Besides what the CIO, CDO and CISO are doing, what is the CFO’s and CHRO’s role in building the right foundations for cybersecurity in the organization?

Terry Ray, Data Security CTO and Fellow, Imperva

Ray: Data is the foundation of businesses, so robust cybersecurity for the enterprise starts with robust data security. When protecting data, the four tenets are:

  • Confidentiality: Ensuring sensitive data is only accessible to those who actually need it and are permitted to access it according to organizational policies while restricting access for others.
  • Integrity: Ensuring data and systems are not modified due to actions by threat actors or accidental modifications. Measures should be taken to prevent corruption or loss of sensitive data and to quickly recover from such an event if it occurs.
  • Availability: Ensuring data and systems are accessible when needed, without downtime or interruptions, to support business operations and decision-making. Measures such as redundancy and disaster recovery planning can help achieve this.
  • Auditability: Ensuring that organizations maintain clear and detailed audit trails of how sensitive data is handled. In the event of a data breach, auditability enables an organization to demonstrate its efforts to secure sensitive data and provide logs and records proving that no sensitive information was exposed or stolen. This not only supports regulatory compliance but also fosters trust by showcasing accountability and transparency in data protection practices.

Beyond training, CHROs can strengthen security by:

  • Policy development and enforcement: Creating and enforcing guidelines on acceptable use, remote work security, and incident response.
  • Access management: Implementing the principle of least privilege to ensure employees only access information necessary for their roles. By taking the lead on these fronts, CHROs can fortify the human element of cybersecurity, transforming employees into the first line of defense.

CFOs, on the other hand, play a crucial role in enhancing organizational cybersecurity by leveraging their expertise in risk management and financial oversight. Here are several ways they can contribute:

  • Separation of duties: In the highly targeted Financial Services and Insurance (FSI) sector, leading institutions like FSISAC recommend that CISOs report directly to CFOs instead of CIOs. This separation of duties eliminates potential conflicts, as CIOs must balance business demands with security needs. CFOs, as fiduciaries, bring a risk-focused perspective, often supported by legal and risk teams, enabling CISOs to build more robust cybersecurity strategies. Other industries are increasingly adopting this model.
  • Risk assessment and prioritization: CFOs can work closely with CISOs to identify and prioritize cyber threats based on their potential financial impact. This helps ensure that resources are allocated effectively to mitigate the most significant risks.
  • Budgeting and investment: By understanding the financial implications of cyber threats, CFOs can advocate for appropriate cybersecurity budgets.
  • Communication and reporting: CFOs can translate complex cybersecurity risks into financial terms that resonate with stakeholders, including the board of directors. They also ensure compliance with regulatory requirements, such as reporting significant cybersecurity incidents to relevant authorities.