New cybersecurity regulations, along with an uptick in post-breach regulatory enforcement actions and civil litigation, continue to push corporate boards toward more active oversight of their organizations’ cybersecurity risks and programs. With this increasing pressure, boards are often left questioning how and to what extent they should be involved in responding to significant cybersecurity incidents. This article addresses the evolving regulatory and litigation landscape impacting the board’s cyber-risk governance and the role of boards in overseeing breach response and related disclosures, and offers five steps for effective board oversight of cybersecurity incident response.
See “Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan” (Sep. 16, 2020).
Boards in the Evolving Regulatory and Litigation Landscape
Several recent regulations at the state and federal level now require either routine board-level reporting or supplemental disclosures regarding board-level involvement in cybersecurity risk oversight and incident response.
State Regulation
Several state regulators, including state insurance regulators such as the New York Department of Financial Services (NYDFS), as well as approximately 23 states that have adopted the National Association of Insurance Commissioners model data security law, have enacted regulations explicitly related to role of boards in cybersecurity programs and incident response. For example, the second amendment to the NYDFS Cybersecurity Regulation, which took effecxft in December 2023 and phased in certain aspects of the amendment, requires the CISO of a covered entity to timely report “significant” cybersecurity events to the “senior governing body” – typically the board – overseeing the company’s cybersecurity program. Under the amendment, the covered entity’s CISO must also report in writing, at least annually, to the senior governing body on the entity’s cybersecurity program. The report must include (among other things) an assessment of the overall effectiveness of the cybersecurity program, material cybersecurity risks to the covered entity, material cybersecurity events and plans for remediating material inadequacies. Similarly, starting in October 2025, the New York Department of Health will require CISOs for all general hospitals to report similar metrics in writing, at least annually, to the hospital’s governing body.
See this two-part series “Amendment to NYDFS Cyber Regulation Brings New Mandates”: Governance Provisions (Dec. 13, 2023), and First Compliance Steps (Jan. 3, 2024).
Federal Regulation
Of particular note among federal regulations, in 2023, the SEC published its rules on Cybersecurity Risk Management, Strategy, Governance and Incident Disclosure. Under the rules, public companies must disclose in their annual reports details regarding their cyber-risk governance, including the processes by which the board or a relevant committee thereof is informed of those risks and any board-level committee responsible for overseeing such risks.
The SEC’s new rules parallel the agency’s increasing enforcement activity against public companies and their executives in the wake of significant cybersecurity incidents, including actions in which the SEC has alleged that the company lacked sufficient disclosure controls and/or internal “accounting controls” related to its cybersecurity program. Recent actions include charges against public companies that allegedly failed to sufficiently disclose the impact of cybersecurity attacks on their third-party vendors. While no directors have been individually named in cyber-related SEC enforcement actions to date, the Commission’s focus on internal and disclosure controls related to cybersecurity matters could implicate director liability in the future.
See this two-part series on the SEC charging four companies for misleading cyber incident disclosures: “New Expectations?” (Nov. 20, 2024), and “Lessons on Contents and Procedures” (Dec. 4, 2024).
Litigation
Directors have, however, frequently been named as defendants in post-incident shareholder derivative litigation, in which it is alleged that the board failed to sufficiently oversee the company’s cybersecurity risks, in breach of their fiduciary duties. In one recent action, SolarWinds shareholders alleged that the company’s directors failed to implement a system of corporate controls for overseeing the company’s cybersecurity risks and purportedly overlooked “red flags” of cyber threats against the company. The Delaware Court of Chancery granted the defendants’ motion to dismiss the case, based in significant part on the plaintiffs’ failure to plead that the board allowed the company to violate “positive law” and the court’s finding that, “absent statutory or regulatory obligations, how much effort to expend to prevent criminal activities by third parties against the corporate interest requires an evaluation of business risk, the quintessential board function,” which is entitled to deference. While the case was dismissed in SolarWinds’ instance, as cybersecurity and privacy rules and regulations continue to proliferate (i.e., as “positive law” is enacted), it remains to be seen whether future shareholder derivative plaintiffs may have more success.
See this two-part series on the SolarWinds Decision: “Court Narrows Case, but SEC’s Surviving Claims Alarm CISOs” (Aug. 7, 2024), and “Practical Takeaways for Cyber Communications” (Aug. 14, 2024).
The Board’s Post-Breach Oversight Role
As a general matter, at the time of a significant incident, the board’s role should be one of oversight: to oversee the company’s material risks from the incident, the company’s response to the incident and the likely impact on the company.
Becoming Actively Informed
Boards exercise their oversight role in significant part by becoming informed on the following:
- the company’s action/response plan (as typically included in its incident response plan);
- the nature, scope and potential impact of the incident;
- the status of the investigation;
- the company’s containment strategies and remediation plan; and
- any applicable insurance coverage.
The board’s oversight role requires it to remain actively engaged in understanding a cybersecurity event as material facts unfold – particularly by asking probing questions to assess the company’s response.
Being Careful Not to Overstep
As heightened expectations for board involvement in cybersecurity matters continue, striking the right balance for board involvement in a cyber breach response is becoming more challenging. Directors may be tempted to shift from an oversight role to a more active “boots on the ground” role, getting involved in the day-to-day management of the response and potentially blurring the line between the board and management.
Directors with significant cyber experience and those who have lived through a cyber incident at another organization may (naturally) attempt to step into the shoes of management in responding to the breach and, for instance, seek to:
- participate in daily forensic investigation calls to receive information in real time;
- direct the company on its decision to take or not take systems offline given the potential business impact;
- question the level of expertise of the company’s third-party response partner(s) or retain a second, independent investigator to act on behalf of the board;
- mandate that the company interact with customers and/or employees in a certain manner; and/or
- attempt to negotiate specific ransom payments with criminal extortionists.
While directors should be applauded for their increased interest and involvement in cyber-risk oversight, stepping too far into the realm of incident response management can lead to inefficiencies during the most critical moments of the investigation, unnecessary tension with management or the cybersecurity team, attorney-client privilege concerns and – potentially – increased liability exposure for the directors.
Steps for Effective Breach Response Oversight
There are several tangible steps that management and the board can proactively take to establish an effective oversight process in the event of a significant incident. Taking the following steps should ensure that the board is kept appropriately informed while management takes primary responsibility for responding to the incident.
1) Gain an Appropriate Baseline Knowledge of Cyber Risks and the Evolving Cyber Threat Landscape
Although there is no explicit regulatory requirement for directors to maintain a specific level of cyber expertise, obtaining a baseline knowledge of cybersecurity and relevant cyber risks has become increasingly important for a number of reasons. At least a basic level of cyber literacy – which, in itself, is a specialized and highly technical area – is needed to adequately assess and oversee the cybersecurity program and a cybersecurity incident. In addition to external sources of knowledge and training, an effective way for directors to obtain this baseline knowledge can be through regular engagement with the CISO, which can help build trust between directors and management, a factor that can go a long way when responding to a significant cyber incident. In a promising statistic, in the annual National Association of Corporate Directors (NACD) survey (reflected on pages 23‑24 of the updated 2023 Director’s Handbook on Cyber-Risk Oversight by the NACD and Internet Security Alliance) of public company directors, 83 percent of respondents indicated that the board’s understanding of cyber risk has significantly improved over the past two years.
It is also important for boards to remain aware and knowledgeable of the rapidly evolving cyber threat landscape, particularly because cyber criminals are quick to exploit new and emerging technologies. Current knowledge of threats can help inform questions to evaluate the current posture of a company’s cybersecurity program in light of those new threats.
The U.K. National Cyber Security Centre’s Cyber Security Toolkit for Boards rightly recommends that directors receive regular briefings covering current threats that could affect all organizations as well as those that are specific to the company’s business, the nature of the threats, how they affect business objectives, and how the company is addressing/guarding against them. Management frequently supplies such briefings, though boards are increasingly interested in retaining supplemental outside cybersecurity advisors (i.e., outside cyber counsel and/or technical cybersecurity experts) to help ensure that they are equipped with the requisite cyber knowledge to meet their fiduciary duties.
Often, management and/or outside cybersecurity advisors provide pre-read materials in advance of the threat briefing, which can help directors digest and prepare questions to discuss. Other popular board-level resources include providing directors with whitepapers from cyber/threat intelligence experts and summaries, prepared by the company (typically members of the information security team), on the recent threats the company has faced.
See “How to Handle Rising Expectations for Board Cyber Education and Involvement” (Mar. 14, 2018).
2) Establish an Escalation Process and Path to the Board
Cybersecurity incidents may – and increasingly do – result in substantial legal, operational and/or financial consequences to companies. Companies should therefore take steps to ensure that significant cybersecurity incidents are promptly escalated to the board or relevant board-level committees – including incidents occurring at the company’s third-party vendors that may significantly impact the company’s operations or its own security protections. For all other (non-significant) cybersecurity incidents, companies should establish a regular reporting cadence for management to brief the board as appropriate. For many organizations, it may be appropriate to report at least quarterly to the applicable committee and at least annually to the full board.
While management should be afforded some discretion in determining whether to escalate an incident to the board, there should generally be no surprises regarding the escalation path when a significant cybersecurity incident occurs. Companies should review their written incident response plans, processes or protocols to understand the triggers for escalating an incident to the board.
Considerations for whether to immediately report an incident to the board may include:
- whether it significantly impacts the business operations;
- whether the incident appears to involve the unauthorized access or acquisition of a significant volume of data (particularly if there are indications the data may include personal information, protected health information or other sensitive information);
- the likely scope of impact to employees or customers;
- the nature of the cyberattack (e.g., ransomware);
- the alleged threat actor (e.g., a nation-state actor); and/or
- the potential need to disclose the cybersecurity incident externally, including to regulators.
Companies should also consider whether the full board should be immediately notified, or whether notification to a committee or committee chair is appropriate.
See “How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board” (Jun. 3, 2020).
