Categories
Digital Consultancy & Business (EN) Featured-Post-Transformation-EN

Implementing Appropriate Cyber Risk Management: A Strategic and Legal Responsibility

Auteur n°4 – Mariami

By Mariami Minadze
Views: 17

Summary – Accelerated digitalization and the surge in cyberattacks require Swiss boards of directors to integrate cyber risk management on par with financial risks to avoid sanctions and personal liability. Governance, due diligence and traceability—via meeting minutes, key indicators and the Business Judgement Rule—ensure informed decisions and effective oversight. Solution: establish a top-level security policy, document every step and deploy a continuous evaluation and mitigation cycle with internal and qualified third-party experts.

In a context of escalating cyberattacks and accelerating digitalization, cyber risk management is becoming a legal obligation and a key governance challenge.

In Switzerland, the board of directors must incorporate information security into its risk management framework, on par with financial and operational risks. Any failure can expose individual board members to personal liability, even in cases of delegation. It is therefore essential to establish a documented, traceable process that is regularly reviewed to guard against sanctions and maintain stakeholder trust.

Fiduciary Responsibility and the Board’s Duty

The board of directors bears legal responsibility for defining the security policy and assessing critical risks. Even if it delegates execution, it must demonstrate rigorous selection, ongoing information, and effective oversight.

Legal Mandate and Regulatory Framework

Under the Swiss Code of Obligations (Art. 716a), the board must ensure an adequate organization to identify, manage, and monitor risks, including those related to information security, and draw on transformational leadership to guide governance.

The security policy must be defined at the highest level of the company and approved by the board of directors. It sets out responsibilities, incident management procedures, and reporting processes to governance bodies.

In case of non-compliance, directors may be held liable for damages suffered by the company or for penalties imposed by regulatory authorities, underscoring the importance of adhering to Swiss legal requirements.

Non-delegation and Due Diligence

The board may assign implementation of the cyber strategy to management or external parties, but primary responsibility remains inalienable. To disclaim its liability, it must demonstrate that it selected competent experts, received regular updates, and exercised effective oversight.

Documenting these steps is crucial: minutes, audit reports, and tracking dashboards provide proof of adequate diligence. Without these elements, the board remains exposed in the event of a major incident.

Due diligence also involves evaluating the skills of service providers and establishing KPIs to measure the effectiveness of the security framework.

Example of Governance Under Scrutiny

In a mid-sized Swiss accounting services firm, the board of directors had engaged an external provider to develop its security plan. Following a major breach, it was found that the board had never approved or reviewed the quarterly reports provided by that provider. This case illustrates that delegation without documented oversight personally exposes directors, despite the involvement of a specialist.

Business Judgment Rule and Traceability of the Decision-Making Process

The Business Judgment Rule protects strategic decisions if they are based on a rigorous, informed process free of conflicts of interest. Traceability and documentation at each stage of the decision mitigate the risk of litigation in the event of failure.

Principle and Conditions of Application

The Swiss Business Judgment Rule recognizes that a board may make errors in judgment without being penalized, provided it acted in good faith, in the best interests of the company, and based on sufficient information. Absence of conflicts of interest is a sine qua non.

To benefit from this protection, the board must show it sought expert opinions, analyzed multiple scenarios, and documented the criteria considered. This rigor protects directors during an audit or dispute.

This principle encourages governance bodies to structure their decisions within a formal and transparent framework, including adopting agile practices to justify each strategic trade-off.

Documentation as a Legal Shield

Detailed minutes, risk assessments, legal and technical expert opinions, and workshop reports form a comprehensive dossier. This documentation is the foundation for demonstrating an impartial and methodical process.

In the absence of written records, courts may consider that the board failed to exercise diligence or did not grasp the stakes. The burden of proof then falls on the directors.

Digitizing these documents via a secure management system facilitates retrieval and ensures data integrity in audits.

Example of a Protected Process

A Swiss financial institution implemented an annual cyber risk review cycle, involving an interdisciplinary committee and external audits. Each meeting yielded a timestamped, digitally signed report. This case shows that rigorous traceability strengthens the board’s position, even after an incident affecting the security framework.

Edana: strategic digital partner in Switzerland

We support companies and organizations in their digital transformation

The Blind Spot of Information Security in Governance

Information security often remains underrepresented at board level, perceived as purely technical. This expertise gap exposes decision-making bodies to ill-informed decisions and unanticipated risks.

Underestimating Cyber Risk at the Strategic Level

In many organizations, cybersecurity is confined to IT teams and not discussed at the highest level. The board may then make decisions without understanding attack scenarios or properly assessing potential impacts on business continuity.

This governance gap leads to fragmented management, where technical priorities diverge from business and legal concerns. The lack of a holistic vision undermines the company’s resilience.

It is essential to integrate cybersecurity experts into the risk committee—recruiting a DevOps Engineer—and to regularly raise board awareness of emerging threats.

Consequences of Ill-Informed Decisions

A cybersecurity investment policy not aligned with the company’s strategy can lead to overinvestment in unsuitable tools or neglect of critical vulnerabilities. These choices increase overall costs and operational complexity without guaranteeing better protection.

In case of an incident, the board may be accused of deficient management for approving budgets or practices that did not consider real threat scenarios.

Close coordination between the CIO, business leaders, and directors is necessary to align budget, skills, and security objectives.

Example of a Competency Gap in Action

A Swiss healthcare provider suffered a ransomware attack. The board had never approved the crisis management plan nor received attack simulations. This case demonstrates that a board lacking awareness cannot effectively challenge mitigation plans, leaving the organization vulnerable to significant fines and loss of patient trust.

Towards Integrated and Documented Cyber Risk Management

Effective cyber risk management must rely on a continuous process of identification, assessment, mitigation, and monitoring. Periodic reassessment ensures adaptation to rapidly evolving threats.

Concrete Risk Identification

Start by mapping information assets, critical business processes, and data flows. This holistic view highlights potential entry points and external dependencies.

Threat modeling workshops, conducted with business teams and the CIO, help anticipate attack scenarios and identify high-criticality areas.

Such a structured approach aligns security strategy with the company’s operational and legal stakes.

Assessing Probability and Impact

Each risk must be evaluated per objective criteria: likelihood, financial, operational, and reputational impact. This prioritization guides budgetary trade-offs.

Using standardized risk matrices ensures comparability and consistency of assessments over time.

Involving business owners in this assessment strengthens ownership of the framework and the relevance of corrective actions.

Defining and Tracking Mitigation Options

For each major risk, formalize several mitigation measures: prevention, detection, correction, and recovery. Compare costs, benefits, and residual impacts for each option.

Document the chosen option, associated performance indicators, and implementation deadlines. A remediation plan with clear milestones facilitates reporting to the board.

A mix of open source solutions and custom developments, as appropriate, ensures flexibility, scalability, and no vendor lock-in.

Continuous Monitoring and Periodic Reassessment

The threat landscape evolves rapidly: monitoring indicators (SIEM, IDS/IPS, regular penetration tests) should feed into a review cycle. This feedback loop ensures measures remain effective.

Quarterly reviews involving the CIO, business teams, and directors enable reassessment of risks based on new incidents or lessons learned.

Integrated management implies updating documentation, adjusting the security policy, and aligning human and technical resources.

Example of a Successful Integrated Approach

Within a Swiss financial services group, the board adopted a risk management framework aligned with ISO 27005 and NIST standards. Each quarter, the risk committee validates a consolidated report combining penetration test results, detection indicators, and mitigation plan progress. This case demonstrates that integrating a formalized, documented process enhances resilience and compliance while optimizing resources.

Strategic Cyber Risk Management

Cyber risk management is not merely a technical measure but a continuous, structured, and traceable governance process. The board’s fiduciary duty, reinforced by the Business Judgment Rule, requires rigorous documentation and constant vigilance. Identifying, assessing, documenting, mitigating, and periodically reassessing are indispensable steps to secure information assets and maintain stakeholder trust.

To meet legal requirements and anticipate threats, our experts support your board of directors in defining robust security policies, selecting modular open source solutions, and implementing agile, scalable processes.

Discuss your challenges with an Edana expert

By Mariami

Project Manager

PUBLISHED BY

Mariami Minadze

Mariami is an expert in digital strategy and project management. She audits the digital ecosystems of companies and organizations of all sizes and in all sectors, and orchestrates strategies and plans that generate value for our customers. Highlighting and piloting solutions tailored to your objectives for measurable results and maximum ROI is her specialty.

FAQ

Frequently Asked Questions on Cyber Risk Management

What are the legal obligations of the Board of Directors regarding cyber risk?

The Board of Directors must, according to article 716a of the Swiss Code of Obligations, establish an adequate organization to identify, manage, and monitor information security risks. It must define a security policy approved at the highest level, oversee its implementation, and document every step to demonstrate its due diligence in the event of an audit or incident.

How do you document a due diligence process to combat cyber risk?

Due diligence is compiled into a complete file: meeting minutes, audit reports, monitoring dashboards, and workshop summaries. Each selection of a provider or solution must be justified by a thorough evaluation, expert assessments, and regular oversight. Timestamped traceability ensures solid proof in case of dispute.

Which KPIs are essential for managing cyber risk?

Key indicators include Mean Time To Detect (MTTD), Mean Time To Respond (MTTR), the number of incidents detected during penetration tests, audit compliance rate, and vulnerability analysis coverage. These KPIs should be updated regularly and presented to the Board to adjust priorities and strategic direction.

How does the Business Judgment Rule protect the Board’s decisions?

The Business Judgment Rule grants immunity when the Board acts in good faith, without conflicts of interest, and based on sufficient information. To benefit from it, the decision-making process must be documented: expert consultations, scenarios considered, and criteria used. This rigor reduces the risk of legal action if a security measure fails.

What are the key steps in a periodic cyber risk assessment?

A periodic assessment follows a cycle: identification of critical assets, evaluation of likelihood and impact, definition of mitigation measures, and monitoring via indicators. Quarterly reviews involving the IT department, business units, and directors help adjust policy and incorporate lessons learned from recent incidents.

How do you choose qualified providers to outsource implementation?

Selection is based on verifying skills (certifications, client references), conducting technical tests (penetration tests), and including contractual KPIs. A prior audit secures the choice. Documenting the process and providing regular reports ensures effective oversight and reduces the Board’s liability.

What role does information asset mapping play in risk management?

Asset mapping inventories critical systems, applications, and data flows. It identifies potential entry points and dependencies, aiding in prioritizing measures. Conducted in workshops with business units and the IT department, it aligns cyber strategy with operational and legal requirements, serving as the foundation for all risk analyses.

How do you integrate cyber risk management into overall governance?

Integration involves establishing a risk committee that includes the IT department, business units, and directors; holding regular reviews; and implementing structured reporting. The security policy must align with corporate strategy and be supported by agile processes. Centralized documentation ensures continuous transparency and traceability.

CONTACT US

They trust us for their digital transformation

Let’s talk about you

Describe your project to us, and one of our experts will get back to you.

SUBSCRIBE

Don’t miss our strategists’ advice

Get our insights, the latest digital strategies and best practices in digital transformation, innovation, technology and cybersecurity.

Let’s turn your challenges into opportunities

Based in Geneva, Edana designs tailor-made digital solutions for companies and organizations seeking greater competitiveness.

We combine strategy, consulting, and technological excellence to transform your business processes, customer experience, and performance.

Let’s discuss your strategic challenges.

022 596 73 70

Agence Digitale Edana sur LinkedInAgence Digitale Edana sur InstagramAgence Digitale Edana sur Facebook