â Index
Board Cybersecurity Reporting Guide
An Annotated Teaching Framework
Based on Best Practices + Educational Commentary
This guide transforms a real cybersecurity board report into a comprehensive teaching tool.
Each slide is followed by detailed commentary explaining why it works, what principles it demonstrates,
and practical do's/don'ts guidance for creating your own board reports.
â Complete Framework
All core principles: Material Risks Only, Focus on What You Control, Context is Everything, Named Accountability, Four Risk Management Strategies
â Practical Examples
Board report slides based on best practices with 13 slides covering risks, metrics, projects, ROI, and board decisions
â Formulas & Templates
ROI calculations, risk scoring, MTTD/MTTR, M&A briefing templates, emergency protocols
â Customizable
Framework, not prescription â adapt to your company's maturity, industry, and board preferences
This document transforms a real board cybersecurity report into an educational teaching guide. After each slide, you'll find commentary explaining why the slide works, what principles it demonstrates, and practical guidance for creating your own board reports.
Critical: This Is a Framework, Not a Prescription
Your company's maturity level, industry, risk profile, and board preferences are unique. You should feel empowered to adapt this structure, add risks that matter to your organization, and present in the style that resonates with your board. The principles matter more than the exact format.
Companies are at different stages of maturity. A startup's board report will look different from an enterprise company's. Healthcare faces different risks than manufacturing. A board that prefers detailed metrics needs different presentation than one that wants high-level narrative. Make sure to include what YOUR board needs to understand the risks of YOUR organization and make informed decisions.
How to Use This Guide
- White slides = The actual board report (what goes to your board)
- Tan sections like this = Educational commentary (teaching material, not for board)
- Each commentary explains the "why" behind the slide's design, which best practices it demonstrates, and provides do's/don'ts guidance
- Content is balanced across all slidesâlater slides get as much attention as early ones
- Guidance varies per slide to avoid repetitionâdifferent principles demonstrated throughout
The Living Document Philosophy
Your board report must evolve with your company. While there are common cybersecurity risks most organizations face, your specific risk profile depends on your business model, industry, technology stack, processes, and people. The risks for a healthcare SaaS company are different from those of a manufacturing company or financial services firm.
Before you create your report, understand your context: What are your strategic initiatives? What business processes are critical? What regulatory obligations do you have? What's your risk appetite? Your board report should answer: What are our material risks, how are we measuring them, what are we doing about them, is it working, and what do we need from the board?
TechHealth Solutions, Inc.
Cybersecurity Board Report
Reporting Period: Q3 2024 (July 1 - September 30, 2024)
Report Date: November 15, 2024
Presented by: Maria Chen, CISO
Classification: Board Confidential
Prepared for Board of Directors Meeting | November 2024
Overall Security Posture: TechHealth demonstrates a mature and improving security posture appropriate for a growth-stage healthcare SaaS company. We have 2 critical material risks requiring board attention, strong operational metrics exceeding industry benchmarks, and 7 strategic security projects aligned with business growth objectives.
Material Risks Requiring Board Attention
20 MindCare Acquisition Security Integration
Impact: $2-5M breach exposure, SOC 2 delay risk, HIPAA violation potential
Status: 25% complete, recovery plan in place
18 Vulnerability Management SLA Non-Compliance
Impact: 32% of high-severity vulnerabilities exceed 30-day SLA
Status: Staffing remediation approved (+2 FTE)
Key Performance Highlights
Risk Exposure Reduction
â 58%
YoY Improvement
Mean Time to Detect
12 min
120x faster than industry
Phishing Failure Rate
11%
39% improvement YoY
Strategic Projects Status
| Project |
Status |
Completion |
Business Impact |
| SOC 2 Type II Certification |
On Track |
69% |
Unblocks $12.3M ARR |
| MindCare Security Integration |
At Risk |
25% |
$2-5M risk reduction |
| FedRAMP Moderate Authorization |
On Track |
35% |
Opens $25M+ federal market |
1
Why This Slide Works
This executive summary demonstrates the "Material Risks Only" principleâthe foundation of effective board reporting. Notice there are only 2 material risks requiring board attention, not 10 or 20. The board doesn't need to know about every vulnerability or compliance gap. They need to know about risks that could significantly impact operations, revenue, reputation, or compliance.
The summary answers the board's core question in 30 seconds: "Are we okay?" The answer is qualified but clear: "Mature and improving posture, 2 critical risks, strong metrics, projects aligned with growth." This is exactly what a board needs to calibrate their level of concern before diving into details.
Key Principle Demonstrated: Business Language, Not Technical Jargon
Notice how risks are expressed in business terms the board understands:
- NOT: "Acquired target has unpatched vulnerabilities in legacy infrastructure"
- BUT: "$2-5M breach exposure, SOC 2 delay risk, HIPAA violation potential"
The board thinks in dollars, timelines, regulatory obligations, and business objectivesânot CVE numbers or CVSS scores. Every risk is translated into business impact they can understand and act upon.
Critical Question: Does the Board Actually Need This?
Before including any risk in your board report, ask three questions:
- Is this a material risk? Could it significantly impact operations, revenue, reputation, or compliance?
- Does the board need to act? Do they need to approve budget, accept risk, or make a decision?
- Is this changing? Are we introducing new risks or closing old ones?
If the answer is "no" to all three, it probably doesn't belong in the board report. Operational metrics and lower-level risks can be tracked elsewhere.
What Makes This Summary Effective
- Context immediately: "Growth-stage healthcare SaaS" tells the board what lens to use
- Metric benchmarking: "120x faster than industry" provides instant comparison point
- Business alignment visible: Every project shows business impact (ARR, market access, risk reduction)
- Status clarity: Green/yellow/red with completion percentagesâno ambiguity
- Named accountability implied: Later slides will show who owns each risk (CISO presenting indicates ultimate ownership)
â DO:
- Limit to truly material risks (typically 2-5 for most organizations)
- Express impact in business terms: revenue, operations, compliance, reputation
- Provide context: company stage, industry, what "good" looks like
- Show business alignment: how security enables or protects business objectives
- Include comparison points: targets, industry benchmarks, prior periods
â DON'T:
- List 15-20 risksâthe board will lose focus and assume you don't know what's actually critical
- Use technical jargon: "CVE-2024-1234," "SQL injection," "misconfigured IAM roles"
- Present metrics without context: "38 critical vulnerabilities" means nothing without trend/target
- Hide problems: If there are material risks, the board needs to knowâtransparency builds trust
- Include every project: Only show initiatives tied to material risks or strategic objectives
Risk Appetite Threshold: Board-approved limit = Risk Score >15 (requiring board visibility)
Risk Scoring: Likelihood (1-5) Ă Impact (1-5) = Risk Score (1-25)
Current Status: 2 risks out of appetite, 8 risks within appetite (monitored)
| LIKELIHOOD |
Low Impact |
|
|
Vulnerability SLA Score: 18 đ Reduce |
MindCare Integration Score: 20 đ Reduce |
| Very High (5) |
|
|
|
|
|
| High (4) |
|
Phishing Score: 12 â Trend |
Vendor Risk Score: 15 â Stable |
|
|
| Medium (3) |
BYOD Score: 9 đ Reduce |
|
|
|
|
| Low (2) |
|
|
|
|
|
|
Low (2) |
Med (3) |
High (4) |
V.High (5) |
Critical (5) |
|
IMPACT (Financial + Reputational + Regulatory) |
Risk Management Strategy Legend
| Strategy |
Application |
Risk Count |
| đ Reduce |
Implement controls to lower likelihood or impact |
6 risks |
| â Accept |
Risk within appetite with documented justification |
2 risks |
| â Transfer |
Cyber insurance coverage + vendor contract clauses |
1 risk |
| â Avoid |
Exit activity entirely to eliminate risk |
1 risk |
2
Why This Slide Works
This risk heat map demonstrates two critical capabilities: quantifying risk consistently and showing your risk management strategy. The board can instantly see which risks are "out of appetite" (scores >15, shown in yellow/red zones) versus risks being actively monitored and controlled (green zone).
The formula is transparent and repeatable: Likelihood (1-5) Ă Impact (1-5) = Risk Score (1-25). This isn't subjectiveâit's based on a board-approved methodology. When you say "Risk Score 20," the board knows exactly what that means and can track changes quarter over quarter.
Key Principle: Define Your Risk Appetite
The context box states the critical line: "Board-approved limit = Risk Score >15." This is risk appetiteâthe board's decision about what level of risk is acceptable given the company's industry, maturity, and competitive position. Everything above this line requires board visibility and action. Everything below it is monitored but doesn't require board-level attention.
This is a governance decision, not a technical one. The CISO recommends the threshold, but the board approves it. Risk appetite should be specific ("critical vulns remediated within 14 days"), measurable (you can report "in appetite" or "out of appetite"), and business-aligned (reflects your industry and maturity level).
The Four Risk Management Strategies
Notice the legend showing all four fundamental strategies for managing risk. You don't have just one way to handle risksâyou have a complete toolkit:
- đ Reduction: Implement controls to lower likelihood or impact (MFA, patching, training, monitoring). Most common strategyâ6 of 10 risks use this approach.
- â Avoidance: Eliminate risk entirely by avoiding the activity (don't use high-risk vendor, don't build risky feature, don't operate in dangerous regions). Requires business trade-offs but eliminates exposure.
- â Transfer: Shift financial impact to others (cyber insurance, vendor contract clauses, warranties). Doesn't reduce likelihood but protects financials.
- â Acceptance: Acknowledge risk and proceed with documented justification. MUST include: business justification, named owner approval (not just CISO), compensating controls where possible, and monitoring schedule. Never accept risks silently.
What Makes This Heat Map Effective
- Visual clarity: Color coding (green/yellow/red) shows risk severity at a glance
- Strategy transparency: Each risk shows which strategy is being applied (not just that risks exist)
- Trend indicators: "â Trend" shows risk improving, "â Stable" shows steady state, "đ Reduce" shows active management
- Accountability for methodology: Formula is stated explicitlyâno mystery math
- Board-approved threshold visible: Distinguishes "board-level concern" from "operational management"
â DO:
- Use consistent scoring methodology quarter over quarter so trends are meaningful
- Show which strategy (Reduce/Avoid/Transfer/Accept) you're applying to each risk
- Clearly mark the risk appetite threshold so board knows what requires their attention
- Limit heat map to material risks only (10-12 max)âdon't clutter with operational issues
- Document acceptance strategy risks with business justification and named owner approval
â DON'T:
- Change scoring methodology mid-yearâit makes trend comparison impossible
- Show 30+ risks on the heat mapâindicates you can't prioritize effectively
- Leave risks in the "red zone" without clear remediation plans and owners
- Accept risks without board approval and documented justificationâthis is a governance failure
- Use subjective terms like "high/medium/low" without quantifiable scoring criteria
Why This Matters to the Board: The MindCare acquisition (closed June 2024, $8.5M) added 47,000 patient records but brought significant security gaps. Unresolved vulnerabilities could result in $2-5M breach exposure, delay SOC 2 certification (blocking $12.3M ARR), and create HIPAA violation risk.
Risk Description
Root Cause: MindCare's legacy infrastructure was not included in pre-acquisition security diligence. Post-acquisition scanning revealed 8 high-priority security gaps including unencrypted backups, missing MFA, excessive admin access, and legacy identity systems.
Business Context: This is our first acquisition. Integration timeline was aggressive (90 days) to hit Q3 revenue targets. Security integration now on critical path for SOC 2 audit completion (Jan 2025 deadline).
Current State (25% Complete)
- â Network segmentation complete
- â EDR deployed to all endpoints
- â Identity migration 40% complete
- â Backup encryption pending (critical)
- â MFA deployment at 35% (target: 95%)
- â Access review incomplete
Target State (Q2 2025)
- Full identity consolidation into Okta
- AES-256 encryption on all backups
- 95% MFA adoption (MindCare users)
- Zero standing admin access (PAM)
- Quarterly access reviews established
- SOC 2 scope inclusion validated
Risk Management Strategy
Primary Strategy: Reduction - Accelerate remediation with dedicated project team, consulting support ($180K), and executive oversight (CISO + CTO co-ownership)
Secondary Strategy: Acceptance (Interim) - Documented interim risk acceptance for 6 months with compensating controls: network segmentation isolates MindCare environment, enhanced monitoring for MindCare systems (SIEM alerts), weekly executive risk review meetings
Key Metrics & Progress Tracking
| Metric |
Current |
Target |
Deadline |
| Integration Completion |
25% |
100% |
Q2 2025 |
| Identity Migration |
40% |
100% |
Q1 2025 |
| MFA Adoption (MindCare Users) |
35% |
95% |
Dec 2024 |
| Backup Encryption |
0% |
100% |
Dec 2024 (critical) |
| High-Severity Vulnerabilities |
23 open |
0 open |
Q1 2025 |
Recovery Plan
- Resource Addition: +1 Senior Security Engineer dedicated to MindCare integration (approved, starts Dec 2024)
- Consulting Support: Engaged Deloitte for identity migration acceleration ($180K, 8-week engagement)
- Timeline Adjustment: Extended target from Q4 2024 â Q2 2025 (realistic vs. overpromising)
- Executive Oversight: Weekly CISO + CTO review meetings with board escalation path
3
Why This Slide Works
This slide demonstrates how to brief the board on M&A security risksâone of the most common "unexpected event" scenarios. Notice the structure: business context first ("first acquisition, aggressive timeline for revenue targets"), then technical details, then strategy, then recovery plan with specific resources and ownership.
The "Why This Matters to the Board" box translates technical gaps into business language: not "unencrypted backups and missing MFA," but "$2-5M breach exposure, SOC 2 delay blocking $12.3M ARR, HIPAA violation risk." This is what boards need to calibrate their concern level.
M&A Security Briefing Template
When briefing the board on acquisition security risks, follow this structure:
- Security Posture Summary: Overall maturity vs. your standards ("Below our baseline" or "Comparable maturity")
- Critical Findings: Deal-breakers or major risks ("No SOC 2, would take 12-18 months" or "Active compromise detected")
- Inherited Compliance Obligations: New regulatory requirements ("Subject to HIPAA" or "EU operations add GDPR scope")
- Integration Timeline & Costs: Realistic estimates ("18-month integration, $2.5M in security tooling/remediation")
- Recommended Strategy: Reduction, Acceptance with controls, or if severeâAvoidance (walk away from deal)
Critical: Security diligence should happen BEFORE deal closes. This example shows post-acquisition discoveryânot ideal but common in fast-paced deals. Always flag if security wasn't included in due diligence.
Risk Strategies in Action: Reduction + Temporary Acceptance
Notice this slide demonstrates a dual strategy:
- Primary Strategy: Reduction â Dedicated team, $180K consulting, executive oversight to actively reduce the risk
- Secondary Strategy: Acceptance (Interim) â Documented 6-month interim acceptance while remediation is underway, with compensating controls (network segmentation, enhanced monitoring, weekly executive reviews)
This is mature risk management. You're not pretending the risk doesn't exist, and you're not claiming you can fix it overnight. You're showing the board: "Here's the problem, here's our plan to fix it, here's how we're protecting ourselves while we work on it, and here's who owns it."
Current State / Target State Framework
The two-column layout showing "Current State (25% Complete)" vs. "Target State (Q2 2025)" gives the board instant understanding of where you are and where you're going. This is especially effective for project-based risks where progress is measurable. Color coding (â green, â yellow, â red) provides visual status assessment.
â DO:
- Always include business context for M&A risks: Why did we acquire? What revenue/strategic value?
- Show recovery plan with specific resources, budget, timeline, and named owners
- Use multiple strategies: Reduction (active remediation) + Acceptance (interim with controls)
- Document compensating controls when accepting risk: segmentation, enhanced monitoring, review schedule
- Be transparent about timeline slips: "Extended Q4âQ2" shows honesty, not failure
â DON'T:
- Hide M&A security issuesâboards WILL find out, and trust will be damaged permanently
- Accept M&A risks without interim compensating controls while remediation is underway
- Promise unrealistic timelines to make the board feel betterâyou'll just fail publicly later
- Skip the "Why This Matters" translationâboard needs business impact, not technical details
- Leave ownership ambiguousâ"CISO + CTO co-ownership" shows clear accountability
Why This Matters to the Board: TechHealth's vulnerability remediation is falling behind policy SLAs: 32% of high-severity vulnerabilities exceed the 30-day deadline. This increases exploitation risk, creates SOC 2 audit exposure, and could trigger customer contract compliance clauses requiring 95% SLA compliance.
Risk Description
Root Cause: Vulnerability volume increased 47% YoY (company growth + MindCare acquisition) but SecOps team remained flat at 4 FTE. Current workload: 280 vulnerabilities/month vs. 190 last year. Team capacity: 200 vulnerabilities/month at quality standards.
Business Impact: SOC 2 Type II audit requires 90% SLA compliance (currently at 68% for high-severity). Audit failure delays certification, blocking $12.3M ARR in delayed enterprise deals. 15 customer contracts have "95% vulnerability remediation within 30 days" clauses.
Current Performance vs. Policy
| Severity |
Policy SLA |
Current Performance |
Compliance Rate |
Status |
| Critical |
7 days |
6.2 days avg |
94% |
Meeting SLA |
| High |
30 days |
42 days avg |
68% |
Non-Compliant |
| Medium |
90 days |
78 days avg |
89% |
At Risk |
Trend Analysis (Past 12 Months)
Key Observations: Declining trend from 88% (Jan 2024) to 68% (Sep 2024). Volume increased 47% YoY (MindCare acquisition added 47 assets in June). Team capacity unchanged at 4 FTE. Without intervention, forecast shows continued decline to 62% by Dec 2024.
SOC 2 Impact: Type II audit requires âĽ90% compliance. Current 68% creates audit risk and delays $12.3M ARR in enterprise deals.
Risk Management Strategy
Primary Strategy: Reduction
- Staffing: +2 FTE Security Engineers (approved, hiring in progress, Jan 2025 start)
- Automation: Deploy ServiceNow vulnerability workflow (reduces manual triage by 40%)
- Prioritization: New risk-based scoring (CVSS + exploitability + asset criticality)
Secondary Strategy: Acceptance (Interim)
- Documented: Board-approved interim acceptance (3 months) with compensating controls
- Controls: Network segmentation limits blast radius, EDR detects exploitation attempts, penetration testing validates controls
Recovery Timeline & Expected Outcomes
Dec 2024: ServiceNow automation deployed â +40% triage efficiency
Jan 2025: +2 FTE Engineers start â +50% remediation capacity
Feb 2025: Backlog cleared â 80% SLA compliance achieved
Mar 2025: Sustained performance â 90%+ SLA compliance (SOC 2 requirement met)
4
Why This Slide Works
This slide demonstrates the critical principle: "Focus on What You Control." Notice what's being measured: SLA compliance rates (how quickly we remediate vulnerabilities), NOT discovery rates or total vulnerability counts. You cannot control how many vulnerabilities vendors introduceâbut you CAN control how fast you fix them once discovered.
The trend chart shows 9 months of declining performance (88% â 68%), clearly exposing the problem. This is transparencyânot hiding bad news, but showing the board exactly where you stand and your plan to fix it. The board appreciates honesty over false confidence.
Four Types of Vulnerability Metrics (Report What You Control)
- Time to Remediate: Average days from discovery to patched/mitigated (CONTROL THIS)
- SLA Compliance Rate: % of vulns remediated within policy timelines (CONTROL THIS)
- Aging Backlog: Count and age of open vulnerabilities by severity (CONTROL THIS)
- Remediation Velocity: How fast you're working through the backlog (CONTROL THIS)
DON'T report: Total vulnerability count or discovery rateâthese fluctuate based on scanning coverage, vendor patches, and acquisition activity. The board can't act on "we found more vulnerabilities"âthey CAN act on "we're taking 42 days to fix high-severity issues when policy requires 30 days."
Named Accountability & Root Cause Analysis
Notice the root cause is stated explicitly: "Volume increased 47% YoY but SecOps team remained flat at 4 FTE." This isn't blamingâit's explaining the systemic issue. The board understands: growth creates new vulnerabilities, and security staffing must scale with company growth.
The solution shows clear ownership: approved +2 FTE, deployment timeline, expected outcomes. No ambiguity about who's responsible or what success looks like ("90%+ SLA compliance by Mar 2025").
Context is Everything: Trend Charts with Targets
The 12-month trend chart includes the critical context the board needs:
- Policy target line (90%): Shows what "good" looks like
- Color coding: Green (meeting), yellow (at risk), red (non-compliant)âinstant visual assessment
- Minimum 6 data points: 9 months of trend data shows this isn't a one-month anomaly
- Forecast stated: "Without intervention, decline to 62% by Dec 2024"âshows urgency
Never show single point-in-time metrics. "68% compliance" means nothing without knowing: Is this better or worse than last quarter? What's the target? Where's the trend going?
â DO:
- Report remediation SLA complianceâwhat YOU control
- Show minimum 6-12 months of trend data with target line
- Explain root cause: "47% volume increase, team flat at 4 FTE"âsystemic, not blame
- Connect to business impact: "$12.3M ARR delayed if SOC 2 audit fails"
- Show recovery plan with timeline, resources, expected outcomes
â DON'T:
- Report total vulnerability countsâyou can't control vendor patch releases or discovery rates
- Show single-month snapshots without trend context
- Hide declining performanceâtransparency builds trust, hiding problems destroys it
- Leave the board guessing what "good" looks likeâalways show policy targets
- Report metrics without accountabilityâwho owns fixing this and by when?
Why This Matters to the Board: TechHealth relies on 72 third-party vendors with data access. Policy requires annual security assessments, but 8 critical vendors (11%) are overdue for reassessment (12-18 months past due). This creates unknown exposure, SOC 2 audit finding risk, and potential HIPAA violation if vendor breach occurs.
Risk Description
Root Cause: Vendor risk program matured in 2023, establishing annual assessment requirement. Resource constraint: 1 FTE Third-Party Risk Manager for 72 vendors = 6 assessments/month required. MindCare acquisition added 12 new vendors (not budgeted), creating backlog.
Business Context: Healthcare SaaS operates in interconnected vendor ecosystem. 68% of healthcare breaches involve third parties (IBM). Regulatory scrutiny increasing: OCR HIPAA enforcement now includes vendor oversight failures.
Vendor Assessment Status
| Vendor Category |
Total Vendors |
Current |
Overdue |
Risk Level |
| Critical (PHI Access) |
18 |
10 |
8 |
High Risk |
| High (System Access) |
24 |
22 |
2 |
Medium Risk |
| Medium (Limited Access) |
30 |
30 |
0 |
Low Risk |
| TOTAL |
72 |
62 |
10 (14%) |
|
Critical Overdue Vendors (Partial List)
| Vendor |
Service |
Data Access |
Last Assessment |
Overdue |
| CloudHealth Analytics |
Data warehouse |
Full PHI |
May 2023 |
18 months |
| MediComm Systems |
SMS notifications |
Limited PHI |
Aug 2023 |
15 months |
| DataSync Pro |
Integration platform |
Full PHI |
Jun 2023 |
17 months |
Risk Management Strategy
Primary Strategy: Reduction - Accelerate assessments with temporary contractor support, deploy automated vendor risk platform (SecurityScorecard continuous monitoring reduces annual assessment burden by 60%)
Secondary Strategy: Transfer - Cyber insurance covers third-party breach ($15M coverage includes vendor incidents), contract addendum requires vendors maintain cyber insurance + indemnification clauses
Tertiary Strategy: Acceptance (Interim) - Documented risk acceptance for 6-month catch-up period with compensating controls: quarterly vendor SOC 2 reports reviewed, network segmentation limits vendor access, enhanced logging/monitoring for vendor API calls
Remediation Plan
- Immediate (Nov-Dec 2024): Complete 8 critical vendor reassessments (contractor support + internal overtime)
- Short-Term (Q1 2025): Deploy SecurityScorecard continuous monitoring platform ($45K annual)
- Medium-Term (Q2 2025): Clear remaining 2 overdue vendors, establish sustainable cadence
- Long-Term (Q3 2025): Hire dedicated Vendor Risk Analyst (+1 FTE, budget approved for FY25)
5
Why This Slide Works
This slide demonstrates how to report vendor risk effectively: focus on YOUR actions (assessments completed, overdue vendors, remediation plans), not speculation about vendor security posture. The board doesn't need to know "Vendor X has vulnerabilities"âthey need to know "We're 18 months overdue assessing Vendor X, creating unknown exposure."
Notice the triple-strategy approach: Reduction (accelerate assessments with automation), Transfer (cyber insurance + contractual protections), and Acceptance (interim with compensating controls). This shows mature risk managementâusing the full toolkit, not just one approach.
Vendor Risk: Focus on What You Control
When reporting vendor risk to the board, concentrate on YOUR due diligence actions and risk management decisions:
- Assessment cadence: % of vendors assessed on schedule vs. overdue (YOU control this)
- Vendor tiering: Critical/High/Medium classification based on data access (YOUR risk model)
- Findings & remediation: Issues discovered and whether vendors remediated (YOUR follow-up)
- Contract protections: Indemnification clauses, insurance requirements, breach notification SLAs (YOUR legal framework)
- Monitoring: Continuous monitoring platforms, API logging, access segmentation (YOUR controls)
DON'T report: "Vendor X had a breach last year"âunless it impacts you. Report: "We reassessed Vendor X post-breach, implemented network segmentation, and added enhanced monitoring."
Demonstrating Transfer Strategy
Notice the explicit mention of Transfer strategy: "$15M cyber insurance coverage includes vendor incidents" and "contract addendum requires vendors maintain insurance + indemnification." This shows the board you're not solely relying on vendor securityâyou've transferred financial risk through insurance and contractual protections.
This is especially important for vendor risk because you CAN'T control vendor security practices directly. You can assess, monitor, and require standardsâbut ultimate control lies with the vendor. Transfer strategy acknowledges this reality and protects the business financially.
Industry Context & Benchmarking
The slide cites: "68% of healthcare breaches involve third parties (IBM)." This contextualizes vendor risk for the boardânot a hypothetical concern, but the #1 breach vector in healthcare. Benchmarking data helps boards understand whether your vendor risk program is appropriately sized for the threat landscape.
â DO:
- Report YOUR assessment cadence and overdue vendors (what you control)
- Show vendor tiering: Critical/High/Medium based on data access and business impact
- Demonstrate multiple strategies: Reduction (assessments) + Transfer (insurance, contracts) + Controls (segmentation, monitoring)
- Cite industry benchmarks: "68% of healthcare breaches involve third parties"
- Show remediation plan with phases: Immediate catch-up, automation deployment, sustainable staffing
â DON'T:
- Report generic "vendor risk exists" without YOUR actions to manage it
- List all 72 vendorsâfocus on overdue assessments and critical vendors only
- Blame vendors for security gapsâreport YOUR due diligence status
- Ignore Transfer strategyâinsurance and contracts are valid risk management tools
- Skip compensating controls during catch-up periodâshow interim protections
Vulnerability SLA Compliance
Critical Vulnerabilities
94%
7-day SLA compliance
Performance: 94% vs. 90% policy target
Trend: Stable (92% Q2 â 94% Q3)
Benchmark: 94% vs 85% industry avg (9% better)
High Vulnerabilities
68%
30-day SLA compliance
Performance: 68% vs. 90% policy target (22% gap)
Trend: Declining (88% Jan â 68% Sep)
Action: +2 FTE approved, Jan 2025 start
Phishing Resilience
Phishing Failure Rate
11%
â 39% improvement YoY
Phishing Reporting Rate
22%
â 5.5x increase YoY
Industry Benchmark
14%
We're 21% better
Why This Matters: Phishing is #1 attack vector in healthcare (73% of breaches per Verizon DBIR). Our 11% failure rate is 21% better than industry average (14%), demonstrating mature security awareness program.
Reporting Rate Context: 22% of employees now report suspicious emails (up from 4% in Jan 2024). Higher reporting = better threat intelligence and faster response.
Multi-Factor Authentication (MFA) Adoption
Corporate Users
98%
MFA Enabled
Target: 95% (exceeded by 3%)
Trend: 94% Q2 â 98% Q3
Remaining 2%: Contractors (BYOD project in progress)
BYOD Users
82%
MFA Enabled
Target: 95% (13% gap)
Trend: 76% Q2 â 82% Q3 (improving)
Action: BYOD MDM project (Q1 2025 completion)
6
Why This Slide Works
This operational metrics slide demonstrates best practice benchmarking and the critical phishing reporting rate metric. Notice every metric includes three context points: current value, policy target, and either industry benchmark or trend. The board instantly knows: "Are we meeting our standards? Are we better or worse than peers?"
Critical: Phishing Reporting Rate is Just as Important as Failure Rate
Notice this report shows BOTH phishing metrics: 11% failure rate (employees who clicked) AND 22% reporting rate (employees who reported suspicious emails). Many organizations only track failure rate, but reporting rate is equallyâif not moreâimportant:
- Measures security culture: High reporting shows employees are engaged, vigilant, and feel empowered to act
- Reflects training effectiveness: Users who report threats recognize phishing and know what to do
- Early warning system: User reports catch real phishing campaigns before they spread, preventing breaches
- True security posture: Low clicks + high reporting = strong defense. Low clicks + low reporting = users may be missing threats entirely
Target: >30% reporting rate. This report shows 22%âgood improvement from 4%, but room to grow. Celebrate increases in reporting rates as much as decreases in click rates.
Benchmarking Sources
The slide cites "14% industry average" and "Verizon DBIR" for benchmarking. Boards need comparison points to understand if your metrics are acceptable. Common benchmarking sources:
- Verizon DBIR (Data Breach Investigations Report): Annual report with industry-specific breach statistics
- Ponemon Institute: Cost of data breach studies, security effectiveness research
- Industry groups: Healthcare ISAC, FS-ISAC, sector-specific sharing communities
- Cyber insurance data: Your insurer often provides anonymized peer benchmarks
- Security vendors: KnowBe4 (phishing), Qualys (vulnerability management) publish benchmark reports
â DO:
- Track BOTH phishing failure rate AND reporting rate (target >30% reporting)
- Include benchmarks: industry average, policy target, prior period comparison
- Show trends: minimum 6-12 months so board sees trajectory, not snapshots
- Cite sources: "Verizon DBIR," "industry average," "peer data from cyber insurer"
- Explain gaps: "82% vs. 95% target because BYOD MDM project delayed to Q1 2025"
â DON'T:
- Only report phishing failure rateâreporting rate shows if users are vigilant or complacent
- Show metrics without benchmarksâboard can't tell if "11%" is good or terrible
- Use generic "industry average" without sourceâcite Verizon, Ponemon, or specific peer data
- Report single-point metricsâ"98% MFA adoption" means nothing without trend or context
- Skip explaining gapsâif you're below target, say why and what you're doing about it
Mean Time to Detect (MTTD) & Mean Time to Respond (MTTR)
MTTD
12 min
120x faster than industry
MTTR
45 min
96x faster than industry
Industry Average
24 hrs / 3 days
MTTD / MTTR
Why This Matters: Speed of detection and response is the #1 factor in limiting breach impact. TechHealth's MTTD (12 minutes) and MTTR (45 minutes) are world-class, demonstrating mature SOC capabilities, effective tooling (SIEM + EDR + NDR), and practiced incident response procedures.
Incident Volume & Classification (Q3 2024)
| Severity |
Q3 Incidents |
Avg MTTD |
Avg MTTR |
Trend vs Q2 |
| Critical |
0 |
N/A |
N/A |
Stable (0 in Q2) |
| High |
2 |
8 min |
32 min |
â (4 in Q2) |
| Medium |
12 |
15 min |
58 min |
â (9 in Q2) |
| Low |
47 |
18 min |
92 min |
â (38 in Q2) |
Incident Volume Context: Medium/Low incident increase reflects expanded monitoring (MindCare acquisition added 47 assets). Higher detection = more alerts, but no critical/high severity increase = effective threat management.
Notable Q3 Incidents: 2 high-severity incidents were phishing attempts with credential compromise. Both detected within 8 minutes (Okta anomaly detection), contained within 32 minutes (account disabled, password reset forced). Zero data exfiltration in either case.
Backup & Disaster Recovery
Backup Success Rate
Target: 99.5% (exceeded)
Failed Backups: 3 of 1,440 daily backups
RTO (Recovery Time Objective): 4 hours
RPO (Recovery Point Objective): 15 minutes
DR Test Results
Last: 6 mo ago
Overdue (policy: quarterly)
Last Test: April 2024 (successful)
Status: Q3 test delayed (MindCare integration priority)
Action: Q4 test scheduled (Dec 2024)
Risk: Medium (backups validated, recovery untested)
7
Why This Slide Works
This incident response slide demonstrates the power of metrics that answer business questions. The board doesn't need to understand every incident detailâthey need to know: "How fast do we detect threats? How fast do we respond? Are we getting better or worse?" The two primary metricsâMTTD (Mean Time to Detect) and MTTR (Mean Time to Respond)âanswer exactly those questions.
Notice the presentation structure: headline metrics with industry benchmarks (12 min vs 24 hrs, 45 min vs 3 days), incident volume breakdown by severity, and specific incident narratives. This pattern works because it moves from strategic overview â operational detail â context. The board gets the "so what" immediately, then can drill into specifics if needed.
Understanding MTTD and MTTR: The Foundation of Incident Response Metrics
MTTD (Mean Time to Detect): Average time from when a security incident occurs to when it's detected by your security team. Calculated by summing detection times for all incidents in a period, divided by the number of incidents.
MTTR (Mean Time to Respond): Average time from detection to containment (threat neutralized, access revoked, systems isolated). Calculated the same wayâsum of all response times divided by incident count.
Why These Matter: IBM research shows that every minute of delay increases breach cost exponentially. Fast detection and response are the #1 factors in limiting damage. MTTD of 12 minutes vs industry average of 24 hours means you contain threats before significant damage occurs. This is the difference between a minor incident and a major breach.
How to Calculate: Track start time (incident occurrence based on log analysis), detection time (when SOC/SIEM alerts), and containment time (when threat is neutralized). Average these across all incidents in your reporting period. Industry benchmarks come from Verizon DBIR, IBM Cost of Data Breach, and Ponemon Institute reports.
What Makes This Incident Reporting Effective
- Severity classification visible: Board instantly sees Critical (0), High (2), Medium (12), Low (47)âno critical incidents is good news
- Trend data included: Comparison to Q2 shows whether you're improving, stable, or degrading
- Context provided immediately: "Medium/Low increase reflects expanded monitoring (MindCare acquisition)"âexplains why numbers went up without alarm
- Incident narratives specific: "2 high-severity phishing attempts, detected in 8 min, contained in 32 min, zero data exfiltration"âcomplete story
- Backup/DR metrics included: 99.8% backup success rate and overdue DR test disclosed (transparency on gaps)
â DO:
- Use MTTD/MTTR as your primary incident response metricsâthey're universally understood and benchmarkable
- Break down incidents by severity so board sees the distribution (many low-severity incidents may be acceptable, many critical is not)
- Provide narrative context for significant incidents: what happened, how detected, how contained, outcome
- Include industry benchmarks to show relative performance ("120x faster than industry" gives instant context)
- Show trend data (vs prior quarter) so board knows if situation is improving or deteriorating
- Disclose gaps transparently (overdue DR test shown clearly with remediation plan)
â DON'T:
- Report just total incident count without severity breakdownâ"61 incidents" sounds alarming until you see 0 critical, 2 high
- Use technical metrics the board can't interpretâ"SIEM correlation rules triggered 8,472 times" means nothing without context
- Hide incidents or only report "clean" quartersâif high-severity incidents occurred, report them with details
- Skip industry benchmarksâwithout comparison, the board can't judge if your performance is good or bad
- Report metrics without explaining what drives themâclarify that incident volume increased due to MindCare acquisition
- Ignore backup/DR gapsâDR test overdue for 6 months is a material risk that must be disclosed
Active Security Projects (Board-Level Visibility)
| # |
Project Name |
Owner |
Status |
Completion |
Target Date |
Business Impact |
| 1 |
SOC 2 Type II Certification |
M. Chen |
On Track |
69% |
Jan 2025 |
Unblocks $12.3M ARR in delayed deals |
| 2 |
MindCare Security Integration |
M. Chen / D. Park |
At Risk |
25% |
Q2 2025 |
$2-5M breach risk reduction |
| 3 |
BYOD Mobile Device Management |
M. Chen |
Behind |
45% |
Q1 2025 (was Q4 2024) |
18% MFA gap closure, BYOD risk reduction |
| 4 |
FedRAMP Moderate Authorization |
M. Chen / J. Mitchell |
On Track |
35% |
Q3 2025 |
Opens $25M+ federal market opportunity |
| 5 |
Zero Trust Network Architecture |
D. Park |
On Track |
78% |
Dec 2024 |
Reduces lateral movement risk by 80% |
| 6 |
Security Awareness Program Expansion |
M. Chen |
On Track |
85% |
Q4 2024 |
Target: <10% phishing failure rate |
| 7 |
Vendor Risk Management Platform |
M. Chen |
On Track |
60% |
Q1 2025 |
60% reduction in assessment workload |
Project Portfolio Summary
Total Active Projects
7
Board-level visibility
On Track / At Risk / Behind
5 / 1 / 1
71% on track
Total Budget
$2.8M
FY24-FY25
Projects Behind Schedule - Root Cause & Recovery
Behind Schedule BYOD Mobile Device Management (MDM)
Original Target: Q4 2024 | Revised Target: Q1 2025 (3-month delay)
Root Cause:
- Technical Complexity: MobileIron integration with Okta took 6 weeks vs. planned 3 weeks (iOS certificate issues)
- User Resistance: 22% of BYOD users concerned about privacy (company visibility into personal devices)
- Resource Conflict: Security engineer allocated to MindCare integration (higher priority)
Recovery Plan:
- Technical: iOS certificate issues resolved (Nov 2024), Android deployment on track
- Change Management: Privacy FAQ published, "personal container" explained (company can't access personal apps/data)
- Resource: Dedicated PM assigned (was shared resource), contractor support for enrollment wave (Dec-Jan)
- Phased Rollout: Phase 1: Executives (Dec), Phase 2: Sales (Jan), Phase 3: All staff (Feb)
Business Impact: 3-month delay is acceptable. MFA gap (18% non-compliant) mitigated by compensating controls (network segmentation, enhanced monitoring). Zero security incidents attributed to BYOD devices in Q3.
8
Why This Slide Works
This project tracking slide demonstrates the "Living Document" principleâboard reports should track projects consistently from initiation through completion. Notice that Project #3 (BYOD MDM) shows a status change from "On Track" to "Behind" with a timeline slip (Q4 2024 â Q1 2025). This transparency builds trust: the board knows you're reporting reality, not sanitized updates.
The table structure provides everything the board needs at a glance: project name, owner (accountability), status (green/yellow/red), completion percentage (progress), target date (timeline), and business impact (why this matters). Seven projects tracked, but only board-level visibility itemsânot every minor initiative. This is the right level of detail for board governance.
What Makes a "Living Document" for Board Reporting
A living document for board governance means your project list evolves quarter over quarter with clear change tracking:
- New projects appear when initiated (added with "New this quarter" notation in your narrative)
- Completed projects drop off the active list (moved to "Completed in Q3" section or removed entirely)
- Status changes are visible (Project X moved from Green to Yellow with explanation)
- Timeline changes are disclosed (target date shifted from Q4 to Q1 with root cause)
- Scope changes are documented (budget increased, deliverables added/removed)
The board should be able to compare this quarter's slide to last quarter's slide and immediately see what changed. No surprises, no memory requiredâthe document itself tells the story of progress and challenges.
Project Tracking Best Practices for Board Reports
- Named accountability: Every project shows owner (M. Chen, D. Park)âboard knows who to ask questions
- Status with completion %: "On Track, 69%" gives two data pointsâtrajectory and progress
- Business impact stated: "$12.3M ARR unblocked" or "Reduces lateral movement risk 80%"âboard sees value
- Red/yellow status explained: "Behind" and "At Risk" projects include root cause analysis and recovery plan below
- Portfolio summary: "5 on track / 1 at risk / 1 behind" gives instant health check of entire program
- Budget visibility: "$2.8M total budget" and "$425K spent Q3" shows spend rate and remaining capacity
â DO:
- Track projects consistently quarter-over-quarter so board can follow progress (same format, same projects until completed)
- Disclose timeline slips immediately with root cause: "Behind schedule: underestimated complexity, resource constraints"
- Show both on-track and struggling projectsâhiding problems destroys board trust when issues eventually surface
- Include business impact column so board understands why each project matters ("$12.3M ARR" is far more compelling than "achieve compliance")
- Name specific owners for accountabilityâ"M. Chen" not "Security Team"
- Provide completion percentages for progress visibility (69%, 25%, 45% vs just "In Progress")
- Document changes in a "Changes from Q2" section: new projects, completed projects, status changes
â DON'T:
- Show only "on track" projectsâif everything is green every quarter, board will question your credibility
- Change project lists without explanationâboard members notice when Project X disappears with no closure note
- Report vague status: "In Progress" tells the board nothing; use specific completion % and trajectory (on track/at risk/behind)
- List every security initiativeâinclude only material projects (>$50K budget, board-approved, or strategic priority)
- Skip business impactâ"Implement EDR" is technical jargon; "Reduce endpoint breach risk 70%" is business value
- Hide root causes when projects slipâboard needs to know if problem is resources, vendor delays, technical complexity, or poor planning
- Report projects once and never againâtrack from inception through completion for full visibility
Project #1: SOC 2 Type II Certification (69% Complete)
Business Driver: $12.3M ARR delayed in enterprise pipeline. 87% of healthcare enterprise RFPs require SOC 2 Type II. Certification unblocks 14 delayed deals (avg $880K ARR each).
Timeline: Audit Phase 1 (readiness): Aug-Oct 2024 (complete). Audit Phase 2 (3-month observation): Oct 2024-Jan 2025 (in progress). Audit Phase 3 (report): Jan 2025. Certificate issuance: Feb 2025.
Status: On Track | All 64 controls implemented and tested. 3-month observation period showing consistent compliance. Expected audit pass: 95% confidence.
| Resource Category |
Details |
Cost |
| People |
0.5 FTE CISO, 1.0 FTE Compliance Manager, 0.3 FTE Internal Audit |
$180K (loaded labor) |
| Technology |
Vanta compliance automation platform (annual license) |
$24K |
| Consulting |
Deloitte Type II audit + advisory (gap remediation support) |
$125K |
| TOTAL INVESTMENT |
|
$329K |
Expected Risk Reduction: Audit findings resolved (8 medium findings closed), control environment maturity increased from ad-hoc to documented/repeatable, annual SOC 2 re-certification process established (ongoing compliance vs. point-in-time).
Project #2: MindCare Security Integration (25% Complete)
Business Driver: $8.5M acquisition (June 2024) added 47,000 patient records and $6M ARR, but inherited security debt. Unresolved gaps create $2-5M breach exposure and risk SOC 2 certification timeline.
Timeline: Discovery (Jul-Aug 2024): Complete. Remediation Phase 1 (network/endpoint): Sep-Dec 2024. Phase 2 (identity/access): Jan-Mar 2025. Phase 3 (validation): Apr-May 2025. Target completion: Q2 2025.
Status: At Risk | Behind schedule (planned 50%, actual 25%). Root cause: underestimated technical complexity + resource constraints. Recovery plan: +1 FTE, Deloitte consulting, extended timeline (realistic vs. aggressive).
| Resource Category |
Details |
Cost |
| People |
1.0 FTE Senior Security Engineer (new hire, Dec start), 0.5 FTE CISO, 0.3 FTE CTO |
$220K (annual loaded) |
| Technology |
PrivGuard PAM licenses (MindCare admins), MobileIron MDM expansion, backup encryption (Veeam) |
$85K |
| Consulting |
Deloitte identity migration (8-week engagement), penetration testing (post-integration validation) |
$180K |
| TOTAL INVESTMENT |
|
$485K |
Expected Risk Reduction: Risk Score 20 â 6 (70% reduction). MindCare environment brought to TechHealth security standards: full identity consolidation (single sign-on), zero standing admin access (PAM), 95% MFA adoption, AES-256 backup encryption, quarterly access reviews.
Project #3: FedRAMP Moderate Authorization (35% Complete)
Business Driver: Federal healthcare market opportunity ($25M+ pipeline: VA, HHS, DoD). FedRAMP Moderate required for federal agencies. First mover advantage: only 3 of 12 competitors are FedRAMP authorized.
Timeline: Readiness assessment: Jul-Sep 2024 (complete). Remediation: Oct 2024-Mar 2025. 3PAO assessment: Apr-Jun 2025. Authorization: Q3 2025. 18-month total timeline (started Jul 2024).
Status: On Track | 127 of 325 controls implemented (35%). Aggressive but achievable timeline. Weekly PMO steering, CEO co-sponsorship (strategic priority).
| Resource Category |
Details |
Cost |
| People |
1.0 FTE Compliance Manager (dedicated), 0.5 FTE CISO, 0.5 FTE CTO, 0.3 FTE each: DevOps, Network, Security (5 FTE total) |
$520K (18 months loaded) |
| Technology |
GovCloud migration (AWS), continuous monitoring tools (Splunk federal), encryption/key mgmt (AWS KMS Federal) |
$380K |
| Consulting |
Coalfire (3PAO assessment), compliance automation (Tugboat Logic), gap remediation advisory |
$450K |
| TOTAL INVESTMENT |
|
$1.35M |
Expected Business Impact: FedRAMP authorization opens federal healthcare market ($25M+ 3-year pipeline identified). ROI: $1.35M investment â $25M+ revenue opportunity = 1,750% ROI. Strategic moat: FedRAMP takes 18-24 months (first mover advantage).
9
Why This Slide Works
This detailed project breakdown demonstrates all Four Pillars of Governance in action: Accountability (named owners for each project), Policy Tie-Back (business drivers stated explicitly), Scope Notes (in-scope resources and constraints shown), and implied Change Log (status updates reference prior quarter planned vs actual completion). These aren't abstract principlesâthey're visible in every project description.
Notice the structure for each project: Business Driver (why we're doing this) â Timeline (phase breakdown with dates) â Status (on track/at risk with root cause) â Resource Breakdown (people, technology, consulting with costs) â Expected Risk Reduction (specific outcome). This pattern ensures the board understands why, when, how much, and what outcome for every major initiative. No vague "security improvement" languageâconcrete business impact.
The Four Pillars of Governance in Board Reporting
These four pillars ensure your board report demonstrates professional governance maturity:
- 1. Accountability: Every project, risk, and metric has a named owner. "M. Chen" owns SOC 2, "M. Chen / D. Park" co-own MindCare integration. No anonymous "Security Team" ownershipâspecific people are accountable.
- 2. Policy Tie-Back: Every project connects to a documented business driver or policy. SOC 2 ties to "$12.3M ARR delayed in enterprise pipeline." MindCare integration ties to "acquisition security debt creates $2-5M breach exposure." FedRAMP ties to "federal healthcare market opportunity ($25M+ pipeline)." Board sees policy/strategy alignment, not random initiatives.
- 3. Scope Notes: Clearly define what's included and excluded. Project resource tables show "People: 0.5 FTE CISO, 1.0 FTE Compliance Manager"âspecific scope. Status sections clarify "Behind schedule (planned 50%, actual 25%)"âtransparency on constraints. Scope notes prevent mission creep and set expectations.
- 4. Change Log: Document changes from prior reports. Status section states "Behind schedule: root cause underestimated complexity." This acknowledges change from prior "On Track" status, explains why, and shows recovery plan. Change logs build trust through transparency.
What Makes This Project Detail Effective
- Business driver stated first: "$12.3M ARR delayed" explains why SOC 2 mattersâboard sees business case immediately
- Timeline broken into phases: "Phase 1 (readiness), Phase 2 (observation), Phase 3 (report)"âboard understands project structure
- Resource breakdown specific: "0.5 FTE CISO, 1.0 FTE Compliance Manager, $24K Vanta, $125K Deloitte"âtotal transparency on investment
- Status includes confidence level: "Expected audit pass: 95% confidence"âboard knows this is high probability, not guaranteed
- Risk reduction quantified: "Risk Score 20 â 6 (70% reduction)"âmeasurable outcome, not vague "improved security"
- Blockers disclosed honestly: "At Risk: Behind schedule, root cause underestimated complexity, recovery plan: +1 FTE"
â DO:
- State business driver first: why is board funding this project? What business problem does it solve?
- Show resource breakdown (people, technology, consulting) so board understands full investment required
- Include timeline phases so board can track progress milestones, not just "completion date"
- Quantify expected outcomes: "Risk Score 20 â 6" or "$12.3M ARR unlocked" vs "improved security posture"
- Name specific owners and co-ownersâaccountability must be clear and individual
- Disclose status changes transparently: "At Risk: Behind schedule, root cause X, recovery plan Y"
- Define scope clearly: what resources are in scope, what constraints exist, what's excluded
- Tie back to policy or strategic objective: SOC 2 ties to enterprise customer requirement policy
â DON'T:
- Start with technical details instead of business driverâboard needs to know "why" before "how"
- Hide resource requirementsâboard needs to approve budget and understand full investment (people + tech + consulting)
- Report just completion percentage without timeline phasesâ"45% complete" means nothing without milestone context
- Use vague outcomes: "enhance security" doesn't tell board anything; "70% risk reduction" is measurable
- Skip ownership attributionâ"Security Team" is not accountable, "M. Chen" is accountable
- Hide status changes or blockersâif project slipped from Q4 to Q1, explain why and show recovery plan
- Leave scope undefinedâboard needs to know what they're funding (which systems, which users, what boundaries)
- Present projects as isolated initiativesâshow policy tie-back so board sees strategic alignment
Security Investment ROI
PAM Implementation: $2.1M Net Value (1,350% ROI)
Phishing Resilience: $702K Annual Value (1,463% ROI)
SOC 2 Certification: $12.3M ARR Unlocked (9,840% ROI)*
*Upon completion (Jan 2025). One-time $125K investment enables $12.3M recurring revenue.
Risk Reduction Achieved
Critical Risks Closed (Past 12 Months):
â
Standing Privileged Access (PAM implementation)
â
Unencrypted Backups (AES-256 encryption)
â
Legacy System EOL (Oracle upgrade)
High Risks Reduced:
⢠Phishing/Credential Theft: Score 20 â 12 (40% reduction)
⢠Insider Threat (Privileged Access): Score 20 â 8 (60% reduction)
Total Risk Exposure Reduction
â 58%
Year-over-Year
Compliance Certifications
| Certification |
Status |
Business Value |
| HIPAA |
Certified |
Enables healthcare market (required) |
| PCI DSS Level 2 |
Certified |
Enables payment processing |
| HITRUST CSF |
Certified |
15% pricing premium capability |
| SOC 2 Type II |
69% (Jan 2025) |
Unblocks $12.3M ARR |
| FedRAMP |
In Progress |
$25M+ federal opportunity |
Market Access: Each certification opens new market segments. SOC 2 required by 87% of enterprise customers. FedRAMP opens federal healthcare ($25M+ pipeline).
Key Efficiency Gains
PAM Session Duration
95%
â Reduction (4.2h â 23min)
Phishing Reporting
5.5x
â Increase (4% â 22%)
Admin Time Savings
380 hrs/mo
= 2.4 FTE recovered
10
Why This Slide Works
This ROI slide demonstrates how to translate security investments into business value the board understandsâdollars returned, risks reduced, and revenue enabled. Notice the ROI bar chart leads: PAM Implementation (1,350% ROI), Phishing Resilience (1,463% ROI), SOC 2 Certification (9,840% ROI projected). These aren't vague "improved security posture" claimsâthey're quantified financial returns calculated using the standard ROI formula.
The slide structure moves from financial ROI â risk reduction achieved â compliance certifications â efficiency gains. This pattern shows the complete value story: security investments don't just reduce risk, they enable revenue (SOC 2 unlocks $12.3M ARR), avoid costs (PAM prevents $2.1M breach), and improve operations (380 hrs/month admin time recovered). This is how boards evaluate security programsâas business enablers, not cost centers.
How to Calculate Security ROI: The Standard Formula
ROI Formula: ROI = [(Benefit - Investment) / Investment] Ă 100
Example: PAM Implementation
- Investment: $150K (software licenses + implementation consulting + internal labor)
- Benefit: $2.25M (modeled breach cost reduction: likelihood reduced 70%, average breach cost $3.2M for privileged access compromise)
- Calculation: [($2.25M - $150K) / $150K] Ă 100 = 1,400% ROI
Example: SOC 2 Certification
- Investment: $125K (audit fees + Vanta platform + internal labor for remediation)
- Benefit: $12.3M ARR (delayed enterprise deals requiring SOC 2, now unblocked)
- Calculation: [($12.3M - $125K) / $125K] Ă 100 = 9,740% ROI (shown as 9,840% with recurring value)
Key Principle: ROI benefits can include avoided costs (breach prevented, downtime avoided), revenue enabled (compliance requirements met, deals unblocked), or efficiency gained (labor hours recovered, faster processes). Use conservative estimates and cite sources (IBM Cost of Data Breach, Ponemon Institute) for credibility.
What Makes This ROI Reporting Effective
- ROI percentages prominent: "1,350% ROI" and "9,840% ROI" leadâboard immediately sees financial return on security spend
- Benefit amounts shown: "$2.1M Net Value" and "$12.3M ARR Unlocked"âabsolute dollar impact supplements percentage
- Risk reduction quantified: "â 58% total risk exposure year-over-year"âmeasurable security improvement, not vague claims
- Specific risks closed listed: "Standing Privileged Access, Unencrypted Backups, Legacy System EOL"âboard sees concrete progress
- Compliance as business enabler: Certifications table shows "Business Value" columnâHITRUST enables "15% pricing premium capability"
- Efficiency gains with FTE equivalents: "380 hrs/mo = 2.4 FTE recovered"âboard understands operational capacity returned
â DO:
- Calculate ROI using standard formula: [(Benefit - Investment) / Investment] Ă 100âboard knows this calculation
- Show both percentage ROI and absolute dollar benefit ("1,350% ROI, $2.1M net value")âgives complete picture
- Use conservative benefit estimates and cite sources (IBM, Ponemon, Verizon DBIR)âbuilds credibility
- Include all benefit types: avoided costs (breach prevented), revenue enabled (deals unblocked), efficiency gained (time saved)
- Quantify risk reduction with before/after scores: "Risk Score 20 â 8" or "58% reduction"âmeasurable outcomes
- Show compliance certifications as revenue enablers: "SOC 2 unblocks $12.3M ARR" or "HITRUST enables 15% premium"
- Translate efficiency gains to FTE equivalents: "380 hrs/mo = 2.4 FTE recovered"âboard understands capacity impact
â DON'T:
- Report activity instead of outcomes: "Deployed PAM solution" vs "Reduced insider threat risk 60%, $2.1M breach cost avoided"
- Skip ROI calculationsâboards allocate capital based on returns; show security investments pay off financially
- Use inflated benefit estimates without sourcesâ"$50M breach prevented" sounds made up; cite IBM average breach cost
- Only show avoided costsâalso demonstrate revenue enabled (compliance unlocks deals) and efficiency gained (time recovered)
- Report vague risk reduction: "improved security posture" tells board nothing; "58% risk exposure reduction" is measurable
- List compliance certifications without business valueâshow "HITRUST enables 15% pricing premium" not just "HITRUST certified"
- Report time savings without contextâ"380 hours saved" means little; "2.4 FTE recovered" shows capacity return
- Cherry-pick only positive ROIâif some investments had modest returns, include them for credibility
Current Situation: Existing policy ($5M coverage, $385K annual premium) expires March 31, 2025. Proposed increase to $15M coverage with 3-year commitment requires board approval (exceeds CFO's $50K variance authority + material contract + risk appetite confirmation).
Context Driving This Decision: Company growth ($48M â $68M ARR, +42% YoY), MindCare acquisition (+47K patient records), HIPAA breach fines increased 40%, market hardening (cyber insurance +25% industry-wide), favorable claims history (0 claims past 3 years).
Options & Recommendation
| Option |
Coverage |
Annual Premium |
3-Yr Cost |
Risk Level |
| 1. Maintain Status Quo |
$5M |
$455K (+18%) |
$1.73M* |
HIGH RISK $3-10M uncovered loss potential |
| 2. Standard Increase â RECOMMENDED |
$15M |
$510K (+32%) |
$1.53M (saves $203K) |
LOW RISK Adequate for 99th percentile breach |
| 3. Premium Coverage |
$25M |
$685K (+78%) |
$2.06M |
VERY LOW RISK Exceeds likely max loss by 2x |
*Projected market rate increases if renewing annually without multi-year commitment
Management Recommendation: Option 2 ($15M Coverage)
â
Rationale:
⢠Coverage Adequacy: $15M = 22% of ARR (industry best practice: 15-25% for SaaS healthcare)
⢠Cost Efficiency: 3-year commitment saves $203K vs. annual renewals (locks in rate before 2026 market hardening)
⢠Risk Transfer: Covers 99th percentile breach cost ($8-12M) with headroom
⢠Peer Benchmarking: 6 of 8 comparable healthcare SaaS companies carry $10-20M coverage
⢠Regulatory Alignment: Satisfies SEC expectations for material risk transfer (adequate given company size)
Risk Implications of Each Option
| Option |
Residual Risk |
Regulatory Risk |
Financing Risk |
| Option 1 ($5M) |
$3-10M uncovered loss in major breach |
SEC may view as inadequate |
Could impair Series B raise ($30M target) |
| Option 2 ($15M) |
$0-500K (only extreme tail event) |
Meets SEC expectations |
No impact; appropriate for investors |
| Option 3 ($25M) |
Negligible ($0 realistic scenarios) |
Exceeds requirements |
$175K annual opportunity cost (1.0 FTE) |
BOARD APPROVAL REQUESTED:
â Approve 3-year cyber insurance contract with Coalition Inc.
â Authorize $510K annual spend (FY25-FY27)
â Confirm $15M coverage limit aligns with board risk appetite
11
Why This Slide Works
This board decision slide demonstrates the "Transfer" risk management strategyâusing cyber insurance to shift financial impact while acknowledging you cannot transfer the risk itself (reputational damage, operational disruption remain). Notice the structure: Current Situation â Context â Options Table â Management Recommendation â Risk Implications â Specific Approval Request. The board has everything needed to make an informed decision in one slide.
The options table is particularly effective: three choices (Status Quo $5M, Standard $15M recommended, Premium $25M) with coverage amount, annual premium, 3-year cost, and risk level for each. Board can instantly compare cost vs. risk trade-offs. The recommendation is explicit ("Option 2") with detailed rationale: coverage adequacy, cost efficiency, risk transfer, peer benchmarking, regulatory alignment. No ambiguity about what management advises or why.
Understanding the Transfer Risk Strategy: Cyber Insurance Decisions
The "Transfer" strategy uses financial instruments to shift monetary impact to third parties. Cyber insurance is the most common transfer mechanism, but it has important limitations:
- What Transfers: Financial costs of breach response (forensics, legal, notification, credit monitoring, fines, settlements). Insurance pays these costs up to policy limits.
- What Doesn't Transfer: Reputational damage, customer trust loss, operational disruption, competitive disadvantage, board/executive liability. These remain even with insurance payout.
- Coverage Adequacy: Best practice for healthcare SaaS is 15-25% of annual recurring revenue. TechHealth at $68M ARR should carry $10-17M coverage minimum. $15M (22% of ARR) fits best practice range.
- Cost-Benefit Analysis: $510K annual premium for $15M coverage = 0.75% of ARR. Industry typical range is 0.5-1.0% of revenue. This proposal is within acceptable range and saves $203K vs. annual renewal approach.
Board Authority Required: This decision requires board approval for three reasons: (1) exceeds CFO's $50K variance authority, (2) material contract commitment (3-year, $1.53M total), and (3) risk appetite confirmation (board must agree $15M coverage aligns with acceptable residual risk).
Emergency Protocol: When to Notify the Board Within 24 Hours
While cyber insurance provides financial protection, certain events require immediate board notification regardless of insurance coverage:
- 1. Material data breach: Unauthorized access to >1,000 patient records or any breach likely to trigger mandatory reporting (HIPAA, state breach laws)
- 2. Ransomware deployment: Any ransomware infection affecting production systems, regardless of whether data was encrypted or ransom demanded
- 3. System outage >4 hours: Any security incident causing customer-facing system outage exceeding 4 hours (RTO threshold)
- 4. Third-party compromise affecting customers: Security incident at vendor/partner that exposes TechHealth customer data or disrupts service delivery
- 5. Regulatory investigation initiated: Notice of investigation from HHS OCR, state AG, SEC, or other regulatory body related to security/privacy
- 6. Extortion/threat: Any extortion demand, public threat to release data, or threat actor communication demanding payment
- 7. Insider threat material incident: Any confirmed malicious insider activity (not accidental) involving data exfiltration, sabotage, or fraud
- 8. Media/public disclosure imminent: Any situation where public disclosure is imminent or has occurred (media inquiry, social media exposure, threat actor publication)
Notification Protocol: CISO notifies CEO and CFO immediately (within 1 hour of incident confirmation). CEO notifies Board Chair and Audit Committee Chair within 24 hours. Full board briefing at next scheduled meeting or emergency session if required for decision-making.
â DO:
- Present 2-4 options (including status quo) so board can see range of choices and trade-offs
- Show full financial picture: annual cost, multi-year commitment, cost comparison, and cost savings if applicable
- State management recommendation explicitly with clear rationale (coverage adequacy, cost efficiency, peer benchmarking)
- Include risk implications table showing residual risk, regulatory risk, and financing risk for each option
- Provide specific approval request with checkboxes: "Approve contract, Authorize spend, Confirm alignment with risk appetite"
- Explain why board authority is required: exceeds delegation limits, material contract, or risk appetite confirmation needed
- Benchmark against peers: "6 of 8 comparable healthcare SaaS companies carry $10-20M coverage"
â DON'T:
- Present only one optionâboard needs to see alternatives and understand why recommended option is best
- Hide multi-year commitment costsâshow both annual ($510K) and total 3-year cost ($1.53M) for full transparency
- Make vague recommendation: "Consider increasing coverage"âbe explicit "Management recommends Option 2: $15M coverage"
- Skip risk implicationsâboard needs to understand residual risk and regulatory/financing consequences of each choice
- Use generic approval languageâprovide specific checkboxes for clear decision points
- Assume board knows why their approval is neededâexplain authority threshold and governance rationale
- Ignore peer benchmarkingâboard wants to know if proposed coverage is consistent with comparable companies
- Forget to establish 24-hour emergency notification protocolâboard must know when immediate notification is required
Risk Assessment Framework
- Framework Used: CIS Controls v8 (18 controls) as foundational assessment structure
- Scoring Model: Likelihood (1-5) Ă Impact (1-5) = Risk Score (1-25)
- Risk Appetite Threshold: Board-approved limit = Risk Score >15 (material risks requiring board visibility)
- Assessment Frequency: Quarterly formal assessment, monthly monitoring of material risks
- Validation: All risk scores reviewed by CISO + CFO, approved by CEO before board presentation
In Scope
- â
TechHealth corporate infrastructure (on-prem + AWS)
- â
TechHealth SaaS application (prod, staging, dev)
- â
MindCare acquired infrastructure (post-acquisition)
- â
Employee endpoints (corporate-issued + BYOD under MDM)
- â
Third-party vendors with data access (72 vendors)
- â
Security projects >$50K budget or board-approved
Out of Scope
- â Pre-acquisition MindCare security posture
- â Personal devices without MDM enrollment (est. 8%)
- â Operational IT metrics (uptime, performance)
- â Projects <$50K budget
- â Vendors with no data access
Reporting Period
- Metrics Period: Q3 2024 (July 1 - September 30, 2024)
- Trend Data: 12-month lookback (October 2023 - September 2024)
- Project Status: As of report date (November 15, 2024)
- Audit Findings: FY24 Annual Audit (completed September 2024) + Q3 Continuous Monitoring
- Industry Benchmarks: 2024 data (Verizon DBIR 2024 published June 2024)
Changes from Q2 2024 Report
| Element |
Q2 2024 |
Q3 2024 |
Reason for Change |
| Report Length |
18 slides |
12 slides |
Board feedback: "too long, focus on material risks only" |
| Metrics Reported |
23 metrics |
9 metrics |
Eliminated operational metrics, kept board-relevant only |
| Risk Universe |
24 risks |
10 risks |
Applied materiality threshold (Risk Score >15), removed low risks |
| Additions |
â |
MindCare risk, SOC 2 progress, ROI slide |
New material risk, board-requested visibility, value proof |
Key Assumptions & Limitations
- Risk Impact Valuations: Based on IBM Cost of Data Breach average ($9.48M for healthcare); TechHealth-specific impact may differ
- Shadow IT: Estimated 5-8% of applications not in asset inventory (risk: unknown exposure)
- Third-Party Risk: Vendor assessments rely on self-reported data (annual validation only)
- Incident Data: MTTD/MTTR based on detected incidents (unknown incidents excluded by definition)
- ROI Calculations: Based on modeled risk reduction (actual breach costs may vary)
Board Governance: Report Owner: Maria Chen, CISO (maria.chen@techhealth.com) | Report Reviewers: David Park (CFO), James Mitchell (CEO) | Board Review: Audit Committee (primary), Full Board (quarterly)
12
Why This Slide Works
This methodology slide demonstrates all Four Pillars of Governance working together in one comprehensive disclosure: (1) AccountabilityâReport Owner named (Maria Chen, CISO), reviewers identified (CFO, CEO), board committee responsible (Audit Committee); (2) Policy Tie-BackâRisk framework referenced (CIS Controls v8), board-approved risk appetite threshold stated (Risk Score >15); (3) Scope NotesâIn-scope and out-of-scope items explicitly listed; (4) Change Logâ"Changes from Q2 2024 Report" table documents every modification with reason.
This level of transparency builds board confidence. When you disclose methodology, scope boundaries, data sources, reporting period, and limitations, the board knows you're not hiding anything. The "Key Assumptions & Limitations" section is particularly powerfulâacknowledging "Shadow IT estimated 5-8% of applications not in asset inventory" shows intellectual honesty and mature risk awareness. This is professional governance documentation.
The Four Pillars of Governance: Complete Framework
Every board report should demonstrate all four governance pillars. This slide shows how they work together:
- 1. Accountability (Who Owns This): Report Owner: Maria Chen, CISO. Report Reviewers: David Park (CFO), James Mitchell (CEO). Board Review: Audit Committee (primary), Full Board (quarterly). Contact information provided. Every risk, metric, and project in this report has a named ownerâno anonymous "team" accountability.
- 2. Policy Tie-Back (Why We Measure This): Framework Used: CIS Controls v8 (board-approved security framework). Risk Appetite Threshold: Risk Score >15 (board-approved materiality line). Assessment Frequency: Quarterly formal assessment, monthly monitoring (documented governance cadence). Every element ties to documented policy or board decision.
- 3. Scope Notes (What's Included/Excluded): In Scope: TechHealth infrastructure, SaaS application, MindCare acquired assets, employee endpoints, 72 vendors with data access, projects >$50K. Out of Scope: Pre-acquisition MindCare posture, personal devices without MDM, operational IT metrics, projects <$50K, vendors without data access. Clear boundaries prevent scope creep and set expectations.
- 4. Change Log (What Changed & Why): Changes from Q2 table documents: Report length (18 â 12 slides, board feedback), Metrics reported (23 â 9 metrics, eliminated operational), Risk universe (24 â 10 risks, applied materiality threshold), Additions (MindCare risk, SOC 2 progress, ROI slide, board-requested visibility). Every change has documented reason.
Section 10 Final Checklist Reference: Before submitting any board report, review the complete governance checklist: (1) All metrics have named owners, (2) All projects tie to documented business drivers or policies, (3) Scope and limitations are explicitly stated, (4) Changes from prior report are documented with reasons, (5) Data sources and benchmarks are cited, (6) Methodology is disclosed and repeatable, (7) Board approval requirements are clearly identified, (8) Emergency notification protocols are documented.
What Makes This Methodology Disclosure Effective
- Framework disclosed: "CIS Controls v8" tells board what assessment structure was usedârepeatable and industry-recognized
- Scoring model transparent: "Likelihood (1-5) Ă Impact (1-5) = Risk Score (1-25)"âboard can verify calculations themselves
- Risk appetite threshold stated: "Board-approved limit = Risk Score >15"âconnects to prior board governance decision
- Scope boundaries clear: In-scope and out-of-scope lists prevent board from assuming coverage you don't have
- Changes documented: "Q2: 18 slides â Q3: 12 slides, Reason: Board feedback 'too long'"âshows responsiveness to board input
- Limitations acknowledged: "Shadow IT estimated 5-8%," "Vendor assessments rely on self-reported data"âintellectual honesty
- Accountability clear: Report owner, reviewers, and board committee namedâeveryone knows who's responsible
â DO:
- Disclose risk assessment framework and scoring methodology so board can verify your approach is consistent and repeatable
- State board-approved thresholds explicitly: risk appetite limit, SLA targets, materiality definitionsâshow governance linkage
- List in-scope and out-of-scope items clearly to set boundaries and prevent assumptions about coverage
- Document all changes from prior report with reasons: slide count, metrics tracked, risks added/removedâtransparency on evolution
- Acknowledge limitations honestly: "Shadow IT estimated 5-8%," "Vendor data self-reported"âshows mature risk awareness
- Name report owner, reviewers, and board committee responsibleâaccountability must be clear and individual
- Cite data sources and benchmarks: "Verizon DBIR 2024," "IBM Cost of Data Breach"âbuilds credibility and verifiability
- Reference Section 10 final checklist before submitting: verify all governance pillars are demonstrated
â DON'T:
- Hide methodologyâif board can't understand how you calculated risk scores, they can't trust your conclusions
- Skip scope definitionâboard will assume you're covering everything unless you explicitly state boundaries
- Ignore changes from prior reportsâboard members notice when slides disappear or metrics change without explanation
- Pretend limitations don't existâacknowledging "Shadow IT estimated 5-8%" is more credible than claiming 100% asset visibility
- Use anonymous ownership: "Security Team" or "IT Department"âname specific individuals accountable for report accuracy
- Make unsubstantiated claimsâcite sources for all benchmarks and industry data ("per Verizon DBIR 2024")
- Present inconsistent methodology quarter-over-quarterâboard needs repeatable framework to track progress meaningfully
- Skip the Section 10 governance checklistâmissing any of the Four Pillars undermines board confidence
Control Maturity Score: 78% (14 of 18 controls fully or substantially implemented)
Framework: CIS Controls v8 (Center for Internet Security) - Industry-recognized cybersecurity framework
| # |
CIS Control |
Status |
Gap |
Business Impact |
| 1 |
Inventory & Control of Enterprise Assets |
Partial |
Contractor devices not tracked |
Medium - Unknown exposure |
| 2 |
Inventory & Control of Software Assets |
Full |
None |
Low - Complete visibility |
| 3 |
Data Protection |
Partial |
MindCare backups unencrypted |
High - HIPAA violation risk |
| 4 |
Secure Configuration |
Full |
None |
Low - SOC 2 compliant |
| 5 |
Account Management |
Partial |
BYOD MFA gaps (18%) |
Medium - Credential theft risk |
| 6 |
Access Control Management |
Partial |
MindCare legacy groups not reviewed |
Medium - Excessive permissions |
| 7 |
Continuous Vulnerability Management |
Needs Improvement |
SLA non-compliance (32%) |
High - Exploitation risk |
| 8 |
Audit Log Management |
Full |
None |
Low - 100% coverage |
| 9 |
Email & Web Browser Protections |
Full |
None |
Low - Strong phishing defense |
| 10 |
Malware Defenses |
Full |
None |
Low - EDR deployed |
| 11 |
Data Recovery |
Partial |
DR test 6 months overdue |
Medium - Recovery uncertainty |
| 12 |
Network Infrastructure Management |
Full |
None |
Low - Segmentation complete |
| 13 |
Network Monitoring & Defense |
Full |
None |
Low - NDR deployed |
| 14 |
Security Awareness Training |
Full |
None |
Low - 11% phishing rate |
| 15 |
Service Provider Management |
Partial |
8 vendors overdue reassessment |
Medium - Third-party risk |
| 16 |
Application Software Security |
Partial |
Legacy apps not in SDLC |
Medium - Unvetted code |
| 17 |
Incident Response Management |
Full |
None |
Low - Proven MTTD/MTTR |
| 18 |
Penetration Testing |
Full |
None |
Low - Annual + post-acquisition |
Note: Full control details, safeguard implementation, and evidence available upon request from CISO.
Appendix A
| APT |
Advanced Persistent Threat - Sophisticated, long-term cyberattack by well-funded adversaries (e.g., nation-state threat actors targeting healthcare IP) |
| BYOD |
Bring Your Own Device - Policy allowing employees to use personal devices for work (e.g., BYOD MDM project to secure personal smartphones) |
| CIS Controls |
Industry-standard cybersecurity framework with 18 controls (TechHealth assessment shows 78% control maturity) |
| EDR |
Endpoint Detection & Response - Security tool that monitors endpoints for threats (CrowdStrike EDR deployed on 100% of endpoints) |
| FedRAMP |
Federal Risk Authorization Management Program - US government cloud security certification (in progress - opens $25M+ federal market) |
| HIPAA |
Health Insurance Portability & Accountability Act - US healthcare privacy law (required for all TechHealth operations) |
| MDM |
Mobile Device Management - Software managing mobile devices for security (MobileIron MDM for BYOD project) |
| MFA |
Multi-Factor Authentication - Login requiring 2+ verification methods (82% MFA adoption, target: 95%) |
| MTTD |
Mean Time to Detect - Average time to detect security incident (12 minutes - 120x faster than industry avg of 24 hours) |
| MTTR |
Mean Time to Respond - Average time to contain security incident (45 minutes - 96x faster than industry avg of 3 days) |
| PAM |
Privileged Access Management - Controls for high-privilege admin accounts (PrivGuard PAM reduced session duration 95%: 4.2h â 23min) |
| Phishing |
Fraudulent emails designed to steal credentials (failure rate: 18% â 11% = 39% improvement YoY) |
| Risk Appetite |
Maximum risk the board is willing to accept (board-approved threshold: Risk Score >15) |
| Risk Score |
Quantified risk level calculated as Likelihood (1-5) Ă Impact (1-5), where Impact = financial loss + reputational damage + regulatory penalty |
| SOC 2 |
Service Organization Control 2 - Security audit for service providers (Type II cert unblocks $12.3M ARR in delayed enterprise deals) |
| Vulnerability SLA |
Policy timeframe for patching vulnerabilities (Critical: 7 days, High: 30 days, Medium: 90 days) |
| Zero Trust |
Security model: "never trust, always verify" - TechHealth approach combines network segmentation + MFA + PAM |
Appendix B