Interest in security is growing among business professionals. More than three-quarters (79 percent) of company directors who responded to the “2017 BDO Cyber Governance Survey” reported a rise in cybersecurity awareness during the past year. In addition, 78 percent of executives said they had matched their investment in time with a commensurate cash injection to help defend their businesses from cyberattacks during the past 12 months.

The survey, which polled 140 corporate directors of public company boards, calculated an average rise of 19 percent in security budgets. While this boost in investment is good news, many businesses remain reticent to share vital information that can help reduce the risk of attack. Instead, organizations should look to create strong cross-business partnerships, particularly between board directors and chief information security officers (CISOs).

Building Cybersecurity Awareness

While board members have increased their time and cash investments in cybersecurity on an annual basis, 18 percent of directors said that their business has suffered a breach during the past two years. When it comes to incident response, 61 percent of survey participants said their company had some form of incident response strategy.

While 16 percent still have no plan at all, the number of businesses that now have a strategy in place is significantly higher than just two years ago, when only 45 percent of firms had an agreed-upon approach to incident response.

Meanwhile, 91 percent of board members said they received cybersecurity briefings at least annually. Just over one-fourth (28 percent) of these individuals are informed on a quarterly basis. Unfortunately, 9 percent of directors said they are still not updated on information security affairs at all.

The BDO survey also asked directors about the WannaCry cyberattacks. About 60 percent of board members said their business had implemented measures to help reduce the risk of ransomware. Key strategies here include an increased emphasis on patch management (58 percent), a rise in the frequency of data backups (58 percent) and the ability to restore data more quickly (46 percent).

The Importance of Information Sharing

In the report, John Riggi, managing director of cybersecurity and financial crimes at BDO, stated that too many executives are still reticent to reveal insights that could help organizations around the world reduce the risk of a security incident. In fact, only one-quarter of company directors share information about cyberattacks with other organizations. Another 24 percent said their business did not share insights with anyone else, while more than half (51 percent) were uncertain whether their organization shared information.

Of the companies that do share information, the significant majority (86 percent) communicate knowledge with government agencies, such as the FBI and the Department of Homeland Security (DHS). While almost half (47 percent) pass insights to Information Sharing and Analysis Centers (ISACs), only 8 percent communicate with rival firms.

Creating Strong Executive Partnerships

The results of the BDO survey support the notion that board directors should become more involved with cyber risk governance. Board directors are under significant pressure, but their trusted executive partners can help fill risk awareness gaps and achieve compliance with a growing number of regulations.

Companies must focus on building strong relationships between board directors and key executives, namely the CISO. Potential tactics for strengthening this partnership include mandating the role of the CISO, understanding his or her network of influence and actively reviewing the state of organizational cybersecurity.

More from

How the Silk Road Affair Changed Law Enforcement

The Silk Road was the first modern dark web marketplace, an online place for anonymously buying and selling illegal products and services using Bitcoin. Ross Ulbricht created The Silk Road in 2011 and operated it until 2013 when the FBI shut it down. Its creator was eventually arrested and sentenced to life in prison.But in a plot twist right out of a spy novel, a cyber attacker stole thousands of bitcoins from Silk Road and hid them away. It took law…

Data Privacy: How the Growing Field of Regulations Impacts Businesses

The proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in number and relevance. So, businesses that seek to become — and stay — compliant must find a solution that can do more than just respond to current challenges. Take a look at upcoming trends when it comes to data privacy regulations and how to follow them. Today's AI Solutions On April…

Why Zero Trust Works When Everything Else Doesn’t

The zero trust security model is proving to be one of the most effective cybersecurity approaches ever conceived. Zero trust — also called zero trust architecture (ZTA), zero trust network architecture (ZTNA) and perimeter-less security — takes a "default deny" security posture. All people and devices must prove explicit permission to use each network resource each time they use that resource. Using microsegmentation and least privileged access principles, zero trust not only prevents breaches but also stymies lateral movement should a breach…

5 Golden Rules of Threat Hunting

When a breach is uncovered, the operational cadence includes threat detection, quarantine and termination. While all stages can occur within the first hour of discovery, in some cases, that's already too late.Security operations center (SOC) teams monitor and hunt new threats continuously. To ward off the most advanced threats, security teams proactively hunt for ones that evade the dashboards of their security solutions.However, advanced threat actors have learned to blend in with their target's environment, remaining unnoticed for prolonged periods. Based…