Skip to main content

As CISA and NIST emphasize, ransomware readiness is no longer optional: organizations must prevent where possible and recover fast when (not if) an incident lands.

This practical checklist helps executives and board members gauge resilience, drive constructive conversations, and push accountability around ransomware readiness across defenses, detection, recovery, and governance.

Ransomware Readiness Checklist

Question What “Good” Looks Like Artifact To Show Suggested Owner
If we were hit tonight, how quickly could we restore critical systems and data? Immutable / offline backups, defined RPO/RTO targets, quarterly restore drills, documented recovery runbooks Report of last restore test (time, success/fail) + backup architecture diagram CIO / Disaster Recovery Lead
Do we have complete MFA coverage (especially phishing-resistant for admins) and enforce least privilege? MFA enabled for all remote, email, and admin access; conditional access policies; privileged access management (PAM) controls; strict governance of service accounts MFA coverage report; inventory of privileged accounts and roles CISO / Identity & Access Lead
Would we be alerted to lateral movement or intrusions within minutes, not days? Endpoint Detection & Response (EDR) / Managed Detection & Response (MDR) with 24×7 monitoring, written alert playbooks, network segmentation, sufficient logging & retention SOC playbooks or detections library; recent purple team / tabletop results Head of Security Operations
Are our third parties (and key SaaS vendors) included in our ransomware plan? Vendor tiering by criticality, contractual obligations for incident notification/cooperation, backup/BCP attestations, integration into response workflows Vendor risk register; data flow map showing external connections Vendor Risk / Third-Party Risk Manager
Who decides about paying ransom, and how do we avoid legal/insurance pitfalls? Governance framework pre-agreed, counsel-led decision path, awareness of OFAC and sanctions risk, insurer notification / engagement protocols, law enforcement alignment Crisis communication tree; breach-notice clause excerpt from insurance contract Chief Legal / Risk Officer
DOWNLOAD THE SAMPLE REPORT AND BLANK CHECKLIST

Tips for Facilitating a Board Discussion

1. Prepare in Advance

Share the checklist before the meeting. Include blank “artifact due” cells so each participant arrives ready with answers and evidence.

2. Keep It Focused

Give each question about ten minutes of discussion time. Short, structured segments keep conversations on track and prevent unnecessary detours.

3. Use a Simple Scoring Model

Adopt a “traffic light” format (green, amber, red) to rate readiness. Record supporting artifacts so improvements can be tracked over time.

4. Assign Clear Ownership

Name the responsible person immediately. Avoid vague promises like “we’ll follow up” without defining who will act and by when.

5. Escalate Real Risk

Summarize high-risk gaps for the board or ELT. Provide next steps, cost estimates, and a timeline for closing critical vulnerabilities.

Why These Questions Matter for Ransomware Readiness

1. Backups & Recovery

CISA’s Ransomware Guide stresses the importance of offline, encrypted, and tested backups. Too often, organizations learn their backups failed only after an attack. Executives should require immutable storage, quarterly restore tests, and clear recovery objectives that match business priorities.

2. MFA & Least Privilege

Stolen credentials drive most ransomware incidents. Enforcing multi-factor authentication (MFA) across all remote, email, and admin accounts drastically reduces exposure. NIST’s guidance adds that least-privilege access (giving each user only what they need) strengthens defense and limits damage.

3. Rapid Detection & Lateral Movement

Attackers move through networks quickly, sometimes within hours. Real-time detection and 24×7 monitoring from EDR or MDR tools help stop them early. Executives should confirm that their Security Operations Center can spot unusual movement within minutes and trigger a documented response plan.

4. Third-Party & Supply Chain Risk

Every vendor connection creates potential entry points. CISA urges organizations to tier suppliers by risk and include incident-response clauses in contracts. Leaders should verify that key vendors test backups, share recovery plans, and participate in tabletop exercises that simulate ransomware events.

5. Ransom Governance & Legal Considerations

A ransom decision involves legal, regulatory, and insurance consequences. The OFAC Advisory and IC3 reports highlight sanctions risks and reporting duties when dealing with threat actors. Boards should define who decides, notify insurers and law enforcement quickly, and keep clear records for compliance.

Key Takeaways

Ransomware readiness starts with leadership. Executives must know how fast the company can recover, who owns each function, and how to coordinate decisions under pressure.

By prioritizing tested backups, MFA, rapid detection, vendor oversight, and defined governance, leaders turn uncertainty into control. These practices reduce risk, improve resilience, and demonstrate due diligence to regulators and stakeholders alike.

When boards treat cybersecurity as a measurable business discipline (not just an IT task), the entire organization becomes stronger, faster, and more prepared to respond.

LET'S DISCUSS AN EXECUTIVE INCIDENT RESPONSE TABLETOP
Marissa Cusick

Author Marissa Cusick

More posts by Marissa Cusick