{"id":10456,"date":"2015-10-02T08:50:46","date_gmt":"2015-10-02T15:50:46","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10456"},"modified":"2015-10-02T09:16:35","modified_gmt":"2015-10-02T16:16:35","slug":"all-eyes-on-the-boardroom","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/10\/all-eyes-on-the-boardroom\/","title":{"rendered":"All Eyes on the Boardroom"},"content":{"rendered":"<p>With the invention of the computer and networks such as the Internet, corporate assets and delivery channels have changed in composition from the physical to the digital.\u00a0 The risks to these assets have also evolved.\u00a0 Now, the risks corporations face are increasingly cyber enabled ones.\u00a0 Not surprisingly, policy makers, regulators, and increasingly, shareholders, have also trained their attentions on corporate cybersecurity and the Boards of Directors, which oversee the management of this cyber risk.\u00a0 Indeed, when it comes to cyber, nowadays, all eyes are on the boardroom.\u00a0 As Securities and Exchange Commissioner Luis Aguilar warned, \u201cboards that choose to ignore, or minimize, the importance of cybersecurity responsibility do so at their own peril.\u201d<!--more--><\/p>\n<p>To see how senior leaders and governance structures are adapting, The Financial Services Roundtable, Palo Alto Networks and Forbes partnered with Georgia Tech in sponsoring the \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/resources\/techbriefs\/governance-of-cybersecurity.html\" target=\"_blank\">Governance of Cybersecurity Report<\/a>\u201d for 2015.\u00a0 <a href=\"http:\/\/www.slideshare.net\/PaloAltoNetworks\/governance-of-cybersecurity-report\" rel=\"nofollow,noopener\"  target=\"_blank\">The survey results were telling<\/a>.\u00a0 Cybersecurity has risen to become a boardroom-level issue for nearly two-thirds (63 percent) of the companies surveyed, a significant jump from 2012, when only 33 percent of boards were actively addressing computer and information security.<\/p>\n<p>According to the report findings, the financial services industry has been a leader in this movement. Compared to other sectors, the financial services industry has had one of the largest improvements in Board discussion and active oversight, with 79 percent of respondent financial sector firms indicating that cybersecurity is addressed by their boards of directors (a 35 percent increase from 2012).\u00a0 Additionally, the percentage of financial sector boards that actively consider cyber risks in reviewing and approving supplier relationships shot up to 64 percent from 38 percent in 2012. Financial sector boards also have more board Risk\/Security Committees and IT\/Technology than any other sector in both the 2012 and 2015 surveys.\u00a0 The sector also leads in the percentage (86 percent) of Chief Information Security Officers (CISOs) it employs.<\/p>\n<p>Other positive findings from the study show that across the sectors, surveyed companies\u2019 senior leaders are reaching outside of their organization for new solutions to address and mitigate cyber threats.\u00a0 Since 2008, 40 percent more organizations have brought in Chief Information Security Officers and 53% of respondents have hired outside risk management consultants.<\/p>\n<p>However, key challenges remain around understanding how best to utilize people, processes and technology to build a prevention mindset into organizations.\u00a0 While 63 percent of respondents said their board regularly or occasionally reviewed their annual security program, only 46 percent said they had participated in a test scenario of the plan. As is often quoted by first responders, you don\u2019t want to be exchanging business cards in an emergency.<\/p>\n<p>In conclusion, while the report indicates that, overall, corporate boards are increasing their cyber focus, there is still room for growth. By implementing some of the report\u2019s recommendations and sharing other best practices across industries, boards and senior leaders can do their part in helping their companies address cyber risks and preserve trust in our digital way of life.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the invention of the computer and networks such as the Internet, corporate assets and delivery channels have changed in composition from the physical to the digital.\u00a0 The risks to these assets &hellip;<\/p>\n","protected":false},"author":132,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,155,115],"tags":[472,1481,1482,1480],"coauthors":[1221,1486],"class_list":["post-10456","post","type-post","status-publish","format-standard","hentry","category-announcement","category-cybersecurity-2","category-reports","tag-forbes","tag-georgia-tech","tag-governance-of-cybersecurity-report","tag-the-financial-services-roundtable"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/132"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10456"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10456\/revisions"}],"predecessor-version":[{"id":10489,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10456\/revisions\/10489"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10456"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}