The following questions are drawn from actual board and audit committee discussions across India's banking, insurance, and capital markets sectors. They are hard because they require quantified, evidenced answers — not reassurance. Each answer below describes what a defensible response looks like, and how RiskSage makes it possible to answer each question with evidence rather than assertion.

Regulatory Compliance
01
"Can you show me, right now, whether we are compliant with each of our regulatory obligations — RBI, SEBI, IRDAI, and DPDP?"
RBI SEBI IRDAI DPDP
The answer must be a percentage with a trend, not a narrative. "We believe we are broadly compliant" is not an answer — it is an assertion.

The challenge is that each regulatory framework contains dozens or hundreds of individual controls, each of which must be implemented and evidenced. The IRDAI Cybersecurity Guidelines (2023, revised March 2025) contain 45 controls across 8 domains. SEBI CSCRF contains controls across 5 categories. RBI's Master Directions on Information Technology have an extensive control catalogue. Manual assessment cannot produce a current, accurate compliance picture — it produces a picture of what the compliance team last audited.

A defensible answer requires Unified Control Library (UCL) mapping — each of the organisation's controls mapped to the specific requirements it satisfies in each framework, with evidence freshness tracked continuously. When a control's evidence expires, the compliance score for every framework that control covers drops immediately.

In RiskSage: The Board Cybersecurity Dashboard displays a real-time regulatory scorecard — one traffic-light tile per framework (RBI_CYBER, SEBI_CSCRF, IRDAI_CYBER_2023, DPDP, ISO 27001) showing percentage posture, critical gap count, and a 90-day trend. Every score is backed by UCL control evidence. The board can see the answer within seconds of opening the dashboard.

02
"What is our actual financial exposure if we suffer a serious cyber incident? I want a number — in rupees."
FAIR RBI Board
The answer requires a probabilistic range: "For a ransomware scenario, our P50 Annual Loss Expectancy is ₹18 crore and our P95 is ₹47 crore. This accounts for productivity loss, response costs, potential RBI enforcement, and reputational damage."

The request for a number in rupees is entirely reasonable. Boards govern financial risk in quantitative terms — credit risk in basis points, market risk in VaR, operational risk in capital charge. There is no principled reason to exempt cyber risk from financial quantification.

The resistance to quantification is usually framed as "too many unknowns" or "cyber risk is different." Both positions are incorrect. FAIR v3.0 was designed specifically to handle uncertainty through probabilistic ranges — the output is not a precise single number but a defensible probability distribution that captures the uncertainty. The P95 figure tells the board the worst realistic scenario, not the worst conceivable one.

In RiskSage: The CRQ Engine runs FAIR v3.0 Monte Carlo analysis across 100 pre-built use cases calibrated to Indian BFSI threat profiles. The Board Dashboard Widget N10.3 shows the top 5 risks in ₹ crore (P50 and P95). Inputs are populated automatically from the live risk graph — VAPT findings, incident history, and control coverage feed directly into TEF and vulnerability estimates.

03
"If we discovered a cyber incident right now — tonight, at 11 PM — could we actually meet the CERT-In 6-hour reporting deadline? Has that ever been tested?"
Critical CERT-In IRDAI
The answer must cover three things: whether the process exists, whether it has been exercised, and whether SLA performance is tracked. "We have an IR playbook" is only the first third of the answer.

The CERT-In 6-hour window begins at the moment of detection — not at the moment the CISO is notified, not at the moment the incident is confirmed. This means the SOC analyst who first identifies an anomaly at 11 PM is the person who starts the clock. The process to escalate, classify, populate the CERT-In notification format, and submit must be capable of completing in under 6 hours from that moment.

Most IR processes fail not because they lack documentation but because they have never been exercised under the specific constraint of regulatory reporting. A tabletop exercise that practices internal containment but not regulatory notification is incomplete. The board should ask to see last quarter's incident SLA performance as a percentage — what fraction of incidents that required CERT-In notification were reported within 6 hours?

In RiskSage: The CERT-In IR module automatically calculates all regulatory deadlines from the detection timestamp. An AI-generated initial report in the prescribed 9-field format is available in seconds. The dashboard tracks incident SLA adherence as a percentage across CERT-In, RBI, IRDAI, and DPBI — the board sees this figure in Widget N10.4 every quarter.

Vendor & Data Governance
04
"Under DPDP, do all our vendors that process customer personal data have a compliant Data Processing Agreement in place? Can you show me the list?"
DPDP RBI IT Outsourcing
The answer must be a list — vendor name, data categories processed, DPA status, and expiry date. "We believe our contracts are compliant" is not auditable. DPDP Rules 2025 make the Data Fiduciary liable for its processors.

India's DPDP Act 2023 and its Rules 2025 impose clear obligations: Data Fiduciaries (banks, insurers, brokers) are responsible for ensuring that Data Processors (their vendors) handle personal data only as specified in a written DPA. The DPA must cover purpose, categories, retention, sub-processor controls, and deletion on contract end. Most organisations have some contracts, but few have a complete, auditable DPA register that they can produce instantly on demand.

The regulatory inspection question is blunt: "Show me all contracts with entities that process customer personal data and confirm each has a DPDP-compliant DPA." If the answer requires two weeks to compile, the organisation does not have adequate vendor data governance — and the next DPDP inspection or RBI examination will reflect that.

In RiskSage: The Contract/DPA module tracks every vendor contract with 28 fields including DPA status, data categories, sub-processor list, RBI IT outsourcing mandatory clauses, and expiry dates. The CONTRACT_EXPIRY MonitorRule fires 60 days before expiry. The DPA compliance summary API answers the DPDP.S8 question instantly — including flagging which vendors process personal data without a current DPA on file.

Investment & Risk Appetite
05
"We approved ₹22 crore for cybersecurity this year. Is that enough? How do we know we're not underinvesting — or overinvesting?"
CRQ · FAIR Board Decision
The answer requires a comparison: total ALE exposure, how much the current programme reduces it, and the marginal risk reduction available from incremental investment. "Industry benchmark is 8% of IT budget" is not adequate for a board-level decision.

This is the question that most CISOs cannot answer with confidence, because it requires financial quantification of risk that most organisations have never undertaken. The framework for answering it is straightforward: calculate the unadjusted ALE for the top risk scenarios (what the losses would be without the current security programme), then calculate the adjusted ALE (with current controls), and compare the difference to the programme cost.

For a ₹22 crore programme to be "enough," it needs to demonstrably reduce ALE by more than ₹22 crore. For it to be "right-sized," the marginal cost of additional controls should not produce risk reduction that exceeds the marginal cost — in financial terms, the security portfolio should be optimised at the point where the last rupee of investment produces approximately one rupee of ALE reduction.

In RiskSage: Widget N10.7 (Investment Summary) shows total security budget vs aggregate ALE reduction — the ROI of the programme as a whole. The FAIR-MAM model shows the marginal risk reduction of proposed new investments. The CRQ What-If API allows the board to ask "what if we invested ₹3 crore in PAM?" and see the projected ALE delta.

06
"What exactly does SEBI CSCRF require of this board specifically — not the CISO, not the security team — but this board, as directors?"
SEBI CSCRF Director Liability
SEBI CSCRF, effective April 1, 2025, requires that the board formally reviews and approves the cybersecurity policy, establishes a board-level oversight mechanism, and ensures that cybersecurity controls are reviewed at least annually. This is a board obligation, not a management obligation.

SEBI CSCRF is unusually specific about board-level accountability. The framework requires regulated entities — stock brokers, depositories, exchanges, mutual funds, and others — to establish a cybersecurity governance framework with board oversight. It mandates automated cybersecurity dashboards. It requires the board to set and periodically review cyber risk appetite.

The three specific board obligations under CSCRF are: (1) formally approve the cybersecurity policy and risk appetite annually; (2) review cyber risk posture via an automated dashboard — not a manually prepared report — with defined thresholds; and (3) ensure cybersecurity controls are independently assessed. Directors who do not have documentary evidence of having performed these functions are personally exposed in the event of a significant incident that triggers regulatory examination.

In RiskSage: The Board Cybersecurity Dashboard exports a digitally signed PDF after each board review — the forensic evidence that the board performed a structured, metric-driven cybersecurity review using an automated dashboard. This document is the evidence that SEBI CSCRF's board oversight requirement demands. The Attestation Calendar Widget tracks the next SEBI review due date.

