Skip to content

Executive Security Risk Summary (Capital One 2019)

Use this to present a consolidated view of security risks and mitigation to executives; supports risk acceptance and resource decisions.


Hallucinated writing examples

Scenario. In September 2020, one month after the OCC Consent Order (August 6, 2020) (time), the Security Director (role) is asked by the CEO and CRO (audience) to produce a consolidated executive security risk summary (type). The summary must tie directly to the Capital One 2019 incident, the Consent Order’s required improvements, and the risk register so that leadership can make risk-acceptance and resource decisions aligned with regulatory expectations.

EXECUTIVE SECURITY RISK SUMMARY

To: Chief Executive Officer, Chief Risk Officer
From: Security Director, Technology Risk
Date: September 30, 2020
Subject: Consolidated Security Risk Summary — Post–July 2019 Incident and OCC Consent Order; Q3 2020

Executive summary. Cyber risk posture remains elevated as a direct result of the July 2019 incident and the Consent Order and $80 million civil money penalty issued by the Office of the Comptroller of the Currency on August 6, 2020 (OCC NR 2020-98). Top risks are explicitly tied to the root causes identified by the OCC and our internal review: cloud configuration governance, identity and access management (IAM), logging and retention, and evidence readiness. Mitigation is driven by Consent Order commitments and our internal roadmap; all items below map to risk register entries and consent order milestones.

Risk landscape. The incident involved exploitation of a WAF misconfiguration on AWS-hosted infrastructure and over-permissioned IAM roles, leading to access to customer data. The OCC Consent Order requires the Bank to strengthen risk management, board reporting, cloud security, and third-party risk. Our risk categories accordingly are: (1) Cloud and perimeter—configuration drift and unauthorized change. (2) Identity and access—over-permissioned roles and third-party access. (3) Detection and response—logging, retention, and forensic readiness. (4) Third-party and supply chain—vendor access and control evidence.

Top risks (abbreviated). (1) Cloud boundary and WAF configuration. High impact; root cause of the 2019 incident. Mitigation: config-as-code and drift detection for designated perimeter controls; target completion Q4 2020 per consent order. (2) IAM over-permissioning. High impact; enabled lateral access in the incident. Least-privilege review in progress; we are tracking reduction in wildcard and over-scoped roles. (3) Log coverage and retention. Medium–high; insufficient logging was cited in the OCC findings. Centralized logging and retention policy are being implemented; evidence package readiness is improving.

Gaps and initiatives. Key gaps relative to Consent Order and risk register: independent validation of control effectiveness; full alignment of risk register to board and OCC reporting. Initiatives in progress: PR-based change workflow for perimeter controls, drift detection rollout, audit packet and control-to-evidence mapping. We request risk acceptance for [specific exception] with revisit date March 2021, budget approval for [initiative] per the approved plan, and acknowledgment of Q4 priorities and metrics for the next executive review.


Official document (executive-level risk disclosure)

Public analogues for an executive security risk summary include 10-K risk factors and earnings or regulatory filings that summarize material cyber risk and response. Post-breach, Capital One’s disclosures and the OCC consent order emphasized risk management and governance, not only the exploit.

Executive risk summaries are often internal; 10-K and consent orders show how regulators expect risk and mitigation to be articulated at the top.


Writing analysis

How executive risk summaries are typically structured

  • Executive summary — Overall risk posture and trend.
  • Risk landscape — Categories (e.g., cyber, third-party, resilience) and severity.
  • Top risks — Key risks with impact, likelihood, and mitigation status.
  • Gaps and initiatives — What is being done and what is planned.
  • Decisions / approvals — Risk acceptances or resource requests.
  • Appendix — Optional detail (e.g., risk criteria, heat map).

What to emulate

  • One-page or short deck: trend, top 5–7 risks, mitigation status, and clear “asks” (approval, budget, acceptance).
  • Trace each risk to the risk register; each mitigation to control evidence or project status.
  • Use plain language; avoid jargon so non-security executives can act.

What to improve

  • Avoid listing controls without tying them to risk reduction or evidence.
  • Include “risks of inaction” and revisit dates for accepted risks so accountability is clear.
Last updated: