Cybersecurity is a governance issue. Boards are expected to oversee cyber risk as part of their fiduciary duties. Individual directors may face personal liability if they fail to exercise adequate oversight. At the same time, this oversight is not easy. Boards struggle due to a lack of cybersecurity expertise and what has been called the 'paralysis trap': the tendency to avoid action in the face of overwhelming technical complexity and rapidly evolving threats. Choosing an adequate governance model can help.

This paper adapts the INSEAD sustainability governance model to cybersecurity by presenting six board-level governance models and six governance-enhancing plug-ins. These tools help boards structure their oversight in line with the company's risk profile, digital maturity, and regulatory environment.

1. Why Cybersecurity is a Strategic Board Concern

Cybersecurity is no longer a back-office/technical issue - it has become a board imperative. The digitalisation of business models, evolving geopolitical threats, and the professionalisation of cybercrime have increased the scale and complexity of cyber risk. The World Economic Forum ranks cybersecurity among the top global risks. According to IBM, the average cost of a ransomware breach exceeded $4.5 million in 2022. Statista projects that the global cost of cybercrime will reach $10.3 trillion in 2025 and rise to $16 trillion by 2029—figures that approach 15% of projected global GDP ($111.3 trillion in 2024). Meanwhile, the cyber insurance market is tightening: premiums are rising and exclusions—especially for state-sponsored attacks—are becoming more common. As cyber threats grow and insurance protections diminish, boards can no longer afford to treat cybersecurity as purely operational. Individual directors may also face personal liability (Cfr NIS2) if they fail to exercise adequate oversight. In this context, the need for structured, strategic cyber governance is clearer than ever.

 

1

2. Why Structure Matters

Good intentions are not enough—effective cyber governance requires structured decision-making, clear responsibilities, and regular engagement. While no single model fits all boards, selecting the right approach to structuring and supporting oversight can significantly improve risk mitigation, crisis readiness, and board–management collaboration.

3. Six Governance Models for Cybersecurity Oversight

Model

Description

Best Fit

1. Fully integratedCybersecurity is embedded into every board-level decision. Strategic plans, M&A, and risk reviews explicitly address cyber.Digital-native or digitally mature companies with high board literacy on cyber. Organisations for whom cyber is a strategic differentiator.
2. Dedicated committeeA board-level cybersecurity or technology risk committee oversees all cyber matters.Large, complex, or regulated firms; companies with prior breach experience.
3. Audit/Risk committee extensionCyber risk is formally included in the audit or risk committee's remit. Often supported by regular CISO briefings.Mid-sized companies or those starting formal cyber governance.
4. Distributed governanceDifferent aspects of cyber (e.g., compliance, innovation, HR, data ethics) are assigned to different committees.Boards with strong governance culture and multiple specialist committees. 
5. Cyber champion modelOne director is designated to lead on cybersecurity and acts as liaison with CISO and/or experts.Smaller boards, or organisations with limited resources.
6. Minimalist/reactiveNo formal oversight; cyber is addressed only during crises or audits.Increasingly unacceptable. Transitional at best, negligent at worst.

Choosing the Right Model

  • Boards often begin with model 3 or 5. (as a proactive step moving out of 6)
  • Larger or regulated companies evolve toward models 1 or 2.
  • Models 4 and 1 work best where cybersecurity cuts across multiple board themes. In 4, watch out for silos, reintegrate.

 

4. Six Plug-Ins to Strengthen Oversight

Plug-InDescriptionUse Case
a. Board cyber trainingStructured learning sessions for directors on cybersecurity threats, regulation, and trends.All boards; especially important in early stages of maturity AND when imposed by regulation
b. Expert briefings (ad hoc)External experts update the board on threat landscape or review major incidents.Enhances situational awareness and challenge capability.
c. Standing advisor or cyber councilOngoing access to independent experts who support board or committee work.Ideal for boards without internal cyber expertise.
d. CISO–board engagementRegular, direct reporting from the CISO to the board or designated committee.Essential for translating operational risk into strategic insight.
e. Board-executive taskforceTime-bound group of directors and senior leaders working on a specific cyber initiative (e.g., post-breach reform).Agile response to high-stakes issues.
f. Simulations and tabletop exercisesStructured crisis scenarios that test board readiness (or rather exec team with board oversight) and decision-making.  1Useful annually or pre-emptively in high-risk sectors.

How Plug-Ins Interact with Models

  • Plug-ins boost board capacity without altering structure.
  • For example, model 3 (Audit/Risk) plus plug-ins a, d, and f can be highly effective.
  • Model 1 (Fully integrated) typically uses a plug-ins a through e.
  • Boards with limited structure should start with training (a) and championing CISO access (d).

 

5. Summary Recommendation

Boards should: 

  • Select a base governance model aligned with company context.

  • Deploy plug-ins to build expertise, engagement, and responsiveness.

  • Review structure annually as threats, expectations, and maturity evolve.

Cyber governance is a matter of structure, not just awareness. By choosing and supporting the right model, boards can move from passive oversight to proactive leadership. As a director, you have an opportunity to put the topic on the agenda and use your reflections to move the board beyond Model 6.

Want to know more? Learn more about the  GUBERNA Sounding Board Committee for Cybersecurity.

1

The Authors

  • Alex

    Alex Driesen

  • Dirk

    Dirk Schilders

  • Iwona

    Iwona Muchin

  • Marc

    Marc Vael

  • Jochen

    Jochen Maertens

Special thanks to Bart De Smet, Inge Boets, and Peter Hinssen for critically reviewing these models.

References

  • INSEAD (2022). Designing Sustainability Governance
  • ecoDa (2020-2024). Cyber-Risk Oversight Handbook
  • European Union (2023). Directive (EU) 2022/2555 (NIS2 Directive)
  • National Institute of Standards and Technology (NIST). Cybersecurity Framework
  • Center for Internet Security (CIS). Top 18 Controls
[1] See also question 7 here