{"id":2674,"date":"2025-11-12T11:01:47","date_gmt":"2025-11-12T11:01:47","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/uncategorized\/untagged\/how-to-talk-to-boards-about-cybersecurity-investment\/"},"modified":"2025-12-15T16:18:05","modified_gmt":"2025-12-15T16:18:05","slug":"how-to-talk-to-boards-about-cybersecurity-investment","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/","title":{"rendered":"Boards and Cyber Security &#8211; How to Talk About Investment"},"content":{"rendered":"<p><strong>It\u2019s a common misconception that stopping cyber attacks just means hiring security experts and buying the latest technology. The reality is, most organisations only realise this isn\u2019t enough after they\u2019ve been attacked. Suddenly, cyber security becomes the board\u2019s top priority.<\/strong><\/p>\r\n<p>Boards often don\u2019t want to spend money on cyber security until something goes wrong. Usually, they don\u2019t see how much damage a cyber attack can cause. Or, nobody has explained the risks to them in a way they understand.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Bridging the Gap<\/h2>\r\n<p>Given how dramatically the risk of cyber attack has risen over the last decade, this is no surprise. Even experienced security professionals have been caught out by the surge in disruptive cyber crime.<\/p>\r\n<p>What matters is bridging the gap with boards by arguing the case for investment using terms of reference they can process. In large organisations, this falls to roles such as CISOs, CTOs or CIOs, while in smaller organisations, it\u2019ll often be the head of IT or a similar role.<\/p>\r\n<p>Although some of the language will be different between these environments, the principles remain the same.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-ciso-became-the-most-important-job-in-cyber-security\/\" rel=\"noopener\">Read: How CISO became the most important job in cyber security<\/a><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Use Simple Language<\/h2>\r\n<p>Board members are appointed for their business experience and background rather than cyber security or IT knowledge. Their knowledge of cyber security issues will often come from reading about incidents in the media that focus on the impact and damage. The first step is to develop a common language to discuss the issue.<\/p>\r\n<p>Technical arguments and jargon <em>don\u2019t <\/em>cut it. It\u2019s better to explain an organisation\u2019s security as a series of protections around layers, for example, users, data, devices, applications, the network, and cloud assets. Highlight advancements such as passwordless authentication and AI-driven threat detection, which have become key.<\/p>\r\n<p><em>The message is that cyber attacks attempt to breach multiple layers at once, which is why each must be defended on a 24\u00d77 basis using specific policies and technologies.<\/em><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Boards Understand Risk<\/h2>\r\n<p>Using threats like ransomware to justify spending can be tricky and often leads to confusion. It is better to describe risk by outlining the vulnerable elements of the organisation\u2019s infrastructure and how each might be better secured. For example, a common threat technique is to attempt to steal credentials using phishing \u2013 a type of cyber attack in which fraudsters impersonate legitimate organisations or individuals to deceive people into disclosing sensitive information such as passwords or personal data. This is a simple tactic whose outcome can be severe.<\/p>\r\n<p>This can be countered through investment in user training, but also email filtering and authentication. It\u2019s not how these work that matters, but how they prevent a given outcome.<\/p>\r\n<p>It\u2019s also important to talk about policies, for example, the adoption of principles such as zero trust \u2013 a security approach where no one is trusted by default, and every user or device must be verified every time they try to access resources. Zero trust doesn\u2019t mandate which technologies must be deployed but outlines a trust architecture that must be applied consistently to achieve its objective.<\/p>\r\n<p>Here are just a few examples of organisations, across various sectors, affected by cyber security incidents, demonstrating the need for robust security measures:<\/p>\r\n<ul>\r\n\t<li><strong>The retail sector<\/strong>: A group known as Scattered Spider coordinated <a href=\"https:\/\/www.theguardian.com\/technology\/2025\/may\/16\/scattered-spider-hackers-uk-cyber-attacks-google-us-retailers\" target=\"_blank\" rel=\"noopener\">attacks on major retailers<\/a>, including Marks &amp; Spencer and Co-op in 2025. These attacks resulted in significant disruptions and drew attention to vulnerabilities in the retail sector&#8217;s cyber security infrastructure.<\/li>\r\n\t<li><strong>HMRC<\/strong>: Over 100,000 taxpayer accounts were compromised in <a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/cvgnz3r2m7eo\" target=\"_blank\" rel=\"noopener\">a cyber attack on HMRC<\/a>. Cyber criminals stole more than \u00a347 million, highlighting the persistent threat of cybercrime to governmental financial institutions.<\/li>\r\n\t<li><strong>BBC<\/strong>: The BBC experienced <a href=\"https:\/\/www.theguardian.com\/media\/article\/2024\/may\/29\/data-breach-exposes-details-of-25000-current-and-former-bbc-employees\" target=\"_blank\" rel=\"noopener\">a significant data breach<\/a> affecting the personal information of over 25,000 current and former employees. The breach involved the unauthorised copying of private records from an online data storage service.<\/li>\r\n<\/ul>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/top-8-cybersecurity-risks-for-your-business\/\" rel=\"noopener\">Read about the top 8 cyber security risks for business.<\/a><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Incident Response<\/h2>\r\n<p>The most extreme example of risk is sudden emergencies, such as an unfolding ransomware attack. This is one area where a lot of CIOs find themselves asking for more money, not only for in-house expertise and response, but third-party support.The board needs to understand the importance of this spending.<\/p>\r\n<p>Cyber attack response planning should be treated in a similar way to how organisations plan against unusual weather, pandemics, or economic disruption.<\/p>\r\n<p>Clear plans on how to respond to ransomware and data breaches are essential. It\u2019s important to decide if cyber security insurance (that covers ransomware and extortion) is an option for the organisation, and to understand what additional funds may be available to support recovery following an attack.<\/p>\r\n<p>The board needs to recognise how automated incident response systems can help deal with cyber attacks quickly. They should also be aware that failing to comply with regulations like GDPR can lead to significant fines.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Key Performance Indicators (KPIs)<\/h2>\r\n<p>It\u2019s not enough simply to make a series of spending recommendations based on technical arguments. The board must have confidence that this spending is part of a long-term strategy whose success can be measured objectively by the organisation over time.The business might also consider introducing KPIs that reflect new technologies, such as AI-driven threat detection effectiveness and adoption rates of innovative security measures.