Boardroom Tool
The Board’s Role in Ransomware Preparedness and Response
Structure oversight of ransomware preparedness and response, by focusing on risk governance, scenario planning, and decision-making under pressure.
Boardroom Tool
Overseeing Insider Threats and Human Risk Management
This tool, featured in the fifth edition of the NACD-ISA Director's Handbook on Cyber-Risk Oversight, defines insider threat, outlines categories of insider incidents, and types of insider threat actors. Further, it outlines the board’s responsibilities with specific actions they can perform to ensure executive management is adequately addressing insider threats.
Human risks and insider threats represent a significant yet often underestimated cyber risk to organizations. As more work has shifted to remote locations following the COVID-19 pandemic, the prospect of insider compromise has increased. While external cyber-attacks often dominate headlines and governance discussions, insider cyber threats can be equally, if not more, damaging because insiders have access to and knowledge of internal systems and processes. Insider threat incidents are also not always malicious but can arise from negligence or intentional bypassing security policies where, for example, they cause too much friction in employees’ workflows.
Precisely because the delivery system for this threat involves leveraging the legitimate access of “trusted insiders” (employees, contractors, vendors, and others) to an organization’s network, systems, and data, it can be harder to detect than other threats in which the forensic indicators of compromise are more immediate and obvious. Further, as agentic AI systems are introduced into corporate workflows and systems, management and oversight of this risk area must evolve.
CISA defines an insider threat as the potential for an individual or individuals with authorized access or understanding of an organization to harm that organization. This harm can include malicious, complacent, or unintentional acts that negatively affect the integrity, confidentiality, and availability of the organization, its data, personnel, or facilities.
As with other forms of unauthorized breaches, insider threat incidents involve unauthorized access to an organization’s assets or causing harm to an organization for the following purposes
Insider attacks are generally carried out through the following types of actors
There are certain warning signs companies can watch for to identify an insider threat, including
The board plays a crucial role in the organization’s management of insider risk, ensuring that oversight policies and procedures are in place to protect organizational assets against potential threats. These include understanding the risks, implementing robust controls, fostering a culture of cybersecurity awareness, continuous improvement of the program, and establishing reporting and communication protocols.
The board should have a clear understanding of the organization’s human risks and insider threat landscape, including the types of risks, vulnerabilities, and potential impacts.
The committee responsible for cyber-risk oversight should ensure management addresses insider risks, such as ensuring the implementation of access controls, data protection measures, and other security controls to prevent and detect insider threats.
The annual assessment should detail the full range of security controls and data protection measures focused on preventing insider breaches, complete with metrics regarding relevant detections, events, incidents, and interventions.
Ensure strong policies and procedures are in place to guide and incentivize employee behavior to prevent insider threats.
The board should promote a culture of cybersecurity vigilance and awareness and ensure management embodies and communicates this throughout the organization.
The board should review and oversee whether the organization’s human and insider risk-management program keeps pace with evolving threats and vulnerabilities.
Boards should monitor whether management is effectively applying lessons learned from past insider threat incidents, and the program demonstrates improvement over time.
Toolkit For Action
Fifteen specialized tools with best practices that enable boards to address common, board-level cyber-risk oversight issues.
Final Days to Save $1,500
on NACD Directors Summit™
2026 Registration
Register by Thursday, April 30 to take advantage of this exclusive discounted pricing.
October 11-14, 2026
The Gaylord National Harbor | Washington, DC Area