
Askhat - stock.adobe.com
In October 2025,Salesforce experienced a significant breach with hackers claiming to have stolen more than one billion data records from Salesforce's clients. This breach evolved into a ransomware attack, as the bad actors demanded money to prevent the sensitive data from being released. However, Salesforce refused to pay, and some records were released, including records from large corporations such as Fujifilm, Gap and Vietnam Airlines.
The Salesforce breach isn't the only event in the news; other companies, such as Google, TransUnion, and Workday, were also hit with cyberattacks in 2025. According to IBM's 2025Cost of Data Breach Report, the average cost of a data breach in the U.S. is $10.22 million, which is at an all-time high for all regions. With the potential for significant costs from a cybersecurity event, board members are taking notice and applying pressure to the organization's cybersecurity staff.
When I started my IT career in the late 1990s, passwords were generally optional, and most privileged accounts were named "admin" or "administrator", and the password was "Password123". Despite the first computer virus, Creeper, being inadvertently launched in 19711, cybersecurity wasn't at the forefront of most IT practitioners' minds, let alone board-level executives.
Fast forward to 2025, and the board of directors is not only expecting regular briefings from their chief information security officer (CISO) but also recruiting former CISOs to serve as board members. The National Association of Corporate Directorsreported that boards are now more engaged with cybersecurity, noting a 77% increase in directors reviewing the impacts of cyber events, a 25-point jump from the same survey in 2022. What was once considered acceptable -- merely meeting regulatory requirements -- has evolved into a strategic investment aimed at maintaining business continuity, safeguarding the corporate reputation, and, in some instances, serving as a market differentiator.
As CISOs increasingly move beyond the CIO's command and share a seat at the board of directors' table, it becomes crucial for both current and future CISOs to understand the language of the business. Instead of preaching to the board about patches and firewalls, CISOs and other IT executives must be able to align cybersecurity protections to the organization's outcomes and key results (OKR) or key performance indicators (KPI) to show the value of cybersecurity initiatives.
As stated earlier, most boards of directors already view cybersecurity as a top-tier business risk. However, the question remains of how well they understand the correlation between cybersecurity and the ROI to a business. CISOS must establish a framework that maps cybersecurity risk to enterprise risks. Among those and others are:
Let's walk through an example of how to reframe cybersecurity risk as enterprise risk to support business outcomes. Patch management, for example, is a foundational cybersecurity best practice. Previously, CISO presentations to the board would cite the number of unpatched devices, the number of days a system has gone unpatched, and the severity of the vulnerabilities requiring patches. While these numbers may quantify the size of the issue, it does not convey the business impacts. CISOs must learn to communicate how cybersecurity manages and mitigates business risk, or, better yet, support business outcomes.
Using the outcomes-based approach, the lack of patching for business-critical systems and applications increases the likelihood of system failure caused by a cybersecurity event, such as a ransomware attack. Verizon's 2024 Data Breach Investigations Reportfound that 14% of all breaches were due to the exploitation of vulnerabilities as the primary point of entry, which is triple the amount from the previous year.
In healthcare, that business application may be part of an imaging system. Without the imaging system, the business stands to lose revenue generated by that system. Additionally, there are potential downstream impacts, such as the need to delay or cancel a surgical procedure. This could snowball into a missed diagnosis, regulatory financial penalties, loss of insurance reimbursement, and civil and criminal lawsuits. Patients may become frustrated while waiting for a rescheduled imaging appointment and may seek alternative care. At its worst, all the snowball effects could lead to unfavorable care outcomes, including death.
In this case, the cost of mitigating the cybersecurity risk is limited to the time required for resource allocation and scheduled downtime, which is far less than the impact of an unpatched system.
Instead of attempting to develop ROI for cybersecurity capabilities, focus on the ROI of established business products. When deploying new business products and capabilities, factor in the cost of protecting those underlying systems against the revenue loss that would result from the product not being available. This builds cybersecurity into the business, rather than adding it as an afterthought. Over time, this will foster aculture of cybersecurity that enables growth and innovation rather than stifling it.
There was a time in the not-too-distant past when it was acceptable to roll out new technology and commit to implementing cybersecurity controls as part of phase two or even later as feature enhancements.
Today's CISO needs to be able to align cybersecurity costs to business costs and, in some instances, business value. Ask yourself this: Would you continue doing business with a bank that has or makes purchases from an online retailer that frequently suffers from system outages?
Aligning the cybersecurity pillars of confidentiality, integrity, and availability with board-level KPIs demonstrates the direct correlation between the cost of mitigating, managing or transferring (e.g., through insurance) a risk and the decision to accept it.
These are obviously simplified, but this example illustrates how cybersecurity risk can be effectively communicated in terms of business value. In a mature organization, cybersecurity risk, like other enterprise risks, may inform the business about when to enter or exit a business strategy.
It is also important to note that this information and analysis should not be presented to the board of directors only once or even once per year. Ideally, this information is available in real time through dashboards, which may serve multiple purposes. On the business side, cybersecurity capabilities are mapped to business operations and strategy. This shows how cybersecurity investments protect business value. On the other hand, unless your cybersecurity program has unlimited resources, these dashboards can help identify which capability gaps and weaknesses to address, thereby maximizing business operations and strategy. This also allows you to reprioritize in the event of an unexpected incident.
The board also concerns itself with emerging risks, including current and future threats, such asAI-driven attacks. When working with any vendor, there are supply chain risks, so having scenario planning and diversifying vendors is crucial. Cloud misconfigurations should also be addressed, and using the downtime associated with theAWS outage in October 2025 is a good reference for vendor concentration risk. Regulation compliance is another topic on the board's mind, with laws changing regularly, particularly with the advancement of AI.
The board of directors clearly understands that adding another facility comes with significant capital and operational expenses. For example, additional square footage comes with increased utility costs, property taxes, equipment and numerous other expenses. They even understand that there are costs associated with securing the property, including access-controlled doorways, CCTV cameras and possibly security guards. Why shouldn't cybersecurity costs be factored to increase as an organization grows its physical and digital footprint? Cybersecurity costs should be part of the value proposition, rather than a line item in the overall IT budget.
By integrating cybersecurity capabilities into the organization's OKRs or KPIs, there is increased visibility into the business value or ROI generated. Without effective cybersecurity controls, business services are vulnerable to failing to meet regulatory requirements, experiencing data breaches, or suffering outages. All of these may result in additional financial penalties and reputational damage, ultimately impacting the bottom line.
Finally, CIOs and CISOs who can articulate the value that cybersecurity brings to the business may find themselves steering the company on the risks and rewards of entering a particular business or offering. It is not enough to have a seat at the table to answer questions from the board of directors; effective cybersecurity leaders will have the influence and credibility to shape the company, and perhaps even an entire industry.
To summarize, here is a to-do list to consider when addressing the board with cybersecurity:
Learn more aboutcybersecurity and metrics for the board.
John Doan is the senior director of cybersecurity advisory and cybersecurity domain architect for a world-renowned healthcare organization.
Transform manually created AWS resources into manageable, automated infrastructure with CloudFormation's import resource with ...
In today's rapidly changing tech landscape, cloud strategy is more important than ever. This guide explores how to best use your ...
Cloud dominance intensifies as AWS, Microsoft and Google capture 63% of the $107B market. AWS leads at 29%, despite erosion, ...
Connectivity issues, misconfigured settings and human error can all cause mobile hotspot problems. IT must know how to avoid and ...
Tablet-based kiosks have become an increasingly popular tool for customer self-service. Organizations managing multiple kiosks ...
Antivirus protection is a built-in feature on most desktop computers, but what about mobile devices? Many smartphones need the ...
Decentralized data centers enhance scalability, reduce latency and improve data compliance, offering a strategic shift for ...
Data center admins should adopt a composable architecture to improve resource utilization, reduce costs and enhance AI workload ...
There are regulated requirements to maintain data center equipment and functionality. ISO 14644 cleanroom standards lay out ...
Here's an overview of 10 ESG reporting frameworks and standards that companies can use to file reports on their practices and ...
ESG initiatives can help boost business success. This guide takes an in-depth look at creating and managing an ESG strategy to ...
Regulatory shifts and tech advances are shaping business sustainability trends for 2026, including AI, climate risk, data centers...