You are on page 1of 3

Oversight of cybersecurity

and data governance


Key considerations for boards
and audit committees

By Kyle Kappel and John Rodi

The rapid shifts that companies made in 2020 and the first half of 2021 to keep their
businesses up and running during the COVID-19 crisis—remote work arrangements,
supply-chain adjustments, and increased reliance on online platforms—were a boon for
organized crime, hacktivists, and nation-states. Cyberattacks of all types proliferated during
the pandemic, and recent headlines of brazen attacks—from the SolarWinds1 breach to the
ransomware attack on the Colonial Pipeline2—with far-reaching implications for supply chains
and the economy highlight the ongoing cybersecurity challenge facing companies.

Indeed, the acceleration of digital strategies, the likely


continuation of remote work and hybrid work models, Cybersecurity challenges and concerns:
and increased regulatory scrutiny of data privacy A boardroom lens
continue to elevate cybersecurity and data governance Our recent surveys of directors, including audit
on board and audit committee agendas. (See sidebar.) committee members, point to the continued
As boards refine their boardroom cybersecurity and and growing prominence of cybersecurity
data governance discussions and oversight processes, and data governance on board and audit
the following considerations may be helpful. committee agendas:

Periodically review management’s cybersecurity — The most important lessons learned—and


risk assessment. Every company should be significant changes made—as a result of
conducting cybersecurity risk assessments as a matter the COVID-19 experience related to crisis
of course. What are the company’s most valuable readiness and digital strategy.3
digital assets, and what are the greatest threats — The top two global governance issues that
and risks to those assets? Are there security gaps? directors cited as most relevant to their
How quickly can a security breach be detected? In a company’s strategy in 2021 are cybersecurity
robust cybersecurity risk assessment, key areas of and data privacy rules and practices.4
focus should include cybersecurity leadership and
governance, human factors or “people risks,” legal and — Many audit committees continue to have
regulatory compliance, business continuity, operations substantial oversight responsibilities
and technology, and information risk. for cybersecurity (62 percent) and data
privacy (42 percent).5

1
SolarWinds Hack Victims: From Tech Companies to a Hospital, Wall Street Journal, December 21, 2020.
2
Pipeline Attack Yields Urgent Lessons About U.S. Cybersecurity, New York Times, May 14, 2021.
3
Views from the boardroom: 2021 pulse survey, KPMG Board Leadership Center, January 2021.
4
Ibid.
5
Challenges presented by COVID-19: 2020 audit committee pulse survey, KPMG Board Leadership Center, October 2020.

© 2021 KPMG LLP, a Delaware limited liability partnership and a member firm of the KPMG global organization of Oversight of cybersecurity 1
independent member firms affiliated with KPMG International Limited, a private English company limited by guarantee.
and data governance
All rights reserved. NDP203732
If the company has sufficient internal resources, the developments in the external environment (e.g., in the
cybersecurity risk assessment can be conducted private and public sector and on the legislative front). A
internally leveraging a standardized framework such as cybersecurity scorecard can help to improve both the
National Institute of Standards and Technology (NIST). quality of cyber information and the quality of director
However, as cyber threats become more sophisticated, dialogue regarding cybersecurity.
the company may need to call on recognized security
Understand the company’s cyber-incident
specialists for support. Indeed, third-party assessments
response plan. As one leading CIO recently told us,
and vulnerability management testing can be useful
it’s challenging to define a precise process or a set of
tools for assessing the robustness of cyber protections
concrete steps for managing a cyber incident because
and whether existing processes are protecting the
cyber incidents don’t all have the same attributes and
most valuable assets.
implications for the company or its customers. That
Take a hard look at supply chain and other third- said, incident management is a critical component of
party vulnerabilities. Robust reporting of third-party an overall cyber risk program and the effectiveness
risks—and close linkage with the company’s risk of the incident response plan depends on several
management process—should be front and center factors. First, scenario planning is critical, and key
for the board. COVID-19 highlighted—and in many players—including the communications, legal, and
cases, accelerated—the heavy reliance on third- policy teams—need to be involved. Second, establish
party relationships. How has the company’s third- clear accountability. If you have a breach, who is
party risk profile changed as a result of COVID-19? responsible for doing what? The final piece involves
How has management’s risk assessment changed decision-making—particularly if an incident has external
to keep pace? Boardroom conversations should implications (as many do). When third parties or
be particularly focused on whether the company’s customers might need to be notified, it’s important
inventory of third-party risks is up to date and whether to have a framework for making those decisions—
third parties’ cybersecurity controls have kept pace sometimes very quickly.
with the changing risk environment. Most importantly,
Be intentional with the allocation of cybersecurity
do they meet the company’s own standards?
and data governance oversight responsibilities.
Make data ethics and hygiene a prominent part Cybersecurity has evolved from being a fairly narrow
of the conversation. Beyond technical compliance IT/compliance-related matter typically on the audit
with privacy laws and regulations—including global- committee’s plate to a full board issue with the audit
and/or state-driven standards6—companies need to committee or another board committee conducting
manage the tension between how they legally use a deeper dive. Indeed, given the audit committee’s
customer data and customer expectations about heavy agenda, it may be helpful to have another board
how that data is used. As customers, employees, committee monitor cybersecurity and data governance
regulators, and other stakeholders pay greater attention issues and do the heavy lifting. While some boards
to data privacy issues, this tension poses significant have formed technology or risk committees to take
reputation and trust risks for companies. To that end, on cyber-specific responsibilities, relatively few have
data hygiene should be a regular part of the data standing committees devoted solely to cyber or
governance conversation: Are we collecting or holding technology issues.7
data that we don’t really need? Who has access to our
Where cybersecurity is addressed at the committee
data, including vendors and third parties? A helpful
level depends on several factors, including the relative
touchstone for boards to keep in mind during data
importance of cyber (and technology) issues to the
hygiene conversations: Just because we can, doesn’t
company (i.e., is it central to the business or has
mean we should.
the company experienced material failures related
Insist on a cybersecurity scorecard. Many audit to cybersecurity?), the bandwidth of the existing
committees and boards review with management committees, and the directors’ skill sets. In short,
a cybersecurity scorecard showing (for the most recognize cybersecurity as a full-board responsibility
recent period) the volume of identified cyber incidents, and be clear and deliberate in allocating cyber-related
the materiality and nature of cyber incidents and responsibilities to board committees as appropriate to
how they are being managed, and key trends and help bring the proper focus and oversight to the issue.

