Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceCybersecurity News

The dos and don'ts of advocating for cybersecurity in the boardroom

By Madeline Lauver
Boardroom
October 19, 2021

When Chris Jacquet joined Hitachi Vantara, the Chief Information Security Officer (CISO) function was understaffed and underfunded. Over the past six years, the Vice President and CISO grew the organization from a small team to a large enterprise security operation. In a talk at the ISC2 Security Congress 2021 on Monday, Jacquet explained how best to advocate for security in the boardroom.

"The importance of cyber in the board is really snowballing, and it's because now people are seeing cyber as a major business issue," said Jacquet. Over the past five years, cybersecurity has become a top-of-mind issue in the C-suite, largely due to several high-profile cyberattacks, including the Solarwinds, Equifax and Colonial Pipeline breaches. A CISO can use the threat of negative branding and loss of reputation in the boardroom when advocating for increased cybersecurity measures.

Understanding the makeup of the board

It's important to keep in mind the role of the board — to represent and support the shareholders. A successful CISO needs to identify tech savvy board members, as well as those who support or detract from cybersecurity measures. Utilizing board members or advisors with cyber backgrounds can greatly increase the chance of gaining the security funding an enterprise needs. Some boards may need to be approached more simplistically, while others already understand cyber threats to enterprise like ransomware or hacks.

Presenting to the board: preparation is key

A successful CISO will consider the top-of-mind cyber questions from the board members' perspectives. This can include identifying the motivations of potential cyberattacks, developing threat detection protocols and articulating the speed of those capabilities, explaining the emergency response in the wake of an attack and teaching the board about potential targets in the company, like the internet protocol (IP) or customer base. Boards will also ask the financial questions: a CISO needs to be able to articulate where funds are going and why cybersecurity needs to be prioritized using specific company metrics to prove the case.

Oftentimes, a board cares more about resiliency than prevention, according to Jacquet. This involves having the right people in the room when a breach occurs. When a CISO liaises with the legal and communications teams, they protect the company from the threat of a tarnished reputation. 

Framing security as a business advantage can also be advantageous in the boardroom — if a competitor recently introduced a new cybersecurity strategy, a CISO can mention this to board members as a way to stay at the forefront of their field. The board wants to know if the cybersecurity team is doing better or worse than the previous quarter. A positive comparison to issues presented at the last board meeting can help show the evolution of cybersecurity at the enterprise. 

Things to avoid in the boardroom

When presenting to the board, there are some strategies CISOs should avoid while advocating for cybersecurity measures, according to Jacquet.

  • Don't get technical. Although it is tempting to explain cyber concepts to the board, a CISO risks losing their audience by using language and concepts that the board does not understand. It's better to frame cybersecurity issues in terms of their effects on the company, rather than what an issue technically involves. Back up any metrics with information from a third party. This improves a CISO's credibility and shows board members that they can trust their security executives.
  • Don't be too reassuring. Telling the board that everything is fine can land a CISO in hot water if an attack happens soon after a board meeting, giving the board the impression that the CISO doesn't have a handle on the true cyber landscape of the firm.
  • Don't scare the board. Board members don't want to feel that the cybersecurity situation is out of control. A successful CISO should be honest, share what is working well and not so well and how the security team will address issues.

Using these tips, a CISO can better prepare for and execute successful presentations to their board.

KEYWORDS: board of directors security boardroom strategies C-Suite cybersecurity Chief Information Security Officer (CISO) cyber attack cyber security risk mitigation threat detection

Share This Story

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing