AI

Boardroom cyber risk: Questions boards should ask and the answers they should be getting

By Jake Upfield, Head of Solutions Advisory, Cybit and Tim Collinson, Founder, Starflare

Cyber incidents are boardroom crises, not IT problems. They can unravel customer trust, damage share prices, and invite costly regulatory scrutiny. For senior leaders, breaches are strategic, legal, and reputational emergencies where effective oversight begins long before an incident occurs.ย 

There areย six criticalย cyber risk questionsย thatย boards should be asking and the answers they should expectย to prepare, respond, and lead through the inevitable breach.ย 

Question 1: Are we confident we meet UK GDPR and sector rules, and do we test compliance beyond the IT team?ย 

First up, data protection laws.ย Youโ€™veย heard about UK GDPR and the Data Protection Act 2018, butย hereโ€™sย what really matters: if you mess this up, the ICO can hit you with fines up to ยฃ17.5 million or 4% of turnoverย –ย whichever hurts more.ย Weโ€™veย seen this play out with British Airways, 23andMe, and plenty of others. Theseย arenโ€™tย theoretical risks;ย theyโ€™reย real precedents that set the bar for what regulators expect.ย 

Depending on your sector, you might haveย additionalย layers on top of that baseline. Ifย youโ€™reย in finance,ย youโ€™reย dealing with FCA and PRA requirements. Legal sector? The SRA has their own expectations. And ifย youโ€™reย part of critical national infrastructure, NIS2 regulations are coming into play. The point is: know your regulations. All of them.ย 

Hereโ€™sย something that catches a lot of organisations off guardย –ย contractual liability. Your business partners are increasingly writing cybersecurity obligations directly into supply contracts.ย ย 

Ourย advice? Be practical about it.ย Aim for strong security, butย donโ€™tย just adopt the strictest possible policy because a client asked for it. Make sure it works for your business. Sometimes you need to push back on clients and explainย whatโ€™sย realistic. Other times, you need to go to your own leadership and say, โ€œIf we want to win this pitch or keep this client, hereโ€™s what we need to invest in.โ€ย ย 

And finally, litigation. This is a growing area in the UKย –ย class-action style claims from customers or employees after a data breach.ย Itโ€™sย not just about regulatory fines anymore;ย itโ€™sย about being sued by the people whose data you were supposed to protect.ย 

Question 2: Do we understand our financial exposure to cyber disruption, and do we have tested recovery plans?ย 

Ransomware is still the dominant threat, andย itโ€™sย not going away. Mid-sized firmsย are prime targets becauseย theyโ€™reย in this uncomfortable middle groundย –ย theyโ€™veย got money worth stealing, butย theyย probablyย donโ€™tย have the enterprise-grade defences that larger organisations can afford. The criminals know this, andย theyโ€™reย betting on it.ย 

Butย hereโ€™sย what really keepsย usย up at night: business interruption. When you get hit with ransomware or a DDoS attack,ย itโ€™sย not just about losing dataย –ย itโ€™sย about your entire operationย grinding to a halt. Revenue stops. Supply chains break down. Customer service disappears. We saw this with Jaguar Land Rover, and it was brutal.ย So,ย weย always ask: how quickly can you get back on your feet?ย 

Think about it like a โ€œMinimum Viableย Your Brandโ€ย –ย whatโ€™sย the bare minimum you need to keep the business running and cash flowing? And more importantly, can you restore to that minimumย viableย state? Becauseย hereโ€™sย the uncomfortable truth: most organisations neverย properly testย their restore capability. They assume their backups work.ย Donโ€™tย assume. Test them.ย 

Now,ย letโ€™sย talk about recoveryย costs, becauseย this is where the bill really adds up. The ransom itself?ย Thatโ€™sย often the smallest part.ย Youโ€™veย got incident response teams, forensic investigators, legal fees, PR firms, and the cost of rebuilding systems.ย ย 

Finally, cyber insurance. Premiums are going up, exclusions are getting tighter, andย itโ€™sย becoming harder for mid-sized businesses to transfer the risk. Some organisations are even looking at self-insuring as an alternative, though that requires serious financial reserves and risk appetite.ย 

