{"id":4204,"date":"2016-04-04T10:14:38","date_gmt":"2016-04-04T14:14:38","guid":{"rendered":"http:\/\/ibit.temple.edu\/?p=4204"},"modified":"2025-06-12T05:54:41","modified_gmt":"2025-06-12T09:54:41","slug":"implementing-board-oversight-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/ibit.temple.edu\/ibit-report\/implementing-board-oversight-of-cybersecurity\/","title":{"rendered":"Implementing Board Oversight of Cybersecurity"},"content":{"rendered":"<p><a href=\"http:\/\/ibit.temple.edu\/wp-content\/uploads\/2016\/04\/IBITReport_CyberBoard.pdf\" rel=\"attachment wp-att-4102\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4102\" src=\"http:\/\/ibit.temple.edu\/wp-content\/uploads\/2016\/04\/cyberboardcoverHigh2016.jpg\" alt=\"IBIT Report Implementing Board Oversight of Cybersecurity 2016\" width=\"580\" height=\"695\" \/><\/a><\/p>\n<h3>Rich Flanagan and Janet Yeomans<\/h3>\n<h4>Temple University<\/h4>\n<p>March 2016<\/p>\n<p align=\"LEFT\">While oversight of cybersecurity risk management should be a regular agenda item for boards of directors, many boards do not have the knowledge or experience to address it. This IBIT Report is a call to action for boards, urging them to think more carefully about their investment of time and attention in securing their information assets. For boards just starting out as well as those already attempting to deal with this issue, the authors detail the steps to define roles and responsibilities, influence corporate culture, develop processes, and establish partnerships.<\/p>\n<blockquote><p><em><strong>Many well-known and well-respected companies, when hit by hackers, have had their customers&#8217; data security compromised along with their reputations. Others have not. Why?<\/strong><\/em><\/p><\/blockquote>\n<p><a href=\"http:\/\/ibit.temple.edu\/wp-content\/uploads\/2016\/04\/IBITReport_CyberBoard.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/ibit.temple.edu\/wp-content\/uploads\/2010\/02\/DownloadNow.png\" alt=\"Download Now\" width=\"125\" height=\"35\" \/><\/a><\/p>\n<hr \/>\n<p>\u00a9 2016 The IBIT Report, Institute for Business and Information Technology, Fox School of Business, Temple University, Philadelphia, PA 19122, USA. All rights reserved. ISSN 1938-1271.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This IBIT Report is a call to action for boards, urging them to think more carefully about their investment of time and attention in securing their information assets. For boards just starting out as well as those already attempting to deal with this issue, the authors detail the steps to define roles and responsibilities, influence corporate culture, develop processes, and establish partnerships.<\/p>\n","protected":false},"author":1709,"featured_media":4388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2,1],"tags":[],"class_list":{"0":"post-4204","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-report","8":"category-uncategorized","9":"entry"},"jetpack_featured_media_url":"https:\/\/ibit.temple.edu\/ibit-report\/files\/2016\/04\/Binoculars-Security.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8vQSu-15O","_links":{"self":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/4204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/users\/1709"}],"replies":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/comments?post=4204"}],"version-history":[{"count":2,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/4204\/revisions"}],"predecessor-version":[{"id":4416,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/4204\/revisions\/4416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/media\/4388"}],"wp:attachment":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/media?parent=4204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/categories?post=4204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/tags?post=4204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}