{"id":4478,"date":"2020-06-29T18:01:03","date_gmt":"2020-06-29T18:01:03","guid":{"rendered":"https:\/\/ibj.be\/news-nl\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/"},"modified":"2020-06-29T18:01:03","modified_gmt":"2020-06-29T18:01:03","slug":"how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors","status":"publish","type":"post","link":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/","title":{"rendered":"How to explain the legal aspects of cybersecurity to the Board of Directors?"},"content":{"rendered":"<p><strong>How to explain the legal aspects of cybersecurity to the Board of Directors<\/strong><\/p>\n<p>by Peter Craddock, Counsel and head of the IT, Data Protection &amp; Cybersecurity team at NautaDutilh<\/p>\n<p>Forget the clich\u00e9s \u2013 cybersecurity is not just an IT issue, it is a company-wide issue. From the chair(wo)man of the Board of Directors to the newest intern, every person in an organisation can be both a cybersecurity threat and a cybersecurity asset.<\/p>\n<p>Given that 30-35% of cyber threats tend to result from actions of well-meaning employees, it is crucial for organisations to ensure that the proper strategy is deployed and that the risk of individuals being a cybersecurity threat is limited as much as possible<em> (see CrowdStrike Services Cyber Front Lines Report, 2019, as well as Deloitte, The future of cyber survey 2019)<\/em>.<\/p>\n<p>The Board\u2019s role in this respect is multi-faceted, with two key points of attention:<\/p>\n<ul>\n<li>The Board is in charge of setting a strategy for and overseeing a company-wide approach to cybersecurity. Not the actual implementation \u2013 that is for the Management to determine \u2013 but under no circumstances is \u201cIT will do this fine\u201d an appropriate strategy.<\/li>\n<li>Individually, directors can have access to commercially sensitive information or even certain forms of personal data. To be a shield against threats rather than a liability, directors must be aware of the risks and of ways to improve their cyber-hygiene.<\/li>\n<\/ul>\n<p><strong>1. Legal and compliance advisors play an important cybersecurity role<\/strong><\/p>\n<p><strong>Defining a strategy<\/strong> and having <strong>good cyber-hygiene<\/strong> do not require directors to be IT experts; however, a successful approach always relies on information \u2013 such as a good overview of the risks and opportunities \u2013 and openness to advice.<\/p>\n<p>Today, organisations generally recognise the importance of cybersecurity. According to the Microsoft and Marsh <em>Global Cyber Risk Perception Survey<\/em> of 2019, 79% of respondents ranked cyber risk as a top-five concern for their organisation.<\/p>\n<p>To help them devise a strategy, Boards are quick to turn to technical advisors (in particular individuals such as the Chief Information Security Officer or Chief Technology Officer), who have a critical role to play in making directors aware of the technical risks and possibilities and in sharing input on what has been achieved each reporting period.<\/p>\n<p>Yet legal and compliance advisors have an equally critical role to play. Cybersecurity risks are not merely technical in nature but can also be legal: failure to comply with the rules of cybersecurity law can lead to liability towards third parties and even administrative or criminal fines. <strong>A successful cybersecurity strategy therefore needs to consider legal risks.<\/strong><\/p>\n<p>In this context, legal and compliance advisors can help Boards define and refine their cybersecurity strategy through different means, such as training and reporting.<\/p>\n<p>We have included below various suggestions on how to put these means into practice.<\/p>\n<p><strong>2. Training: improving the level of cyber-awareness among the Board<\/strong><\/p>\n<p>Cybersecurity law training covers various topics and takes many forms. It is therefore crucial for you as legal and compliance advisors to choose the mode and content that best fits your Board.<\/p>\n<p><strong>a) Legal framework<\/strong><\/p>\n<p>Organise training on the legal aspects of cybersecurity for the Board so that directors are aware of the principles that must underpin its cybersecurity strategy.<\/p>\n<p>The selection of topics is crucial given that <strong>cybersecurity law is more than just the GDPR<\/strong>. Aside from data protection, there are sector- or activity-specific rules (e.g. finance and telecommunications sectors among others, but also providers of essential services or certain kinds of digital services), as well as cybercrime-related legislation. There are rules in relation to security measures as well as rules regarding the handling of security incidents (personal data breaches being one form of security incident); there are rules on what constitutes a cybercrime and what is authorised security research or ethical hacking. In the UK, there is even a legal initiative that would impose specific, technical security requirements for all new Internet-of-Things devices (notably a unique password for <em>each<\/em> device that is not resettable to a universal factory setting).<\/p>\n<p>Whichever topics you choose, <strong>make their impact clear<\/strong>. The Board may appreciate theoretical exercises and presentations, but without illustrations of what this means for the organisation \u2013 or for directors individually \u2013 they may struggle to assimilate your training.<\/p>\n<p>Finally, try to involve the information security team in the preparation of such training, not only to ensure the technical accuracy of any factual explanations given but also to help you understand references to certain concepts or technical standards if they seem unfamiliar.<\/p>\n<p><strong>b) Fines<\/strong><\/p>\n<p><strong>Talk about fines<\/strong> during these trainings as well \u2013 not to scare directors, but to <strong>make the risks tangible<\/strong>. Recent fines imposed by data protection authorities across the European Union for inadequate security measures help highlight the importance of good cyber hygiene. For instance:<\/p>\n<ul>\n<li>in Germany, a telecommunications provider was fined 9.55 million EUR for failure to have sufficient controls in place for access to customer data;<\/li>\n<li>in Bulgaria, the National Revenue Agency was fined 2.6 million EUR for similar failures.<\/li>\n<\/ul>\n<p>In other words, on top of the financial and reputational damage they caused for the organisations in question and the damage to affected individuals, these security failures highlighted infringements of cybersecurity laws and led to high fines. It is also worth noting that proper logical access controls, i.e. restrictions on who sees what, are one of the first building blocks that need to be examined when devising a system, database or application.<\/p>\n<p>These eye-catching amounts help focus minds, as they show that cybersecurity is not a dead weight, a mere cost. Aside from the many other benefits in terms of protection of assets, even a little investment in cybersecurity can help avoid fines and the reputational fallout they can cause.<\/p>\n<p><strong>c) Incidents<\/strong><\/p>\n<p>If you can, contemplate carrying out incident simulations or workshops with Board involvement. A dry run allows stakeholders to <strong>try out an incident response plan<\/strong> and think about possible solutions to problems. In addition, it helps limit the sense of panic and intense pressure that many feel when they first have to deal with a major incident.<\/p>\n<p>For instance, a security incident or data breach workshop might lead the Board to examine tricky issues in a practical manner, such as the question of whether to pay or not if the organisation is paralysed by a ransomware attack or what steps to take in case of corporate espionage.<\/p>\n<p><strong>2. Reporting, to help with awareness of internal &amp; external developments<\/strong><\/p>\n<p>Reporting on cybersecurity law will often be included in reports from Management, which can cover both internal status updates and external legal changes.<\/p>\n<p><strong>a) Internal status updates<\/strong><\/p>\n<p>In terms of internal developments, reports from Management have to help the Board determine <strong>whether the organisation is properly addressing both potential and actual legal risks<\/strong>.<\/p>\n<p>Legal and compliance advisors therefore have to summarise for these reports the state of compliance with cybersecurity law, points of attention and any ongoing contacts with regulators or disputes.<\/p>\n<p>It is important to stress the broader repercussions cases before regulators can have. The Belgian Data Protection Authority, for instance, has refined its approach in relation to the naming or anonymisation of organisations in its published decisions, but an imprudent approach can lead to improperly anonymised decisions or decisions with full identification \u2013 with all the <strong>reputational fallout<\/strong> that this can cause. In case of a significant and potentially damaging decision in public relations terms, legal and compliance advisors have to highlight these risks as well.<\/p>\n<p><strong>b) Impact of legal changes<\/strong><\/p>\n<p>Reporting is also crucial to keep the Board <strong>up to date on new legislation and case law<\/strong> and how they may impact the cybersecurity strategy (obviously, this can also take the form of refresher trainings).<\/p>\n<p>Data protection case law is a key source in this respect, due to the many ongoing cases before the Belgian Data Protection Authority and other supervisory authorities within the European Union that are based on data breaches or security failings.<\/p>\n<p><strong>c) Collaboration with information security teams<\/strong><\/p>\n<p>As these reports aim to help the Board (re)evaluate its cybersecurity strategy, it is best to establish a dialogue between legal and compliance advisors on the one hand and information security teams on the other hand to provide combined and pragmatic input.<\/p>\n<p>To be successful, though, <strong>such collaboration has to be recurrent<\/strong> and not limited to the preparation of one report \u2013 the Board will benefit from a more comprehensive overview of the risks and measures taken, while the organisation will benefit from greater alignment in the implementation of the cybersecurity strategy.<\/p>\n<p><strong>3. Cybersecurity is a process, not a state<\/strong><\/p>\n<p>By way of closing comments, it is important to stress that full security is an illusion. Legal and compliance advisors can therefore not require full cybersecurity for compliance; a <strong>risk-based approach<\/strong> will invariably be required.<\/p>\n<p>Likewise, the Board will have to acknowledge that not all risks can be averted. In such a case, the role of legal and compliance advisors involves suggesting ways to handle or mitigate those risks, taking into account applicable legal requirements.<\/p>\n<p>You yourself may need a hand along the way \u2013 in that case, feel free to reach out for support.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Forget the clich\u00e9s \u2013 cybersecurity is not just an IT issue, it is a company-wide issue. From the chair(wo)man of the Board of Directors to the newest intern, every person in an organisation can be both a cybersecurity threat and a cybersecurity asset.<\/p>\n","protected":false},"author":1,"featured_media":1117,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-4478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-partnerblog"],"blocksy_meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to explain the legal aspects of cybersecurity to the Board of Directors? - IBJ - IJE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to explain the legal aspects of cybersecurity to the Board of Directors? - IBJ - IJE\" \/>\n<meta property=\"og:description\" content=\"Forget the clich\u00e9s \u2013 cybersecurity is not just an IT issue, it is a company-wide issue. From the chair(wo)man of the Board of Directors to the newest intern, every person in an organisation can be both a cybersecurity threat and a cybersecurity asset.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/\" \/>\n<meta property=\"og:site_name\" content=\"IBJ - IJE\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-29T18:01:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ibj.be\/wp-content\/uploads\/2020\/06\/nautadutilh-cropped.png\" \/>\n\t<meta property=\"og:image:width\" content=\"395\" \/>\n\t<meta property=\"og:image:height\" content=\"42\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ronnyvanderborght\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"ronnyvanderborght\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/\"},\"author\":{\"name\":\"ronnyvanderborght\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#\\\/schema\\\/person\\\/13a90897df17a00fd7ba7cc501d0496c\"},\"headline\":\"How to explain the legal aspects of cybersecurity to the Board of Directors?\",\"datePublished\":\"2020-06-29T18:01:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/\"},\"wordCount\":1520,\"publisher\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/ibj.be\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/nautadutilh-cropped.png?fit=395%2C42&ssl=1\",\"articleSection\":[\"Partnerblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/\",\"url\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/\",\"name\":\"How to explain the legal aspects of cybersecurity to the Board of Directors? - IBJ - IJE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/ibj.be\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/nautadutilh-cropped.png?fit=395%2C42&ssl=1\",\"datePublished\":\"2020-06-29T18:01:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ibj.be\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/nautadutilh-cropped.png?fit=395%2C42&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ibj.be\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/nautadutilh-cropped.png?fit=395%2C42&ssl=1\",\"width\":395,\"height\":42},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/partnerblog\\\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ibj.be\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to explain the legal aspects of cybersecurity to the Board of Directors?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/ibj.be\\\/nl\\\/\",\"name\":\"IBJ - IJE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ibj.be\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#organization\",\"name\":\"IBJ - IJE\",\"url\":\"https:\\\/\\\/ibj.be\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ibj.be\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/ibj-ije-logo-color.svg\",\"contentUrl\":\"https:\\\/\\\/ibj.be\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/ibj-ije-logo-color.svg\",\"width\":288,\"height\":121,\"caption\":\"IBJ - IJE\"},\"image\":{\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/10961968\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ibj.be\\\/nl\\\/#\\\/schema\\\/person\\\/13a90897df17a00fd7ba7cc501d0496c\",\"name\":\"ronnyvanderborght\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cd2dd4863bbc8a3842b2f208c00ab3f9e01ffaa16b26a93a19a3cdc637b7efe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cd2dd4863bbc8a3842b2f208c00ab3f9e01ffaa16b26a93a19a3cdc637b7efe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cd2dd4863bbc8a3842b2f208c00ab3f9e01ffaa16b26a93a19a3cdc637b7efe5?s=96&d=mm&r=g\",\"caption\":\"ronnyvanderborght\"},\"sameAs\":[\"https:\\\/\\\/ibj.be\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to explain the legal aspects of cybersecurity to the Board of Directors? - IBJ - IJE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/","og_locale":"nl_NL","og_type":"article","og_title":"How to explain the legal aspects of cybersecurity to the Board of Directors? - IBJ - IJE","og_description":"Forget the clich\u00e9s \u2013 cybersecurity is not just an IT issue, it is a company-wide issue. From the chair(wo)man of the Board of Directors to the newest intern, every person in an organisation can be both a cybersecurity threat and a cybersecurity asset.","og_url":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/","og_site_name":"IBJ - IJE","article_published_time":"2020-06-29T18:01:03+00:00","og_image":[{"width":395,"height":42,"url":"https:\/\/ibj.be\/wp-content\/uploads\/2020\/06\/nautadutilh-cropped.png","type":"image\/png"}],"author":"ronnyvanderborght","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"ronnyvanderborght","Geschatte leestijd":"8 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/#article","isPartOf":{"@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/"},"author":{"name":"ronnyvanderborght","@id":"https:\/\/ibj.be\/nl\/#\/schema\/person\/13a90897df17a00fd7ba7cc501d0496c"},"headline":"How to explain the legal aspects of cybersecurity to the Board of Directors?","datePublished":"2020-06-29T18:01:03+00:00","mainEntityOfPage":{"@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/"},"wordCount":1520,"publisher":{"@id":"https:\/\/ibj.be\/nl\/#organization"},"image":{"@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ibj.be\/wp-content\/uploads\/2020\/06\/nautadutilh-cropped.png?fit=395%2C42&ssl=1","articleSection":["Partnerblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/","url":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/","name":"How to explain the legal aspects of cybersecurity to the Board of Directors? - IBJ - IJE","isPartOf":{"@id":"https:\/\/ibj.be\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/#primaryimage"},"image":{"@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ibj.be\/wp-content\/uploads\/2020\/06\/nautadutilh-cropped.png?fit=395%2C42&ssl=1","datePublished":"2020-06-29T18:01:03+00:00","breadcrumb":{"@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/#primaryimage","url":"https:\/\/i0.wp.com\/ibj.be\/wp-content\/uploads\/2020\/06\/nautadutilh-cropped.png?fit=395%2C42&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ibj.be\/wp-content\/uploads\/2020\/06\/nautadutilh-cropped.png?fit=395%2C42&ssl=1","width":395,"height":42},{"@type":"BreadcrumbList","@id":"https:\/\/ibj.be\/nl\/partnerblog\/how-to-explain-the-legal-aspects-of-cybersecurity-to-the-board-of-directors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ibj.be\/nl\/"},{"@type":"ListItem","position":2,"name":"How to explain the legal aspects of cybersecurity to the Board of Directors?"}]},{"@type":"WebSite","@id":"https:\/\/ibj.be\/nl\/#website","url":"https:\/\/ibj.be\/nl\/","name":"IBJ - IJE","description":"","publisher":{"@id":"https:\/\/ibj.be\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ibj.be\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/ibj.be\/nl\/#organization","name":"IBJ - IJE","url":"https:\/\/ibj.be\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/ibj.be\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/ibj.be\/wp-content\/uploads\/2024\/06\/ibj-ije-logo-color.svg","contentUrl":"https:\/\/ibj.be\/wp-content\/uploads\/2024\/06\/ibj-ije-logo-color.svg","width":288,"height":121,"caption":"IBJ - IJE"},"image":{"@id":"https:\/\/ibj.be\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/10961968\/"]},{"@type":"Person","@id":"https:\/\/ibj.be\/nl\/#\/schema\/person\/13a90897df17a00fd7ba7cc501d0496c","name":"ronnyvanderborght","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/cd2dd4863bbc8a3842b2f208c00ab3f9e01ffaa16b26a93a19a3cdc637b7efe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cd2dd4863bbc8a3842b2f208c00ab3f9e01ffaa16b26a93a19a3cdc637b7efe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd2dd4863bbc8a3842b2f208c00ab3f9e01ffaa16b26a93a19a3cdc637b7efe5?s=96&d=mm&r=g","caption":"ronnyvanderborght"},"sameAs":["https:\/\/ibj.be"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ibj.be\/wp-content\/uploads\/2020\/06\/nautadutilh-cropped.png?fit=395%2C42&ssl=1","_links":{"self":[{"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/posts\/4478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/comments?post=4478"}],"version-history":[{"count":0,"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/posts\/4478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/media\/1117"}],"wp:attachment":[{"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/media?parent=4478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/categories?post=4478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ibj.be\/nl\/wp-json\/wp\/v2\/tags?post=4478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}