Question 3: How do we measure the effectiveness of staff training, and are we holding leadership accountable for cyber culture?ย 

Hereโ€™sย something that might surprise you: your biggest vulnerability oftenย isnโ€™tย your technology –ย itโ€™sย your people. Andย weโ€™reย not just talking about malicious insiders, though those exist.ย Weโ€™reย talking about good people making honest mistakes. A mis-sent email. A misconfigured cloud storage bucket. These accidents can be just as devastating as deliberate attacks.ย 

Thenย thereโ€™sย theย skills gap. Most mid-sized businessesย donโ€™tย have dedicated in-house securityย expertise. Instead,ย youโ€™veย got an already overstretched IT team trying to handle cybersecurity on top of everything elseย theyโ€™reย managing.ย Thatโ€™sย whyย weโ€™reย seeing more organizations turn to MDR,ย Managed Detection and Response,ย or external SOC teams to fill those gaps.ย Itโ€™sย not a sign of weakness;ย itโ€™sย smart resource allocation.ย 

Cyber is still too often seen as a technical problem rather than a business risk. And when that happens, you end up underinvesting. The NCSC has excellent guidance on thisย –ย boards need to understand that cybersecurity is fundamentally about protecting the business, not just protecting the servers.ย 

Andย then thereโ€™sย training fatigue. Youย probably doย security awareness training, right? But be honest,ย is itย actually effective, or is it just a checkbox exercise? Because if your staff are clicking through annual training modules just to get them done,ย youโ€™reย still exposed to phishing and social engineering attacks.ย 

Sometimes the training is under-resourced or just impractical for how people work.ย Hereโ€™sย whatย weโ€™dย suggest: consider tailored training specific to job roles. Your finance team faces different threats than your sales team or your HR department. Generic training misses the mark.ย ย 

Question 4: Where are our biggest technical weak spots, and do we have the budget and roadmap to address them?ย 

Cloud security is the big one.ย Everyoneโ€™sย moved to SaaS and IaaS over the past few yearsย –ย itโ€™sย been rapid, and honestly, necessary. But that speed has introduced risks around misconfiguration, identity management, and third-party reliance.ย Identity is the new โ€œfront doorโ€ to your organization.ย Itโ€™sย not about firewalls anymore;ย itโ€™sย about knowing who has access to what. If youย canโ€™tย answer that question confidently,ย youโ€™veย got a problem.ย 

Now, this sounds boring, but legacy systems are killing organisations slowly.ย Youโ€™veย probably gotย critical systems running that are outdated, poorly patched, and the vendor barely supports them anymore.ย Maybe theyโ€™reย so old that replacing them feels impossible, orย maybe theyย just work soย youโ€™veย left them alone. Butย hereโ€™sย the reality: support the basics and do your patching.ย The majority ofย successful breaches exploit known vulnerabilities that have patches available.ย Itโ€™sย not exotic zero-daysโ€”itโ€™sย basic hygiene.ย 

Remote and hybrid working has fundamentally expanded your attack surface. Home networks, personal devices, VPNsโ€”theyโ€™reย all potential entry points. And personal devices are particularly challenging becauseย youโ€™veย got limited control over who or what can access your information through them. And thenย thereโ€™sย the perennial issue of people sending work homeย –ย forwarding emails to personal accounts, working on personal laptops. Every time that happens, yourย information is spreading beyond your control.ย 

Hereโ€™sย something that should worry you: AI-driven attacks. Cybercriminals are using AI to craft better phishing emails, automate attacks, and exploit exposed credentials faster than ever. The barrier to entry for conducting sophisticated attacks is now even lower, and attacks are happening faster. Now, there isย a silver liningย –ย security defence tooling has also improved with AI enhancements. But you need to be investing in those tools toย benefitย from them.ย 

Question 5: How are we assessing supplier cybersecurity, and do we know our critical dependencies?ย 

Theย uncomfortable truthย is thatย youโ€™reย only as secure as your weakest supplier.ย 

Think about your vendor dependencies for a moment. Cloud providers, SaaS vendors, managed service providersย –ย youโ€™reย relying on them for critical business functions. Andย hereโ€™sย whatย weย always do:ย weย check a vendorโ€™s reputation before taking them on. This is especially important ifย youโ€™reย in sectors like law firms, where client confidentialityย isnโ€™tย negotiable. You need to do your due diligence on vendors before you hand them the keys to your data.ย 

But it gets more complicated. Cascade breaches are a real phenomenon. When an attack hits a supplier,ย it canย impactย hundreds of downstream firms.ย Weโ€™veย seen this play out repeatedly. Marks & Spencer was affected throughย a supplierย (TCS). There are countless other examples.ย 

Andย hereโ€™sย an interesting questionย weย donโ€™tย hear asked enough: attacks on your customers can lead you to lose work.ย Doesย this meanย suppliersย shouldย also be vetting their customers for cyber resilience? Because if your major client goes down due to a breach,ย youโ€™reย losing revenue through no fault of your own.ย 

Now,ย letโ€™sย be realistic about due diligence challenges. Most mid-sized businesses simplyย donโ€™tย have the resources to fully assess every supplierโ€™s cybersecurity posture. Youย canโ€™tย send detailed security questionnaires to every vendor and expect to review them all thoroughly.ย So,ย what do you do?ย 

There are tools available. Ratings agencies like BitSight orย LEETย Security can give you an external view of a vendorโ€™s security posture. Assessment tools like 6Clicks and Arco can help streamline the process.ย Theyโ€™reย not perfect, butย theyโ€™reย better than flying blind.ย 

Question 6: If a major breach hit tomorrow, do we have the communication and resilience strategy to protect our reputation?ย 

Customer trust is fragile. A serious breach can lead to lost clients, cancelled contracts, and reputational damageย thatโ€™sย much harder to quantify than regulatory fines. The financial hit from the ICO is painful, butย itโ€™sย finite. Losing your customersโ€™ trust? That can last years.ย Thatโ€™sย why you need to have your communications plan ready in advance. Your reputation can be won or lost based on how you handle the communication in those critical first hours and days.ย 

Hereโ€™sย ourย strong recommendation: use professionals to help you. Whenย youโ€™reย in crisis mode,ย youโ€™reย not thinking clearly.ย Youโ€™reย stressed,ย youโ€™reย dealing with technical teams, lawyers, regulators, and customers all at once. Having a PR firm or crisis communications team on retainer who knows your business and can step inย immediatelyย –ย thatโ€™sย invaluable.ย Donโ€™tย try to wing it when the crisis hits.ย 

Demonstrating strong cybersecurity is becoming a market differentiator, especially in B2B sectors. Your prospects and clients are asking about your security posture. They want to know you take this seriously. If you can show them robust controls, certifications, and a mature security program,ย youโ€™reย actually winningย business because of it.ย 

And speaking ofย demonstratingย securityย –ย investor and lender expectations are rising sharply. Ifย youโ€™reย looking for funding, ifย youโ€™reย working with insurers, they want proof of robust cyber resilience. Large companies have Enterprise Risk Management frameworks with cyber listed as a key risk. Insurers are nowย almost alwaysย looking at certifications like Cyber Essentials Plus, ISO 27001, SOC 2.ย Theyโ€™reย not just taking your word for it anymoreย –ย theyโ€™reย performing their own control testing.ย 

Soย whenย weย ask if you have a communication and resilience strategy,ย weโ€™reย asking several things at once. Do you have a crisis plan? Have youย identifiedย who speaks on behalf of the organisation? Do you have professional support lined up? Can youย demonstrateย to clients, investors, and insurers thatย youโ€™reย prepared?ย 

Becauseย hereโ€™sย the thing: how you respond to a breach matters as much as preventing it in the first place. Everyone assumesย theyโ€™llย never be breached. The smart organizations are the ones who prepare for whenโ€”not ifโ€”it happens.ย 

Author

Related Articles

Back to top button