Given this recent incident involving Microsoft, I thought it would be helpful to share a brief overview of some the steps boards can take in their journey toward cyber readiness and preparedness:
While it is critically important to take preventative measures, the recent incident at Microsoft highlights that no business can be 100% immune from cyberattacks.
The natural next step in cybersecurity preparedness is having a cyber response protocol in place in case of a breach or cyber-attack:
- Think through the protocol in advance. Have the IT and/or cyber teams review the crisis management tabletop exercise they have run with the board. Ensure that they’re ready with external cyber forensic experts.
- As part of tabletop cyber planning, ask the CISO and/or tech team to run through their post-breach protocol with the board. For example, who is the outside council they would use? Who is the forensic consultant? Who on the communications team is in charge?
- Post-breach the key area organizations need to focus on is how to remove and stop the attacker’s ability to move around within the company. It is important to keep in mind that many internal IT systems within companies were set up for efficiency. The internal IT systems typically presume that all the other systems are trusted and so there are connection points that make it easy for an intruder to move around within a system. In general, overall IT system designs are not specifically architected with cybersecurity in mind. This is an area to reexamine.
As board members seek to conduct oversight and guide management priorities, it may be helpful for the board to consider bringing in outside experts to give an orientation and briefing.
For example, in 2022 Mandiant (a cybersecurity firm that is now part of Google Cloud) helped over 1,800 customers prepare for or recover from critical cybersecurity incidents.
Cyber-related risk continues to be one of the top concerns businesses are facing. For more information on how boards should think about cybersecurity preparedness and risk mitigation, I recommend reading this white paper shared by the Google Cloud Cybersecurity Action Team, “Perspectives on Security for the Board”.