{"id":2279,"date":"2022-12-06T04:07:00","date_gmt":"2022-12-06T04:07:00","guid":{"rendered":"https:\/\/www.praxonomy.com\/blog\/?p=2279"},"modified":"2022-12-06T13:06:10","modified_gmt":"2022-12-06T13:06:10","slug":"why-cybersecurity-should-be-on-the-boards-esg-agenda","status":"publish","type":"post","link":"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/","title":{"rendered":"Why Cybersecurity Should be on the Board&#8217;s ESG Agenda"},"content":{"rendered":"\n<p>As the world increasingly goes digital, cybersecurity should be a key concern for any board of directors charged with overseeing a company\u2019s Environmental, Social, and Governance (ESG) agenda. The potential risks posed by cyberattacks are becoming more and more severe, and companies must take steps to protect themselves against these threats.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading_855369-0d, .wp-block-kadence-advancedheading.kt-adv-heading_855369-0d[data-kb-block=\"kb-adv-heading_855369-0d\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading_855369-0d mark, .wp-block-kadence-advancedheading.kt-adv-heading_855369-0d[data-kb-block=\"kb-adv-heading_855369-0d\"] mark{font-style:normal;color:#f76a0c;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<h2 class=\"kt-adv-heading_855369-0d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading_855369-0d\"><strong>DATA AS A \u201cCRITICAL INTANGIBLE ASSET\u201d<\/strong><\/h2>\n\n\n\n<p>This World Economic Forum (WEF) <a href=\"https:\/\/www.weforum.org\/agenda\/2022\/03\/three-reasons-why-cybersecurity-is-a-critical-component-of-esg\/\" target=\"_blank\" rel=\"noreferrer noopener\">article<\/a> states that intangible value, or the value of assets that are not physical in nature, now represents 90% of the asset value in organisations. Data, perhaps, has become the most critical intangible asset in determining the value of an organisation. As companies scale, this intangible asset grows as well. This increases the likelihood of cybersecurity breaches.<\/p>\n\n\n\n<p>Cybersecurity, therefore, ought to be a concern for boards. Organizations that take an ESG approach to cybersecurity can create a more holistic and effective risk management strategy, so that in the event of a breach, value is \u201cnot lost, or the loss is [at least] minimised.\u201d&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>REASONS WHY CYBERSECURITY SHOULD BE ON THE ESG AGENDA<\/strong><\/h2>\n\n\n\n<p>The connection between cybersecurity and ESG may not be obvious to many. In this section, we spell out how cybersecurity affects the individual elements of ESG and why it should concern boards as a significant trigger for risk exposure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Impact of Cybersecurity on the Environment<\/strong><\/h3>\n\n\n\n<p>Cyberattacks on equipment and monitoring systems in critical infrastructure, including power grids, hospitals, factories, and water systems may result in \u201c<a href=\"https:\/\/global.lockton.com\/gb\/en\/news-insights\/the-role-cyber-plays-in-the-boardrooms-esg-agenda\" target=\"_blank\" rel=\"noreferrer noopener\">spillage, waste discharge, fire, explosion, or release of hazardous materials.<\/a>\u201d&nbsp;<\/p>\n\n\n\n<p>For example, maritime activity relies on information and communication technology (ICT) to meet customer demand and ensure transportation safely. ICT, as explained in the above mentioned article, is used to deliver operations that include \u201cship propulsion, navigation, freight management, traffic control, maintenance and communications.\u201d A cyberattack on this industry can lead to disasters such as tanker accidents. One tanker incident can lead to the release of millions of gallons of crude oil into the ocean.<\/p>\n\n\n\n<p>There is the assumption that boards belonging to such critical industries understand their potential environmental impact should one thing or another go awry (such as remediation expenses, legal liabilities, claims, fines, reputational damage, and the potential loss of life). What needs to be highlighted here, however, is the identification of cyberrisk and threats as a possible trigger for environmental damage.&nbsp;<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading_906ee9-98, .wp-block-kadence-advancedheading.kt-adv-heading_906ee9-98[data-kb-block=\"kb-adv-heading_906ee9-98\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading_906ee9-98 mark, .wp-block-kadence-advancedheading.kt-adv-heading_906ee9-98[data-kb-block=\"kb-adv-heading_906ee9-98\"] mark{font-style:normal;color:#f76a0c;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<h3 class=\"kt-adv-heading_906ee9-98 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading_906ee9-98\"><strong>Impact of Cybersecurity on Society<\/strong><\/h3>\n\n\n\n<p>We highlighted data as quite possibly the most valuable intangible asset of companies. The companies who retain and manage large volumes of personal identifying information (PII) assume significant risk for cyberattacks. From election meddling to identity theft, the potential societal impact of weak cybersecurity measures is far-reaching.<\/p>\n\n\n\n<p>Cybercriminals are increasingly targeting healthcare data and institutions which impact the quality of care communities are able to receive. Healthcare data breaches hit an all-time high in 2021, <a href=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breaches-hit-all-time-high-2021-impacting-45m-people\" target=\"_blank\" rel=\"noreferrer noopener\">impacting 45 million people<\/a>. Criminals have also set their sights on utility industries. The recent <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password\" target=\"_blank\" rel=\"noreferrer noopener\">Colonial Pipeline attack in the US<\/a>, for instance, led to temporary income loss for the community, long lines at gas stations, and increased fuel prices.<\/p>\n\n\n\n<p>Consumers and institutions alike have adopted and shifted to digital transactions in recent years. Criminals have taken notice of the vulnerabilities this presents. In fact, in 2021, identity theft victims were <a href=\"https:\/\/www.idtheftcenter.org\/post\/identity-theft-resource-center-2021-annual-data-breach-report-sets-new-record-for-number-of-compromises\/\" target=\"_blank\" rel=\"noreferrer noopener\">up by over 23%<\/a> over the previous all-time high. Identity theft is a major inconvenience to individuals, companies, and industries. It disrupts lives.<\/p>\n\n\n\n<p>The Equifax (a credit agency) data breach is a good example of how costly cybersecurity lapses can be to organisations and its shareholders. Equifax lost the PII and financial data of almost 150 million individuals in 2017, exposing its users to the real risk of identity theft. As a result, Equifax had to pay a USD575 million settlement for the breach. Apart from regulatory fines, penalties and damage to its reputation, the company\u2019s bottomline took a significant hit. Shareholders were not spared from this.<\/p>\n\n\n\n<p>Cybersecurity is not just an IT issue \u2014 it is a societal one. Boards must understand the extent to which cybersecurity issues can affect their stakeholders and address the risks accordingly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Impact of Cybersecurity on Governance<\/strong><\/h3>\n\n\n\n<p>As stated, a company\u2019s ability to protect its data and intellectual property from cyberattacks can make or break its reputation and bottom line.<\/p>\n\n\n\n<p>Cyberattacks can have a serious impact on a company&#8217;s share price. In some cases, the stock price of a company can drop precipitously. This is especially true if the attack results in the loss of PII, compromises intellectual property, or disrupts operations.<\/p>\n\n\n\n<p>Equifax\u2019s stock price<a href=\"https:\/\/ca.finance.yahoo.com\/quote\/EFX\/history?period1=1504742400&amp;period2=1505952000&amp;interval=1d&amp;filter=history&amp;frequency=1d\" target=\"_blank\" rel=\"noreferrer noopener\"> plunged from $142.72 to $92.98 in just one week<\/a> in 2017. Its market share also dropped and struggled to recover.<\/p>\n\n\n\n<p>As an organisation\u2019s losses can rack up in the millions as a result of an attack, financial resources may need to be drawn from other areas of the business in order to cover the costs. This, again, impacts the bottomline and the reputation of the company. The reputational damage can be extensive: from loss of revenue to difficulties in talent acquisition.<\/p>\n\n\n\n<p>To close this section, boards need to be aware of the legal implications of cybersecurity breaches. In some cases, boards and top leaders of organisations may be held liable for the damages caused by a cyberattack.&nbsp;<\/p>\n\n\n\n<p>The SolarWinds\u2019 software breach, which gave hackers access to the data of thousands of companies and government offices that used the software, <a href=\"https:\/\/www.scmagazine.com\/analysis\/incident-response\/solarwinds-lawsuits-can-proceed-texas-judge-rules\" target=\"_blank\" rel=\"noreferrer noopener\">resulted in a suit against the company\u2019s top executives<\/a>. Investors alleged that the company\u2019s leaders failed to monitor cybersecurity risks ahead of the attack.<\/p>\n\n\n\n<p>While some organisations have availed of cyber-insurance to minimise risk and losses, insurers are increasingly narrowing the scope of coverage. This limits how much organisations can rely on it to mitigate risk.&nbsp;<\/p>\n\n\n\n<p>But it\u2019s important to emphasise what the WEF paper has stated: insurance is not a substitute for good governance.<\/p>\n\n\n\n<p>Instead, the reliance on a framework for identifying, measuring, analysing, and managing cyberrisk should be part of any organisation\u2019s ESG strategy and set the tone for effective governance.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading_59e722-c7, .wp-block-kadence-advancedheading.kt-adv-heading_59e722-c7[data-kb-block=\"kb-adv-heading_59e722-c7\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading_59e722-c7 mark, .wp-block-kadence-advancedheading.kt-adv-heading_59e722-c7[data-kb-block=\"kb-adv-heading_59e722-c7\"] mark{font-style:normal;color:#f76a0c;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<h2 class=\"kt-adv-heading_59e722-c7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading_59e722-c7\"><strong>How Boards Can Reduce ESG-related Cybersecurity Risk Exposure<\/strong><\/h2>\n\n\n\n<p>There is no silver bullet when it comes to cybersecurity, but boards can introduce these steps to ensure it reduces its ESG-related cybersecurity exposure:<\/p>\n\n\n\n<ol><li><strong>Give cybersecurity the attention it deserves. <\/strong>Regularly include the topic in the board\u2019s meeting agenda.&nbsp;<\/li><li><strong>Assess the company\u2019s risk profile and compare it to peers.<\/strong> Identify any gaps in the company\u2019s current cybersecurity posture and address them.