Introducing the Blog Series: Cyber Resilience Board Briefings
What are Cyber Resilience Board Briefings?
Over the past few years, I’ve spent a significant portion of my time working with organisations in the middle of ransomware and destructive cyberattacks. Not tabletop scenarios or theoretical models: real incidents, with real operational impact, unfolding under pressure, alongside senior executives.
What stands out is not simply how these attacks succeed. It is how often organisations mistake restoration for resilience. I have seen recoveries declared successful, only for the organisation to discover weeks or months later that risk had been reintroduced, trust had been assumed rather than proven, or critical decisions had been made with incomplete evidence.
I have also seen organisations receive significant post-incident budget and headcount increases, then spend that investment without addressing the operating model failures that made the incident so damaging in the first place. More money does not automatically create resilience. Without governance, accountability, and clear decision rights, it often just funds a larger version of the same problem.
Equally, I have seen overconfidence evaporate quickly. Claims of impenetrable protection rarely survive contact with a determined adversary, and some leaders who projected the greatest certainty before an incident were no longer in post after it.
At that point, the issue is no longer purely technical, it is a governance failure.
The gap between cyber and the boardroom
Cybersecurity has become a standing item at board level: awareness exists, investment has increased, reporting has improved and best-practice frameworks are widely adopted. Yet, when a destructive cyber event occurs, many organisations still struggle to answer a small number of fundamental questions:
What does “recovered” actually mean?
Can we trust the environment we are restoring into?
Are we prioritising speed, or assurance and who decides?
What level of risk is acceptable in the recovery process?
How do we evidence that decisions taken under pressure were appropriate to partners, regulators and cyber insurers?
These are not questions for the Security Operations Centre, they are board-level decisions, often made implicitly rather than explicitly.
The problem with current cybersecurity and cyber resiliency narratives
Much of the cyber industry narrative still focuses on:
Prevention
Detection
Tooling
These are all hugely important aspects, but largely irrelevant at the point where the organisation is already compromised. When your organisation can’t deliver products, services or its mission and, identities are untrusted and time pressure is acute, the problem shifts from “How do we stop this?” to “How do we safely continue operating?” That transition is where many organisations falter. Not because they lack technology, but because they lack:
Defined decision rights
Clear recovery conditions
Alignment between security, IT, line-of-business and executive leadership
A shared understanding of what “good” looks like under failure
What this series will do
Cyber Resilience Board Briefings is designed to address that gap. Each briefing will be:
Short and focused, easily consumable by the board
Grounded in real incident patterns I’ve observed first-hand
Framed in business and governance language
Oriented around decisions, not tooling
Cyber Resilience Board Briefings topics will include:
The difference between recovery and recovery to a trusted state
Why identity is the critical path in most recoveries
Common failure modes observed during ransomware response
The hidden risks in “clean” backups
Decision frameworks for operating under degraded trust
How to align cyber recovery with regulatory expectations (e.g. operational resilience requirements)
Who Cyber Resilience Board Briefings are for:
Board members and non-executive directors
Chief Information Officers, Chief Information Security Officers and Chief Risk Officers
Investors and advisors to technology organisations
If your role involves oversight, accountability, or decision-making under uncertainty, this series is for you.
A different lens on cyber resilience
Cyber resilience is often described as a capability, in practice, it is an emergent property, the result of how well an organisation coordinates:
Governance
Technology
People
Decision-making under pressure
Your organisation doesn’t discover whether it’s resilient in a policy document, it discovers it when:
Your identity systems can’t be trusted
Your tooling is degraded or evaded
Your teams are working from incomplete information
And the business is demanding answers
What comes next
The first briefing in this series will focus on a foundational issue: Why “recovery” is not the same as “recovery to a trusted state” and why that distinction matters at board level. In many of the incidents I’ve been involved in, the real damage wasn’t caused by the attack itself, it was caused by what happened after systems came back online.
If cyber resilience is now a board-level concern - and it is - then it needs to be understood, discussed, and governed at that level. That’s the purpose of the Cyber Resilience Board Briefing series.