惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

The Register - Security
The Register - Security
美团技术团队
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
Jina AI
Jina AI
C
Check Point Blog
aimingoo的专栏
aimingoo的专栏
I
InfoQ
S
Securelist
T
Tor Project blog
GbyAI
GbyAI
L
LINUX DO - 热门话题
V
Visual Studio Blog
AWS News Blog
AWS News Blog
The Cloudflare Blog
腾讯CDC
K
Kaspersky official blog
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
Recorded Future
Recorded Future
李成银的技术随笔
W
WeLiveSecurity
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
M
Microsoft Research Blog - Microsoft Research
G
Google Developers Blog
酷 壳 – CoolShell
酷 壳 – CoolShell
Schneier on Security
Schneier on Security
B
Blog
IT之家
IT之家
爱范儿
爱范儿
H
Help Net Security
Simon Willison's Weblog
Simon Willison's Weblog
NISL@THU
NISL@THU
J
Java Code Geeks
博客园 - 聂微东
T
The Exploit Database - CXSecurity.com
Cyberwarzone
Cyberwarzone
博客园 - 叶小钗
MyScale Blog
MyScale Blog
Application and Cybersecurity Blog
Application and Cybersecurity Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
Project Zero
Project Zero
F
Future of Privacy Forum
D
Darknet – Hacking Tools, Hacker News & Cyber Security
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
Hacker News: Ask HN
Hacker News: Ask HN
D
Docker
Apple Machine Learning Research
Apple Machine Learning Research
B
Blog RSS Feed
V
Vulnerabilities – Threatpost