<\/li><li><strong>Ensure adequate funding for cybersecurity initiatives \u2014 in the short and long-term<\/strong>. In the short term, boards should ensure there are enough resources to implement effective mitigation strategies. In the long term, they should plan for future investment in new technologies and personnel.<\/li><li><strong>Get the right people to address cybersecurity.<\/strong> From obtaining the services of a Chief Information Security Officer (CISO) to senior security experts, boards need to ensure they have access to the knowledgeable security personnel to help oversee the organisation\u2019s cybersecurity strategy. If possible, establish a subcommittee to oversee this.<\/li><li><strong>Stay informed.<\/strong> Boards should be briefed on cybersecurity risks and trends to provide them with an understanding of how these might impact the organisation\u2019s ESG and corporate strategy.<\/li><li><strong>Set clear expectations for management on what needs to be done to mitigate risks.<\/strong> Set strong achievable goals and timelines. Communicate ESG expectations to the management team so that everyone works towards the same goal. Review progress and hold leaders accountable for results.<\/li><li><strong>Incorporate cybersecurity into ESG reporting initiatives.<\/strong> This gives invaluable insights into the effectiveness of a company\u2019s cybersecurity program and allows boards to make better decisions about where to allocate present and future resources.<\/li><li><strong>Implement a strong data protection and governance strategy. <\/strong>Monitor the risks the company, stakeholders, and customers face around the use of data.<\/li><li><strong>Institute a security-oriented culture.<\/strong> Start from the top. From the adoption of secure board technologies such as <a href=\"http:\/\/www.praxonomy.com\/board-portal\" target=\"_blank\" rel=\"noreferrer noopener\">board portals<\/a> to implementing internal cybersecurity strategies, training, and controls, boards need to invest the time and resources to ensure employees, contractors, and suppliers understand the value it places on securing the organisation. This begins at the board level.&nbsp;<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CONCLUSION<\/strong><\/h2>\n\n\n\n<p>Investors are becoming increasingly interested in responsible investing. <\/p>\n\n\n\n<p>Seventy-two percent (72%) of global investors <a href=\"https:\/\/www.rbcgam.com\/en\/ca\/about-us\/responsible-investment\/our-latest-independent-research\" target=\"_blank\" rel=\"noreferrer noopener\">integrate ESG principles into their investment approach and decision-making<\/a>. Cybersecurity ranks as a Top 2 concern (second to anti-corruption) when it comes to ESG investing. It\u2019s reason enough to take ESG-related cybersecurity issues seriously.<\/p>\n\n\n\n<p>But more than that, cyberthreats have evolved to become a material sustainability risk. Good governance, especially at the boardroom level, is key. <\/p>\n\n\n\n<p>As the WEF article cited above states, organisations who fail to realise this will find themselves to be less resilient and less sustainable. Making cybersecurity an ESG priority can spell the difference between a successful future and a catastrophic mistake.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><a href=\"https:\/\/www.praxonomy.com\/company\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Speak to us<\/em><\/a> <em>about securing your board processes today.<\/em><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The trend towards responsible investing continues. Seventy-two percent (72%) of global investors integrate environmental, social, and governance (ESG) principles into their investment decision-making \u2014 with the area of cybersecurity as a Top 2 ESG investment concern. Read our latest article to find out why this is the case.<br \/>\n<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":10,"featured_media":2282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Cybersecurity Should be on the Board&#039;s ESG Agenda - Praxonomy Blog<\/title>\n<meta name=\"description\" content=\"Cybersecurity should be on the board&#039;s ESG agenda. It has far-reaching implications for the environment, society, and governance. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Praxonomy Blog: Why Cybersecurity Should Be on the Board&#039;s ESG Agenda\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity should be on the board&#039;s ESG agenda. It has far-reaching implications for the environment, society, and governance. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/\" \/>\n<meta property=\"og:site_name\" content=\"The Boardlogic Blog | News, Updates, Industry Insights and Best Practices.\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-06T04:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-06T13:06:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2022\/09\/Why-Cybersecurity-Should-Be-on-the-Boards-ESG-Agenda.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1254\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Praxonomy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Praxonomy Blog: Why Cybersecurity Should Be on the Board&#039;s ESG Agenda\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2022\/09\/Why-Cybersecurity-Should-Be-on-the-Boards-ESG-Agenda.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Praxonomy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/\",\"url\":\"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/\",\"name\":\"Why Cybersecurity Should be on the Board's ESG Agenda - Praxonomy Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#website\"},\"datePublished\":\"2022-12-06T04:07:00+00:00\",\"dateModified\":\"2022-12-06T13:06:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/f47bd3572a228e962b0cdeb97fc80ad0\"},\"description\":\"Cybersecurity should be on the board's ESG agenda. It has far-reaching implications for the environment, society, and governance. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.praxonomy.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Cybersecurity Should be on the Board&#8217;s ESG Agenda\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#website\",\"url\":\"https:\/\/www.praxonomy.com\/blog\/\",\"name\":\"The Boardlogic Blog | News, Updates, Industry Insights and Best Practices.\",\"description\":\"The official blog for news, updates, industry insights and best practices from Boardlogic by Formidium \u2014 board meeting management software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.praxonomy.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/f47bd3572a228e962b0cdeb97fc80ad0\",\"name\":\"Praxonomy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/007a118efb09e3772832a512b1b52fde?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/007a118efb09e3772832a512b1b52fde?s=96&d=mm&r=g\",\"caption\":\"Praxonomy\"},\"url\":\"https:\/\/www.praxonomy.com\/blog\/author\/praxonomy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Cybersecurity Should be on the Board's ESG Agenda - Praxonomy Blog","description":"Cybersecurity should be on the board's ESG agenda. It has far-reaching implications for the environment, society, and governance. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/","og_locale":"en_GB","og_type":"article","og_title":"Praxonomy Blog: Why Cybersecurity Should Be on the Board's ESG Agenda","og_description":"Cybersecurity should be on the board's ESG agenda. It has far-reaching implications for the environment, society, and governance. Learn more.","og_url":"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/","og_site_name":"The Boardlogic Blog | News, Updates, Industry Insights and Best Practices.","article_published_time":"2022-12-06T04:07:00+00:00","article_modified_time":"2022-12-06T13:06:10+00:00","og_image":[{"width":2400,"height":1254,"url":"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2022\/09\/Why-Cybersecurity-Should-Be-on-the-Boards-ESG-Agenda.png","type":"image\/png"}],"author":"Praxonomy","twitter_card":"summary_large_image","twitter_title":"Praxonomy Blog: Why Cybersecurity Should Be on the Board's ESG Agenda","twitter_image":"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2022\/09\/Why-Cybersecurity-Should-Be-on-the-Boards-ESG-Agenda.png","twitter_misc":{"Written by":"Praxonomy","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/","url":"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/","name":"Why Cybersecurity Should be on the Board's ESG Agenda - Praxonomy Blog","isPartOf":{"@id":"https:\/\/www.praxonomy.com\/blog\/#website"},"datePublished":"2022-12-06T04:07:00+00:00","dateModified":"2022-12-06T13:06:10+00:00","author":{"@id":"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/f47bd3572a228e962b0cdeb97fc80ad0"},"description":"Cybersecurity should be on the board's ESG agenda. It has far-reaching implications for the environment, society, and governance. Learn more.","breadcrumb":{"@id":"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.praxonomy.com\/blog\/why-cybersecurity-should-be-on-the-boards-esg-agenda\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.praxonomy.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Cybersecurity Should be on the Board&#8217;s ESG Agenda"}]},{"@type":"WebSite","@id":"https:\/\/www.praxonomy.com\/blog\/#website","url":"https:\/\/www.praxonomy.com\/blog\/","name":"The Boardlogic Blog | News, Updates, Industry Insights and Best Practices.","description":"The official blog for news, updates, industry insights and best practices from Boardlogic by Formidium \u2014 board meeting management software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.praxonomy.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/f47bd3572a228e962b0cdeb97fc80ad0","name":"Praxonomy","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/007a118efb09e3772832a512b1b52fde?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/007a118efb09e3772832a512b1b52fde?s=96&d=mm&r=g","caption":"Praxonomy"},"url":"https:\/\/www.praxonomy.com\/blog\/author\/praxonomy\/"}]}},"modified_by":"Carissa Duenas","_links":{"self":[{"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/posts\/2279"}],"collection":[{"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/comments?post=2279"}],"version-history":[{"count":11,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/posts\/2279\/revisions"}],"predecessor-version":[{"id":2404,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/posts\/2279\/revisions\/2404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/media\/2282"}],"wp:attachment":[{"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/media?parent=2279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/categories?post=2279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/tags?post=2279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}