Follow us


You'll need to get senior staff to co-operate effectively to tackle cyber security threats. Here's where to start

Tackling the ever-changing cyber security threat in an agile and proactive way requires influential members from the whole business to work together. Here is a selection of key questions by which you can assess your business's cyber-readiness.

Board and C-suite

  • What are our key information assets including IP and who is responsible to protect them?
  • Do we know the reputational and financial impacts of a cyber security attack?
  • Am I personally at risk?
  • Can solutions be found that marry a desire for security with competiveness?
  • How does our crisis response plan take information assets into account?
  • How can we move from reacting to anticipating the threat?
  • Are we considering cyber security when making investment decisions during mergers and acquisitions?
  • Are we exposed further up or down the supply chain?
  • How regularly do we review the cyber threat and update response plans?
  • Have we created a culture where employees can raise issues before it is too late, and that those issues will be escalated appropriately within the business?

CIO and IT professionals

  • What systems do we need to operate?
  • Which of those systems have the most business critical or sensitive information?
  • What would motivate a cyber-attacker specifically to attack our business?  Do we know who and why?
  • How regularly do we review and test processes in line with the ever-changing technology and security climate?
  • What is cyber security best practice for my industry and are we keeping pace of changing regulation?
  • Are there any trends that make our information vulnerable at certain times?
  • What cyber attacks has our business suffered so far?
  • How affective has our response been to date?
  • Are training programmes in place to address data protection and cyber risks faced by our employees?
  • Who is represented in our incident response team? (Legal, HR, PR, IT, Risk, etc)
  • Who is empowered to act and make the decisions needed in the event of a crisis; what's the chain of command?
  • Do we have a review mechanism in place to determine the cause of the incident and learn from the experience?

General counsel and legal professionals

  • Do we know our regulatory and compliance obligations as they pertain to cyber security?
  • Have these been adequately communicated to the other relevant stakeholders in the business?
  • Do we have reporting processes in place to make appropriate regulatory notifications and reports in the event of a cyber security incident?
  • Who regularly tests our incident response plans and should a representative from legal be involved?
  • How do we keep up to date and implement cyber security policies across multiple jurisdictions?
  • Do we have appropriate policies and procedures in place for our employees describing acceptable and secure use of the organisation’s information assets and systems?
  • Are our policies and procedures formally acknowledged in employment terms and conditions?
  • Are our stakeholders clear on how to interact with the media in the event of a crisis?
  • What should happen if we suffer a breach through our supply chain?
  • Have we adequately reviewed our inbound and outbound contracts in the context of cyber security risk?
  • Are we adequately involved in assessing cyber security risk associated with any mergers, acquisitions or outsourcing arrangements?
  • Do we have appropriate insurance in place to cover loss as a result of a cyber incident?
  • How do we feedback the conclusions from an investigation into our policies and procedures and ensure that employees are given appropriate notice and training on them?
London Crisis Prevention and Management Defamation and Reputation Health, Safety and Environmental Crisis Management Human Rights Cyber Risk Advisory Business Protection and Risk