Page 12 - IMDR Journal 2025
P. 12

Research Article
            keeping things secure. This system includes things like risk   information-based risk identification is an emerging trend in
            assessments,  rules  for  who  gets  access,  written  security   the corporate world and discussions on such identification
            procedures, and regular internal checks.          should be taken seriously because they may very well be our
                                                              saviors in this post-9/11 world. Mandates the board to be
            In both the SFO and BA cases, there’s no clear sign that this
            system (or anything similar) was being used. ISO 27001   updated regarding risks and the occurrence of cybersecurity
            requires companies to look for security risks and fix them   incidents.  Nevertheless,  it  is  reported  that  the  top
            using specific tools listed in the standard.       management and the board of directors of BA did not focus
                                                              on cyber spending or awareness. Similarly, it appeared that
            But SFO and BA didn’t seem to have any solid process to   SFO considered cybersecurity routine IT tasks as opposed to
            find  weak  spots.  For  example,  BA  didn’t  update  an  old
                                                              a board mandate. CISA observes that boards are supposed to
            JavaScript file that had known problems. That shows they
                                                              empower CISOs and fund them, and that the decisions made
            didn’t have a way to manage or fix outdated software. If they   on cyber are clear. Executive accountability findings on BA
            had followed the ISO 27001 system, they would’ve done   indicate  the  board  had  overlooked  even  fundamental
            regular checks and cleanup to avoid that kind of risk.
                                                              security  measures,  which  ICO  attributed  to  a  “profound
            ● Access Control Policies Annexe A of ISO 27001 involves   organisational failure in digital risk management”.
            access control policies on users. The access controls are   ● Cybersecurity Culture Corporate governance extends to
            weak, as demonstrated by the stolen credentials. Neither   culture.  BA  treated  compliance  (e.g.,  GDPR)  as  a  box-
            SFO  nor  BA  had  implemented  such  policies  as  least-  ticking exercise rather than an imperative. The ICO report
            privilege or MFA. ISO 27001 would impose writing the
                                                              criticised  BA  for  lacking  encryption  and  strong
            rules  of  access  and  review  regularly,  which  could  have
                                                              authentication as if they were optional, reflecting a failure of
            avoided  the  harvesting  of  passwords  as  the  only   tone at the top. In contrast, boards should foster a culture
            authentication method.
                                                              where managing cyber risk is seen as a core responsibility.
            ● Occurrence of Risk and Procedure Monitoring. The theme   ● Investment and Prioritisation Directors must balance
            of  the  standard  is  an  orientation  of  treating  risks  and   cybersecurity budgets against other business needs. In these
            observing their efficiency. Such a store of some sensitive   cases,  evidence  suggests  cybersecurity  budgets  were
            information in plain text was a failed treatment when BA   constrained.  Good  governance  would  evaluate  security
            made it a habit to do so. That as an unacceptable risk or   spending  as  an  investment  in  resilience,  not  just  a  cost
            misconfiguration  would  have  been  identified  by  the
                                                              centre. Frameworks like ISO 27001 and NIST CSF should
            implementation of ISMS, verification would have happened
                                                              be endorsed by the board and integrated into the risk appetite
            through the control.
                                                              statements.
            ● On the same point, SFO does not have endpoint security,   In summary, corporate governance failures contributed to
            meaning  they  did  not  treat  and  test  such  systems  well.   these  breaches.  Neither  SFO  nor  BA  had  a  governance
            Overall,  ISO/IEC  27001  is  supposed  to  safeguard   structure that elevated cyber risk to board agendas. Industry
            information resources through applying a comprehensive   guidance (e.g. NACD Director’s Handbook co-developed
            risk approach evaluation and ongoing improvement. With   with  CISA)  stresses  that  cyber  must  be  a  “fundamental
            an established ISMS compliance coupled with ISO 27001,   matter of good governance”. The SFO and BA incidents
            SFO  or  BA  would  have  established  formal  processes  to
                                                              underscore  that  neglect  at  the  governance  level  leaves
            determine  what  is  lacking  and  not  there,  and  implement
                                                              organisations vulnerable.
            security  standards  (like  encryption  and  authentication).
            Control testing.                                  ● Strategic Implications The SFO and BA breaches have
                                                              broad strategic implications for the aviation industry. Key
            In  other  words,  a  certified  ISMS  would  have  ensured   lessons and recommended actions include:
            proactive security management, whereby the security would
            have been managed in advance. With a possible initiative of   ●  Board-Level  Accountability  Boards  must  treat
            preventing or reducing such violations. They also did not   cybersecurity as a strategic governance issue rather than a
            have ISO controls that would make security interventions   technical  afterthought.  Regular  reporting  on  cyber  risk,
            consistent and responsive.                        incidents, and compliance should be mandatory. Directors
                                                              should insist on cybersecurity metrics alongside financial
            Corporate Governance
                                                              and safety metrics. This aligns with CISA’s call for boards
            Cybersecurity  should  become  a  part  of  corporate   and CEOs to “own” cyber risk as an enterprise risk.
            governance. Decent governance addresses cyber-hazards as   ● Enhanced Security Investments Organisations should
            a rational strategic issue and not only a simple problem in IT.   invest in modern security infrastructure. Examples include
            An advisory issued by CISA highlights the fact that cyber
                                                              Security  Information  and  Event  Management  (SIEM)
            risk  is  presently  a  business  risk  under  the  ownership  of
                                                              systems to correlate and alert on threats, Endpoint Detection
            boards and CEOs. Both plane crash situations had a faulty   and Response (EDR) tools for monitoring workstations, and
            board-level review.
                                                              next-generation  firewalls.  These  tools  support  the  NIST
            ● Board-Level Oversight                           Protect  and  Detect  functions  by  identifying  anomalous
             In his his article entitled Developing Information-Based   activity. As NIST points out, a risk-based approach allows
            Risk Assessment  in  a  Post-9/11  World-  Incorporation  of   firms  to  allocate  resources  effectively.  Despite  budget
            Serious  Discussions,  Chris  Thompson  pointed  out  that   constraints,  the  cost  of  breaches  (investigations,  fines,



                                                                                                    3
   7   8   9   10   11   12   13   14   15   16   17