Skip to main content

The CISO Brief

Insights for future-focused cyber security leaders

The CISO Brief is designed for current and aspiring cyber leaders, offering valuable insights, strategies, and tools to help you excel in the dynamic field of cybersecurity. In the second installment of this three-part series, we will continue to explore the elements of effective board communication.

The what, when, and how of effective board communication – Part 2

The cyber risk landscape is evolving rapidly, driven by emerging threats, technological advancements, and heightened regulatory oversight. Today’s cyber leaders need to be agile, forward-thinking, and adept at engaging with the board. To foster organizational resilience, chief information security officers (CISOs) should partner with the board of directors and board committees to ensure robust governance of cyber risk.

In part one of this series, we explored how CISOs can tailor their engagement with boards to enhance understanding and drive better outcomes. In this installment, we present a framework for determining the appropriate cadence of board-level cyber discussions, preparing for their oversight-focused questions, and communicating effectively during a cyber crisis.

Quick take: Essential steps for effective board engagement

  1. Align the frequency, structure, and content of board-level cyber discussions with the organization’s risk profile and the board’s oversight responsibilities.
  2. Anticipate board directors’ questions and provide data-driven insights that support informed risk governance.
  3. Establish a clear incident escalation and disclosure process to enable timely oversight and executive collaboration during crises.

Establishing a regular cadence for board-level cyber oversight

The frequency and format of cyber risk updates to the board should be tailored to the organization’s risk appetite, sector, and regulatory environment. While there is no universal standard, leading practices suggest that boards should receive substantive cyber risk updates at least quarterly. These sessions should be structured around comprehensive assessments, such as those based on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and include at least one annual deep dive into the organization’s cyber risk posture.

These engagements are not merely informational; they are essential for enabling boards of directors to fulfill their oversight responsibilities. Regular updates allow the board to monitor the evolving threat landscape, assess the adequacy of risk mitigation strategies, and ensure that cyber risk remains integrated into broader enterprise risk management.

Boards of directors may also seek clarity on the organization’s cyber risk appetite, the rationale for resource allocation, and the robustness of incident response and disclosure protocols.

Preparation should go beyond assembling technical data. CISOs should craft a narrative that contextualizes cyber risk within the organization’s strategic objectives and risk tolerance. Understanding the board’s composition, varying levels of technical fluency, and prior engagement with cyber topics can help tailor communications that are both accessible and actionable.

Preparing for oversight questions

Effective board communication requires CISOs to anticipate the types of questions board members are likely to ask in their governance capacity. To lay the groundwork for productive discussions, consider leveraging the following key questions, designed to foster oversight and strategic alignment between board members and management.

Key questions for the board’s oversight of cyber risk:

  1. What is the organization’s cyber risk appetite, and how is it governed?
  2. Which assets constitute “crown jewels,” and how are they protected?
  3. What is the overarching cyber risk strategy, and how does it align with enterprise objectives?
  4. What is the rationale for current investments in cyber risk mitigation and response capabilities?
  5. How robust are incident response and disclosure plans, and have they been tested?
  6. Is the organization prepared to maintain operations and resilience in the event of a significant cyber incident?
  7. How are vulnerabilities identified, prioritized, and disclosed to the board?
  8. How are regulatory and critical infrastructure requirements being met?
  9. For organizations with technology products, how is “secure by design” being ensured?
  10. What metrics and key performance indicators are used to monitor cyber risk and program effectiveness?
  11. How is third-party and supply chain cyber risk being governed and monitored?

These questions are intended to assist the board in understanding its oversight responsibilities and to spark meaningful dialogue.

Incident escalation and disclosure governance

A well-defined incident escalation and disclosure process is a cornerstone of effective board oversight. This process should:

  • Clearly delineate thresholds for escalation to the board and relevant committees.
  • Outline roles and responsibilities for the board and management during a cyber incident.
  • Ensure timely, transparent communication that meets regulatory obligations, for example SEC disclosure requirements.

Disclosure governance should be documented and regularly reviewed, enabling the board to exercise effective oversight throughout the incident response process. Ongoing updates between the eradication and recovery phases are critical to ensure the board remains informed and can fulfill its fiduciary duties.

Conclusion

The dynamic nature of cyber risk demands that CISOs adopt a proactive, strategic approach to board engagement. By aligning technical insights with the board of directors’ governance mandate and establishing a regular cadence of clear, business-focused updates, CISOs can empower them to exercise effective oversight and drive organizational resilience.

Need help facilitating effective board engagement?

Deloitte can help CISOs and boards of directors translate complex cyber risks into clear, actionable insights. Our team provides guidance on board presentations, tailored communication strategies, and board education to support effective cyber risk governance. Connect with us to learn more.

Next up

As CISOs refine their approach to board engagement, anticipating and addressing board members’ most pressing questions becomes essential for effective oversight. In part two, we will outline practical strategies and discussion prompts to help management and board members deepen their understanding of cyber risk and drive more informed, resilient decision-making.

Cyber solutions

Deloitte offers a unified approach to help you tackle obstacles and build new capabilities fast. Leverage our breadth of solutions and cybersecurity leading practices that can help you transform your organization and achieve success, wherever you are on your journey.

Subscribe to our cybersecurity series, The Current

Sign up for our quick-read series to keep pace with the latest in cybersecurity strategies, insights, news, and views.

Visit MyDeloitte and log in or join to easily subscribe to The Current.