Cyber Security

Board-Level Security Advisory


Bridge the gulf between the Board and CISOs

Security Leadership Challenges

Board members and CISOs are not on the same page


As cyber incidents escalate, it is becoming increasingly difficult for CISOs to get the budget and necessary control they need over cyber security. This is because the Board still see security as an obstacle.


Evidence suggests that whilst CISOs often feel like they are heard at Board-level, in fact leaders are often more comfortable with an out-of-sight-out-of-mind approach.


Our security advisors have extensive and proven experience securing board buy-in. We work in partnership with leaders to confront the communication-gap head-on, with workshops and a proven methodology.

There is a gulf between CISOs and the Board 


In a survey that we carried out, 70% of board members reported that they understand everything that they are being told by IT and security executives in their presentations, but more than half (54%) agreed or strongly agreed that the data presented was too technical. 85% believe that IT and security executives need to improve the way they report to the board, and two in five do not believe that risks are reduced because of their conversations and reports from IT & security experts.


Just 69% of board members see eye-to-eye with their CISOs. Fewer than half (47%) of members serve on boards that interact with their CISOs regularly, and almost a third of them only see their CISOs at board presentations. This is nowhere near enough time to develop a meaningful conversation around cybersecurity strategies and goals, especially since this understanding and dialogue somehow isn’t converting to action, with only 37% of those same board members having a Breach Response plan in place. 

A one-day workshop to create a vision for cyber security


With extensive experience presenting to and engaging with business leaders and boards, we understand what works and what doesn't. By leveraging the expertise of an industry-leading CISO and the experience of a seasoned C-suite tech leader and coach, we can provide valuable insights on effective board and executive engagement supported by our surveys to Board members and CISOs.


Our tailor-made interactive workshop provides research-backed insights, will address your specific concerns, and equip you with practical strategies to align the board, speak their language and gain the support needed to execute your cybersecurity strategy.

Benefits of our model


Driven by expertise

Our team has the experience, technical background, and real-world experience to deal with complex cyber security challenges.

Secure by design

We build security into your IT infrastructure and business processes from the ground up, concentrating on our 6 key areas.

Bespoke roadmaps

We develop tailored cybersecurity roadmaps that consider your specific business models, industry challenges, and risk profiles.

Client-centric model

We ensure close collaboration with our clients. This includes regular updates, clear communication, and flexible engagement models.

Thought leadership

We leverage advanced technologies like AI and automation to improve the efficiency and effectiveness of our solutions.

Training programmes

We offer innovative training and up-skilling programs to foster a culture of cyber security awareness within organisations.

Want to know more?

Our outcome-driven, pragmatic approach will provide direct feedback and practical strategies to help you and your team better understand the board/business mindset. We give actionable advice on improving engagement with leadership to gain the support needed to execute your strategy.

GET IN TOUCH

Cyber Security in Numbers

44%


Of business leaders emphasise the importance of CISOs in translating technical aspects of cybersecurity to CEOs and Boards.

$256bn


The price that ransomware costs are projected to reach annually by 2031.

>$1.5tr


The estimated total addressable market for cybersecurity as of 2022, according to McKinsey.

"There’s no silver bullet solution with cyber security, a layered defense is the only viable defense."

James Scott, Senior Fellow and co-founder of the Institute for Critical Infrastructure Technology

Cyber Security Insights


Neon blue network and numbers
by John Madelin 23 Jan, 2024
Authors
Profile image of John Madelin

John Madelin

Managing Partner - Cyber Security


As Managing Partner for Cyber Security, John has over 30 years of hands-on experience in numerous front-line roles which have focused on the design, build, and management of cyber security—and included intense cyber incident management responsibilities. John’s experience spans across government, banking, retail, manufacturing, and utilities. He is a practical leader who has developed an approach to digital security which focuses on getting the basics right first and building out from there.


His position as a long-standing and respected member of the security community has led to many prominent roles and responsibilities. In recent years, this includes: drafting the UK Government public consultation document on the cyber profession, chairing one of the leading research committees providing cyber security material to the UK Government, and becoming an Oxford Martin Associate on the topic of international co-operation and advising another large national government as a regular panel member.

Our team can be your team


Our team of experts have multiple decades of experience in cyber security in many different business environments and across various geographies.


We can build you a specialised team with the skillset and expertise required to keep your cyber defences secure and long-lasting.


Our combination of expertise and an intelligent methodology is what realises tangible financial benefits for clients.

Our Cyber Security Experts

Get in touch with John today


There is no substitute for real-world experience. We are a highly collaborative team of senior level executive professionals able to adapt to any challenge, however niche & challenging.

+44 (0)1223 750335

info@cambridgemc.com

Contact Form - Cyber Security Practice

Share by: