Please find below some articles and links to better understand the challenge.
Our biggest blindspots as CEOs
What every CEO needs to know about cybersecurity: A background paper By Ray Boisvert President and CEO I-SEC Integrated Strategies
Cybersecurity Questions for CEOs
Why CEOs Are Failing Cybersecurity, And How To Help Them Get Passing Grades
The Biggest Threat to Cyber Security–Your CEO
Preventing cyberattacks might be as simple as keeping an eye on the C-suite.
Corporate Security Checklist – a CEO’s Guide to Cyber Security
22 essential questions to evaluate your company’s defenses
Cyber Risk Management Primer for CEOs
Cyber Security: A Failure of Imagination by CEOs
The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity?
Target CEO Fired – Can You Be Fired If Your Company Is Hacked?
CEOs Can No Longer Sit Idly By on Cybersecurity
CEOs disconnect between cyber security perception and reality; report
The CEO/CIO relationship
The Differences Between CIOs and CEOs
The CIO in Crisis: What You Told Us
Is There A CEO-CIO Disconnect?
CIO vs CEO: Finding Middle Ground
Securing the C-Suite, Part 1: Lessons for Your CIO and CISO
The Chief Risk Officer: What Does It look Like and How Do You Get There?
Chief Risk Officers Are Taking on a Broader Role
The Triumph of the Humble Chief Risk Officer
If You Don’t Have A Chief Risk Officer, Get One
The role of the Chief Risk Officer in the spotlight
Three ways to strengthen the CFO-CIO partnership CFO Insights
When technology meets finance: how the CFO can become an innovation catalyst
Accountants as aggregators of data – Evading a Cyber Attack
Cyber Security Big Four get serious on cyber security
Data and Dollars: The Role of the CFO in Cybersecurity
The CFO’s role in cybersecurity
Accounting Firm Tech Systems Are Weak
TOP CYBERCRIMES WHITE PAPER HOW CPAs CAN PROTECT THEMSELVES AND THEIR CLIENTS
Cybersecurity Best Practices Guide For IIROC Dealer Members
Study shows businesses the ROI behind a strong security program
IT security auditing: Best practices for conducting audits
Internal Audit’s Contribution to the Effectiveness of Information Security (Part 1)
7 Types of Hacker Motivations
No Business Too Small to Be Hacked
Percentage of companies that report systems hacked