SlideShare une entreprise Scribd logo
1  sur  18
©2019 Diligent. All rights reserved. Diligent Confidential.
How Higher Ed Boards Can Learn to
Stop Avoiding & Start Loving Cyber Risk
Dottie Schindlinger
Vice President of Thought Leadership
June 19, 2019, 1:30-2:15 PM
2019 AICUP Member Meeting on Collaboration
2
Today’s Agenda
Overview of the board’s
role in cyber risk oversight
Review the latest trends
and research related to
boards and cyber risk
Discuss how boards can
prepare for cyber incidents
Mini-Tabletop Exercise
Cyber Risk by the Numbers
447 million
Number of personal records hackers
stole last year
206 Days
Average # days it took US
companies to detect a data breach
>70% by 2021
Percentage of all cryptocurrency
transactions used for cybercrime
$6 trillion annually by 2021
Annual cost of cybercrime, which is
already greater than illicit drug trade
1 in every 50
Emails contains malicious content
#10 on the Top 10
Education is #10 on the top 10 most
cyber-attacked industries
3
Sources: https://www.ibm.com/security/data-breach; https://www.comparitech.com/vpn/cybersecurity-
cyber-crime-statistics-facts-trends/; https://cybersecurityventures.com/cybersecurity-almanac-2019/
Cybersecurity – programs and processes in place to protect hardware, networks, and data from cyber
incidents
Cyber resilience – the ability to withstand a cyber incident, including:
• Programs & processes in place to ensure operations can continue with minimal disruption both
during & after an incident
• The speed and agility of the organization’s response to cyber incidents
• The ability of the organization to retain & rebuild the trust of stakeholders after a cyber incident
occurs
4
Cybersecurity vs. Cyber Resilience
Are Boards of Trustees
Cyber-Ready?
5
Trustee
Access to
sensitive
docs
Ability to save,
share and store
these docs
A scenario to consider…
7
Cyber-Readiness – Boards Lag Behind
53%
North American directors
use personal email for
board communications
(Global: 56%)
45%
North American directors
lost a device that
contained board records in
the past year
(Global: 29%)
29%
North American board
using secured instant
messaging software
(Global: 47%)
37%
North American boards
find it challenging to share
sensitive documents safely
(Global: 47%)
2018 Forrester, Directors’ Digital Divide Report
8
Cyber-Readiness – Boards Lag Behind
82% 67%
13% 51%
School boards have never
conducted a security audit
of board communication
IT/Data security teams that
oversee the security of
board communications
School boards don’t
require cybersecurity
training
School boards “don’t
know” if there is a cyber
crisis plan in place;
another 39% know there
isn’t one.
2018 NSBA School Board Cyber Risk Report
What Is the Board’s Role in
Cyber Risk Management?
9
Board’s Fiduciary Obligations
Duty of Care
• Acting on an informed basis after consideration of all
available information
Duty of Loyalty
• Putting the organization’s interests above your own &
avoidance of conflicts of interest
Duty of Good Faith
• Exercising care & prudence in business decisions with
adherence to law & policy
10
Who’s Accountable?
11
Administration carries out
day-to-day business, reports
to President
President oversees school &
staff, reports to board
Board: oversees mission,
represents stakeholder
interests, oversees
institution
Stakeholders: students, families,
community, local businesses, elected
officials, government agencies, media, etc.
Questions for the board to consider
12
• Is the institution’s approach to cybersecurity risks and associated privacy
issues able to meet new legal requirements? (e.g. GDPR, US state laws)
• How frequently is the maturity of the institution’s cybersecurity risk
management framework being assessed and evaluated?
• How is the institution monitoring for new and potential cybersecurity
regulatory changes and complying with new legal requirements?
13
5 Cyber “Discussion Starters” for the Board
1 What’s our plan include? (BC/DR, crisis comm’s, cyber risk coverage)
2 How are we protecting consumer data?
3 How do we know our security/privacy program works?
4 What are the biggest vulnerabilities & how are we preparing?
5 Have we received adequate training & have we practiced the plan?
• Divide into teams
• Each team – select a VIP to take notes, someone to be time-keeper, and a team rep.
• Read through the case scenario & discuss:
• What would your board do first, second?
• What unanswered questions need to be resolved?
• Who on the board should be involved and what roles should each person play?
• What reports & data will the board need?
• How should the board’s efforts be coordinated?
14
Exercise: Cyber Crisis
Q&A – What’s On Your Mind?
Contact Me!
16
@GovTechGeek
linkedin.com/in/GovTechGeek
slideshare.net/BoardEffect
boardeffect.com/blog
17
(866) 672-2666
info@boardeffect.com
boardeffect.com
1111 19th Street NW, 9th Floor,
Washington, DC 20036
Contact Us
Thank you!

Contenu connexe

Tendances

Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey GuideCitrix
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...AIIM International
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Kevin Duffey
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020Rahul Boga
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentationBradford Bach
 
#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election SystemsDevOps.com
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 

Tendances (20)

Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about t...
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 

Similaire à How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!

A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...SurfWatch Labs
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmDavid Sweigert
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon BradyStarttech Ventures
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 

Similaire à How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk! (20)

A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
Websense
WebsenseWebsense
Websense
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

Plus de Dottie Schindlinger

Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Building Your Best Corporate Boardroom: How to Find the Right Directors for a...Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Building Your Best Corporate Boardroom: How to Find the Right Directors for a...Dottie Schindlinger
 
Managing School District Policy Documents with BoardDocs
Managing School District Policy Documents with BoardDocsManaging School District Policy Documents with BoardDocs
Managing School District Policy Documents with BoardDocsDottie Schindlinger
 
Making Sense - Reframing Problems to Generate Better Board Decisions
Making Sense - Reframing Problems to Generate Better Board DecisionsMaking Sense - Reframing Problems to Generate Better Board Decisions
Making Sense - Reframing Problems to Generate Better Board DecisionsDottie Schindlinger
 
School Board Governance in the Digital Age
School Board Governance in the Digital AgeSchool Board Governance in the Digital Age
School Board Governance in the Digital AgeDottie Schindlinger
 
Easing the Superintendent Evaluation Process with BoardDocs
Easing the Superintendent Evaluation Process with BoardDocsEasing the Superintendent Evaluation Process with BoardDocs
Easing the Superintendent Evaluation Process with BoardDocsDottie Schindlinger
 
Welcome to Your District's Board Meeting - Now What?!
Welcome to Your District's Board Meeting - Now What?!Welcome to Your District's Board Meeting - Now What?!
Welcome to Your District's Board Meeting - Now What?!Dottie Schindlinger
 
Making Sense: Generating Better Board Decisions with BoardDocs
Making Sense: Generating Better Board Decisions with BoardDocsMaking Sense: Generating Better Board Decisions with BoardDocs
Making Sense: Generating Better Board Decisions with BoardDocsDottie Schindlinger
 
Forrester Report on Boardroom Technology and Board Best Practices
Forrester Report on Boardroom Technology and Board Best PracticesForrester Report on Boardroom Technology and Board Best Practices
Forrester Report on Boardroom Technology and Board Best PracticesDottie Schindlinger
 
Top 5 Governance Issues Facing Nonprofits for 2019
Top 5 Governance Issues Facing Nonprofits for 2019Top 5 Governance Issues Facing Nonprofits for 2019
Top 5 Governance Issues Facing Nonprofits for 2019Dottie Schindlinger
 
WASB 2019 Convention: Generating Better Board Decisions with BoardDocs
WASB 2019 Convention: Generating Better Board Decisions with BoardDocsWASB 2019 Convention: Generating Better Board Decisions with BoardDocs
WASB 2019 Convention: Generating Better Board Decisions with BoardDocsDottie Schindlinger
 
Governing in a Digital Age - Conference Presentation at Upswell 2018
Governing in a Digital Age - Conference Presentation at Upswell 2018Governing in a Digital Age - Conference Presentation at Upswell 2018
Governing in a Digital Age - Conference Presentation at Upswell 2018Dottie Schindlinger
 
33 Principles in 33 Minutes: Guide to Good Governance
33 Principles in 33 Minutes: Guide to Good Governance 33 Principles in 33 Minutes: Guide to Good Governance
33 Principles in 33 Minutes: Guide to Good Governance Dottie Schindlinger
 
Engaging the School Community in Decisions with BoardDocs
Engaging the School Community in Decisions with BoardDocsEngaging the School Community in Decisions with BoardDocs
Engaging the School Community in Decisions with BoardDocsDottie Schindlinger
 
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
33 Principles in 33 Minutes: Building and Maintaining Your Board and PoliciesDottie Schindlinger
 
Maximize Efficiency & Time - Board Management Solutions that Work
Maximize Efficiency & Time - Board Management Solutions that WorkMaximize Efficiency & Time - Board Management Solutions that Work
Maximize Efficiency & Time - Board Management Solutions that WorkDottie Schindlinger
 
The Clear Picture on Board Transparency: Why It’s so Important
The Clear Picture on Board Transparency: Why It’s so ImportantThe Clear Picture on Board Transparency: Why It’s so Important
The Clear Picture on Board Transparency: Why It’s so ImportantDottie Schindlinger
 
What Can You Do with PSBA BoardDocs ?!
What Can You Do with PSBA BoardDocs ?!What Can You Do with PSBA BoardDocs ?!
What Can You Do with PSBA BoardDocs ?!Dottie Schindlinger
 
The Clear Picture on School Board Transparency: Why It’s so Important
The Clear Picture on School Board Transparency: Why It’s so ImportantThe Clear Picture on School Board Transparency: Why It’s so Important
The Clear Picture on School Board Transparency: Why It’s so ImportantDottie Schindlinger
 
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!Dottie Schindlinger
 

Plus de Dottie Schindlinger (20)

Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Building Your Best Corporate Boardroom: How to Find the Right Directors for a...Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
Building Your Best Corporate Boardroom: How to Find the Right Directors for a...
 
Managing School District Policy Documents with BoardDocs
Managing School District Policy Documents with BoardDocsManaging School District Policy Documents with BoardDocs
Managing School District Policy Documents with BoardDocs
 
Making Sense - Reframing Problems to Generate Better Board Decisions
Making Sense - Reframing Problems to Generate Better Board DecisionsMaking Sense - Reframing Problems to Generate Better Board Decisions
Making Sense - Reframing Problems to Generate Better Board Decisions
 
School Board Governance in the Digital Age
School Board Governance in the Digital AgeSchool Board Governance in the Digital Age
School Board Governance in the Digital Age
 
Easing the Superintendent Evaluation Process with BoardDocs
Easing the Superintendent Evaluation Process with BoardDocsEasing the Superintendent Evaluation Process with BoardDocs
Easing the Superintendent Evaluation Process with BoardDocs
 
Welcome to Your District's Board Meeting - Now What?!
Welcome to Your District's Board Meeting - Now What?!Welcome to Your District's Board Meeting - Now What?!
Welcome to Your District's Board Meeting - Now What?!
 
Making Sense: Generating Better Board Decisions with BoardDocs
Making Sense: Generating Better Board Decisions with BoardDocsMaking Sense: Generating Better Board Decisions with BoardDocs
Making Sense: Generating Better Board Decisions with BoardDocs
 
Forrester Report on Boardroom Technology and Board Best Practices
Forrester Report on Boardroom Technology and Board Best PracticesForrester Report on Boardroom Technology and Board Best Practices
Forrester Report on Boardroom Technology and Board Best Practices
 
Top 5 Governance Issues Facing Nonprofits for 2019
Top 5 Governance Issues Facing Nonprofits for 2019Top 5 Governance Issues Facing Nonprofits for 2019
Top 5 Governance Issues Facing Nonprofits for 2019
 
WASB 2019 Convention: Generating Better Board Decisions with BoardDocs
WASB 2019 Convention: Generating Better Board Decisions with BoardDocsWASB 2019 Convention: Generating Better Board Decisions with BoardDocs
WASB 2019 Convention: Generating Better Board Decisions with BoardDocs
 
Governing in a Digital Age - Conference Presentation at Upswell 2018
Governing in a Digital Age - Conference Presentation at Upswell 2018Governing in a Digital Age - Conference Presentation at Upswell 2018
Governing in a Digital Age - Conference Presentation at Upswell 2018
 
33 Principles in 33 Minutes: Guide to Good Governance
33 Principles in 33 Minutes: Guide to Good Governance 33 Principles in 33 Minutes: Guide to Good Governance
33 Principles in 33 Minutes: Guide to Good Governance
 
PSBA Learning Lab BoardDocs
PSBA Learning Lab BoardDocsPSBA Learning Lab BoardDocs
PSBA Learning Lab BoardDocs
 
Engaging the School Community in Decisions with BoardDocs
Engaging the School Community in Decisions with BoardDocsEngaging the School Community in Decisions with BoardDocs
Engaging the School Community in Decisions with BoardDocs
 
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
33 Principles in 33 Minutes: Building and Maintaining Your Board and Policies
 
Maximize Efficiency & Time - Board Management Solutions that Work
Maximize Efficiency & Time - Board Management Solutions that WorkMaximize Efficiency & Time - Board Management Solutions that Work
Maximize Efficiency & Time - Board Management Solutions that Work
 
The Clear Picture on Board Transparency: Why It’s so Important
The Clear Picture on Board Transparency: Why It’s so ImportantThe Clear Picture on Board Transparency: Why It’s so Important
The Clear Picture on Board Transparency: Why It’s so Important
 
What Can You Do with PSBA BoardDocs ?!
What Can You Do with PSBA BoardDocs ?!What Can You Do with PSBA BoardDocs ?!
What Can You Do with PSBA BoardDocs ?!
 
The Clear Picture on School Board Transparency: Why It’s so Important
The Clear Picture on School Board Transparency: Why It’s so ImportantThe Clear Picture on School Board Transparency: Why It’s so Important
The Clear Picture on School Board Transparency: Why It’s so Important
 
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
33 Principles in 33 Minutes: Best Practices for the Best Board Meeting Ever!
 

Dernier

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Dernier (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!

  • 1. ©2019 Diligent. All rights reserved. Diligent Confidential. How Higher Ed Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk Dottie Schindlinger Vice President of Thought Leadership June 19, 2019, 1:30-2:15 PM 2019 AICUP Member Meeting on Collaboration
  • 2. 2 Today’s Agenda Overview of the board’s role in cyber risk oversight Review the latest trends and research related to boards and cyber risk Discuss how boards can prepare for cyber incidents Mini-Tabletop Exercise
  • 3. Cyber Risk by the Numbers 447 million Number of personal records hackers stole last year 206 Days Average # days it took US companies to detect a data breach >70% by 2021 Percentage of all cryptocurrency transactions used for cybercrime $6 trillion annually by 2021 Annual cost of cybercrime, which is already greater than illicit drug trade 1 in every 50 Emails contains malicious content #10 on the Top 10 Education is #10 on the top 10 most cyber-attacked industries 3 Sources: https://www.ibm.com/security/data-breach; https://www.comparitech.com/vpn/cybersecurity- cyber-crime-statistics-facts-trends/; https://cybersecurityventures.com/cybersecurity-almanac-2019/
  • 4. Cybersecurity – programs and processes in place to protect hardware, networks, and data from cyber incidents Cyber resilience – the ability to withstand a cyber incident, including: • Programs & processes in place to ensure operations can continue with minimal disruption both during & after an incident • The speed and agility of the organization’s response to cyber incidents • The ability of the organization to retain & rebuild the trust of stakeholders after a cyber incident occurs 4 Cybersecurity vs. Cyber Resilience
  • 5. Are Boards of Trustees Cyber-Ready? 5
  • 6. Trustee Access to sensitive docs Ability to save, share and store these docs A scenario to consider…
  • 7. 7 Cyber-Readiness – Boards Lag Behind 53% North American directors use personal email for board communications (Global: 56%) 45% North American directors lost a device that contained board records in the past year (Global: 29%) 29% North American board using secured instant messaging software (Global: 47%) 37% North American boards find it challenging to share sensitive documents safely (Global: 47%) 2018 Forrester, Directors’ Digital Divide Report
  • 8. 8 Cyber-Readiness – Boards Lag Behind 82% 67% 13% 51% School boards have never conducted a security audit of board communication IT/Data security teams that oversee the security of board communications School boards don’t require cybersecurity training School boards “don’t know” if there is a cyber crisis plan in place; another 39% know there isn’t one. 2018 NSBA School Board Cyber Risk Report
  • 9. What Is the Board’s Role in Cyber Risk Management? 9
  • 10. Board’s Fiduciary Obligations Duty of Care • Acting on an informed basis after consideration of all available information Duty of Loyalty • Putting the organization’s interests above your own & avoidance of conflicts of interest Duty of Good Faith • Exercising care & prudence in business decisions with adherence to law & policy 10
  • 11. Who’s Accountable? 11 Administration carries out day-to-day business, reports to President President oversees school & staff, reports to board Board: oversees mission, represents stakeholder interests, oversees institution Stakeholders: students, families, community, local businesses, elected officials, government agencies, media, etc.
  • 12. Questions for the board to consider 12 • Is the institution’s approach to cybersecurity risks and associated privacy issues able to meet new legal requirements? (e.g. GDPR, US state laws) • How frequently is the maturity of the institution’s cybersecurity risk management framework being assessed and evaluated? • How is the institution monitoring for new and potential cybersecurity regulatory changes and complying with new legal requirements?
  • 13. 13 5 Cyber “Discussion Starters” for the Board 1 What’s our plan include? (BC/DR, crisis comm’s, cyber risk coverage) 2 How are we protecting consumer data? 3 How do we know our security/privacy program works? 4 What are the biggest vulnerabilities & how are we preparing? 5 Have we received adequate training & have we practiced the plan?
  • 14. • Divide into teams • Each team – select a VIP to take notes, someone to be time-keeper, and a team rep. • Read through the case scenario & discuss: • What would your board do first, second? • What unanswered questions need to be resolved? • Who on the board should be involved and what roles should each person play? • What reports & data will the board need? • How should the board’s efforts be coordinated? 14 Exercise: Cyber Crisis
  • 15. Q&A – What’s On Your Mind?
  • 17. 17 (866) 672-2666 info@boardeffect.com boardeffect.com 1111 19th Street NW, 9th Floor, Washington, DC 20036 Contact Us

Notes de l'éditeur

  1. 159,700 Number of cyberattacks reported by organizations in 2017 – estimated to actually be closer to 300,000 including those that were unreported $6.5 million Average total cost of a cyber breach, including the cost of scrubbing systems, damages, etc. But it does not include ongoing litigation, increases in cyber risk insurance coverage, new fines imposed by regulators. 3.5 million Number of unfilled cybersecurity jobs by 2021 $6 trillion Annual cost of cyber crime damages by 2021 1 in every 131 Emails is malicious – most common are phishing, malware including skimmers & ransomware 93% Cyber attacks that could be prevented by updating software & training – for example, still using Internet Explorer which is no longer being fully patched/supported by Microsoft, not being vigilant about using strong passwords, using the same password on multiple sites
  2. Dottie to provide a brief introduction to the data from the survey: “Before we dive into the survey data, I want to provide some context on cyber risk. Imagine a scenario where you have a group of part-time employees who are only on-site a handful of days each year. These employees mostly operate outside your firewall, but their job entails receiving, reviewing and responding to some of the most sensitive information your company has. These individuals also may have the ability to take this incredibly sensitive information and save it to local drives, print copies, and potentially email others using personal email accounts on service providers that might be completely unsecured. Even if the systems they use have security, since they are not managed by your company’s data security team, you have no access to of control over the systems these folks are using. Unfortunately, this scenario is a fairly accurate picture of how boards of directors communicate and operate at many companies.”
  3. These are based on Delaware corporate law, which influences the largest number of corporations in the US and has therefore become the standard. Duty of Care: Coming prepared to meetings, ready to deliberate, actively visiting the board portal Taking the time to research & reflect Adhering to professional standards – even when you’re off duty Staying informed on risks, opportunities, finances, activities, successes & challenges Anticipating consequences of decisions Duty of Loyalty: Advocating for the org’s mission & its stakeholders interests above your own Networking, opening doors, leveraging social media NOTE: Private opinions tend not to stay private for long Providing support & care for the CEO Disclosing & avoiding potential conflicts of interest Maintaining confidentiality & helping others do the same Supporting board decisions in public, regardless of personal feelings Duty of Obedience: Being a “good student” of the bylaws, policies, laws governing the org. and board Ensuring others adhere to the rules Knowing the org’s core documents, ensuring they are current & accurate Being a “good citizen” – keep the health and welfare of your org.’s stakeholders top of mind
  4. What’s at stake? Into effect 11/1/2018. Among the new rules are a requirement that companies must keep accurate data about cybersecurity safeguards for two years following, in case breaches are revealed down the line. The law also calls for "appropriate" digital safeguards at all parts of the business, including dealings with third party contractors. The rules call for stiff penalties, too — up to $100,000 per violation — a sum that should be enough to frighten many businesses into updating their IT infrastructure. But many will have problems complying with the new rules, partly because of a lack of awareness.