Risk 2022 Special Report: Cybersecurity Meets Reality

© AdobeStock
Cyber risk can’t be eliminated, but it can be managed. Directors shared oversight strategies at Corporate Board Member’s 2021 Board Risk Forum. Some ideas.

The notion of cybersecurity as a systemic risk for companies is not new, but the past year of remote work and the increased frequency of cybercrime certainly underscored that it has become one of the biggest risks facing boards today. Digital transformation and the Internet of Things have opened up points of entry in every area of operations, as well as all along the supply chain, and the resulting decentralized networks are trickier than ever to safeguard.

At the same time, regulators, investors, customers and other stakeholders are stepping up pressure on boards to actively demonstrate diligence in the area of cybersecurity; they expect personal information to be protected, systems to be resilient and processes to be in place to quickly address attacks when they happen. When companies fail to deliver on that, shareholder lawsuits inevitably follow, and directors have been increasingly named in derivative suits.

But for most board members, who typically have no background in technology or IT security, cybersecurity risk remains one of the most challenging areas of oversight. In March, directors gathered virtually to hear from industry experts and corporate chief information security officers about how to wrap their arms around this mushrooming risk and how to recognize it not only as a threat but an opportunity. Takeaways from Corporate Board Member’s Board Risk Forum follow.

Erinmichelle Perri, Chief Information Security Officer, The New York Times

The CISO’s shift from primarily defensive triage and toward proactive offense has created a learning curve for directors accustomed to asking questions about reactive measures. “It’s been a process, I’d say in the last five to 10 years, to get the board to understand that the questions they should be asking are quite a bit more about how are we securing our products and services? How are we getting this right from day one?” said Erinmichelle Perri, CISO for The New York Times.

Along those lines, the panelists recommended boards prioritize the following questions for their CISOs:

• What is our “shift left” strategy?
Niall Browne, Senior Vice President and Chief Information Security Officer, Palo Alto Networks

It is no longer an option to build products, or really anything inside a company, without considering security from the ground up, said Niall Browne, senior vice president and CISO, Palo Alto Networks, who likened it to building a house with- out considering plumbing or electricity. “Then suddenly the electrician turns up and says, ‘Oh, by the way, we’ve got a wire here, we’re going to rip down the walls.’”

In most operations environments today, trying to update security piecemeal is complicated by “tremendous scale,” says Browne. “You’ve got dozens of clouds. You could have hundreds of thousands of images that are spun up every single second and spun down. It’s ephemeral, it’s dynamic, it’s continuously changing. So if you’re using traditional models to go back there and try to fix the issues after they’ve occurred, it’s game over. There’s no way anybody can ever keep up.”

• How is security being addressed holitically throughout the organization?
Dawn Cappelli, VP, Global Security and Chief Information Security Officer, Rockwell Automation

Dawn Cappelli, VP, global security and CISO for Rockwell Automation, recalled that after the WannaCry ransomware attacks in 2017, Rockwell realized they had some potentially dangerous silos in their security programs, where manufacturing, products, services and other areas were individually protected. “But we needed to bring all of that together,” she said.

To do that, the team developed what it called the connected enterprise ecosystem cybersecurity strategy. “Big mouthful there, but basically what it means is we have one comprehensive strategy that encompasses the entire ecosystem,” says Cappelli. That includes IT, manufacturing, supply chain, third parties, the company’s own products, security, M&A partners, services, connections to customers and cloud providers and all third-party software the company uses. “So, when we talk with our manufacturing or supply chain departments about risk in their area, it’s part of this comprehensive program,” she said.

• What is our third-party risk?

The Solar Winds cyberattack—which involved thousands of companies’ networks being infected by Russian malware downloaded via a simple software update—made clear that a company’s products can be put at risk by any partner company’s security breach. “A lot of companies haven’t thought a lot about that,” said Cappelli, who recalled another recent case of a company’s file transfer product being infected with ransom- ware, which was then downloaded to customers, whose information was then stolen and who were then extorted for its return.

To get the full scope of the risk, Browne recommended conducting a tabletop exercise specifically focused on the supply chain and what the impact might be if attacked. “You want to have at least 10, 15, 20 departments in the room—legal, finance, etc.—and you want to run it from end to end. If there is a compromise, how do you detect it?” Then, consider what would be done in the first 24 to 48 hours to remediate “because that’s going to be the most critical time,” he said.

