The Cyber Resilience Compass 2025
Page 11 of 26 · WEF_The_Cyber_Resilience_Compass_2025.pdf
Examples of front-line practices that organizations
are applying:
–Risk-owners across the organization develop
risk profiles to provide a structured approach
to managing cyber risk within their local
purviews, identifying vulnerabilities and impacts
and implementing proactive measures.
These are combined within the enterprise
risk management process to provide an
organization-wide view of cyber risk. Such
methodical risk assessments include identifying
critical assets, evaluating their supporting digital
infrastructure, assessing potential threats,
analysing existing controls and reviewing past
incidents within the organization, sector or
broader ecosystem.
–Top leadership establishes transparent
ownership and accountability structures and a
clear chain of command to empower decision-
makers. Individual risk-owners establish roles
and responsibilities for key processes, decisions
and risk management and communicate
these structures, with regular reviews and
assessments to ensure that roles adapt to
address emerging risks.
–Legal, compliance and cybersecurity teams
periodically evaluate legislative and regulatory
developments to mitigate legal and financial
risks while strengthening the cyber resilience
posture. To create robust compliance strategies, they use incident notification requirements,
cybersecurity standards, certification
frameworks and regulatory fragmentation.
–CISOs and chief revenue officers (CROs)
assess cyber insurance as a strategic tool to
limit financial losses, legal liabilities, business
disruptions and reputational damage caused by
cyber incidents. They work closely with insurers
and legal teams to meet policy requirements
and to maximize coverage benefits.
Experts emphasized the need to ensure that
relevant risk-owners across the organization fully
understand their exposure to cyber risks, as well
as the limitations of what the cybersecurity team
can guarantee in terms of system availability, data
confidentiality and data integrity. Many highlighted
the challenge of embedding responsibility and
accountability for managing residual risk within
the organization’s governance, risk and
compliance systems.
A common issue raised was the tendency to treat
cyber risk as “the CISO’s problem” rather than
understanding that cyber risk is business risk.
The lack of cyber awareness and a shortage of
specialized staff were identified as key factors
contributing to this challenge, making it difficult for
some risk-owners to grasp the extent of their cyber
risk exposures. Additionally, immature regulations
and the lack of qualified external advice were cited
as barriers in certain regions.
It is imperative to get multiple stakeholders in the room – front-line
operators, legal, compliance, marketing, risk management, security
practitioners and HR – and ask each of them to identify the top three
critical scenarios they believe could cause us the greatest financial
harm or the most devastating impact on the business connected to
other KPIs.
Gregory Eskins, Head, Global Cyber Insurance Center, Marsh McLennan
Trust is at the core of Schneider Electric’s business,
with cybersecurity as a critical pillar. Effective cyber risk
management extends beyond technology to governance,
which is why the company has embedded key internal
controls (KICs) within the three-lines-of-defence framework.
The KICs initiative establishes clear accountability for cyber
risk mitigation, ensuring that business and operational cyber
risk-owners (first line of defence) formally acknowledge risks
and implement controls. These efforts are guided by the group
CISO (second line of defence) and independently reviewed
by internal audit (third line of defence). By making control
expectations explicit, KICs eliminate ambiguity and ensure that
cybersecurity and product security are integral to operations.KICs are mapped to company policies and the cyber risk
register, which are updated annually by the cybersecurity
team. Each year, risk-owners formally sign off on control
execution, providing evidence or action plans to address
gaps. This structured approach strengthens compliance,
enhances business resilience and enables the company
to demonstrate security commitments to customers and
regulators. By formalizing risk-ownership, KICs mark a
significant advance in Schneider Electric’s cyber maturity
programme, reinforcing the company’s proactive stance on
cybersecurity and business continuity.CASE STUDY 3
Schneider Electric – Key internal controls in action
The Cyber Resilience Compass: Journeys Towards Resilience
11
Ask AI what this page says about a topic: