Aikido

How to Get Your Board to Care About Security (Before a Breach Forces the Issue)

Written by
Mike Wilkes

If you’ve ever read one of those “Board Reporting Templates for CISOs” articles and thought, “Ah yes, surely my board will dedicate 25 minutes to my posture dashboard and ask follow-up questions about vulnerability backlog burn-down velocity,” then I have wonderful news for you: You have not met enough boards.

Most enterprise boards don’t want a security dashboard. They don’t want posture metrics. They don’t want a heat map that looks like a NASA launch risk briefing. What they want, whether they say it explicitly or not, is decision support.

They want a defensible way to choose between competing risk narratives. They want to know whether to invest in mitigation A or B. They want to reduce uncertainty. They want to avoid a career-ending surprise and here’s the part most security leaders don’t want to hear:

Boards don’t fund security because it’s important. They fund security when the decision feels rational, bounded, and defensible.

Let’s talk about how to make that happen.

Why Boards Don’t Care About Security

Boards are not anti-security. They’re not reckless and they’re not stupid. They are simply optimized, structurally, culturally, and psychologically, for outcomes discussions.

Security is an odd discipline because the best-case outcome is nothing happening. No headlines. No disruption. No emergency meetings. No ransom negotiations. No sudden “how could this have happened?” calls.

And “nothing happened” is not an outcome the board can easily value. It’s a void. It’s hypothetical. It’s counterfactual. It’s a ghost story. So the board naturally falls into the mindset every human falls into:

“Nothing has happened so far.”

Which is tragically seductive logic. It’s also one of the most expensive sentences in corporate history. The problem is that the absence of proof is not proof of absence. It’s more often evidence of luck, obscurity, or poor detection. Boards are not being irrational here. They’re applying the same reasoning they use elsewhere:

  • If we ship, we see revenue.
  • If we market, we see pipeline.
  • If we hire, we see throughput.
  • If we cut costs, we see margin.

But security? The success metric is a negative space. So unless you help them feel the decision as concrete and bounded, security will always be relegated to a nice to have.

Why “Trust Me, This Is Important” Never Works

There are two common board-level security presentations:

Slide Type Approach
Slide Deck Type A
“We’re all gonna die.”
Fear-based narrative. Heavy on threat actors, scary stats, and worst-case scenarios. Ends with a budget request and a vague sense of doom.
Slide Deck Type B
“Everything is just fine.”
Posture dashboard approach. Green check marks. Trend lines. Compliance progress. The subtle message is, “We have it handled.”

Both approaches are untrue and both approaches fail. Boards don’t respond well to panic because panic is not a plan. Panic is a request for emotional trust, and boards are explicitly designed not to run on emotion.

And boards don’t respond well to “everything is fine,” because then the question becomes why you need more money. The CISO is stuck trying to walk a tightrope between sounding like Chicken Little and sounding like an overfunded bureaucrat. You don’t want the board to feel fear. You want them to feel clarity and confidence.

How Boards Actually Think About ROI and Risk

Security leaders often mistakenly try to “prove ROI” the way marketing or sales might. Boards do not think about security the way they think about revenue. They think about it the way they think about risk, insurance, and resilience.

Here’s the board mental model, simplified:

  • What are our competitors doing?
  • What is our expected loss?
  • What is the cost of reducing it?
  • What is the probability?
  • What is the impact?
  • What is the uncertainty?
  • What is the worst plausible operational outcome?

Security frameworks tend to have a prevention bias. They assume we can prevent bad things from happening if we just implement enough controls and buy enough tools. Boards understand something security teams sometimes forget: prevention is not binary. Some failures are inevitable. As the infosec mantra goes, it’s not a matter of if you will be breached, it’s a matter of when. This is why boards will fund insurance but resist increased spending on security tooling.

Insurance is a bounded financial instrument. It has a premium, a policy, and a payout. Even if it doesn’t cover everything, it’s a familiar decision shape.

Security investments often come as open-ended commitments:

  • “We need a platform.”
  • “We need a program.”
  • “We need better posture.”
  • “We need more tools.”

Boards hear, “We need a blank check to fight an invisible enemy forever.” That’s not a board-friendly ask. The board wants a choice in order to take a decision.

The Real Cost of a Breach

Most breach cost discussions are stuck in the shallow end of the pool:

  • fines
  • legal settlements
  • PR damage

Those matter, but the operational reality is worse and more relevant. The true cost of a breach is the forced reallocation of your most scarce resource: engineering focus. A major incident doesn’t just cost money. It displaces planned work. It steals quarters of development.

Incident response is not “just IT cleaning things up.” Real incident response includes:

  • forensic investigation requiring chain-of-custody devices taken out of service
  • hardware refresh (because you can’t trust compromised endpoints)
  • emergency identity resets and access redesign
  • cloud re-architecture under duress
  • re-issuing secrets and certificates
  • re-validating backups (which may be compromised too)

It’s messy, expensive and disruptive (just ask Caesars or 23andMe).

Customer trust and churn is also not theoretical. Loyalty is hard won and easily lost, especially in enterprise contracts where renewal cycles create a natural exit ramp.

After a breach, the question isn’t “how did the attacker do it?” The question becomes: “Who knew what, and when?” Suddenly your security program isn’t being evaluated on its technical merits. It’s being evaluated on its narrative defensibility by armchair quarterbacks.

Which brings us to the uncomfortable truth:

The first attack is the threat actor.
The second attack is everyone else.

How to Talk About Breach Events

Experienced CISOs don’t obsess over breach likelihood. They talk about breach cadence.

Because the question isn’t whether you’ll ever have an incident. The question is:

  • How often will you face compromise?
  • How quickly will you detect it?
  • How well can you contain it?
  • How fast can you restore operations?

This is resilience thinking, not prevention thinking. And if someone says: “We’ve never been breached.” The correct response is not to argue. It’s to gently reframe. The more mature your detection is, the more incidents and breaches you discover. This is deeply counterintuitive for executives. In other words, improved visibility can make you look “worse” before it makes you safer.

Attackers also exploit basic hygiene failures far more often than sexy zero-days. The myth that breaches require elite adversaries is comforting, but it’s usually wrong. Modern attackers move quickly. Mean-time-to-exploitation is now measured in minutes and hours, not days and weeks, especially as AI accelerates exploit development and phishing scale. Your resilience is defined by your adaptability and not your ability to restore backups and return to a prior state. Because the prior state was the vulnerable configuration that got you breached in the first place.

The Only Security Metrics Boards Actually Care About

Boards don’t want a dashboard. They want a steering wheel. So what security metrics matter?

Risk exposure trends

Not “number of vulnerabilities,” but how your exposure is changing and why. Always report in percentages and deltas from the previous quarter’s metrics and not absolute numbers of vulnerabilities.

Time-to-detection and time-to-remediation

These are operational metrics with direct business meaning. Include auto-remediated metrics from code scanning for shared secrets, vulnerable configurations with your CSPM, configuration drift and supply-chain risk like the recent NPM Shai-Hulud attacks.

Blast radius reduction

This is the most board-relevant security concept: containment. Not “can we stop every fire,” but “can we keep a kitchen fire from burning down the building.” 

This is where “what if” thinking becomes powerful. Google’s SRE blog popularized the “Wheel of Misfortune” with weekly tabletop exercises: recurring structured incident simulations. NASA uses a similar concept: the “pre-mortem.” You assume failure, then you work backward to understand how it will happen. Security chaos engineering is the evolution of this: thoughtful experiments around failure states, rooted in operational reality, not theater.

Known unknowns vs blind spots

Boards can understand uncertainty. They cannot understand “we have 13,492 critical vulnerabilities.” But they can understand:

  • “We do not know whether lateral movement is possible between these environments.”
  • “We do not have objective validation of our external attack surface.”
  • “We do not know if our detection pipeline can catch credential stuffing.”

This is why third-party penetration testing is incredibly valuable when used properly. Not as a checkbox, but an objective discovery and validation of risk mechanism.

Security Metrics That Hurt Your Case

Now let’s talk about the metrics that make boards and senior leadership tune out.

Tool counts

More tools is not more security. Each tool is effectively a privileged user. Each one becomes part of the attack surface. Each one adds operational complexity. Deep maturity with a few tools beats shallow implementations of dozens of tools.

Vulnerability volumes

Not all criticals and highs are equal. The rise of EPSS-style thinking makes this obvious: only a small percentage of vulnerabilities ever become exploited in real breaches. Volume-based metrics confuse prioritization.

CVE severity totals

Severity is not the same as exploitability. Reachability and context matter more. Boards don’t want to fund a war on numbers because it simply cannot be won.

Compliance completion percentages

Every breached company had audits and had compliance reports. Compliance is a low bar. Real security is the goal. When CISOs bring these metrics to the board, they often do it because those are the easiest metrics to produce. But easy is not the same as persuasive.

Using POCs to Turn Hypothetical Risk Into Evidence

One of the most effective tools a security leader has is the paid proof-of-concept. Not as a feature bake-off. As a structured discovery experiment. A good POC is board-safe because it produces evidence without fear-mongering. It can:

  • surface unknown critical issues
  • validate whether a risk narrative is real
  • reduce uncertainty around current controls
  • provide a defensible basis for investment

The key is to treat it like a business experiment:

  • Define the hypothesis.
  • Define the success criteria.
  • Define the timebox.
  • Define what “no” looks like.

Then you can go back to the board and say: “We ran a bounded evaluation. Here is what we learned. Here are the decision options.” Boards love bounded decisions.

Budget Allocations After a Breach

There’s a tragic pattern in security leadership: Breach → “told you so” → budget unlocked.

But this is a poisonous gift. Because the post-breach CISO is often given the resources the pre-breach CISO begged for and was denied. And the pre-breach CISO is often shown the door. This is not just unfair, it’s organizationally damaging. Because of the second attack, the armchair quarterbacks, investigators, insurers, regulators, often destroy the CISO’s credibility even if they handled the incident well.

Many CISOs don’t survive the second attack. And then succession planning, or lack of it, introduces an entirely new vulnerability window. Threat actors know this. They pile on. They exploit the chaos of leadership change. You can end up fighting a war on two or three fronts:

  • opportunistic attackers
  • organized crime
  • internal organizational instability

The way to avoid this trap is to build board-level decision support before the breach.

How to Handle Common Objections

Executives and boards have a small set of predictable objections. The mistake is to rebut them like a debate. The right move is to reframe them like a decision. You should also make sure you read “Appendix A: Questions for the Board to Ask Management About Cybersecurity” from the NACD 2017 Board Handbook and be prepared to answer each of those questions.

“It’s too expensive.”

“Expensive” compared to what? Compared to the expected loss? Compared to the cost of downtime? Compared to the opportunity cost of diverted engineering sprints and deliverables?

“We already have something.”

This is a blind spot objection and usually includes reference to bundled services from your Microsoft 365 subscription. Don’t argue about replacement but instead talk about how Microsoft Defender is necessary, but not sufficient. Talk about outcomes:

  • What can we detect?
  • What can we prevent?
  • What can we contain?
  • What do we not know?

“We’re already compliant.”

Compliance is not risk reduction. It is evidence you passed a checklist. It is not evidence you can survive an incident.

“We’ll build it internally.”

Internal build decisions must include:

  • maintenance burden
  • training costs for new hires
  • opportunity cost
  • long-term ownership risk

The build versus buy decision should make sure to address whether this is a core competency. Security tooling is not “a one-time project.” It’s an operational commitment and a journey. For many years running corporate email systems was a multi-person IT team. Now it’s largely outsourced to Microsoft and Google with much better security results and lower cost. Phil Venables once mentioned to me that his biggest regret when running security at Goldman Sachs was that they insourced far too much of their capabilities just because they could. Not because it was the right thing to do.

“We’ll use open source.”

Open source is definitely excellent and worthy of trust. But boards should understand the difference between:

  • capability
  • reliability
  • accountability

Open source gives you code. It does not give you a service guarantee or “one neck to throttle.”

“Pentests are enough.”

Pentests are point-in-time snapshots, often performed just one week per year. Boards should demand continuous risk management.

“That won’t affect us / We’ll never be hacked.”

Confidence is an assumption. Assumptions must be validated. This is where board governance guidance matters. The board doesn’t need to become technical. But it does need to become decision-capable around IT risk and business disruptions to understand the nature of cybersecurity risks as systemic risk.

What a Board-Ready Security Investment Case Looks Like

So what does a credible security investment actually look like?

Clear risk framing and a relevant framework

Framework choice matters. Some frameworks are showing their age and are poorly suited for cloud-native companies. One of the worst things you can do is let the organization settle on an antiquated measuring stick. The CIS Top Controls are among the best cybersecurity frameworks because they’re updated regularly and keep pace with cloud-based innovations and techniques.

Measurable uncertainty reduction

Security is not just about controls. It’s about reducing ambiguity. And here’s the leadership quote I want every executive to memorize:

“As managers we execute a plan,
as leaders we manage scarcity, and
as executives we manage ambiguity.”

Boards manage ambiguity. Your job is to help them reduce it by presenting context and data.

Time-bound evaluation with qualitative ROI

Don’t over-math it. Keep it conceptual. “What does success look like in 90 days? In 6 months?” When does the solution pay for itself in cost avoidance or the decommissioning of a legacy tool that is no longer delivering effective security controls and risk avoidance?

Defined success criteria

Functional and non-functional requirements:

  • availability
  • confidentiality
  • integrity
  • operational overhead
  • resilience impact

This is how you package the ask into something the board can approve without feeling like they’re signing up for a hope and a prayer.

The One Mistake CISOs Make When Talking to Boards

The biggest mistake CISOs make is thinking the board will fund security because it’s important. Boards do not fund importance. They fund defensible decisions. So the goal is not to impress them with the complexity of the threat landscape.

The goal is to give them a bounded, rational tradeoff:

  • Here are the competing risk narratives.
  • Here is what we know.
  • Here is what we don’t know.
  • Here are the options.
  • Here is the cost.
  • Here is what changes if we act.
  • Here is what stays uncertain if we don’t.

When you do that, the board can do its job. And ironically, that’s when they start caring about security.

Pace Layering and Why Governance Moves Slowly

Good security programs operate across multiple layers of change. Stuart Brand’s pace layering model is useful here:

  • Fashion
  • Commerce
  • Infrastructure
  • Governance
  • Culture
  • Nature

Technology moves quickly at the edge, like fashion. Governance moves slowly, and that slowness is not a problem to be solved. It is the stability layer that keeps businesses from thrashing. If you want the board to move, you have to speak in governance terms: bounded decisions, reduced ambiguity, defensible tradeoffs. Because talking to the board is the easy part.

What’s difficult is adding value to their thinking.

Share:

https://www.aikido.dev/blog/how-to-get-your-board-to-care-about-security

Subscribe for threat news.

Start today, for free.

Start for Free
No CC required

Get secure now

Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.

No credit card required | Scan results in 32secs.