Fiduciary Resilience Model
Directors have long accepted that weak financial oversight produces enterprise consequences. The discipline around financial reporting, controls, audit, and escalation was built deliberately. It exists to protect continuity, credibility, and value.
Technology risk now warrants the same level of discipline as financial risk.
I am not suggesting that board directors need to become technologists. They do not.
I say this because technology now sits inside the operating core of nearly every enterprise. It shapes how a company serves customers, communicates, makes decisions, moves money, delivers products, complies with regulations, and recovers from disruption. In many organizations, when critical technology fails, operations stop. The event no longer stays inside IT. Within hours, it becomes operational, reputational, regulatory, and financial all at once.
This is the governance gap I see most often.
Boards know technology matters. They know cyber matters. They know AI is reshaping the landscape. They know modernization has become harder to defer. And yet many still treat these as separate technical topics, or as periodic reporting items, instead of governing them as a connected category of enterprise risk.
That framing no longer holds.
Cyber, AI, modernization, and third-party exposure are interdependent conditions that determine how resilient the enterprise actually is.
A cyber event will test recovery capability. An AI deployment will surface process weaknesses and data quality problems. A legacy environment will increase both security and continuity exposure. A vendor change can shift data exposure, regulatory posture, customer experience, or all three at the same time.
This is why I use the term Fiduciary Resilience.

The Fiduciary Resilience Model is my board-level approach to governing technology risk as enterprise risk, with the same rigor boards apply to financial risk. It gives directors a practical way to focus oversight on what can disrupt the business, what must be governed, and what must be true so the organization can keep operating when technology fails.
The structure is straightforward: Visibility, Governance, and Readiness.
Those three pillars help boards stay at the right altitude while still asking the right questions.
Visibility
Boards don't need additional dashboards. They need evidence-based visibility into where technology can disrupt the enterprise.
That sounds obvious. In practice, many boards still receive summaries of controls, incident counts, heat maps, and program updates that fail to answer the question that actually matters: what failure would most disrupt the business?
That question changes the conversation.
It moves the board away from generic reporting and toward business consequences. It clarifies which systems, dependencies, processes, and external relationships truly matter. It also forces management to express technology exposure in business and operational terms, which is where oversight becomes meaningful.
Visibility starts with critical technology dependencies.
Which systems are essential to customer service, transactions, communications, compliance, or core operations? How are those systems risk-ranked? How current is that ranking? What dependencies sit behind them, including data, infrastructure, third parties, and manual workarounds that may be far less resilient than people assume?
Boards also need visibility into cyber exposure expressed in business terms. I am less interested in the volume of attempted attacks than in understanding which business capabilities are most exposed and what an interruption would actually look like if those capabilities went down.
The same is true for AI.
The first board question is often framed too broadly. The question is not simply whether the organization is using AI. The more useful framing is, where is AI embedded and what data does it touch?
In many organizations, AI is entering through vendor platforms long before the board sees a formal AI strategy. That matters because it can shift data exposure, control requirements, customer outcomes, and regulatory implications without much fanfare.
Third-party exposure belongs in the same visibility discussion. Most organizations now depend on a relatively small set of software, infrastructure, and service providers. Vendor concentration, control changes, embedded AI features, and service disruptions can create enterprise impact quickly. A static vendor review at procurement is not enough if the vendor changes the product, the model, or the terms of use six months later.
Legacy fragility belongs here as well. I have seen environments that looked modern from the outside while older infrastructure underneath created serious exposure. That kind of hidden weakness is exactly what boards should want surfaced. Modernization conversations often focus on cost and efficiency. They should also assess fragility. If the underlying environment is difficult to secure, difficult to support, and difficult to recover, the board should treat it as an enterprise risk issue.
Visibility is where the board begins to separate reassuring reporting from decision-useful evidence.
Governance
Once the board understands where the exposure sits, the next question is governance.
Technology risk requires more than interest and good intentions. It requires ownership, structure, cadence, and escalation that match the pace of change.
This is where many boards still have work to do.
To be clear, the board does not need to, nor should it, choose technology platforms or manage implementation plans. That is management's job. The board's responsibility is to ensure there is clear ownership in management, a defensible oversight structure, and a cadence of review that reflects the real shape of current technology risk.