3) Provide Appropriate and Timely Updates Regarding the Investigation
Following escalation to the board or relevant board-level committee, companies should provide appropriate timely updates on material facts as the investigation into the nature and scope of the incident unfolds. If a third party is engaged by the company to assist with the breach response – for example, a forensic investigator or law firm – management may want to consider having the third party report directly to the board on the key facts or risks associated with the incident.
Typically, helpful information to provide directors during incident status updates includes, but is not limited to:
- a summary of the incident, including the material threat actor activity;
- a preliminary root cause analysis (if known);
- a timeline of threat actor activity;
- key response efforts, such as the company’s initial steps taken upon detection of the incident;
- vendors engaged to help respond to the incident;
- the status of containment and restoration (if applicable) efforts;
- the estimated or likely financial or operational impact on the business; and
- potential regulatory and/or litigation exposure.
In addition, directors likely will want to understand the communications strategy with employees, customers, the media, law enforcement and, potentially, the threat actor (such as in a ransomware/extortion incident).
See “Cyber Crisis Communications – ‘No Comment’ Is Not an Option” (Sep. 7, 2022).
4) Document Updates to the Board
When an incident occurs, it is prudent from a regulatory and litigation perspective to document when and how the board is informed and updated on a cyber event, to demonstrate that the board members are actively engaged and meeting their fiduciary duties of oversight. Board and committee meeting minutes should reflect sufficient detail to show that the board discussed the incident and the company’s response, though granular details of the company’s investigation are not required. If the investigation is being conducted through in-house or outside counsel under privilege, the meeting minutes and any accompanying materials should so reflect. Finally, it is a best practice to share written updates through a board portal, if available; sending communications to an outside director’s email that the individual’s employer can access may risk waiving privilege.
5) Conduct Board-Level Training and/or Tabletop Exercises
Tabletop exercises continue to be a useful activity to further develop muscle memory when cyberattacks occur and, increasingly, a regulatory requirement (or expectation). Traditionally, most companies conduct: (a) technical tabletop exercises focused on the technical aspects of a response, involving the company’s information security and IT teams, and/or (b) executive tabletop exercises focused on the cross-functional response to a significant cybersecurity incident, involving front-line responders or executives from various departments beyond information security and IT, including legal, communications, marketing, finance, HR, operations, etc. At a minimum, it can be helpful to provide the board with a readout following an executive-level tabletop exercise, highlighting the key strengths and areas of improvement for management to focus on moving forward.
More recently, however, boards are increasingly becoming directly involved in tabletop exercises or similar “live” simulated training. Board-level exercises frequently include a third-party expert, such as outside breach counsel or a cyber consultant, to help facilitate and guide the board through a simulated cyber incident to allow the directors to explore their oversight role at pivotal points in the incident lifecycle.
In the NACD’s most recent update to its Director’s Handbook on Cyber-Risk Oversight, it recommends that it “is also advisable for directors to participate with management in one or more cyberbreach simulations, or ‘tabletop exercises.’” By including the board, or certain members thereof, in tabletop exercises, board members are not only able to practice their oversight role, but also they can gain a better understanding of potential cyberattacks, the multitude of issues that arise while responding to a cyberattack and the company’s incident response protocols, including how or when incidents are escalated to the board. Effective board-level exercises will focus on training the directors, rather than testing them, and should result in the board feeling confident in its oversight role and that management is prepared in the event of a significant cybersecurity incident.
See this two-part series on a mock cyber incident tabletop exercise: “Everything at Once” (Jun. 19, 2024), and “Day Two and Beyond” (Jun. 26, 2024).
Kim Peretti is co-chair of Alston & Bird’s privacy, cyber and data strategy team, as well as the national security and digital crimes team. She is the former director of PwC’s cyber forensic services group and a former senior litigator for the DOJ’s Computer Crime and Intellectual Property Section. With over 24 years of experience as an information security professional and lawyer, she manages technical cyber investigations, assists clients in responding to large cybersecurity and privacy incidents, and advises boards and senior executives in cybersecurity and cyber risk matters. Peretti also services clients in matters of privacy, AI, national security investigations, and responding to data security-related regulatory inquiries and enforcement actions.
Cara Peterman is a partner in Alston & Bird’s securities litigation group. She focuses on shareholder derivative suits, shareholder class actions, M&A litigation and other complex commercial litigation. She also regularly represents clients in investigations brought by the SEC and other federal and state regulators. Peterman counsels public companies and their directors and officers on public disclosure and corporate governance matters, with a concentration on cybersecurity; data privacy; AI; and environmental, social and governance-related issues.
Lance Taubin is a senior associate at Alston & Bird, focusing on cybersecurity and data privacy. He advises clients on various cybersecurity and data privacy issues, including breach preparedness, response and compliance, guiding them through complex incidents and regulatory challenges, as well as managing cyber risk, technology transactions and M&A diligence. Taubin draws from his in-house cybersecurity and privacy experience to provide clients with unique solutions to cybersecurity risk management, privacy compliance, technology transactions and corporate law matters.