Maturity & Positioning
07
"How does our cybersecurity maturity compare to peer organisations in our sector? Are we below the regulatory expected level?"
NIST CSF 2.0 Benchmarking
The honest answer for most Indian BFSI organisations: Tier 2 (Risk Informed) across most NIST CSF functions, with Recover often at Tier 1. SEBI CSCRF implicitly expects Tier 3. The gap is specific, not a general finding.

Peer comparison is difficult because most organisations don't publish their maturity levels. However, the question can be answered in terms of regulatory expectations. SEBI CSCRF, with its mandates for continuous monitoring, automated dashboards, and board-approved risk appetite, describes an organisation that is operating at NIST CSF Tier 3 (Repeatable) or above. IRDAI's board attestation requirement implies that the GOVERN function is at Tier 3. If an organisation's GOVERN function is at Tier 2, it is below the implied regulatory expectation.

The maturity gap is also actionable. Unlike a vague "we need to improve our security posture," a NIST CSF Tier gap analysis produces specific, measurable improvement targets — each function, each gap, each control investment required to close it.

In RiskSage: The CISO Command Dashboard (Widget N9.1) shows a radar chart of all 6 NIST CSF functions against the board-approved target Tiers. The maturity score is computed daily from live risk graph data — not a questionnaire. The board sees current vs target Tier for each function and the roadmap to close the gap.

08
"IRDAI requires us to submit the IS audit report signed by both the board and the auditor within 90 days of financial year end. Has that happened? Where is the evidence?"
IRDAI Attestation
The answer must be: "Yes. Here is the submission date, the board meeting at which it was approved, the minutes, and the signed export bundle with the IRDAI submission reference number."

IRDAI's requirement for board attestation is one of the most consequential governance obligations facing India's insurance sector. The IS audit report must be reviewed by the board, signed by both the external IS auditor and the board, and submitted to IRDAI within 90 days of the financial year end — or within 30 days of audit completion, whichever is earlier. Failure is not a technicality — it is a supervisory compliance breach that IRDAI examinations specifically check for.

The process breaks down in three ways in practice: (a) the audit takes longer than anticipated, leaving insufficient time for board review and submission; (b) the board review happens but is not properly documented — the minutes exist, but there is no evidence that the board specifically reviewed the IS audit findings; and (c) the submission happens but there is no tracking of the IRDAI receipt acknowledgement.

In RiskSage: The IRDAI Board Attestation module tracks the full workflow — audit engagement, findings review, board attestation, and IRDAI submission with reference number. The Attestation Calendar Widget N10.5 shows the deadline and current workflow stage. The Board PDF export is RSA-SHA256 signed — the tamper-proof evidence record for IRDAI inspection.

Liability & Accountability
09
"If we suffer a major breach and CERT-In misses notification in time, are we as directors personally liable? What is the extent of that liability?"
Personal Liability CERT-In DPDP
The answer is yes — potentially. Section 70B of the IT Act (CERT-In Directions) provides for imprisonment of up to one year for non-compliance. DPDP provides for penalties of up to ₹250 crore. Sector regulators have independent enforcement powers. Directors are not automatically shielded by the corporate form if they fail to exercise adequate oversight.

The liability landscape for directors of Indian BFSI organisations has become materially more serious in the past three years. The CERT-In Directions 2022 under Section 70B of the IT Act expose any person in charge of and responsible for the organisation to criminal liability for non-compliance — including missed notification deadlines. DPDP's penalties fall on the organisation, but enforcement history from GDPR (upon which DPDP is substantially modelled) shows that regulators can and do seek evidence of board-level governance failure when imposing maximum penalties.

The defence available to directors is demonstrating that they exercised appropriate oversight — that they reviewed the organisation's cybersecurity posture regularly, that they were provided with adequate information, that they set and tracked risk appetite, and that they approved appropriate resource allocation. Directors who can produce a signed, time-stamped board dashboard showing that they reviewed the organisation's CERT-In readiness in the quarter before an incident are materially better positioned than directors whose only engagement with cybersecurity was an annual narrative briefing.

In RiskSage: Every Board PDF export is RSA-SHA256 signed with a canonical JSON payload. The export includes a timestamp, dashboard metrics, and framework posture scores. This is the director's evidence that proper oversight was exercised. The ExportBundle verify endpoint allows any party to independently confirm the document's authenticity and integrity.

