Cyber failures can haunt boards for years – in courtrooms, markets, and the public eye

Beazley's Wayne Imrie says boards can no longer treat cyber as an IT issue

Cyber failures can haunt boards for years – in courtrooms, markets, and the public eye

Cyber

By Branislav Urosevic

When a company suffers a cyberattack, the fallout for its board of directors is often swift – and enduring. From crashing stock prices to class actions and regulatory scrutiny, the reputational and legal consequences can drag on long after systems are restored and headlines fade.

The reputational damage often begins within hours. One of the most immediate shocks, according to Wayne Imrie, head of London market wholesale executive risks at Beazley, is in the financial markets.

“The first and foremost is probably the stock price reaction,” he said. “In this current environment, the market is really twitchy to anything … You see stock prices, the volatility in the trends at the moment and the investor sentiment is pretty quick to move.”

But reputational exposure goes well beyond investor response. After a cyber incident, scrutiny can quickly expand to include employees, suppliers, and customers – all of whom may begin questioning whether the company had been adequately prepared.

“If you’re not doing the right things and not investing the time, the money, the effort, the process, the controls … it’s a huge reputational impact,” Imrie said.

Central to that scrutiny is the question of whether cybersecurity was treated as a core enterprise issue – or simply an IT concern. Imrie noted that leading organizations have long since elevated cybersecurity to the C-suite and boardroom.

“Long gone are the days of it being an IT function … now we see a lot of our clients with chief information security officers in place, reporting into the very top end of the company.”

Failing to meet that standard – or appearing to downplay the breach – can significantly damage trust. “It’s not just about the fact they may have not done enough diligence … It’s also about having the planning in place,” he said. In today’s environment, transparency, response speed, and stakeholder communication are key measures of leadership credibility.

That’s especially true for public companies, which must disclose cyber incidents and quantify their impact quickly. If the board falters in that responsibility, reputational damage can escalate into legal exposure.

“You need to be transparent with your investors,” Imrie said. “[You] also need to be able to quantify the impact … give a clear view of what the financial impact is going to be, what the operational impacts [are], what kind of the timelines look like.”

If the board is seen as having failed in its oversight duties – either in preparation or in response – they may ultimately face securities class actions from shareholders. These claims can linger long after the original incident has faded from headlines. “You’ve gone from dealing day one with a cyber incident … to being 900 days plus, still going through the same issues … talking about the pain as you’re trying to settle out the securities class action,” Imrie said.

Legal liability is rising – and regulators are tightening the net

While reputational damage can be severe, the growing legal and regulatory consequences are just as daunting.

“Investors will definitely hold the directors personally liable,” Imrie said. “They’re looking for the … board [to do] the right things and [make] the right decisions at the right time for that company.”

Courts are increasingly willing to entertain claims that directors failed in their duties if they did not oversee or disclose cybersecurity risks appropriately. Shareholders are more assertive in seeking compensation when failures in cyber oversight result in financial harm.

At the same time, regulatory bodies are tightening their grip. Oversight is expanding to include not just the handling of customer data and operational controls, but also disclosure practices. Imrie pointed to new SEC rules in the US requiring public companies to disclose material cybersecurity incidents within four days of determining their significance.

“If you believe you have an incident that is material … you make that disclosure within four days,” he said. “And it has to have qualitative and quantitative data in there around what you think the impact [is] and … the seriousness of the situation.”

This rule underscores a growing expectation: that boards treat cybersecurity as a top-tier governance issue – with full awareness of the potential legal and market consequences. Failure to do so doesn’t just put a company at risk. It puts its leadership directly in the crosshairs of regulators, plaintiffs, and the public.

As Imrie made clear, “There’s much more regulatory oversight now,” and boards that don’t keep pace with that reality may find themselves paying the price for years to come.

Related Stories

Keep up with the latest news and events

Join our mailing list, it’s free!