Back to Resources
Board Notification Memo — visual preview
Template

Board Notification Memo

Breach & Incident Board Communication Template

Overview

When a significant security incident hits, the board needs to know quickly, clearly, and with the right level of detail. This memo template gives CISOs a structured format for notifying the board of directors about material cyber incidents, ongoing breaches, or emerging risks that could affect the organization. The template balances urgency with clarity, providing enough technical context without overwhelming non-technical board members.

Memo Structure

  • Subject line and incident classification (Critical/High/Medium)
  • Executive summary: what happened, when, and current status
  • Scope of impact: systems, data, customers, and operations affected
  • Response actions taken and team mobilized
  • Regulatory and legal implications
  • Business continuity and customer impact assessment
  • Recommended board actions and resource requests
  • Next steps and follow-up communication schedule

Notification Triggers

TriggerBoard notification timelineDetail level
Active data breach with customer PIIWithin 24 hoursFull memo with impact assessment
Ransomware impacting production systemsWithin 24 hoursFull memo with recovery timeline
Regulatory investigation or enforcement actionWithin 48 hoursFull memo with legal counsel input
Critical vulnerability affecting core infrastructureWithin 72 hoursBriefing memo with remediation plan
Third-party breach affecting shared dataWithin 72 hoursBriefing memo with vendor response status
Material cyber insurance claimWithin 48 hoursFull memo with financial impact

Writing for a Non-Technical Audience

Board members care about business impact, not packet captures. Lead with what the organization stands to lose: revenue, customer trust, regulatory penalties, and competitive position. Use analogies that connect to business concepts they already understand. Instead of saying "an attacker exploited CVE-2024-1234 to achieve remote code execution," say "an attacker used a known software weakness to gain access to our internal systems." Provide enough technical detail to demonstrate competence but avoid jargon that obscures the message.

Follow-Up Communication Plan

The initial memo is just the beginning. Establish a regular cadence of updates: daily for active critical incidents, twice weekly during investigation phase, and weekly during remediation. Each update should reference the original memo and provide progress against the action items listed. Schedule a formal board presentation within 30 days of incident closure to cover the full post-mortem, corrective actions, and any investment requests tied to improving defenses.

Frequently Asked Questions

How quickly should the board be notified of a cyber incident?

For material incidents involving data breaches, ransomware, or regulatory implications, notify within 24 hours. SEC rules require disclosure of material cybersecurity incidents within four business days on Form 8-K, making timely board awareness essential.

What is considered a "material" cyber incident for board notification?

An incident is material if it could reasonably affect the company's financial condition, operations, or reputation. This includes breaches involving customer PII, operational disruptions, regulatory exposure, potential litigation, or incidents likely to attract media attention.

Should the CISO present to the board directly?

Yes, for significant incidents. The CISO should present the facts, and the CRO or General Counsel should address business and legal implications. Having the CISO present directly demonstrates accountability and technical command.

What if the investigation is still ongoing when the board needs to be informed?

Be transparent about what is confirmed and what remains under investigation. Use phrases like "based on our analysis to date" and "subject to further investigation." Set the expectation for when more complete information will be available.

How do we handle board notification when the breach involves insider activity?

Involve HR and legal counsel before distributing the memo. Limit details about the suspected individual to what is necessary for the board to understand the scope. Ensure the investigation plan addresses evidence preservation and due process.

Ready to use this resource?

Download it now or schedule a demo to see how Hunto AI can automate your security workflows.

Book a Demo

© 2026 Hunto AI. Copyright. All Rights Reserved