Continuous Visibility
10
"Our posture was 74% last quarter. It's 68% this quarter. What happened? Why did we deteriorate, and what has been done about it?"
Control Drift Trending
The answer must identify the specific controls that drifted, when they drifted, why (evidence expiry, monitor failure, mapping revocation), and what remediation is in progress with a completion date.

A posture percentage without a trend is a snapshot. A trend without an explanation is a mystery. A trend with an explanation but without a remediation plan is a problem. The board is entitled to all three: trend, root cause, and remediation status.

Control drift — the degradation of compliance posture between audit cycles — is one of the most common and least-tracked phenomena in enterprise GRC. Evidence for a control expires. A monitoring rule fails silently. A control implementation is revoked as part of a system change. In each case, the posture score drops, but nobody is notified unless there is an active drift detection system in place.

In RiskSage: The Continuous Compliance module (N4) detects control drift events — EVIDENCE_EXPIRED, MONITOR_FAIL, MAPPING_REVOKED, POSTURE_DEGRADED — and creates ControlDriftEvents with timestamps and AI-suggested remediation. The CISO Dashboard Widget N9.5 shows the drift feed. Widget N9.9 shows the 90-day posture trend. The board receives an explanation of every drift event, not just the resulting number.

11
"We renewed our cyber insurance for ₹15 crore coverage last month. Is that actually enough? And is our insurer aware of our VAPT findings?"
VaR · Insurance Financial Risk
The answer requires a VaR calculation: "At 99th percentile, our maximum single-incident loss is estimated at ₹89 crore. Our current coverage is ₹15 crore. The gap is ₹74 crore — which is uncovered residual risk that the board should either accept or address through additional coverage or risk reduction."

Cyber insurance decisions in most Indian BFSI organisations are made by procurement teams with minimal input from the security function and no input from quantitative risk analysis. The coverage amount is often a round number — ₹10 crore, ₹15 crore, ₹25 crore — selected based on industry practice or broker recommendation rather than analysis of actual exposure.

The insurer question is also important. Most cyber insurance policies contain disclosure obligations — the insured must disclose material facts about its risk profile. Unremitted VAPT findings, unpatched CRITICAL vulnerabilities, and known deficiencies in incident response capability could all be considered material facts. Non-disclosure may void coverage at the point of claim.

In RiskSage: The Probabilistic VaR model produces 95th and 99th percentile loss estimates that directly inform insurance sizing decisions. The VAPT module shows the current remediation state of all findings — providing the disclosure-ready summary for insurance renewal. The CRQ Board PDF page documents the quantitative basis for coverage decisions.

12
"How will we know if our risk posture deteriorates significantly between now and our next board meeting in three months? Who is watching, and what would trigger an escalation to the board?"
Continuous Monitoring Governance Gap
The answer must describe an automated monitoring system with defined escalation thresholds — not "the CISO will tell us if something goes wrong." If the answer is the latter, the board is operating blind between meetings.

This question reveals the governance gap that most boards have not yet addressed. The board meets quarterly. Cyber incidents happen continuously. A critical vulnerability may be discovered, exploited, and cause damage in the six weeks between board meetings with no board-level visibility until the next scheduled review.

Effective board-level oversight requires defined escalation triggers: specific thresholds at which the CISO is obligated to notify the board chair or the audit committee immediately — outside the normal quarterly cycle. These triggers might include a CRITICAL VAPT finding in a customer-facing system that is not remediated within the defined SLA, a CERT-In notification that was made within the 6-hour window but where the incident severity is above a defined threshold, or a posture deterioration of more than 10 percentage points in any single framework.

In RiskSage: The Continuous Compliance module monitors for control drift, VAPT SLA breaches, incident overdue notifications (every 30 minutes), and evidence expiry. The Board Cybersecurity Dashboard updates in real time — board members with EXECUTIVE_VIEWER access can check the live posture between meetings. The AI-generated daily CISO brief (Widget N9.10) provides a 5-bullet executive summary that can be forwarded to the board chair on request.

From Hard Questions to Clear Answers

Every question above has a defensible, evidence-backed answer. The challenge is not knowledge — it's infrastructure. The RiskSage Board Cybersecurity Dashboard is built specifically to give India's BFSI boards the evidence layer they need to govern cyber risk with the same rigour applied to financial risk.