister is the director of Crisis Prepared, an organisational resilience consultancy and vice chair of the Business Continuity Institute. He is a former police officer with over 30 years’ experience in business continuity, civil protection, crisis and major incident management.

  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Mail

Related Posts

  • Most businesses ‘vulnerable to or at high risk’ of cybercrime
    March 20, 2024
    business cybercrime

    A mere 13% of firms are ‘resilient’ to cyber-attack or disruption from AI-powered assaults, research reveals.

  • Are cyber disclosure demands too high?
    August 15, 2022
    cyber disclosure

    Organisations increasingly struggle with cybersecurity as they balance fear of reputational damage against cyber disclosure requirements.

  • Cyber criminals chase ransomware insurance money
    April 18, 2023
    ransomware insurance

    Specialist ransomware criminals are investigating victims’ insurance capacity—sometimes by blatantly asking companies outright.

  • Cyber security reporting falls short
    August 4, 2022
    cyber security

    UK companies are struggling to provide focused disclosures as cyber attacks continue to increase, says the FRC.

Search


Follow Us

Most Popular

Featured Resources

wef global risks 2025

The Global Risks Report 2025

The 20th edition of the Global Risks Report reveals an increasingly fractured global...
Supply chain management cover

Strategic Oversight in Supply Chain Management: A Guide for Corporate Boards 2025

Supply chains have become complex, interdependent and opaque and—according to research...
OB-Cyber-Security

Cyber Security: What Boards Need to Know

Maintaining firewalls, protecting servers and filtering malicious emails rarely make...

C-suite barometer: outlook 2025 - UK insights

Forvis Mazars draws UK insights from its global study and looks at UK executives’...

The IA’S Principles Of Remuneration 2024 2025

This guidance from the Investment Association is aimed at assisting remuneration...
Diligent 2024 leadership tech cover

Leadership, decision-making & the role of technology: Business survey 2024

This research report by Board Agenda and Diligent sheds light on how board directors...

Director Reference Guide: Navigating Conflict in the Boardroom

The 'Director Reference Guide' on navigating conflict in the boardroom provides practical...
Nasdaq 2024 governance report cover

Nasdaq 2024 Global Governance Pulse

This Nasdaq survey gathered data from more than 870 board members, executives, and...

Becoming a non-executive director (4th edition)

Board composition is the subject of much debate, while the role of the non-executive...
art & science brainloop new cover

The Art & Science of Creating an Effective Board

Boards are coming under more scrutiny and pressure than ever before from regulators,...
SAA First time NED guide

First Time Guide for Non-Executive Directors

The role of the non-executive director has never been more vital: to advise, support,...

SUBSCRIBE TODAY

Stay current with a wide-ranging source of governance news and intelligence and apply the latest thinking to your boardroom challenges. Subscribe


  • Editors & Contributors
  • Editorial Advisory Board
  • Board Advisory & Corporate Services
  • Media Marketing Solutions
  • Contact Us
  • About Us
  • Board Director Network
  • Terms & Conditions
  • Privacy Policy
  • Cookies

Copyright © 2026 Questor Media Group Ltd.

  • Terms & Conditions
  • Privacy Policy