Forbes - Innovation

Stop Measuring AI Spend, Start Measuring Impact AI Agents Belong In Your Identity Program How SMEs Unlock Greater Value From AI Why Small, Elite Teams Outperform Big Ones If You Value Online Security Stop Using Public Wi-Fi Hotspots Demystifying Success: A Practical Approach To Guiding Your Business Are Financial Institutions Failing To Back The Low-Carbon Economy? Airbnb CEO Brian Chesky Called Chinese AI Fast And Cheap. Now, Congress Wants Answers The Neurotech CRO: Kordata Launches To Power Next-Gen Clinical Trials Latest AI Behaves More Like Humans By Rudely Interrupting You During Conversational Chats And We Might Relish It Google I/O 2026 Turned Gemini Into An Agent Platform Advanced Packaging Leads The Way To Intel Foundry Success From AI Policies To AI Literacy In Education Today’s Wordle #1797 Hints And Answer For Thursday, May 21 NYT ‘Pips’ Hints, Answers And Walkthrough For Thursday, May 21 Meta Expands Its Creator Ecosystem With Instagram’s New Instants App 4 Factors That Strongly Influence First Impressions, By A Psychologist ‘The Boys’ Series Finale Is A Crushing Disappointment ‘Escape From Tarkov’ Icebreaker Delayed As Current Event Extended Class Of 2026 Faces A Hard Truth: AI Isn’t The Threat—Ignoring It Is What Google’s Universal Cart Launch Means For AI-Led Shopping The $150 Trillion Question—What Is AI’s Value In Asset Management A Third-Wave Philanthropy Unlocked By AI Could Supercharge Federal R&D Top Frontier AI Models Top Out At C+ ... Barely Better Than Old Models Google Wants Search To Stop Answering And Start Acting Quordle Hints Today: Thursday, May 21 Clues And Answers NYT Strands Hint Today: Thursday, May 21 Clues And Answers (In A Material World) NYT Connections Hints Today: Thursday, May 21 Clues And Answers (#1,075) NYT Connections Answers Explained For Thursday, May 21 (#1,075) Why Infrastructure Modernization Is The Real Enabler Of AI The ‘Concord’ Curse Returns With Quantic Dream’s PvP Game Axed In 3 Months ‘Obsession,’ Now Going Viral, Just Set A 17-Year Box Office Record ‘The Boys’ Series Finale Review: Last Second Salvation Inside Incyte’s $120 Million AI For Drug Development Deal Samsung Galaxy Z Fold 8: Bad Crease News, No Display Upgrade The Robot Revolution Has Officially Begun When Insurance Disappears, Economies Follow. The G7 Has A Unique Opportunity To Act Solving The Identity Crisis: Putting Today’s Fragmented Consumer Back Together Private Equity-Owned Retinal Practices Perform Fewer Retinal Detachment Procedures Some Private Equity Firms Would Rather Let People Go Blind Than Reduce Their Profits How To Mitigate The Microsoft Windows BitLocker ‘Angry Hacker’ 0-Day ‘Off Campus’ Has Set A Rotten Tomatoes Score Record For The Past Year E-Cigarettes Can Help You Quit Smoking Says New Study Netflix’s Best New No. 1 Show Lands A 90% Rotten Tomatoes Score 2 Stubborn Habits That Predict Long-Term Success, By A Psychologist The AI-Native Human: What You Must Become To Stay Relevant GitHub Says 3,800 Repositories Breached—TeamPCP Hackers Demand $50,000 Vibe Hunting: A New Way Of Threat Hunting With AI Your AI Is Getting Smarter. But Whose Intelligence Is It Building? How 24/7 Renewables Are Ending Fossil Fuel Reliability ​Behind Vertical AI: What AI Is Already Demanding Of Energy And Utilities How The ARISE Network Is Rethinking Clinical AI Meet The Star-Nosed Mole — The Fastest Hunter On The Planet It’s Time To Rethink Data Retention In Healthcare The Intelligence Infrastructure Behind AI Agents The Next Phase Of Enterprise AI: Why LLM Consolidation Is Inevitable ​The Software Coordination Tax: Why Your 40-Engineer Team Is Shipping Like 25 Beyond The ‘Build Versus Buy’ Trap: Agentic Orchestration​'s Role In The Future Of GTM Demystifying Success: A Practical Approach To Guiding Your Business The Identity Crisis Your Security Team Didn't See Coming The End Of The Server Room: What Happens When Your Cameras Start Modernizing Legacy Industries And Multi-Partner Coordination Why Pharma Boards Confuse Scenario Models With Risk Measurements Your Company Is Measuring AI Adoption Wrong. Track This Instead. China Has Outspent The U.S. On Research For The First Time. 3,375 American Scientists Are Telling Congress To Pay Attention Why Americans Are Turning Against Data Centers Climate Advisers Call For Maximum Workplace Temperature Rules In U.K. People Are Really Angry At AI Content Even If It Turns Out That AI Didn’t Produce It And The Content Was Actually Human Made Volvo EX60 Road Tested: Is This The Best Electric SUV Yet? Ugreen Packs A Punch With Its Latest Nexode And MagFlow Air Chargers Why AI Literacy Has Become A Boardroom And Investor Priority 007 First Light Early Access: How To Play Before The Release Date Ronda Rousey’s 17-Second Win Drew Staggering Netflix Viewership Ronda Rousey Fallout: UFC Veteran Rips MVP MMA 1 As 'Cringe' When Is the Next UFC? Date, Times and Full Schedule Ebola Outbreak Update: An American Doctor, A WHO Emergency, And What The New Numbers Mean Microsoft Work Trend Index 2026 Shows AI Productivity Is Not Enough Today’s Wordle #1796 Hints And Answer For Wednesday, May 20 NYT ‘Pips’ Hints, Answers And Walkthrough For Wednesday, May 20 ‘The Boys’ Season 5, Episode 8 Release Time: Here’s When The Series Finale Drops On Prime Video America Built An Ebola Response System After 2014. Here’s How It Works As Doctor Shortage Rages On, Physician Assistant Pay Hits $140,000 Google I/O Buried Google Glass — And Launched Something Better Google’s AI Smartglasses Could Challenge The App Economy How PwC Is Supporting Agentic AI Deployments World’s Biggest Humanoid Robot Maker: The Tipping Point Is Near AI Data Center Build Out Faces Infrastructure And Political Head Winds NYT Strands Hint Today: Wednesday, May 20 Clues And Answers (No Rush) Quordle Hints Today: Wednesday, May 20 Clues And Answers NYT Connections Hints Today: Wednesday, May 20 Clues And Answers (#1,074) Dell COO Says Agentic AI Is Forcing Data Center Rebuild Apple’s Upcoming Accessibility Features Show The Real Potential Of Apple Intelligence German EV Subsidies Begin And China Could Be A Big Winner Sony Marks 10 Years Of Noise-Cancelling Headphones With Premium 1000X The Collexion The Hidden Players Powering The Future Of Quantum Computing AI Security Threats Coming From Outside And Inside, And Few Are Ready Defining An Intelligent Business 41-Year-Old Father Died Of Cancer. His Widow Shares Life After Death. School Districts With Fast-Rising Test Scores Have 5 Things In Common How ‘Heated Rivalry’ Built A Fandom Bigger Than Its First Season
Developing An Executive Cybersecurity Strategy For Directors
Keegan Crage · 2026-05-21 · via Forbes - Innovation

Keegan Crage | Owner, TechBrain AU — ISO 27001 certified, cyber security & AI governance partner | Oxford MSc Cyber Security (in progress).

getty

The regulatory tide has already turned. Has enterprise cyber posture kept pace?

A director reviews a board pack at the kitchen table, on a personal laptop, over the home Wi-Fi. But the corporate SIEM sees nothing. The corporate SOC raises no alerts. This is the board's unowned risk, and it sits on the kitchen table. Many cyber programs built in the last decade falter at the corporate boundary. Director liability could walk out with the executive every evening.

The U.S. SEC has already tightened cyber disclosure rules for companies. Australia is on the same arc, with the Corporations Act 2001 placing a statutory duty on directors to act with reasonable care and diligence. The ASIC has treated cyber as material since the Privacy Act 1988 Notifiable Data Breach Scheme can extend to director-held personal data.

The enterprise security program isn't behind, but it wasn't scoped for this. The moment it clicked for me was when I found out that a chair had been using a personal Gmail account for board correspondence for the better part of two years because it was just easier on their phone. Nobody had flagged it. Nobody had even thought to look. That was the moment I realized the risk model had a human-shaped hole in it that no amount of corporate tooling was ever going to close.

The Architectural Boundary​

Corporate SOC, SIEM and MDR platforms are working as designed; they are staffed and tooled for the corporate-owned attack surface. But the executive's kitchen-bench laptop, the home router and the family iPad are all owned outside it. None of it is in scope. The gap is an architectural boundary.

Ponemon Institute's 2025 research, surveying 586 security professionals, found 51% of organizations had seen attacks targeting executives or family members, up from 42% in 2023. GetApp's 2024 research puts the figure at 72% of senior executives targeted in the prior 18 months. In mid-market boardrooms, the number stops being alarming. It becomes predictive.

The Australian Signals Directorate's 2024-25 report documents state-sponsored groups turning home routers into botnet infrastructure. Every family-shared device still signed in to work (laptop, tablet or inherited phone) could widen the hijack surface. Personal email used for board correspondence has the potential to become a wire-fraud vehicle in waiting.

Every one of these is a claim against the director as opposed to a ticket for IT to resolve. Boards still briefed through the IT subcommittee on a lagging audit cycle may not be hearing the signal.​

For most directors hearing this, the first reaction is recognition as they see themselves in the scenario, followed immediately by discomfort. There's almost always a beat where they realize this is the first time someone has spoken to them about cyber as something that belongs to them personally, not to the IT team, not to the CISO. Then the discomfort sets in, because they can see exactly where that logic leads.

Establishing A Better Cybersecurity Posture At The Director Level

Companies need to start treating executive personal cyber as its own program, owned at board level, with its own scope and budget line. It doesn't live inside the CISO's remit: Legal, privacy and ethical issues prevent corporate IT from operating inside a director's personal environment.

Any program fails if there isn't buy-in. An executive who silently disables protections ends the program. A seamless, trusted relationship is what holds it together. Protection and surveillance have to be separated architecturally. Get it right, and the strategy does what it needs to without peering into the executive's personal life. Get it wrong? No director tolerates the program past the second month.

Start with a prepared personal-risk audit for each director, mapping the full household digital footprint (personal devices, shared accounts, home networks and who has access to). That inventory becomes your program scope, and it could surface the personal email accounts or kitchen-table laptops no corporate SIEM has ever seen along with devices such as home security cameras no director ever considered was a corporate cybersecurity risk. Ownership sits with the general counsel or chief risk officer, not the CISO.

From that baseline, protection needs to operate across four domains simultaneously: personal privacy foundations (dark web monitoring, credential exposure), home network security with active penetration testing, device-level hardening and malware protection, and incident response. The executive's household is a unit of protection. Any program that covers only the individual and ignores shared devices at home could leave potential entry points wide open.

Finally, build the evidence layer from Day One. Every control implemented should produce documentation that maps directly to D&O and cyber insurer renewal questionnaires. An annually certified, audit-ready record of your security posture underpins a strong a governance strategy.

Executive Cybersecurity And Governance

Stop asking the CISO to find the budget. Executive personal cyber is a governance category that runs adjacent to the enterprise cyber program, not nested inside it.​ Executives should put a line in the board-level risk budget before anyone's written a scope document, because if it has to compete internally with the enterprise program, it loses every single time, and quietly, so nobody notices until something goes wrong.​


Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?