Streamline your cloud experience and maximise your cloud investment with Microsoft Azure-aligned public cloud services.
Host all of your workloads in the most appropriate location while experiencing the simplicity of one cloud from Six Degrees.
Enhance your cyber security and safeguard your organisation with our cyber security strategy and advisory, consultancy, and managed services.
Connect your business through a comprehensive connectivity portfolio delivered via our owned and operated core Next Generation Network (NGN).
Secure your productivity on any device, anywhere, any time.
Streamline your hosting with comprehensive colocation services delivered from three UK data centres.
Gain clarity and control of your 5G estate, ensuring ongoing cost efficiencies are managed on your behalf through our managed service.
Gain confidence in your cloud direction and achieve accelerated time to value through our assured and optimised cloud services.
Master today’s complex threat landscape and protect your business with our intelligence-led security services.
Videos and webinars are a great way to digest the latest technology insights.
Our eBooks and whitepapers provide in-depth insights from our experts.
Our thought leaders publish regular blogs on up-to-the-minute topics.
Learn all about the latest news from Six Degrees as we continue to evolve.
We host regular in-person and virtual events for our clients.
Discover how Six Degrees has driven success for others.
Learn how we enable our clients to achieve more; providing superior secure solutions, powered by our passionate people.
We are proud to partner with many of the world’s leading vendors, enabling you to leverage our continual investment in difference-making technology.
Learn how CNS at Six Degrees delivers intelligence-led security services that protect organisations in today’s hostile landscape.
We are committed to operating in an environmentally and socially conscious way. Learn more about our commitments as a business.
We are proud of our secure cloud credentials. Learn why we’re one of the most highly accredited providers in the UK.
We are a friendly and passionate bunch here. Whether you want to work with us or for us, we think you’ll enjoy the Six Degrees experience.
Home » Blogs » How to Tell The Board That You’ve Been Hacked …and keep your job
Fundamentally, cyber security has a visibility problem. When everything is going right, no one really notices — except to perhaps complain about costs. Demonstrating that cyber brings real value to your organisation is critical. A breach doesn’t demonstrate the positive benefits of cyber investments, but it does illustrate the potential risk — a risk that, realistically, is growing.
The global pandemic and resultant shift towards remote working have accelerated the number of cyber-attacks. Ransomware, malware and brute force attacks are all on the rise. An Interpol assessment of the impact of the pandemic on cybercrime has revealed a significant shift of targets from individuals and small businesses to major corporations, governments and critical infrastructure. But that doesn’t mean smaller businesses can rest on their laurels — it’s a dangerous cyber landscape out there, and remote working has only made things harder.
Cyber security is all about risk management and preparation. With that in mind, how do you prepare for the worst? How do you tell your Board about a hack and keep your job? That’s what we are going to explain here.
For more general advice on cyber security communication with the Board, check out our downloadable resource — Board Presentation Toolkit: Cyber Security and Threat Management.
If you’re talking to the Board about an attack, the buck stops with you. Even though regulations, such as GDPR, make it clear that responsibility for incidents or data breaches sits with the organisation and not an individual, don’t hide behind this from an internal standpoint.
Taking responsibility doesn’t mean that you are legally liable for the breach, but you should make it clear that you understand that your job is the effective delivery of a cyber security system. You might also want to point out any times you warned about the possibility of the kind of incident you are experiencing now. This is an appropriate thing to do. But it’s important that you frame all of this in the right way — namely, that you take personal responsibility for preventing this type of incident.
Fundamentally, by the time you are presenting to the Board, you should have instigated your incident management plan, which should be the central focus of your conversation. Just remember, the Board will want to hear you say “I should not have allowed this to occur”.
Note: 1-in-10 organisations don’t have an incident management plan. If you’re one of the 10%, then you should address this immediately. Get in touch if you want help.
The Board is going to want to know what happened. Share what you know, and share what you are doing to find out more. But it’s important to avoid making unverified claims — you don’t want to have to back-track two-or-three days later.
You want to focus on things that the Board will find important — the financial consequences, regulatory repercussions, PR impact and the extent of the breach. When brushing up on the latest intelligence, keep the following in mind:
If you can bring this back to warnings you had made previously — all the better. But, again, you need to take responsibility while doing this. And be careful not to jump to a solution too quickly.
You should be prepared with your next steps. According to the NCSC, the four core response stages to go through are: Analyse, Contain, Remediate and Recover.
The more information you have and the more effort that has gone into planning before reporting on the incident the better. Your ability to demonstrate what you are going to do next will add credibility to your response and calm fears about repeated breaches.
You have everyone’s attention during a breach, and the Board will want to understand how this will never happen again. This is where there are opportunities to be found in failure. Use the incident to highlight the importance of cyber security, and the value of aligning security with your organisation’s appetite for risk.
Something many people outside of cyber don’t understand is that there are no guarantees in cyber security. It’s all about weighing up direct costs, opportunity costs and risks. It’s critical that your organisation conducts an effective cyber risk assessment, and makes investments accordingly. It’s possible that the current breach is an outcome that your organisation deemed an acceptable risk. That might need to change moving forward. Either way, it should be taken into account.
Note: A direct cost is the actual cost of failure, e.g. fines, loss of revenue, loss of customers. An opportunity cost is what inaction forces on you, e.g. not being able to roll out a new customer-facing app because you can’t effectively manage the security risk.
The post-incident review will be crucial in the recalibration stage — this should cover lessons learned about the cause and also about the response itself.
Lessons from the incident itself:
It would help if you used this review to consider both the tactical fixes that would have prevented or detected this incident, as well as strategic solutions that may only show themselves across multiple cycles of incidents.
Look to answer questions such as:
Look for ineffective governance processes that may have led to multiple intrusions via previously unrecorded, internet-facing assets.
Lessons from the response:
Keeping good records of activities during the response will assist with this review.
Strategy considerations
Modern cyber security needs to focus on flexibility and the accommodation of remote working. One technical component to consider is endpoint security. This is an approach to cyber which seeks to control the transfer of data between your network and endpoints to effectively protect the whole system within an agile environment. For more information, check out the link below.
Suggested reading: How to Build a Better Cyber Security System Today
More fundamentally, it’s essential to build a repeatable cyber security process that will help you prioritise the right strategies and flexibly respond to internal and external changes. At Six Degrees, we have captured this within a five-stage cyber journey.
If you need to begin your analysis following a security breach, this is a great model to follow. The circular nature of this journey means that even by starting from the particular hacking incident, you can then work your way through all of the key questions and issues.
We live in unprecedented times, and while best practice security processes and endpoint security solutions are available, expertise is in short supply. The cyber security skills shortage is real, and strategic partners can help you access the expertise you need, on-demand.
Fundamentally, you need a team that not only checks compliance with your security approach but continuously monitors the actions of the hackers. A team that continually upgrades your process of securing sensitive data.
Being placed in the firing line following a security breach is not a comfortable place to be. But it’s an opportunity to make the case for greater investment in more flexible and effective security systems. Long-term, an agile approach will enable you to do more with less.
Managed Security Providers can help you build the kind of flexibility you need, and access the skills required. At Six Degrees, we’ve been helping businesses improve their cyber outcomes for decades. Get in touch if you want help planning a better future.
With 2020 behind us and 2021 in full…
There has been a significant amount of change…
The Board is never going to care more…
Proactive defence with Microsoft Defender for Endpoint 2020…
More information on our Privacy and Cookies Policy can be found here: https://www.6dg.co.uk/privacy-cookies/. You can update how we contact you in the future by visiting our Communications Preference Centre here: https://www.6dg.co.uk/preference-centre/.