Cyber Risks Aren’t Just an ‘IT Problem’ for Businesses Anymore

How Cyber-Secure is your Business? 10 Questions Every Business Manager Should Address

Share this blog!


Sign up for our eNewsletter, Good Sense, to get updates on financial, strategic and operational best practices for financial institutions.


Get the latest information on legislation, tax reform, business guidance and on farm optimization strategies from your Pinion Ag Experts.


Get the latest information on legislation, tax reform, business guidance and biofuel manufacturing optimization strategies from your Pinion Biofuels Experts.

Reading Time: 2 minutes

Normally, when organizations discuss cybersecurity, all heads turn to IT for management of this issue.  But Cyber Risks programs are no longer the sole responsibility of IT departments.

Cyber risks today are infiltrating businesses in ways that go beyond what your technology function can control.  For this reason, it’s become vital for businesses to incorporate a cybersecurity assessment and control processes across the entire organization. Managing these business risks extends to applications and data outside of the firm’s control, suppliers, and customers.

10 Questions for Every Executive Business Manager

To assess and ensure the strength of a security program, we recommend that management takes a key role in making sure they have answers to each of these questions:

  1. Do you know your company’s cybersecurity risks? You should be able to identify and evaluate potential risks, the sources, how to address them, and develop a cyber risk management program to meet any and all regulatory obligations.
  2. Do you have an inventory of systems, software, data and information? In addition to your equipment inventory, make sure to include cloud applications, mobile applications and other third parties who may have access or control of the firm’s data and information. Your answer should be complete with a financial ledger or physical assets inventory, and risks associated with each.
  3. Is there a cybersecurity defense system in place? Ensure you have a recognized, accepted framework, such as the NIST Cybersecurity Framework (, to address cybersecurity defense in depth.
  4. How often do you conduct a risk assessment or maturity assessment of your security program against a framework? If this doesn’t happen, it needs to. Creating the best defense is helped with a good offense – and it’s imperative to conduct a penetration test of your cyber defenses. This will help identify vulnerabilities than need to be addressed, and whether you business’ security program can handle cyber risks.
  5. Do your outsourced providers and contractors have cybersecurity controls and policies in place? External sources should be checked to ensure they align with your policies and controls for data protection. Assess whether they monitor their controls, and consider any risks with vendors and contracts that could pose damage to your company.
  6. Do you practice ongoing, employee awareness and training for cybersecurity best practices? Make sure employees know their roles and understand how to handle and secure sensitive information.
  7. Do any new technology plans include risk management steps?
  8. Are meeting your customers’ security concerns as well?
  9. Does your external auditor indicate you have cybersecurity-related deficiencies in internal controls over financial reporting? Assess and remedy any deficiencies, as they are sometimes signs that broader cyber security deficiencies may exist.
  10. Do you or another executive manager receive regular updates on operational security? Consider forming a steering committee to regularly review metrics and help balance business goals and security measures.

How did you do?  If you answered “no” or “I don’t know” to these questions, it’s time to reassess the role that executive management is playing in overall business risk management. Engaging in the process, measuring the strength of your security program, and reinforcing its importance internally and externally, will result in a more resilient and secure operation overall.


For questions regarding cybersecurity controls, frameworks, and best practices, contact a Pinion technology advisor.

Pinion People Related to this Post