Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

5 Minutes With

Making cybersecurity a board-level imperative

By Maria Henriquez
SEC_Web_5Minutes-Pasteris-0123_1170x658.jpg

Headshot image courtesy of Jay Pasteris

January 5, 2023

A topic that is becoming increasingly critical to companies of all sizes in all industries: making cybersecurity a board-level imperative.

Data breaches and advanced threats generate headlines on a daily basis. The need to protect organizations from regulatory compliance and business continuity risk may be top of mind for cyber and technology leaders and their teams but far too often, the topic is only paid lip service at the board of director level.

With the cost of the average data breach now topping $4.35 million, according to the IBM Cost of a Data Breach Report, it is more critical than ever for boards to appreciate the impact that information security can have on the business. Boards should treat security as a top business risk as well as a top business opportunity. As a three-time chief information officer (CIO) and chief information security officer (CISO), Jay Pasteris speaks directly to this issue. 


Security: What is your background? What are some of your responsibilities at GreenPages?

Pasteris: I am a technologist. For the past 20+ years, I have worked at a senior level in IT and cybersecurity for organizations in technology, financial services/investment management, learning and development and global medical research.

Currently, I am CIO and CISO at GreenPages, a national IT and cybersecurity services firm. I oversee our growing intellectual property and services portfolio, systems security, compliance, and quality assurance, and lead our technical pre-sales and business advisory services teams. I also am an executive sponsor and security advisor to our key enterprise clients.


Security: It is more critical for boards to appreciate the impact that information security can have on the business. Why should boards treat security as a top business risk and a top business opportunity? 

Pasteris: Corporate boards must support, if not mandate, companies’ investment in cyber maturity and defenses and push executive management to treat all adversaries and threats - whether hacking groups, malicious insiders or plain old human error by employees or contractors as a core business risk. The reason is simple: threats are continuously increasing in size, sophistication and frequency. Companies can no longer assume it will not happen to them. They must be proactive in implementing cybersecurity readiness plans to minimize operational, financial and reputational harm.  It has to become part of their DNA. Companies in highly regulated industries such as financial services and healthcare and publicly held organizations have an even greater risk as insurers are requiring certain cyber standards and shareholders will demand continuous oversight.


Security:  How have you advised boards in the past and how are you doing it in your present role at GreenPages?

Pasteris: At GreenPages, we’ve developed a comprehensive cybersecurity program that we have applied to increase the security posture of hundreds of customers in several industries. This playbook includes a holistic framework design to quickly and effectively assess, modernize and manage their cybersecurity program. The framework removes the complexities and the “intimidation factor” of a cybersecurity program including how to effectively communicate at the board level, the investments being made, and the manner in which these investments contribute to making the organization stronger, better protected, resilient, more competitive and a better place to work and do business with. Cyber can be a competitive advantage.


Security:  How can CISOs better communicate cyber risk and metrics in terms that resonate with the board? 

Pasteris: It is critical to remember that most board members lack the technical background, experience, and frankly, the appetite for overly technical terminology.

I have developed several best practices for communication with boards: Engage more regularly. Visualize (Heat Map) the risks, investments needed, progress against those risks and speak their language. Be brief. Skip the acronyms. Use analogies and anticipate their questions, objections, or concerns.  Communicate how security initiatives align with and impact business priorities and outcomes. For example, “How might this risk harm the company?” “Is our security program maturing and keeping pace with our peers in the industry?” In my experience, board members are most concerned with  - and justifiably so - visibility, organizational readiness and the need to continuously enhance or protect brand reputation.  

By associating IT and cyber risks with business goals, objectives and outcomes, boards are able to understand and assign a cost justification to major initiatives. They can be the CISO’s greatest advocate when you work in tandem together to drive true cyber resiliency for the organization.


Security:  Do you believe boards should have previous cybersecurity experience on board? Or does it fall on the CISO to brief the board on cybersecurity? 

Pasteris: Absolutely. I believe this and have been preaching this message within my own organization and our client base. It is no longer optional for corporate boards to recruit and select members with real-world cybersecurity experience; it is now a business imperative regardless of a company’s size or industry segment. 

The simple reason for this is security risks are business risks. Corporate boards need to be held accountable for the company’s actions - or inaction - with respect to taking a much more proactive approach to continuously protecting their employees, their customers, their intellectual property, their data and more. 

KEYWORDS: board of directors security cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Shea feature

    Making a difference in cybersecurity and intelligence

    See More
  • Cybersecurity Issues Now at the CEO and Board Level

    See More
  • Hand holding lightbulb

    Safeguarding Intellectual Property: A Strategic Imperative for Organizations

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing