Corporate Governance: Cyber Security and Resilience Policy Report

Verified

Added on  2023/06/08

|13
|3257
|307
Report
AI Summary
This report provides a comprehensive analysis of corporate governance and cyber security for a company listed on the Australian Stock Exchange. The report begins with an introduction to the challenges of cyber risk management and resilience, particularly for ICT-based organizations. It then provides a brief summary of the case study, followed by a critical analysis of the existing security system, highlighting the importance of employee training and up-to-date technology. The report justifies the integration of cyber security and resilience protocols, emphasizing the need for board-level cyber resilience tools. It outlines best practices for initiating a resilience policy, including board principles, cyber principal toolkits, and a cyber risk framework. The report concludes with recommendations for enhancing the company's cyber security posture, ensuring the protection of sensitive data and mitigating potential risks. The report also emphasizes the need for a strategic approach to cyber security, rather than just a reactive one.
Document Page
Running head: CORPORATE GOVERNANCE
Corporate Governance
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CORPORATE GOVERNANCE
Table of Contents
Introduction......................................................................................................................................3
Brief Summary of the Case Study...............................................................................................3
Critical Analysis of the security system existing in the company...............................................4
Justification for the integration of cyber security and resilience protocol in the company.........6
Best practices for initiating the resilience policy.........................................................................7
Recommendation.............................................................................................................................9
Conclusion.......................................................................................................................................9
References......................................................................................................................................11
Document Page
2CORPORATE GOVERNANCE
Introduction
In most of the organizations today, especially the ones that follow the Information and
Communication Technology or ICT based environment for their business organization, it
becomes a pretty difficult task to handle the critical challenges that are there in the Cyber Risk
Management and Resilience. In these kinds of organization, there is constant risk about the
security of data and thus becomes an even bigger challenge to implement a risk assessment and
management procedure to handle all the risks that the company faces from the cyber world
(Tricker and Tricker 2015). A company listed on the Australian Stock Exchange would be at a
higher risk, since the company deals with all the financial information about the customers of the
organization. Any security breach and compromise of data would not just be harmful for the
business organization but would also be perilous for the customers of the organization since this
would mean handing over random financial information to the malicious attackers over cyber
world. Thus, the following report would be based on the security system of a company listed on
the Australian Stock Exchange and its critical analysis on the basis of the best practices for
initiating a resilience policy in the organization as a positive change.
Brief Summary of the Case Study
The organization as mentioned in the case study is as listed in the Australian Stock
Exchange. Therefore, this means that the organization handles a lot of personal details of their
clients other than the data related to the business. For example, if it is assumed that the
organization belongs to a real estate business, it would have all the personal details of a client,
including their contact information and financial data (Duncan, Zhao and Whittington 2017).
Document Page
3CORPORATE GOVERNANCE
Thus, there has to be a strict security policy and system maintained in the organization that
would imply upon the organization’s business process and operations management. As a
consultant for the business organization it is the duty of the consultant to check for the security
systems and policies that are applicable in the organization.
Thus, it can be stated that the organization works on an existing security system that runs
within the organization to protect the integrity of the employee data and the client data as well. It
is required for the consultant in the organization to produce a clear critical analysis of the
security system and provide new cyber resilience for the company’s well being and which
compensates the company’s appetite as well (Tagarev, Sharkov and Stoianov 2017). This is
because; with the emerging technologies and advancement of the technological era, there is also
ways by which the malicious attackers can defy the existing security systems and carry on with
their malicious works even with the ways to stop them. Thus, there would be a cyber resilience
proposition advised by the consultant for the sake of enhancing the security system of the
organization.
Critical Analysis of the security system existing in the company
The organization in the case study is included in the Australian stock exchange top 200
companies. Therefore it is quite justify that it goes to such a system that provides security to the
company regarding the employee and customer data (Trim and Lee 2016). However it is not to
be neglected as a matter of fact that Bose and managers of Enfield to acknowledge an impending
the risk that may have been preventable but somewhat due to poor handling of the security
system it may result into something bigger. For example we have seen that the breach of
customer data that occurred in Equifax had the company at a loss of almost 1.5 billion USD
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CORPORATE GOVERNANCE
including the hacking of customer data consisting of personal and contact information of the
organization (Avant, Kahler and Pielemeier 2017). Therefore it can be pointed out that it is not
just the security system that needs to be up to date with the latest technological advancements but
also the employees who work in the organization need to be up to date about the handling of the
systems. In this case as well it is identified that there has been no security policy for handling the
security systems in the business organization. It had no lack in its implementation of security
system what the employees have no idea on how to secure the entire organization system so that
it may not form a problem in the near future. However the security system is up to date
according to the technological advancements it can be said that on the part of the employees
there have been some cases of mishandling the security system that have resulted into minor
problems in handling of information and data regarding the customers and the employees.
Therefore after the critical analysis of the security system in the entire organization it can
be said that it is a positive point that the company is advanced enough to implement state of the
art facilities for its security system but they also need to find a way to make the employees in the
organization handle them as well so that there should be no mishandling of data and no
possibility of malicious attack cause hacking into the system in the near future (Deschaux-Dutard
2016). It is found that the organization is focusing more on the security system rather than
applying and strategic early to the entire organization to make sure that it is impermeable to any
malicious attacker in the cyber world. It is often found that the entire organization had been
putting up a very strong system but the handling of data or the storing processing and capturing
of important employee and customer information is not established as a strategy clearly to the
workforce (North and Pascoe 2016). The ignorance in handling intricate and confidential data
Document Page
5CORPORATE GOVERNANCE
would make a company vulnerable to any external malicious attack from the cyber world even if
the organization processes state of the art security system in the business organization process.
Justification for the integration of cyber security and resilience protocol in the
company
There has been a huge demand for the board level cyber resilience tool simply because
the challenges that cyber security and cyber resilience implement on an organization have found
to be seemingly novel. This is why it is often found that the people at the cream of the hierarchy
levels of an organization especially the senior executive and the other Board members are
continuously demanding the board level cyber resilience tools (Choras et al. 2015). The world
economic forum offers these tools simply for the Governance of strategy in a business
organization instead of having a set standard or tactics for a business management. Since boards
function a vital governance characteristics for an organization in determines the behaviour of the
entire company and it sets the risk appetite for a company as well. The world economic forum
have found several misconceptions in the frame Works from the perspectives of the board of
directors and this has been well notice in business scholarships (Rashid, Joosen and Foley 2016).
The cyber resilience Technologies and strategies bridges the gap by conducting an interview for
the board of the directors across several industries and continents and only due to that it has been
found that the security risks in every organization has been increasing at an exponential rate due
to the technological advancements and thus the cyber resilience to learn essentially needed to
govern the security system existing in the business process of and ICT based organization or an
organization listed under the top 200 organizations of the Australian stock exchange (Sandberg,
Amin and Johansson 2015).
Document Page
6CORPORATE GOVERNANCE
Nowadays it is considered that the existing security systems installed in an organization
of such a huge impact has been insufficient to meet the challenges of the digitisation of the latest
era of Cyber world (Harrop and Matteson 2015). It is important that an organization go for extra
protection but it should also develop strategies to make sure that the networks used in the
organization and durable enough and they are able to extract the advantages and opportunities of
the world of digitisation when it is implied (Cavelty, Kaufmann and Kristensen 2015). Cyber
security has much broader definition but cyber security and strategic cyber security system has
huge difference. Cyber resilience evokes the long-term thinking in the strategic system for a
business organization for its data and information security and thus resonance should we
dependent on conversations rather than implementing them on an individual organization.
Best practices for initiating the resilience policy
Regarding the best practices for initiating the residence policy in the organization,
following would be a structured list for the highly esteemed organization as described in the case
study as advised by the consultant:
Board principles for Cyber resilience: it had been found in the analysis above
by the consultant that even though the organization has a huge state of the art
Security System enabled in the organization for securing the intricate and
confidential employee and customer data there is a lack of common sense in the
entire work force in handling the security system (Shafqat and Masood 2016). It
can also be found that there is a haphazard way of maintaining the system used
for security of data in the organization and it has not been up to date with the
latest technological advancement does falling short of hacking vulnerabilities.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CORPORATE GOVERNANCE
Therefore would principles for Cyber resilience is a set frame work consisting of
10 principle that reduces the supervisory cyber risk that the Bose have developed
in the recent years raising high awareness (Roege et al. 2017). This Framework
consisting of the ten principles enables board action that helps in the recognition
of pivotal roles within a board.
Cyber principal tool kits: The framework of the 10 principles to enable the
board members in recognising their pivotal role in handling the security system in
the organization for Cyber resilience is now supported with a set of questions that
fosters the constructive dialogue that happens between a senior management and
the board (Pate-Cornell and Rouse 2016). This conversation is mainly generated
due to the topic regarding the maintenance of the dignity of the cyber security
system in the organization and implementation of Cyber resilience (North and
Pascoe 2016). The questionnaire will does help the boat in understanding and
performing their role for overseeing the handling of security system.
Board cyber risk framework: this Framework suggest that the boat should
review the risk that the organization faces in the cyber world time to time on a
regular basis to ensure that the entire cyber system is integrated and review of
other business risks are easily available (Knowles et al. 2015). This Framework
helps in the handling of cyber security program as a whole and provides the
information based on risk management prioritising actions that occurs within the
cyber resilience program.
Insights on the emerging Technology risks: the cyber resilience policy that is
handed over with the help of this document has asset guideline and insights that
Document Page
8CORPORATE GOVERNANCE
can be applied to any organization who is under the process of shifting the
business model for the latest innovations in the technological world (Musman
2016). Since the company in the case study already has such change implemented
in the business process before the insides and the guidelines would more
specifically facilitate the discussion in between the stakeholders of the board level
with the executive teams which would rather help them devices strategy to make
the entire work force work as a single unit and in an intelligent way to handle the
security system with respect to the technological advancements that happen in the
cyber world.
Recommendation
Thus, it is recommended that the corporate governance structure as implemented by the
consultant to the organization in the case study should follow the cyber resilience policy to make
an effective way of handling the employee and customer data with the use of the existing cyber
security system even though the technological advancements of the cyber world keeps on or
crying at an exponential level. Applying cyber resilience policies in an organisation would only
help them handle their business process as well as the security system in the organisation in a
structured way for the board members to effectively make a decision out of the meeting with the
executives for devising a successful plan or implementing a strategy to handle the technological
change in the cyber world with respect do the security system that exist in the organisation.
Conclusion
Document Page
9CORPORATE GOVERNANCE
From the above report, it can be concluded that the Australian Organization listed in the
country’s Stock Exchange had an effective security system but with the advancement of
technology and the greater loopholes detected during the process of advancements, there was a
need to implement a better and improved security system for the organization. This had been
done by a consultant who proposed effective ways by which a resilience policy can be
implemented within the organization on the basis of the existing security system and its
vulnerabilities. This had been done because a company listed on the Australian Stock Exchange
is always at a higher risk, since the company deals with all the financial information about the
customers of the organization. Any security breach and compromise of data would not just be
harmful for the business organization but would also be perilous for the customers of the
organization since this would mean handing over random financial information to the malicious
attackers over cyber world. Thus, the following report was based on the security system of a
company listed on the Australian Stock Exchange and its critical analysis on the basis of the best
practices for initiating a resilience policy in the organization as a positive change.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10CORPORATE GOVERNANCE
References
Tricker, R.B. and Tricker, R.I., 2015. Corporate governance: Principles, policies, and practices.
Oxford University Press, USA.
North, J. and Pascoe, R., 2016. Cyber security and resilience It's all about
governance. Governance Directions, 68(3), p.146.
Trim, P. and Lee, Y.I., 2016. Cyber security management: a governance, risk and compliance
framework. Routledge.
Deschaux-Dutard, D., 2016. Cyber security in the European Union: resilience and adaptability in
governance policy. By George Christou.
Avant, D., Kahler, M. and Pielemeier, J., 2017. Innovations in Global Governance: How
Resilient, How Influential?. Innovations in Global Governance, p.1.
Choras, M., Kozik, R., Bruna, M.P.T., Yautsiukhin, A., Churchill, A., Maciejewska, I., Eguinoa,
I. and Jomni, A., 2015, August. Comprehensive approach to increase cyber security and
resilience. In Availability, Reliability and Security (ARES), 2015 10th International Conference
on (pp. 686-692). IEEE.
Roege, P.E., Collier, Z.A., Chevardin, V., Chouinard, P., Florin, M.V., Lambert, J.H., Nielsen,
K., Nogal, M. and Todorovic, B., 2017. Bridging the gap from cyber security to resilience.
In Resilience and Risk (pp. 383-414). Springer, Dordrecht.
Rashid, A., Joosen, W. and Foley, S., 2016. Security and resilience of cyber-physical
infrastructures: Proceedings of the First International Workshop held on 06 April 2016 in
Document Page
11CORPORATE GOVERNANCE
conjunction with the International Symposium on Engineering Secure Software and Systems,
London, UK.
Tagarev, T., Sharkov, G. and Stoianov, N., 2017. Cyber Security and Resilience of Modern
Societies: A Research Management Architecture. Information & Security, 38, pp.93-108.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Sandberg, H., Amin, S. and Johansson, K.H., 2015. Cyberphysical security in networked control
systems: An introduction to the issue. IEEE Control Systems, 35(1), pp.20-23.
Harrop, W. and Matteson, A., 2015. Cyber resilience: A review of critical national infrastructure
and cyber-security protection measures applied in the UK and USA. In Current and Emerging
Trends in Cyber Operations (pp. 149-166). Palgrave Macmillan, London.
North, J. and Pascoe, R., 2016. Cyber security and resilience It's all about
governance. Governance Directions, 68(3), p.146.
Dunn Cavelty, M., Kaufmann, M. and Søby Kristensen, K., 2015. Resilience and (in) security:
Practices, subjects, temporalities. Security Dialogue, 46(1), pp.3-14.
Shafqat, N. and Masood, A., 2016. Comparative analysis of various national cyber security
strategies. International Journal of Computer Science and Information Security, 14(1), p.129.
Pate-Cornell, E. and Rouse, W.B., 2016. Perspectives on Complex Global Challenges:
Education, Energy, Healthcare, Security, and Resilience (Vol. 1). John Wiley & Sons.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]