This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our PRIVACY POLICY for more information on the cookies we use and how to delete or block them.
  • Elevation of Cybersecurity
    to the Boardroom
Business tool :

Managing Risk - Elevation of Cybersecurity to the Boardroom

25 August 2016

Summary -

Data protection and cybersecurity have evolved from the micro responsibility of the IT team to a macro business priority, requiring the understanding and oversight of the board.  While cybersecurity has moved onto the boardroom agenda, few organizations have yet to implement comprehensive cybersecurity strategies that protect their critical digital assets.

In a landscape that requires a high-level understanding of technology to inform corporate strategy, what are your cybersecurity strategies? - This checklist tool can be used to assist your organisation with:

  • Identifying potential cyber threats in order to raise awareness and communicate actionable items to the board, while evaluating which specific threats need board intervention.
  • Describing a cybersecurity plan incorporating a sense of ownership and specific measures which also includes allocation of resources and funding based on risk.
  • Recognizing steps to build and maintain a strong, invested chain of governance.

At BDO, we encourage our clients to become world-class competitors, and we leverage our international reach to help local and regional businesses realise their strategic ambitions.

Data protection and cybersecurity have evolved from the micro responsibility of the IT team to a macro business priority, requiring the understanding and oversight of the board. While cybersecurity has moved onto the boardroom agenda, few organizations have yet to implement comprehensive cybersecurity strategies that protect their critical digital assets. Does your organization have a cyber-incident response plan or cyber-risk requirements for third-party vendors – a major source of cyberattacks.
 
In a landscape that requires a high-level understanding of technology to inform corporate strategy, what are your cybersecurity strategies? - See more at: https://www.bdo.com/events/managing-risk-elevation-of-cybersecurity#sthash.nYROw83y.dpuf