<\/p>\r\n<p>A common cyber security KPI is reducing the organisation\u2019s reliance on vulnerable legacy systems, typically unsupported software. This is a useful because the reduction in legacy equipment can be measured and reported quite precisely. The board approves spending on new systems and migration, and gets a defined risk reduction it can understand.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Independent Assessment<\/h2>\r\n<p>Boards will often want more than a list of KPIs, however, and will want to understand how these relate to higher-level governance regimes, for example, GDPR or NIST\u2019s Cybersecurity Framework. This can be achieved by carrying out a benchmarking exercise that compares an organisation to its peers and gives boards an idea of maturity level.<\/p>\r\n<p>However, this doesn\u2019t mean that technical assessments have no place. A good example is to conduct independent assessments such as penetration testing. This provides a degree of reassurance, so the board doesn\u2019t have to take it on trust that its security design is meeting its goals.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Cyber Security is Competitive<\/h2>\r\n<p>Strong cyber security can now be a real competitive advantage. In the past, a cyber attack was often seen as just an IT problem \u2013 something that could be fixed with some extra work and minor embarrassment. However, the surge in data breaches, the theft of IPs, and ransomware has changed this.<\/p>\r\n<p>Severe cyber attacks now represent a huge potential bill and possibly even an existential threat. It follows that organisations that can resist or minimise the impact of cyber attacks can gain a competitive advantage over peers that fail to do this.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-supply-chains-became-the-next-big-cyber-risk\/\" rel=\"noopener\">Read: How Supply Chains Became the Next Big Cyber-risk.<\/a><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>A Strategic Imperative: Boards and Cyber Security Alignment<\/h2>\r\n<p>Bridging the gap between the cyber security function of an organisation and management as an idea is far from new. What\u2019s changed however, is the urgency of making this happen in a way that leads to concrete improvement rather than a lot of meetings and talks.<\/p>\r\n<p>This isn\u2019t simply about best practice and compliance but survival. The organisations that find a way to turn cyber security from IT\u2019s unwanted child into a part of their strategic planning for the future will be the ones that survive into the future.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Achieve Cyber Security Certifications For Your Business<\/h2>\r\n<p>Get started on your journey to <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/\" rel=\"noopener\">Cyber Essentials<\/a> and <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials-plus\/\" rel=\"noopener\">Cyber Essentials Plus <\/a>and <a href=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/\" rel=\"noopener\">ISO 27001<\/a> certifications for your business with British Assessment Bureau.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/certification-quote\/\" rel=\"noopener\">Request a quote<\/a> today or <a href=\"https:\/\/amtivo.com\/uk\/contact-us\/\" rel=\"noopener\">contact our team<\/a> to discuss your needs.<\/p>","protected":false},"excerpt":{"rendered":"To secure board support, highlight cyber risks, potential impacts, and the need for proactive protection.","protected":false},"author":24,"featured_media":2171,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[32],"class_list":["post-2674","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-cyber-essentials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Talk to Boards About Investing in Cyber Security<\/title>\n<meta name=\"description\" content=\"Learn about boards and cyber security \u2013 how to communicate cyber security investments to boards effectively, highlighting risks and strategic advantages.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Boards and Cyber Security - How to Talk About Investment\" \/>\n<meta property=\"og:description\" content=\"Learn about boards and cyber security \u2013 how to communicate cyber security investments to boards effectively, highlighting risks and strategic advantages.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T16:18:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2022\/09\/How-to-talk-to-the-board-about-cybersecurity-investment-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Talk to Boards About Investing in Cyber Security","description":"Learn about boards and cyber security \u2013 how to communicate cyber security investments to boards effectively, highlighting risks and strategic advantages.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/","og_locale":"en_GB","og_type":"article","og_title":"Boards and Cyber Security - How to Talk About Investment","og_description":"Learn about boards and cyber security \u2013 how to communicate cyber security investments to boards effectively, highlighting risks and strategic advantages.","og_url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/","og_site_name":"Amtivo UK","article_modified_time":"2025-12-15T16:18:05+00:00","og_image":[{"width":1500,"height":1200,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2022\/09\/How-to-talk-to-the-board-about-cybersecurity-investment-1.png","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/","url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/","name":"How to Talk to Boards About Investing in Cyber Security","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2022\/09\/How-to-talk-to-the-board-about-cybersecurity-investment-1.png","datePublished":"2025-11-12T11:01:47+00:00","dateModified":"2025-12-15T16:18:05+00:00","description":"Learn about boards and cyber security \u2013 how to communicate cyber security investments to boards effectively, highlighting risks and strategic advantages.","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2022\/09\/How-to-talk-to-the-board-about-cybersecurity-investment-1.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2022\/09\/How-to-talk-to-the-board-about-cybersecurity-investment-1.png","width":1500,"height":1200,"caption":"How to talk to the board about cybersecurity investment"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-talk-to-boards-about-cybersecurity-investment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"Cyber Essentials","item":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"Boards and Cyber Security &#8211; How to Talk About Investment"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":11,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2674\/revisions"}],"predecessor-version":[{"id":9873,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2674\/revisions\/9873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/2171"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=2674"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=2674"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=2674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}