Leading Through Crisis: The Board's Playbook for Attack, Ransom, & Litigation
Governing at the Point of Impact: Decision-Making, Crisis Management, and Shareholder Defense.
Core Learning Objectives
- Direct the initial board-level response in the first 48 hours of a material cyber crisis.
 - Govern the complex decision-making process around paying a ransom, including legal, ethical, and financial factors.
 - Assess and manage the risk of shareholder derivative lawsuits and regulatory enforcement actions post-breach.
 - Lead a simulated cyber-attack tabletop exercise, applying learned principles in a real-time scenario.
 - Facilitate a productive, high-stakes dialogue between the Audit Chair and the C-Suite during a crisis.
 
Detailed Course Outline
Module 1: The First 48 Hours: The Board's Role When the Alarm Sounds
Key Concepts: Activating the Incident Response Plan (IRP). The board's role vs. management's role (strategic oversight, not tactical command). Establishing secure, out-of-band communications. Key stakeholders to engage: external counsel, cyber insurance carrier, forensic firm, law enforcement.
Module 2: The Ransomware Dilemma & Crypto Preparedness
Key Concepts: The "Pay vs. Don't Pay" debate (OFAC sanctions risk, encouraging future attacks vs. fiduciary duty to the business). The role of cyber insurance. Understanding ransom negotiation.
Special Lesson: Buying Crypto Futures for Ransom Readiness
Rationale: Acquiring large sums of cryptocurrency (e.g., Bitcoin) quickly during a crisis is slow, expensive, and can trigger market alerts. A pre-established relationship with a digital asset custodian or a strategy involving regulated financial instruments like cash-settled crypto futures can serve as a financial hedge and a proxy for payment readiness.
Board Action:
The board should direct the CFO and Treasurer to research and present a "Ransom Payment Financial Readiness Plan." This plan outlines the exact mechanics and third-party partners required to procure a specific amount (e.g., $10 million) of a designated cryptocurrency within a 12-hour window. This is a risk mitigation strategy, not speculation.
Module 3: The Aftermath: Navigating Shareholder Litigation & Regulatory Scrutiny
Key Concepts: The anatomy of a shareholder derivative lawsuit post-breach (alleging breach of fiduciary duty). Proving the board acted in good faith (documentation is key). Managing regulatory investigations from the SEC, FTC, and international Data Protection Authorities.
Case Study: The Equifax Breach (2017)
Scenario: Equifax's failure to patch a known vulnerability led to a breach affecting 147 million people. The aftermath included a $700M settlement with the FTC and states, multiple shareholder lawsuits, a congressional investigation, and the resignation of the CEO, CIO, and CSO. The board was heavily criticized for its slow response and for executives selling stock after the breach was discovered but before it was publicly disclosed.
Boardroom Takeaway:
This case is the ultimate cautionary tale in post-breach governance failure. It highlights the devastating reputational and financial cost of a poorly managed response. The key lessons for the board are the critical importance of timely patching of known vulnerabilities, robust insider trading policies during an incident, and transparent, well-managed public disclosure.
Module 4: The C-Suite Dialogue: Audit Chair & CISO/CIO Crisis Conversation
Key Concepts: This module presents a scripted dialogue and analysis to model an effective, high-stakes conversation.
Example C-Suite Dialogue
Audit Chair: "Is the incident contained, or is the threat ongoing?"
CIO: "Yes, our General Counsel and risk team engaged them on day one. They are funding the forensic firm we hired."
Audit Chair: "Good. Second, risk of data exfiltration. The SEC will view data theft differently from a pure service outage. What is our forensic team's confidence level that customer PII has been compromised?"
CISO: "Chairwoman, at this moment, we have evidence of exfiltration, but we cannot confirm the specific data types. Our working assumption must be that sensitive data is in the attackers' hands. We are operating under that worst-case scenario."
Audit Chair: "Understood. That informs our materiality assessment. Finally, business continuity. When can we tell the market and our key customers that our core services will be restored? I don't need a guarantee, I need a data-driven projection with confidence intervals."