Companies that fail to do that end-to-end scenario-planning will wind up trying to come up with a solution during those first hours—and 48 hours can quickly become 72 or 100-plus. “That’s a disaster,” said Browne, “because you’re creating material on the fly.”

Rather, the whole team should sit down and figure out exactly what will happen in the event of a breach. What is the canned questionnaire that will be sent to every vendor on the net- work? Which team is set up in house to deal with the responses and do a risk assessment? “Oftentimes, if you have a breach, it’s not the fact that you’ve been breached—because a lot of organizations have been,” said Browne. “It all comes down to how transparent you were, how quickly you responded, how quickly you notify the customers. I’m a huge believer in that transparency, making sure you’re prepared for that.”

• What does our company’s security awareness program look like?

The human element “is always the wild card, the weakest link,” said Cappelli. And that was exaggerated during Covid with everyone dispersed and working from home. “We’ve had to keep security front of mind for them.” To do that, Cappelli’s team makes videos about the latest security-related news, holds monthly security lunch-and-learns with the entire cadre of engineers and invites in outside experts to give talks on relevant topics. “We had an Emmy Award-winning journalist come in and give a talk on social networking security because a lot of these attacks now are coming in using information gleaned from social media activity,” she said. “Our security awareness has never been higher. My goal is, once we get back to the office, let’s keep this online security aware- ness going.”

• What positive lessons have we learned?

Perri noted that being forced to pivot over and over to solve challenges brought on by Covid and remote work stress-tested the system in real time and demonstrated the creative potential of the team. “So, I think really going into 2021, we’re stronger than ever,” she said. “In terms of opportunities here out of chaos, we’re going to see a lot of great lessons learned.”

She also emphasized the need for both management and the board to keep in mind the toll this past year has taken on IT employees. “The workforce is burnt out” after Covid, Perri said. “We need to keep the human element in mind. We need to be flexible, empathetic, meet employees where they are.”

Ransomware: An Ever-Evolving Risk

In March, a ransomware attack against insurance company CNA again illustrated how smaller companies can easily find themselves the victims of a larger hack, if the stolen data is used to extort money from the original target’s customers. And the data demonstrating the prevalence of ransom- ware attacks shows no signs of abating. Since 2016, there have been more than 4,000 cases every day, according to FBI figures. “But that’s likely a very low estimate,” said Scott L. Howitt, SVP and chief information officer for McAfee. “They’re using the stats that were reported to them and in a lot of cases, people don’t report it because they don’t want the bad press to follow them.”

That’s understandable—particularly considering the high financial toll this particular cyber crime has taken on targeted companies. Howitt offered steps to mitigate risk:

• SEGMENT NETWORKS. Howitt recommends boards ask their CISOs about creating divisions between networks to ensure that when one is infected, the malware doesn’t spread as easily to the rest. For example, as CISO of MGM Resorts International prior to McAfee, Howitt worked on segmenting the networks of the casino’s hospitality, restaurant, retail and entertainment networks in order to mitigate potential damage to the whole business.

Internet of Things (IoT) applications have made the job of securing all points on the network even more complex, adding new risks, he added. At MGM Resorts, the refrigerator technology allowed temperatures to be regulated remotely. “So now [we had to consider], what if somebody came in and raised the temperature of the chicken, so now suddenly I’ve got poisoning risks, and it’s a life safety issue instead of being a data leakage issue.”

• IDENTIFY THE POTENTIAL THREAT ACTORS. While active monitoring for potential attacks is critical, it’s not enough. Your CISO should be able to identify the bad actors most likely to target the company and then ask what they are doing proac- tively to prevent those attacks. “Because that’s one great thing about threat actors—they’re not very inventive,” said Howitt. “They only have to get it right once or twice, so they throw an attack against 1,000 people and if one or two catches, it’s worth the money.”

• MAKE SURE THERE IS A COMPANYWIDE PREVENTION/AWARENESS PROGRAM—INCLUDING THE BOARD. Most malware is spread initially through a phishing email sent to an employee with network access, which is what happened to CNA. “They had a very robust cyber program, but that’s the trick—it only takes one click for something bad to happen,” Howitt said.

