{"id":63,"date":"2020-02-18T09:00:09","date_gmt":"2020-02-18T01:00:09","guid":{"rendered":"https:\/\/www.praxonomy.com\/blog\/?p=63"},"modified":"2023-04-26T21:05:32","modified_gmt":"2023-04-26T20:05:32","slug":"book-review-a-leaders-guide-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/","title":{"rendered":"Book Review: A Leader&#8217;s Guide To Cybersecurity"},"content":{"rendered":"\n<h2 style=\"text-align: center;\">A Leader&#8217;s Guide to Cybersecurity \u2013 Why Boards Need to Lead \u2013 And How To Do It<\/h2>\n<p class=\"ListHeading\" style=\"text-align: center;\"><em>By Thomas J. Parenty and Jack J. Domet<\/em><\/p>\n<p style=\"line-height: 1; text-align: center; font-size: 14px;\">Harvard Business Review Press | ISBN: 9781633697997 | 240 pages (Hardcover)<\/p>\n<p style=\"line-height: 1; text-align: center; font-size: 14px;\">&nbsp;<\/p>\n<p style=\"line-height: 1; text-align: center; font-size: 14px;\"><img decoding=\"async\" src=\"https:\/\/info.praxonomy.com\/hubfs\/leaders-guide-to-cybersecurity-v2.png\" alt=\"leaders-guide-to-cybersecurity-v2\" style=\"width: 600px; margin: 0px auto;\" width=\"600\"><\/p>\n<p>&nbsp;<\/p>\n<p>It&#8217;s a good book, a very good book in fact. Parenty and Domet know what they&#8217;re talking about and have strong views on how any board member can step up and do the right thing. This book is well worth the read, whether you&#8217;re a board member or not.&nbsp;<\/p>\n<h3>Duty of care<\/h3>\n<p>Though they make the point in diplomatic language, the authors assert, up front and unequivocally, that company directors are responsible for cybersecurity; the logic being that boards are responsible for their organizations&#8217; overall approach to risk and that technology vulnerabilities comprise a big and growing part of corporate risk.<\/p>\n<p>Thus, your responsibilities as a director cannot be ignored, deferred or delegated. It&#8217;s on you, now and in the future.<\/p>\n<p>If you tell yourself that you can rely on the good work and recommendations of your IT staff and call it job done, then you are derelict in your duty as a director. If you decide to rely only or mostly on third-party tests, audits and certifications, then you are derelict. If you think that you can buy security by outsourcing key decisions to consultants or suppliers, then you are derelict. In short, if you think that you, as a board member, do not carry key, personal and ongoing responsibility for leadership in the cybersecurity of your company, then you need to think again.<\/p>\n<h3>It&#8217;s about the framing<\/h3>\n<p>Some directors believe that cybersecurity is an information technology issue best left to experts. This is not surprising given that most board members are not IT security practitioners, computer system administrators or the like. They don&#8217;t speak the language. They are not necessarily up to date on technical standards, hardware and software options, the latest news or industry best practices. Feeling out of their depth, some directors decide to leave it to the executive team or other board members to deal with company IT security policies and procedures.<\/p>\n<p>This, the book says, is a mistake. Cybersecurity is not about IT issues per se. It&#8217;s about risk, specifically the risk of interruptions to and failures of critical business functions. For example, Company X may have thorough and well documented back-up procedures but unless those procedures are regularly tried and tested, nobody knows how well they will stand up in an emergency. It&#8217;s the board&#8217;s job to ask, to see that meaningful tests are carried out and to make sure that lessons learned are incorporated into company operations.<\/p>\n<p>This kind of oversight brings immediate and powerful benefits. Companies whose back-up systems work well cannot be so easily brought to their knees by ransomware or related attacks, not to mention by the inevitable employee mistakes and equipment failures that all companies suffer at one time or another.<\/p>\n<h3>Tell me a story<\/h3>\n<p>Useful framing for board-level oversight often takes the form of narrative. The first step is to list the company&#8217;s critical business functions. Then the board needs to start thinking about what might go wrong and who or what might be in position to make those things go wrong.<\/p>\n<p>These steps are followed by thinking through \u201cWhat if?\u201d and \u201cWhat next?\u201d scenarios. If a critical business function goes down, what are the consequences? the company&#8217;s responses? the possible costs? the timelines? the worst case? the communications process? \u2014 and more.<\/p>\n<p>In the end, the board should be building collections of cybersecurity stories \u2014 each a fully developed narrative with a beginning, middle and end, a list of characters, their profiles and motives, plot and context, along with discussions and plans for corrective and preventive actions and policies.&nbsp;<\/p>\n<p>The process is not unlike what happens when a team of writers sits down together to create scripts for a television series; they conceptualize the set-up and start writing episodes.&nbsp;<\/p>\n<p>Not every story has to be written at once. Neither do the board&#8217;s first attempts have to capture every possible consequence of a mishap to a critical business function. The point is to get started.<\/p>\n<h3>Aides-m\u00e9moire<\/h3>\n<p>The book, which shines when it comes to practical advice, includes tables, guides and plenty of war stories to focus the mind and point the way. It is clear that the authors&#8217; simple, practical advice is born of decades of work in the field. The result is an extended how-to, a handbook that manages to be both readable and easy to put to immediate use.&nbsp;<\/p>\n<p>This is not a small accomplishment. 30 years ago IBM adopted a process called Component Failure Impact Analysis (CFIA), a framework that takes a hard look at the various parts of IT systems in which a single component failure might disrupt or destroy, well, everything.<\/p>\n<p>IT project leaders still use CFIA methodology to assess the consequences of component failures and devise possible mitigations. But CFIA is not for everybody. It\u2019s hard technical work.<\/p>\n<p>CFIA provides tools for engineers to analyse IT systems while the book helps boards look at key and core business functions. Both methodologies look to assess the potential impact if and when an underlying process is disrupted, by a cyber-attack for example, and then think through what could be done to prevent or recover from the damage.<\/p>\n<p>In short, the book achieves its aims by explaining, in simple, non-technical terms, how boards can go about assessing their own critical business function vulnerabilities and then build plans to protect those functions from failure and attack while creating a resilient, forward-looking corporate culture.&nbsp;<\/p>\n<p>It&#8217;s not that the authors have invented something entirely new but rather that they have distilled industry best practices and the lessons from their own hard-won experience into a useful primer for the non-technical board member. It\u2019s impressive work.&nbsp;<\/p>\n<h3>Beyond the book<\/h3>\n<p>Board members have cybersecurity responsibilities that go beyond the core business functions of the company.&nbsp;<\/p>\n<p>In many cases boards themselves need better IT support. In fact, there is an argument for putting board work and communications on entirely separate, high-security systems. This would help shield the board from the risk of both external and internal breaches and allow the board to keep working even when the company\u2019s own systems have been compromised.<\/p>\n<p>A board member\u2019s personal digital hygiene can usually benefit from an upgrade or two (or three). It is not difficult to start taking basic precautions. Every board member should do so.<\/p>\n<p>There is also a case for top-level leadership in regard to increasing stakeholder data protection in the company itself along with an opportunity for public advocacy of better data protection rights in the broader community, both on a personal and full-board basis.&nbsp;&nbsp;<\/p>\n<p>The list goes on but core company cybersecurity is a great place to start, arguably the best place to start, and this book is a great first step on the journey.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/info.praxonomy.com\/cs\/c\/?cta_guid=3caa0af8-597e-4f6c-a6ed-d98078805c90&amp;signature=AAH58kGAT1YFZ3HpNbpq9provMG2SoKVtg&amp;pageId=25705120480&amp;placement_guid=b6323230-23c9-46f3-bb7c-3ffb6a498ee6&amp;click=0a1327a8-4928-430f-b841-6425816f2d67&amp;hsutk=1f762149464a60a1e04458d77f43d317&amp;canon=https%3A%2F%2Finfo.praxonomy.com%2Fblog%2Fbook-review-a-leaders-guide-to-cybersecurity&amp;utm_referrer=https%3A%2F%2Finfo.praxonomy.com%2Fblog&amp;portal_id=4127993&amp;redirect_url=APefjpF6zMCgKz_3sMqjpxx7KppS24_Vb7QUf653yqkIROdfAt7Rb2w5-wV-1MpXR8VRhUvOGuMBBjQ1t0jzPznne3KhZykg9JDuhzm3x2WZv5LFP2CnJXUob2a72qYgC_AssNNRw7ibUYEco7Ya9dMbXawBCrLtW2n2HGtg4R6raZ157eQR54T7uyJNpqkVc8TRdhIzd-AT9pZpkli209DBIdeOhIZca8aFJfrqrp5IvAwrp5k-JrfptY_xLrqy9TOhvpUHoCLC9wXFIUysTQmGLbaO22dmhz-FLEeYHrNlvZBqrfZuJym_1SmvGpPK4SqulDE13w3OyAGUCp0hlyr-t7YrUU_du4yY70bDIJSJqW23T20iPwUpfwS7MpJ9O5J3JBiBwFuX&amp;__hstc=72765452.1f762149464a60a1e04458d77f43d317.1595986175250.1609837532740.1609906656779.117&amp;__hssc=72765452.5.1609906656779&amp;__hsfp=1865096567&amp;contentType=blog-post\" target=\"_blank\" rel=\"noopener\">Click here to download this book review in PDF<\/a><\/p>\n<p><a href=\"https:\/\/bookshop.org\/p\/books\/a-leader-s-guide-to-cybersecurity-why-boards-need-to-lead-and-how-to-do-it-thomas-j-parenty\/9056668?aid=93091&amp;ean=9781633697997&amp;listref=risks-cybersecurity\" rel=\"noopener noreferrer\" target=\"_blank\">Find this book on Bookshop.org<\/a><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Our CEO and Founder, Jay Shaw, presents his book review on &#8220;A Leader&#8217;s Guide to Cybersecurity (Why Boards Need to Lead and How to Do It) by Thomas J. Parenty and Jack J. Domet.<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":4,"featured_media":121,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4,5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Book Review: A Leader&#039;s Guide To Cybersecurity - Praxonomy<\/title>\n<meta name=\"description\" content=\"Parenty and Domet have strong views on cybersecurity and how any board member can step up and do the right thing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Book Review: A Leader&#039;s Guide To Cybersecurity - Praxonomy\" \/>\n<meta property=\"og:description\" content=\"Parenty and Domet have strong views on cybersecurity and how any board member can step up and do the right thing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Boardlogic Blog | News, Updates, Industry Insights and Best Practices.\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-18T01:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-26T20:05:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2020\/12\/book-review-a-leaders-guide-cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1322\" \/>\n\t<meta property=\"og:image:height\" content=\"793\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jay Shaw\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Shaw\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/\",\"url\":\"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/\",\"name\":\"Book Review: A Leader's Guide To Cybersecurity - Praxonomy\",\"isPartOf\":{\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#website\"},\"datePublished\":\"2020-02-18T01:00:09+00:00\",\"dateModified\":\"2023-04-26T20:05:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/3dbad6161e2a22d88e930ba095d1ed6a\"},\"description\":\"Parenty and Domet have strong views on cybersecurity and how any board member can step up and do the right thing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.praxonomy.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Book Review: A Leader&#8217;s Guide To Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#website\",\"url\":\"https:\/\/www.praxonomy.com\/blog\/\",\"name\":\"The Boardlogic Blog | News, Updates, Industry Insights and Best Practices.\",\"description\":\"The official blog for news, updates, industry insights and best practices from Boardlogic by Formidium \u2014 board meeting management software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.praxonomy.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/3dbad6161e2a22d88e930ba095d1ed6a\",\"name\":\"Jay Shaw\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2020\/12\/jay-shaw.jpg\",\"contentUrl\":\"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2020\/12\/jay-shaw.jpg\",\"caption\":\"Jay Shaw\"},\"description\":\"Jay is a consultant at Formidium. He is a serial entrepreneur with over 20 years experience in the IT industry. Jay was the Co-founder and CEO of NetDimensions, a London Stock Exchange AIM listed enterprise software company.\",\"url\":\"https:\/\/www.praxonomy.com\/blog\/author\/jay\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Book Review: A Leader's Guide To Cybersecurity - Praxonomy","description":"Parenty and Domet have strong views on cybersecurity and how any board member can step up and do the right thing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"Book Review: A Leader's Guide To Cybersecurity - Praxonomy","og_description":"Parenty and Domet have strong views on cybersecurity and how any board member can step up and do the right thing.","og_url":"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/","og_site_name":"The Boardlogic Blog | News, Updates, Industry Insights and Best Practices.","article_published_time":"2020-02-18T01:00:09+00:00","article_modified_time":"2023-04-26T20:05:32+00:00","og_image":[{"width":1322,"height":793,"url":"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2020\/12\/book-review-a-leaders-guide-cybersecurity.png","type":"image\/png"}],"author":"Jay Shaw","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Shaw","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/","url":"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/","name":"Book Review: A Leader's Guide To Cybersecurity - Praxonomy","isPartOf":{"@id":"https:\/\/www.praxonomy.com\/blog\/#website"},"datePublished":"2020-02-18T01:00:09+00:00","dateModified":"2023-04-26T20:05:32+00:00","author":{"@id":"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/3dbad6161e2a22d88e930ba095d1ed6a"},"description":"Parenty and Domet have strong views on cybersecurity and how any board member can step up and do the right thing.","breadcrumb":{"@id":"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.praxonomy.com\/blog\/book-review-a-leaders-guide-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.praxonomy.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Book Review: A Leader&#8217;s Guide To Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.praxonomy.com\/blog\/#website","url":"https:\/\/www.praxonomy.com\/blog\/","name":"The Boardlogic Blog | News, Updates, Industry Insights and Best Practices.","description":"The official blog for news, updates, industry insights and best practices from Boardlogic by Formidium \u2014 board meeting management software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.praxonomy.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/3dbad6161e2a22d88e930ba095d1ed6a","name":"Jay Shaw","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.praxonomy.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2020\/12\/jay-shaw.jpg","contentUrl":"https:\/\/www.praxonomy.com\/blog\/wp-content\/uploads\/2020\/12\/jay-shaw.jpg","caption":"Jay Shaw"},"description":"Jay is a consultant at Formidium. He is a serial entrepreneur with over 20 years experience in the IT industry. Jay was the Co-founder and CEO of NetDimensions, a London Stock Exchange AIM listed enterprise software company.","url":"https:\/\/www.praxonomy.com\/blog\/author\/jay\/"}]}},"modified_by":"Andreas Yasaratne","_links":{"self":[{"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/posts\/63"}],"collection":[{"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":10,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"predecessor-version":[{"id":2610,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/posts\/63\/revisions\/2610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/media\/121"}],"wp:attachment":[{"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.praxonomy.com\/blog\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}