Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical Security

Tone at the top: It’s time to bring security to the board level

By Lee Waskevich
person playing chess in suit

Image via Unsplash

September 8, 2023

To many boards, cybersecurity can get lost in the shuffle or lose prioritization amidst a packed docket of other high-level priorities. 

However, in the wake of increasingly elusive cyber threats, security challenges brought on by the rise of generative artificial intelligence (AI) and ever-changing compliance requirements, this is a critical mistake. 

No longer is it acceptable for data protection to be left out, minimized, or pushed down the list when it comes to board-level conversations. On the contrary, prioritizing security at the executive table is essential for any business looking to operate without disruption in an evolving tech landscape. 

But what benefits does a cyber-focused board provide to its business? Below, here are three ways that getting the board involved in data protection processes sets a proper tone at the top regarding this important and growing issue. 

Ensuring compliance with SEC filing requirements: 

For boards today, understanding potential cyber threats is more than just a smart business practice. 

In fact, the U.S. Securities and Exchange Commission (SEC) has recently passed legislation that will require companies to report “material” cybersecurity incidents within four business days of it being determined to be material. What’s more, the SEC legislation will force companies to disclose cybersecurity governance from the perspective of board management — or risk the prospect of infringement. 

From a compliance perspective, these new standards underscore the need for cybersecurity to be seen as an investment in the company’s bottom line. With investors (and regulators) watching, data protection isn’t just about preventing avoidable data breaches, it’s also about reaffirming public confidence in a company’s ability to manage them. 

Expanding security literacy: 

Of course, to implement meaningful cybersecurity measures, companies first have to understand them. 

Unfortunately, according to a report by Harvard Business Review, fewer than half (47%) of board members report interacting with their chief security officers (CISOs) regularly — perpetuating knowledge gaps that only make board involvement more challenging. 

Without security literacy, it’s near impossible for board members to recognize the urgent cyber risks facing their company and the steps needed to help address them. 

To overcome these hurdles, it’s critical that concurrent with any investments in data protection and management, board members also prioritize cybersecurity education and training. By making smart cybersecurity hires and elevating those voices across the organization, board members can create a clear roadmap whereby employees from the top down can contribute to an impregnable security apparatus. 

Building a robust incident response plan:

The key to success for any incidence response plan is preparedness, ensuring that employees across the business understand how to proceed should an unexpected data breach occur. Building the plan, however, is half the battle. Here, having board involvement can be critically important in positioning cybersecurity experts with the tools needed to be successful. 

Considering  that 63% of C-level executives say they do not have an incident response plan of their own, according to a report by Shred-It, it’s clear that this process has been overlooked by far too many and for far too long. By getting the board’s buy-in, however, security leaders can bring attention to this critical issue and change cybersecurity preparedness for the better. 

Thankfully, there has never been a better time for companies to adopt a data protection plan of their own. In fact, with the advent of emerging technologies like artificial intelligence (AI), incident response processes are getting highly sophisticated, allowing cybersecurity experts to predict and manage incoming threats before they happen. 

In the face of a rapidly evolving threat landscape and increasing regulatory attention, boards can no longer simply delegate cybersecurity away, leaving the bulk of the responsibility to the CTO or CIO. 

Rather, data protection and management must be seen as a top-level corporate priority to guarantee strategic alignment across an organization. By addressing potential risk mitigation strategies and training initiatives at the highest levels of corporate leadership, the board can ensure the right resources — and the right talent — are devoted to protecting company data both now and in the future. 

KEYWORDS: data breach notification incident response risk management SEC regulations security planning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Lee Waskevich is Vice President of Security at ePlus.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Overcoming Silos

    Building Bridges: Overcoming Silos to Bring Organizations to the Next Level

    See More
  • COVID-19 Proves It’s Time for the IRS to Stop Identity Fraud at the Front Door

    See More
  • Cybersecurity Issues Now at the CEO and Board Level

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing