You are receiving this e-mail because you subscribed to this or a related news 
source. If you want to unsubscribe please follow the instructions listed.
With a Scrum team dedicated to cyber security and a board that treated it 
differently than other business continuity issues, much could be done to secure 
data in the public and private sector. In the era of cyber security breaches 
that cost business and governments millions if not billions of dollars, a new 
way of governing for profit and non-profit boards is in order. This according 
to Ryn Melberg on her weekly podcast entitled, The Guardian. 
The Guardian Podcast with Ryn Melberg can be heard on iTunes,   Soundcloud, or 
www.rynmelberg.com. 
Not Like Other Continuity Issues
Business has been treating cyber security the same way as any other business 
continuity issue. Re-routing calls in a call center when the power goes out is 
a very typical continuity issue. When the power goes off it is obvious to 
everyone, but with a cyber breach, it is not. Managing cyber security issues 
like this makes them more difficult to detect. “Whether with Target or even 
Ashley Madison, the hackers are inside the site and doing great harmlong before 
anyone even knows they are there,” Melberg said. “Directors do not seem to 
grasp that these break-ins are different than other continuity events. That is 
why cyber security and governance need another strategy.” 
No Days Off                                                             
Melberg says that tracking and managing cyber break-ins has to be a daily task 
for companies that are big enough to be vulnerable. “When the building is hit 
by lightening, it is hard to miss,” she said. “Hackers work hard to make sure 
that they go undetected for as long as possible. This is a huge issue that 
every board should be equipped to manage proactively.” 
Audit Committee
Making cyber part of the responsibility of the audit committee is one way to 
manage this issue, possibly even assigning a separate person or subcommittee to 
this is one approach. “Early detection is the key to being more secure,” 
Melberg said. “When managing traditionally, it is not possible to know anything 
in advance.” Melberg compared this to trying to find a shoplifter inside a 
store. “If the shoplifter was inside the store and stealing for days, and then 
gone once you noticed something missing there is not much good even the most 
well intentioned security person to make a difference.” 
The CIO As Board Member
Given that the CIO is responsible for all technology he/she should be a member 
of the board. “The person closest to the problem is usually the one closet to 
the solution,” Melberg said.  “As the CIO is in charge of all things technical 
and is going to get the blame for any break-ins anyway, he/she should be on the 
board and a member of the audit committee. They are the ones who will have to 
fix whatever is broken.” 
More people working on an issue does not always make it better. “You can have 
all kinds of federal agencies show up to work on a cyber breach from the FBI to 
the NSA to Homeland Security,” Melberg said. “It will take longer to sort out 
jurisdiction than it would to start working on a breach.” 
Scrum To The Rescue
One Scrum team dedicated to finding the potential for a break-in and doing this 
every day is probably the best way to prevent breaches.  “What happens in a 
traditional setting, a team has to be formed before any actual work gets done,” 
Melberg said. “A half dozen people working on security and preventing cyber 
security breaches is a very small amount of money to spend compared to what a 
break-in will cost.”

Reply via email to