Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

5 Minutes With

Making cybersecurity a board-level imperative

By Maria Henriquez
SEC_Web_5Minutes-Pasteris-0123_1170x658.jpg

Headshot image courtesy of Jay Pasteris

January 5, 2023

A topic that is becoming increasingly critical to companies of all sizes in all industries: making cybersecurity a board-level imperative.

Data breaches and advanced threats generate headlines on a daily basis. The need to protect organizations from regulatory compliance and business continuity risk may be top of mind for cyber and technology leaders and their teams but far too often, the topic is only paid lip service at the board of director level.

With the cost of the average data breach now topping $4.35 million, according to the IBM Cost of a Data Breach Report, it is more critical than ever for boards to appreciate the impact that information security can have on the business. Boards should treat security as a top business risk as well as a top business opportunity. As a three-time chief information officer (CIO) and chief information security officer (CISO), Jay Pasteris speaks directly to this issue. 


Security: What is your background? What are some of your responsibilities at GreenPages?

Pasteris: I am a technologist. For the past 20+ years, I have worked at a senior level in IT and cybersecurity for organizations in technology, financial services/investment management, learning and development and global medical research.

Currently, I am CIO and CISO at GreenPages, a national IT and cybersecurity services firm. I oversee our growing intellectual property and services portfolio, systems security, compliance, and quality assurance, and lead our technical pre-sales and business advisory services teams. I also am an executive sponsor and security advisor to our key enterprise clients.


Security: It is more critical for boards to appreciate the impact that information security can have on the business. Why should boards treat security as a top business risk and a top business opportunity? 

Pasteris: Corporate boards must support, if not mandate, companies’ investment in cyber maturity and defenses and push executive management to treat all adversaries and threats - whether hacking groups, malicious insiders or plain old human error by employees or contractors as a core business risk. The reason is simple: threats are continuously increasing in size, sophistication and frequency. Companies can no longer assume it will not happen to them. They must be proactive in implementing cybersecurity readiness plans to minimize operational, financial and reputational harm.  It has to become part of their DNA. Companies in highly regulated industries such as financial services and healthcare and publicly held organizations have an even greater risk as insurers are requiring certain cyber standards and shareholders will demand continuous oversight.


Security:  How have you advised boards in the past and how are you doing it in your present role at GreenPages?

Pasteris: At GreenPages, we’ve developed a comprehensive cybersecurity program that we have applied to increase the security posture of hundreds of customers in several industries. This playbook includes a holistic framework design to quickly and effectively assess, modernize and manage their cybersecurity program. The framework removes the complexities and the “intimidation factor” of a cybersecurity program including how to effectively communicate at the board level, the investments being made, and the manner in which these investments contribute to making the organization stronger, better protected, resilient, more competitive and a better place to work and do business with. Cyber can be a competitive advantage.


Security:  How can CISOs better communicate cyber risk and metrics in terms that resonate with the board? 

Pasteris: It is critical to remember that most board members lack the technical background, experience, and frankly, the appetite for overly technical terminology.

I have developed several best practices for communication with boards: Engage more regularly. Visualize (Heat Map) the risks, investments needed, progress against those risks and speak their language. Be brief. Skip the acronyms. Use analogies and anticipate their questions, objections, or concerns.  Communicate how security initiatives align with and impact business priorities and outcomes. For example, “How might this risk harm the company?” “Is our security program maturing and keeping pace with our peers in the industry?” In my experience, board members are most concerned with  - and justifiably so - visibility, organizational readiness and the need to continuously enhance or protect brand reputation.  

By associating IT and cyber risks with business goals, objectives and outcomes, boards are able to understand and assign a cost justification to major initiatives. They can be the CISO’s greatest advocate when you work in tandem together to drive true cyber resiliency for the organization.


Security:  Do you believe boards should have previous cybersecurity experience on board? Or does it fall on the CISO to brief the board on cybersecurity? 

Pasteris: Absolutely. I believe this and have been preaching this message within my own organization and our client base. It is no longer optional for corporate boards to recruit and select members with real-world cybersecurity experience; it is now a business imperative regardless of a company’s size or industry segment. 

The simple reason for this is security risks are business risks. Corporate boards need to be held accountable for the company’s actions - or inaction - with respect to taking a much more proactive approach to continuously protecting their employees, their customers, their intellectual property, their data and more. 

KEYWORDS: board of directors security cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Shea feature

    Making a difference in cybersecurity and intelligence

    See More
  • Cybersecurity Issues Now at the CEO and Board Level

    See More
  • Hand holding lightbulb

    Safeguarding Intellectual Property: A Strategic Imperative for Organizations

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing