Follow us

The Five Questions Every Board Should Ask Their CISO in 2026

How Boards Strengthen Cyber Resilience, Improve Decision-Making and Protect Business Outcomes

Cyber security has shifted from a technical function to a core component of operational resilience. Boards now own cyber risk in the same way they own financial risk and regulators, insurers and shareholders expect visible accountability.

Yet there’s still a disconnect.

CISOs are overwhelmed by expanding threats, shrinking resources and rising expectations. Boards struggle to get the clarity they need to make informed decisions. And somewhere between these two realities sits your organisation’s exposure.

2026 is the year this gap must close.

Below are the five questions every Board should be asking their CISO, alongside the practical steps Boards can take to translate cyber risk into business impact, improve resilience and strengthen alignment.

  1. What are our top systemic risks and how do they impact business outcomes?

Boards don’t need a technical deep dive. They need a clear view of:

  • Which risks could disrupt operations
  • Which risks could erode revenue
  • Which risks could damage brand trust
  • Which risks could trigger regulatory or legal consequences

Systemic risks — identity failures, third-party dependency, patch gaps, configuration drift, poor backup hygiene — are not technical issues. They are business issues.

Practical step for Boards:
Ask your CISO to map each top risk to a business objective: revenue continuity, customer trust, operational uptime, regulatory compliance or financial exposure.

This reframes cyber risk as business risk and ensures prioritisation aligns with strategy.

  1. Which controls are failing silently?

Every major breach in the last decade has had the same pattern:
the controls existed, but they were not being enforced.

Identity settings drift. MFA exemptions creep in. Endpoints fall out of compliance. Patches are missed. Backups aren’t tested.

Silently failing controls are the biggest blind spot for enterprises — and most Boards never hear about them until after something goes wrong.

Practical step for Boards:
Request a quarterly “silent failure” dashboard:

  • % of controls out of compliance
  • Time out of compliance
  • Systems or business units most affected
  • Business impact if those controls were exploited

If your organisation cannot provide this today, it’s a sign visibility is missing.

  1. Where can automation improve assurance and reduce cost?

This is the question that unlocks real transformation.

Most organisations still manually monitor controls — often without realising the enormous cost and inefficiency it creates.

Our own enterprise client research shows:

  • Average cost to manually test one control: £1,500
  • Typical enterprise controls: 1,000
  • £1.5M per cycle
  • Quarterly cycles = £6M per year

And this cost does not include:

  • Second-line teams chasing evidence
  • First-line teams collecting and formatting data
  • Analysis, retesting and remediation
  • Delays that leave the business exposed
  • Lost productivity across operations, risk and IT

Once Boards understand these numbers, automation stops being a technical decision and becomes a financial and operational one.

  1. Where does AI expand our attack surface — and where does it strengthen us?

AI is now embedded across development, operations, customer experience, and data analysis. It accelerates productivity and decision-making, but it also reshapes the risk landscape in ways Boards must understand.

Where AI Expands Risk

AI introduces new exposure in areas such as:

  • Shadow AI tools handling sensitive data without governance
  • Model manipulation and poisoning
  • Uncontrolled integrations with SaaS and third parties
  • AI-generated code creating hidden vulnerabilities
  • Identity attacks powered by AI speed and scale

These are not speculative threats — they are already appearing in incident data across industries.

Where AI Significantly Strengthens the Organisation

AI is not just a risk multiplier. When governed properly, it becomes one of the most powerful resilience enablers available to CISOs and Boards.

AI enables:

Predictive analytics over systemic risks
AI can spot patterns that humans simply never see — early signs of control failure, identity drift, vulnerability clusters, and unusual access behaviours.

Faster detection and response
AI-driven anomaly detection identifies suspicious activity before it becomes a breach, drastically reducing dwell time.

Operational efficiency and cost reduction
AI removes 50–70% of manual security effort: log analysis, evidence gathering, repetitive control checks, triage, and noise filtering.

Continuous control assurance
AI can automatically validate whether:

  • MFA is enforced
  • Admin privileges are creeping
  • Patches are overdue
  • Backups are failing
  • Configurations are drifting

This gives Boards ongoing proof of control effectiveness, not snapshots.

Sharper risk reporting for Boards
AI can translate technical signals into business impact: financial exposure, service downtime, regulatory breach probability.

AI doesn’t just “enhance security” — it improves governance, decision-making and assurance.

Practical Step for Boards

Ask your CISO to provide an AI Risk & Opportunity Map that includes:

  • All AI systems in use (internal, shadow, third-party)
  • What data they access and process
  • The controls monitoring their behaviour
  • AI-driven security capabilities already in place
  • Predictions or trends AI is surfacing
  • Operational efficiencies and cost savings generated by AI

This ensures AI is treated not just as an emerging risk, but as a strategic capability that strengthens resilience and reduces cost.

If your organisation cannot produce this map, both the value and the risk of AI are currently invisible — meaning neither is being governed effectively.

Recommended Guard Rails for AI: What Boards Should Insist On

AI will only strengthen resilience if it operates within a defined and enforceable set of guard rails. Without these, AI becomes another shadow ecosystem — fast, powerful, and dangerous.
Boards should insist on the following governance guard rails:

  1. AI Asset Inventory and Classification

Before AI can be governed, it must be seen.

  • Full inventory of all AI systems: internal, purchased, embedded in SaaS, and shadow AI
  • Classification based on criticality, data sensitivity, and business use
  • Quarterly updates tied to change management

Outcome: No invisible AI systems creating hidden exposure.

  1. Data Usage Boundaries

AI is only as safe as the data it is allowed to touch.

  • Clear rules on what data AI models may access
  • Automated enforcement preventing sensitive or regulated data from being ingested
  • Encryption and access controls for all training data

Outcome: Reduced risk of data leakage, regulatory breaches, and model poisoning.

  1. Access & Identity Controls

AI expands identity risk — and identity must be the first guard rail.

  • Role-based access control for AI tools
  • MFA enforced for all privileged AI-related actions
  • Continuous monitoring of service accounts used by AI systems

Outcome: AI cannot be misused by compromised or over-privileged identities.

  1. Auditability and Explainability

Boards must be able to audit what AI did, not just what it produced.

  • Logging of all AI actions, prompts, and outputs
  • Explainability thresholds for high-risk decisions (fraud, finance, safety, customer impact)
  • Version control for models and prompts

Outcome: Transparency, accountability, and defensibility in incidents or regulatory reviews.

  1. Controlled Integration Points

AI tools often chain into other systems — the silent danger.

  • Security reviews before any AI tool integrates with business applications
  • No unmanaged plug-ins or extensions
  • Continuous monitoring of API calls made by AI systems

Outcome: AI cannot silently expand the attack surface through poorly controlled integrations.

  1. Use-Case Governance

Not every AI capability should be deployed.

  • Approved list of business-acceptable use cases
  • Red flags for prohibited ones (e.g., customer-facing medical or legal guidance without validation)
  • A clear escalation path for high-risk or experimental use

Outcome: AI is used deliberately — not reactively.

  1. Human Oversight for High-Impact Decisions

AI augments judgment; it must not replace it.

  • Mandatory human approval for high-risk automated decisions
  • Pairing of AI insights with human contextual judgement
  • Dual-control process for financial, legal, or reputational decisions

Outcome: AI informs decisions but never becomes the sole decision-maker.

  1. Continuous Monitoring and Drift Detection

Models change over time — sometimes dangerously.

  • Monitoring for performance deterioration and model drift
  • Alerts when models behave outside expected norms
  • Periodic re-training and recalibration

Outcome: AI stays reliable, predictable, and aligned with business intent.

Final Board Action: Mandate an AI Governance Framework

Boards should require the CISO and CIO to jointly deliver an AI Governance Framework covering:

  • Policy
  • Controls
  • Monitoring
  • Metrics
  • Reporting
  • Incident response
  • Accountability

This positions AI as both a business accelerator and a governed risk — not an uncontrolled experiment.

  1. How does cyber risk tie directly to business objectives and what is the ROI?

This is the question that shifts cyber from a cost centre to a strategic enabler.

Boards increasingly expect CISOs to quantify cyber risk with the same rigour as financial risk. This requires modelling the cost of attacks, the cost of controls, and the risk avoided through automation.

The Financial ROI Boards Should Expect

Using industry-standard ALE modelling (based on Sophos “State of Ransomware 2024”):

  • Probability of ransomware: 0.594
  • Average ransomware cost: $3.61M

ALE = 0.594 × 3.61M = $2.144M

Meaning:
The average organisation faces $2.14M in expected annual ransomware losses if key controls are not enforced.

CCM monitors the five controls proven to prevent 60%+ of attacks:

  • MFA
  • Patch status
  • Endpoint protection
  • Identity/config drift
  • Backups and disaster recovery readiness

Risk avoided:

$2.144M × 60% = $1.287M per year

If enterprise CCM costs ~$100K, then:

ROI = 1,187%

This moves cyber investment from “technology spend” to “risk reduction with measurable financial return”.

How Boards and CISOs Move Closer Together

Boards often don’t see the operational pain CISOs face:

  • Too many systems
  • Too much manual evidence gathering
  • Too many audits
  • Too many blind spots
  • Not enough people

At the same time, CISOs often don’t translate risk into business-aligned language.

Here’s how to close the gap:

  1. Ask for outcome-based reporting, not technical reporting

Request insights tied to uptime, financial exposure, customer trust and regulatory risk.

  1. Require an annual “Cyber ROI & Exposure Forecast”

Just like any other business unit.

  1. Encourage the CISO to replace manual processes with automated assurance

Not as a cost-saving initiative — but as a resilience and risk-reduction strategy.

  1. Set joint KPIs between Cyber, Risk, Finance and Operations

This embeds cyber into the organisation’s core decision-making model.

Final Thought: Good Governance Starts With the Right Questions

Cyber resilience in 2026 demands more than oversight — it demands informed engagement.

When Boards ask better questions, CISOs provide better answers.
When CISOs translate risk into outcomes, Boards make stronger decisions.
And when automation replaces manual control testing, everyone gains clearer visibility, lower cost and stronger resilience.

These five questions are where that shift begins.

 

RECENT POSTS

The Five Questions Every Board Should Ask Their CISO in 2026

How Boards Strengthen Cyber Resilience, Improve Decision-Making and Protect Business Outcomes Cyber security has shifted from a technical function to a core component of operational resilience. Boards now own cyber risk in the same way they own financial risk and regulators, insurers and shareholders expect visible accountability. Yet there’s still

Find out more

What to Expect: January 2026 DORA Review and Supervision

The Digital Operational Resilience Act (DORA) is reshaping how financial services firms across the EU manage operational and cyber risk. Enforcement officially began on 17 January 2025, and now the focus is shifting to the supervisory review scheduled for January 2026. This imminent oversight will be guided by the European

Find out more

What It Really Means to Be Operationally Resilient

Every organisation today claims to be operationally resilient. But when a cyberattack hits, a critical supplier fails, or an outage brings core services to a standstill, how many can truly say they are? Operational resilience has become one of the biggest buzzwords in business, a phrase that appears in board

Find out more

Contact Us

To find out more about cyber security and Continuous Controls Monitoring, please complete the form below with a short message and we’ll get right back to you. Alternatively, you can book a meeting directly.

Address:
5th Floor,
72 King William Street,
London,
EC4N 7HR

 

Seamless Integration with Archer

The integration between Quod Orbis and Archer enhances your existing Archer implementation by expanding its capabilities to meet specific business, industry, regulatory, and technical requirements. This partnership enables organisations to streamline their risk and compliance processes with Continuous Controls Monitoring (CCM).

Please note that we do not provide an installation package on the Archer Exchange. To learn more about this partnership or to request assistance with platform setup, control configuration, and integration, please contact us at [email protected] or book a chat directly here. You can also find out more information on the Archer Exchange.

Atyaf eSolutions is a technology solutions provider specialising in offering a broad range of digital services and products. Founded with a vision to deliver innovative and efficient technology solutions, Atyaf eSolutions focuses on helping businesses and organisations achieve their digital transformation goals.

Atyaf eSolutions is known for its customer-centric approach, aiming to deliver high-quality, reliable, and cost-effective solutions. The company leverages the latest technologies and methodologies to ensure that its clients stay ahead in the competitive digital landscape. With a team of skilled professionals, Atyaf eSolutions is committed to driving digital innovation and supporting businesses in their growth and success.

Gieom is an established provider of operational risk and resilience solutions. We enable financial institutions to evidence regulatory compliance and assure key stakeholders that their risk and resilience frameworks are robust and sustainable.

With over 100 clients globally, and 12 years experience in designing, implementing, and maintaining operational resilience and risk solutions, Gieom has a proven record in helping firms to interpret regulations, meet compliance obligations, automate complex and repetitive processes, manage policies and procedures with integrity, and leverage Generative AI to strengthen operational resilience.

Gieom’s Operational Resilience Platform offers a robust end-to-end framework for identifying critical business services, mapping resources, setting impact tolerances, managing risks and controls, analysing data and implementing effective remediation strategies. Its modular, low-code, drag-and-drop design accelerates your journey to operational resilience and compliance, allowing rapid remediation based on identified gaps that are specific to your organisation.

Crafted in collaboration with former regulators and industry experts, and underpinned by Magpie AI (Gieom’s GenAI engine), our DORA 360 solution enables financial institutions and their ICT service providers to align with technical standards set within the EU Digital Operational Resilience Act (DORA).

DORA 360 offers policy mapping, process visualisation, risk management, incident management reporting, supply chain management and resilience management, with both on-premises and cloud deployment options. Magpie AI also delivers regulatory intelligence on demand and automatically assesses ICT service provider contracts to reveal compliance gaps.

DORA 360 can also be used for other IT Service Management (ITSM) frameworks such as ITIL and NIST.

Forging powerful partnerships is critical to providing cutting-edge solutions in today’s dynamic IT landscape. YASH Technologies collaborates with a global leader in CCM, Quod Orbis, to deliver best-in-class 360⁰ Cyber Posture Management Services. YASH’s decades of industry expertise and a team of highly skilled security professionals, combined with Quod Orbis’s industry-leading Continuous Controls Monitoring (CCM) platform, create a holistic monitoring solution for businesses. The Quod Orbis platform provides real-time, holistic visibility across your entire IT infrastructure, encompassing cyber security, risk management, and compliance. This translates to a single source of truth for your organisation, empowering you to stay ahead of ever-evolving security threats. With YASH’s advisory and the power of the Quod Orbis platform, you can confidently navigate the complex world of IT security. Click here to know more.

Deda was born from the entrepreneurial journey of the Podini family, characterised by a constant desire to explore new markets and innovate business models to generate positive social impact and help create shared and lasting value. The initial commitment in the large-scale retail sector has evolved into a diversified reality that also embraces other strategic sectors such as real estate, finance and technology, in Italy and abroad, looking to the future with enthusiasm and determination.

Deda Tech is Dedagroup’s Managed Cloud & Security Services Provider. Specialising in creating future-oriented IT strategies by transforming top vendor technologies into people-focused solutions. Over 200 tech talents with more than 600 certifications, a team in step with industry evolutions thanks to more than 20 years of experience.

Amazon Web Services (AWS) is a comprehensive and widely adopted cloud platform, offering over 200 fully featured services from data centers globally. AWS provides a broad set of infrastructure services, such as computing power, storage options, and networking, as well as higher-level services like artificial intelligence (AI), machine learning (ML), data analytics, and Internet of Things (IoT). AWS helps businesses scale and grow by providing the infrastructure and tools needed to innovate faster, reduce costs, and run applications with higher reliability.

PwC stands as a global leader in professional services, offering deep expertise in audit and assurance, consulting, and tax. With a presence in over 157 countries and a dedicated workforce of more than 284,000 professionals, PwC combines comprehensive industry knowledge with advanced technology to assist organisations in addressing their most complex challenges. Their risk management technology helps navigate the various phases of the risk management lifecycle so your business can stay ahead of threats.

Connecting your business to the best technology providers.  Behind Every Cloud are expert, independent trusted advisors who can help you cut through the noise and hype to quickly provide you with intelligent, market informed, fact-based vendor comparison services across a wide range of technology solutions.  Established in 2010, our unique approach and expert advice accelerates the speed and success of technology modernisation projects. We have access to a highly experienced network of vendors and are valued by our clients as an Independent Trusted Advisor.
 
We provide straight-talking, no-nonsense advice, to help you make the best buying decisions, and as one of the UK’s first specialist cloud adoption “referral consultancies”, we don’t charge clients for our advice.

Opentech is an IT services company, with an important history and significant experience in delivering management tools for company internal control systems (Compliance, Risk Management, Internal Auditing, etc.).

The company, established in 2003, operates in the development and distribution of software application products, with a particular focus on the Integrated Control System based on the OCEG (Open Compliance & Ethics Group) model.

Opentech is ISO 9001 and 27001 certified with extension to the 27017 and 27018 guidelines for software development, training and consultancy.

Opentech has created the GO GRC 2.0 Suite, a suite of integrated and independent software application solutions, owned by Opentech, designed entirely by our company specialists, with a consistent design based on the OCEG logical model, recognized as the Standard GRC.

The GO GRC 2.0 platform has been qualified by the National Cybersecurity Agency in the Italian Cloud Marketplace.

GO GRC 2.0 also covers specific areas that can be activated on-demand; our Suite, in fact, integrates different components in order to build a complete and effective Governance and Control model such as: Organization, Corporate Governance, Internal Audit, Compliance, Operational Risks, Line Controls, CFO, IT Risk, Supervisory Body, Privacy, Complaints, Purchases, Safety at work.

GO GRC 2.0 benefits from a direct, timely and continuous support from Opentech specialists who deal with the entire life cycle of the Suite.

The GO GRC 2.0 suite is also adopted by various major players in the financial and non-financial markets.

Secon is a leading cyber security company dedicated to protecting organisations from cyber threats, ensuring compliance and enhancing their security posture. We offer a comprehensive range of services and technologies tailored to corporations, financial institutions, and government entities.

We believe in three fundamental truths:

  • Every organisation is a potential target for cyber attacks or data breaches.
  • Continuous preparedness is essential, requiring 24/7 protection with the right tools and technology.
  • Effective recovery playbooks are crucial for swift business restoration post-breach.

At Secon, we address cyber security challenges with our holistic approach, providing tailored services such as Cyber Resilience Review, Cyber Risk Assessment, and 24/7 monitoring via our Security Operations Centre (SOC). We partner with leading security vendors to deliver top-tier solutions, including endpoint protection, network security, cloud security, and identity and access management.

Our purpose is to support organisations in developing the necessary tools, technologies, and processes to enhance their cyber resilience against evolving threats. Organisations trust Secon to safeguard their assets, minimise risk and ensure peace of mind. 

Take a tour of our platform

Niall Flavin

DevOps Engineer -

Uttamkurmar Lakhani

Technical Analyst -

Register for updates

Please register your contact details with us to receive links to insightful blog articles as soon as they are published.

Address:
2nd & 3rd Floor,
2 Burgon Street,
City Of London,
London,
EC4V 5DR

 

Liam Flavin

Intern Developer -

Ekaterina Kuzevanova

Back End Developer -

Mohamed Mohamud

Front End Developer -

Juan Morales

DevOps Engineer -

Luke Bakare

DevOps Engineer -

Rutvik Belapurkar

Technical Analyst -

Harman Singh Malhotra

Technical Analyst -

Jason Wilkes

Technical Lead -

Annie Greenfield

Marketing Executive -

Will Tonge

Head of Recruitment -

Will has spent the last 9-years embedded in Cyber Security working with global, household names and innovative start-ups.

Passionate about bringing people and technology together, Will has worked in various settings, helping build high-growth organisations across multiple sectors. During this time, he has built an extensive network with access to some of the best talent out there.

Outside of QO, his young daughter keeps him well on his toes!

Shaun Barnes

DevOps Team Lead

Mark Hudson

Non-Exec Director -

Mark works with SMEs and charities to develop strategies to help them grow and access development capital. He is a NED, charity trustee and mentor to a wide range of people. His plural career started in 2017 after 16 years at pwc as a Deals partner working with large corporates and PE houses; at pwc he also ran the Retail and Consumer practice and was Chairman of the pwc UK Supervisory Board. Prior to pwc he was an executive director at Welcome Break and Iceland Group, and a partner at Bain and Company. He trained as an engineer at Imperial College and has an MBA from INSEAD. 

Register for our event

Sign-up to future Quod Orbis events

Eamon Flavin

Non-Exec Director -

Eamon is a highly regarded and massively respected technology career professional as well as serial entrepreneur. He has started, grown and successfully taken to market three technology business.

Genuinely expert in technology, Eamon has enjoyed long-term working relationships with many of the world’s top companies and organisations in finance, banking, government, manufacturing, engineering, technology and the charities sector.

He draws on unparalleled contacts and experience and provides advice, solutions and recommendations, as well as helping respond to emergencies. Eamon has grown in-house and client teams and has a gift for hiring great people.

Peter Martin

Non-Exec Director -

Peter has the ability to do what many fail to and that is to consistently bring together highly professional teams and build a business environment that is supportive, agile, professional and where everyone enjoys coming into the office.

Bringing a unique blend of business acumen and technical knowledge to the role of non-exec director, Peter has already demonstrated his ability to bring an exceptional flair for dealing with complex situations with a clear, considered approach.

Personally, Peter brings humility and a strong moral compass to the team. His disarming and self-deprecating approach wins everyone over.

Anwen Haynes

Head of Marketing -

Anwen has worked in B2B and B2C marketing for over 20 years. From transforming end-to-end customer journeys in retail with strategic customer-centric plans to target driven focused strategies for B2B sales. With extensive experience in digital marketing including SEO, as well as Brand development, she loves to develop a cohesive approach to brand image and communications to drive and develop the business proposition and perception.

Alice Walker

Head of Customer Success -

Alice has worked in the IT industry for 20 years. Starting in Procurement, she moved into Software Asset Management before transitioning into Customer Success Management. Working across a variety of roles for different industries as both a customer and a service provider has given her a great understanding of what makes a great service. She has always been passionate about building and maintaining great customer relationships and helping her customers achieve their goals.

Owain Rowley

Lead Developer -

Owain has spent nearly a decade building software solutions and products within the cyber security sphere for the likes of government entities, large telecommunication companies, banks and card transaction companies.

This level of experience allows him to swiftly identify business and security processes that can be streamlined with automation, increase the efficiency of existing processes, as well as generate insightful data visualisations and models for members of an organisation at each different level.

Ami Penolver

Head of HR & Legal -

Ami is a finance sector career professional, with many years’ experience working in financial services, both in London and throughout the UK. In addition to financial control, she looks after HR and legal for the company.

Being a mother of two also equips her with the basic skills required to manage a senior team of management and technology consultants.

Ami’s sense of balance and perspective is an essential ingredient of the Quod Orbis culture.

Alastair Dickson

Commercial Director -

Alastair has spent the last 20 years working in Cyber Security and Risk Management. He is a passionate believer that security solutions should enable a business to take advantage of all the benefits of the digital world, while not putting the organisation’s data or productivity at risk.

Alastair has developed high-performing teams in some of the industry’s most competitive markets and launched new innovative technologies to market.

Being a rugby coach, and also having four sons at home, means he has lots of experience in keeping a passionate team in order but always has time for some fun!

Gary Penolver

CTO -

Gary has 15 years’ experience in senior technology roles, and has already been closely involved in starting and taking two technology companies to market.

Totally comfortable with a fast-moving, state-of-the-art technical landscape, he helps his clients maintain and improve security and compliance.

He has a reputation for delivering pragmatic and easy to maintain solutions – business owners and managers enjoy knowing that the security and compliance is well managed and automated, properly instrumented and reported at a competitive cost point.

Honest, open, unflappable and very social, Gary is trusted by many household-name organisations to protect their, and their client’s data.

Martin Greenfield

CEO -

Martin is an experienced technology and organisational transformation specialist and an excellent, proven leader and communicator in mission-critical operations, particularly in security technology.

Over the past 20 years, multi-billion pound commercial organisations, including global banks, utilities and major investment funds have trusted Martin to transform their operations to meet financial, operational and compliance targets.

Martin optimises operations, managing and transforming operational teams of between 50 and 500 people, to deliver the highest levels of audit compliance, risk management and financial efficiency.

Often working with other major consultancies and suppliers for new global corporate owners or management teams, Martin will help integrate and streamline operations on a global basis.

Thank you.

Please register your contact details with us to receive links to insightful blog articles as soon as they are published.

Sign Up!

Fill in your details to access the Liberty & QO White Paper

Request a Quod Orbis CCM demo

Contact us to schedule a demo of the Quod Orbis CCM managed platform.

See it for yourself – automated Continuous Controls Monitoring (CCM), with complete cyber controls visibility in a single pane of glass, continuance compliance, automated audits, our unique service wrap, and more.

Please complete your details and a member of the Quod Orbis team will be in touch soon.