6
 or example, California Consumer Privacy Act, General Data Protection Regulation, and other
F
relevant laws and regulations.
7
 According to a KPMG analysis based on BoardEx data as of May 2021, only 12 percent of S&P
500 companies have a board committee with “cyber” or “technology” in the committee’s name.

© 2021 KPMG LLP, a Delaware limited liability partnership and a member firm of the KPMG global organization of Oversight of cybersecurity 2
independent member firms affiliated with KPMG International Limited, a private English company limited by guarantee.
and data governance
All rights reserved. NDP203732
Reinforce the board’s own cybersecurity protocols.
In addition to greater vigilance regarding the security
of board meetings and communications, directors’ use
of personal email, personal devices, or unauthorized
software to conduct board business can present Kyle Kappel
serious cyber risks. Has the general counsel or Principal
chief information security officer briefed the board Cyber Security Services
on company cybersecurity protocols that apply to Network Leader
directors and employees in the context of the new
operating environment? Companies with robust digital
models that drive customer and supply chain channels,
employee connectivity, and data-driven operations and
insights are likely to fare best. That advantage going
John Rodi
forward, however, will hinge on the underlying security
Leader
and the company’s overarching digital mindset.
KPMG Board
Remember that cybersecurity is fundamentally Leadership Center
a business issue. While a standardized or consistent
way of discussing cyber risk and mitigation efforts
is helpful, it’s not uncommon for cybersecurity
discussions to lapse into technical jargon. The board
should insist that management (CISO, CTO, chief data
officer) discuss these issues with the board in plain
English and in business context—i.e., the implications
for strategy, risk, and reputation.

About the KPMG Board Leadership Center


The KPMG Board Leadership Center (BLC) champions outstanding governance to help drive long-term
corporate value and enhance investor confidence. Through an array of programs and perspectives—including
the KPMG Audit Committee Institute, the WomenCorporateDirectors Foundation, and more—the BLC
engages with directors and business leaders to help articulate their challenges and promote continuous
improvement of public- and private-company governance. Drawing on insights from KPMG professionals and
governance experts worldwide, the BLC delivers practical thought leadership—on risk and strategy, talent
and technology, globalization and compliance, financial reporting and audit quality, and more—all through a
board lens. Learn more at kpmg.com/us/blc.

Some or all of the services described herein may

Contact us not be permissible for KPMG audit clients and their


affiliates or related entities.
kpmg.com/socialmedia
kpmg.com/us/blc
T: 1-800-808-5764
E: us-kpmgmktblc@kpmg.com The information contained herein is of a general nature and is not intended to address the
circumstances of any particular individual or entity. Although we endeavor to provide accurate
and timely information, there can be no guarantee that such information is accurate as of the
date it is received or that it will continue to be accurate in the future. No one should act upon
such information without appropriate professional advice after a thorough examination of the
particular situation.

© 2021 KPMG LLP, a Delaware limited liability partnership and a member firm of the KPMG
global organization of independent member firms affiliated with KPMG International Limited,
a private English company limited by guarantee. All rights reserved. NDP203732-1A

The KPMG name and logo are trademarks used under license by the independent member
firms of the KPMG global organization.

You might also like