• MAKE SURE SECURITY IS BEING ADAPTED FOR THE FUTURE. Most security people grew up primarily in a physical network environment, said Howitt. As companies go to the cloud and transition to a software-based world, how is your CISO retooling the security organization to adapt? To that end, he or she should be having conversations with all the company’s business owners—not just internally with the security team. “It’s okay to put your CISO on the spot and say, ‘So, as the world changes to a network-based world, tell me what you know about the business. How are you adapting that to meet the strategy?’” he said. “If the CISO isn’t thinking about it in terms of business strategy, it’s checkbox compliance. That will get you past the audits, but it won’t necessarily keep you secure.”

TO PAY OR NOT TO PAY?

To be sure, ransomware attacks only thrive in a world where victims pay the ransom. But whether or not to pay is an age-old question without a clear-cut answer. “It’s easy to be morally right and say you should never pay, but it has to be a business decision,” said Howitt. Factors will include the ransom amount, the files that have been targeted, the cost to the business of having files stay locked, etc. According to the latest data, only 26 percent of firms pay, and that may be because their cyber insurance firms require it.

“From an actuarial standpoint for them, it’s cheaper if they just hurry up and pay the ransom and take the chance of getting the attack over with,” said Howitt. But he points out that payment does not guarantee the return of the data that was stolen. “It’s always a very dicey proposition to pay them off because they might not unlock your files, and they’ll just take your money and run.”

Howitt recommends conducting a tabletop exercise that looks in detail at the potential impact of a ransomware attack on each area of the business. “The frequency of tabletop exercises should be every quarter,” he said. “And it doesn’t have to be a full day. You can accomplish a lot in an hour or two. It should be a very specific scenario.

“The ask is, what we need to do, and then is it working? Should we do more or less? Kill it? The data-driven decision is becoming more and more important.”

What ISS Thinks About Your Cybersecurity Oversight

Cybersecurity ranked first on the list of concerns for 67 percent of investors, according to the 2019 RBC Responsible Investing survey. That number isn’t likely to decrease, given the escalating costs to companies. The annual economic cost of cyber breaches is estimated to run as high as $1.5 trillion, according to Marsh & McLennan’s Cyber Risk Center. And, in addition to the $8 million direct cost, on average, to U.S. companies, the indirect costs, including reputational risk, stock price performance risk and litigation risks— the last evidenced most recently by a recent class- action lawsuit against SolarWinds—are enormous.

Among ISS’s Russell 1000 constituents over the past four years, almost all sectors were negatively affected when it came to financial returns post cyber breach. “Investors care about cybersecurity for many reasons, but most importantly because it can really impact the bottom line,” said Marija Kramer, Head of ISS ESG Business.

As the investor community attempts to quantify cyber risk across its investments, many rely on ISS’s Governance QualityScore to help assess and bench- mark boards’ information security risk oversight. Here are some key indicators ISS is looking at on behalf of investors:

1. TRANSPARENCY. ISS looks not only at whether companies are providing disclosure related to cybersecurity risks but also at the quality of that disclosure, said Mark Brockway, head of corporate solutions at

ISS. “So, is it more general in nature or do they have what we call a ‘clear approach’?” A clear approach means a detailed discussion of the information security risks specific to the company and the strategies to mitigate this risk, Brockway explained, noting that while more companies are disclosing, few are taking a clear approach. (See chart, below.) Kramer added that investors want to know the expected costs of a potential breach so they can factor that in.

2. A COMMITTEE TASKED WITH OVERSIGHT. “That committee can either be on a standalone basis or part of an existing committee, oftentimes audit,” said Kramer, who noted that a little more than three-quarters of the S&P 500 now have this in place. She added that there is also evidence that investors are going to hold portfolio companies to outside standards and assurance of their policies and practices being monitored by an ISO or other standard setter.

3. BOARD EXPERTISE IN CYBERSECURITY. This is becoming increasingly common among larger-cap companies. ISS found 92 percent of the S&P 500 and about 55 percent of Russell 3000 companies have three or more directors with information security expertise. “This is quite prominent in certain sectors where exposure is more significant,” said Kramer, “but it’s really front and center to the needs of investors is they’re doing their assessments and looking to engage with portfolio companies.”


  • Get the Corporate Board Member Newsletter

    Sign up today to get weekly access to exclusive analysis, insights and expert commentary from leading board practitioners.
  • UPCOMING EVENTS

    JUNE

    13

    AI Unleashed: Oversight for a Changing Era

    Online

    SEPTEMBER

    16-17

    20th Annual Boardroom Summit

    New York, NY

    MORE INSIGHTS