While most organizations understand the value and necessity of risk oversight, banks boards face a pressure which is unique to most other industries. The worst-case scenario in failing to monitor and mitigate risk is always devastating, but unlike other organizations, banks are also burdened with their depositor’s financial well-being. Let’s take a closer look at how banks are handling their risk oversight and what they could be doing better.
Continue readingTag Archives: cyber security
A Cybersecurity Overview for University Board Members
“Cybersecurity” is the perfect buzzword. The amount of sensitive data vulnerable to hacking or phishing attempts grows by the day. The intricacy of methods used to compromise that data is increasing at a far faster rate than the development of effective countermeasures. High risk and high stakes have made the importance of the word abundantly clear. At the same time, addressing the issue of cybersecurity requires highly specialized knowledge. Thus, we get a buzzword; a word everyone knows they should be talking about, but no one knows what to say. Fully plumbing the depths of cybersecurity in a single blog article is a tall order. Instead, let’s keep it simple. We’re going to break down the need-to-knows of cybersecurity for university board members.
Continue readingCyber Security Becomes a Boardroom Priority

The Ponemon Institute found that, on average, each individual data loss costs a company approximately $154. Multiply that number by 83 million users, and JPMorgan Chase’s recent loss totaled in at around a staggering 12.78 billion dollars—and that’s just a rough estimate; the number is likely higher.
Obviously, these high-profile hacks and breaches have pushed cyber security to the forefront of board members’ concerns. According to PWC’s most recent Corporate Directors Survey, board members are becoming more engaged with IT strategy—namely cyber security risks.
The study states, “83% of directors describe themselves as at least ‘moderately’ engaged with overseeing the risk of cyber attacks.”
Continue reading