Boardroom Tool
The Board’s Role in Ransomware Preparedness and Response
Structure oversight of ransomware preparedness and response, by focusing on risk governance, scenario planning, and decision-making under pressure.
Boardroom Tool
Example Cybersecurity Board Reporting
This tool, featured in the fifth edition of the NACD-ISA Director's Handbook on Cyber-Risk Oversight, provides examples of foundational practices and metrics boards may leverage to determine the soundness of cyber-risk oversight during regularly scheduled cybersecurity briefings. It provides suggested cyber risk-related questions for board members to discuss with senior management.
Cyber-risk oversight is a set of activities designed to ensure that realized risks are kept within tolerable levels and do not endanger the operational resilience of the corporation. The board’s role is to challenge management to identify the right balance between effort/expense and outcomes with the understanding that it is constantly moving and changing.
It’s important to remember that cyber risk cannot be managed to zero risk. High-performing boards understand this fact and strive to reduce the likelihood and severity of disruptive cyber events, rather than eliminate them entirely. Focusing on the “critical few” issues aligned with strategic business objectives improves clarity of analysis and aids decision-making.
Boards want a clear view of risk, readiness, and response. Report types can include
| Report Type | Trigger | Format | Objective |
| Cyber-Risk Brief (standing agenda item) |
Every board meeting | Two-page executive memo + dashboard | Trend analysis, resource needs |
| Material-Incident Update | Within 24 hours of the determination of materiality (aligns with SEC Item 106) | One-page incident sheet + follow-up call | Facts, impact, containment, disclosure steps |
| Deep-Dive Session | Quarterly | Thirty-minute workshop | Strategy, emerging threats, and budget alignment |
Heat-map of top five enterprise risks (likelihood vs. Impact) mapped to business objectives. If possible, quantify their business impact on these objectives and include scenarios.
Industry standard metrics used to assess due care and due diligence in the effectiveness and management of cyber-risk controls. Boards should track these metrics and their trends over time to assess performance.
| Category | Example Metrics (Target) | Why It Matters |
| Exposure | Percent critical assets with Multi-Factor Authentication (MFA) (> 98%) | Attack-surface reduction |
| Resilience | Mean time-to-detect (MTTD) and mean time-to-recover (MTTR) | Operational continuity |
| Hygiene | Critical vulnerabilities > 30 days old (< 5%) | Patch discipline |
| Third Party | Vendors with cybersecurity SLAs (> 90%) Vendors with current SOC 2 Type2 (> 90%) |
Supply-chain assurance |
| Culture | Phish click rate (< 2%) | Human firewall strength |
| Data Security | Percent of sensitive data (PII/PHI/financial) classified and inventoried (> 95%) Percent of third-party data processors with current security assessments (> 90%) |
Visibility drives down risk Third-party data-flow risk management |
For each incident ≥ “Medium” severity or above a defined expected impact threshold:
Introduction of emerging threats to the business, potential impact and risks, and proposed actions to address anticipated risks (with timelines and associated metrics)
This tool, featured in the fifth edition of the NACD-ISA Director's Handbook on Cyber-Risk Oversight, provides examples of foundational practices and metrics boards may leverage to determine the soundness of cyber-risk oversight during regularly scheduled cybersecurity briefings. It provides suggested cyber risk-related questions for board members to discuss with senior management.
Cyber-risk oversight is a set of activities designed to ensure that realized risks are kept within tolerable levels and do not endanger the operational resilience of the corporation. The board’s role is to challenge management to identify the right balance between effort/expense and outcomes with the understanding that it is constantly moving and changing.
It’s important to remember that cyber risk cannot be managed to zero risk. High-performing boards understand this fact and strive to reduce the likelihood and severity of disruptive cyber events, rather than eliminate them entirely. Focusing on the “critical few” issues aligned with strategic business objectives improves clarity of analysis and aids decision-making.
Boards want a clear view of risk, readiness, and response. Report types can include
Heat-map of top five enterprise risks (likelihood vs. Impact) mapped to business objectives. If possible, quantify their business impact on these objectives and include scenarios.
Industry standard metrics used to assess due care and due diligence in the effectiveness and management of cyber-risk controls. Boards should track these metrics and their trends over time to assess performance.
For each incident ≥ “Medium” severity or above a defined expected impact threshold:
Introduction of emerging threats to the business, potential impact and risks, and proposed actions to address anticipated risks (with timelines and associated metrics)
Toolkit For Action
Fifteen specialized tools with best practices that enable boards to address common, board-level cyber-risk oversight issues.
Final Days to Save $1,500
on NACD Directors Summit™
2026 Registration
Register by Thursday, April 30 to take advantage of this exclusive discounted pricing.
October 11-14, 2026
The Gaylord National Harbor | Washington, DC Area