Questions worth asking include:
Who owns technology risk in management? Where is it governed at the committee level? What triggers escalation to the full board? Does the cadence of review reflect annual planning cycles, or the speed at which cyber threats, vendor changes, and AI adoption are actually moving?
These are governance questions. They are not technical questions.
In many companies, AI risk belongs under enterprise risk oversight, unless AI is the company's core product. Cyber often sits there as well, or in a dedicated technology or risk structure depending on the company's dependency profile. The point is less about finding one universal committee model and more about making the ownership and escalation model explicit.
Boards should also be honest about their own composition. Directors do not need deep technical specialization across the board. They do need enough fluency and curiosity to ask thoughtful questions, understand the answers, and recognize when they are hearing clarity versus generality. As technology becomes more central to operations, this becomes a board effectiveness issue.
Good governance in this area is disciplined without becoming intrusive. Directors should be probing rather than performative. They should challenge assumptions, test the logic, and ask for evidence. They should also support management by helping clarify priorities, risk appetite, and investment decisions. This matters especially with modernization, where the journey is often long, sequential, and difficult.
A board can add real value here by pressing on a few basic points.
Why are we modernizing? What business value are we protecting or creating? What risks are we reducing over time? What evidence will show that the investment is improving resilience rather than simply refreshing technology?
Those are board-level questions. They keep oversight focused on consequences.
Readiness
The third pillar is readiness.
Readiness is the proof point. It is where oversight either becomes tangible or stays theoretical.
For cyber, the governing question has shifted. Asking whether the company is secure is no longer enough. Boards should ask how quickly the organization can detect an event, how quickly it can contain it, and how quickly it can recover critical operations. Every organization is a target. Prevention still matters. It is no longer sufficient as the primary frame.
Let me say it again: every organization is a target.
This is why I see cyber as a resilience issue as much as a security issue. A serious cyber event will test leadership, operations, communications, customer trust, and continuity all at once. Boards should expect evidence that critical recovery plans exist, that they are tested, and that testing changes something. A tabletop exercise that produces no operational improvement is a weak signal of readiness.
Culture matters here as well. If an organization lacks risk discipline, weak behavior at the edges can bypass strong controls at the center. Training, accountability, and escalation are part of readiness because resilience depends on how people act under pressure, and not solely on what tools are installed.
For AI, readiness begins with knowing where it is embedded, what data it touches, and what controls govern its use. I am wary when organizations push AI quickly onto weak processes, poor documentation, or messy data. Automating disorder usually scales the problem. It does not solve it.
This is why I believe operational cleanup often has to come first.
If a process is inconsistent, dependent on workarounds, or fed by poor inputs, applying AI to it can create more output with less reliability. Boards should want to know whether management has identified the exposure, clarified accountability, and built quality control into the process. Human oversight remains critical, especially where outputs affect customers, compliance, financial decisions, or enterprise reporting.
For modernization, readiness means treating the work as structural risk reduction as well as business enablement.
A sound modernization plan should reduce fragility, improve recoverability, and strengthen the company's ability to adapt. It should also support competitive positioning. Faster product delivery, stronger customer responsiveness, and better operating resilience are all legitimate board-level outcomes.
For third parties, readiness means more than onboarding diligence. It includes contingency planning, visibility into concentration risk, awareness of vendor changes, and a practical view of what happens if a provider fails or materially alters the service. This is particularly important when vendor AI changes how data is used or how outputs are generated.
Readiness ultimately comes down to evidence.
Evidence that the enterprise can detect. Evidence that it can respond. Evidence that it can recover. Evidence that it is reducing the structural conditions that make disruption more likely.
What boards should expect to see
A board that takes technology risk seriously should expect a small set of clear proofs.
It should see a current view of critical dependencies and where failure would most affect operations. It should see recovery testing on important systems and understand what changed as a result. It should see how AI use is being identified, governed, and bounded. It should see modernization decisions tied to resilience and business impact, presented as something more than a generic infrastructure refresh. And it should see third-party risk treated as a dynamic exposure, especially where vendor changes affect data, controls, or customer outcomes.
Most of all, the board should expect candor.
If management is more focused on producing polished dashboards than on surfacing what genuinely creates concern, oversight quality suffers.
The board's role
I don't believe boards should govern technology by stepping into operations. I do believe they should govern technology risk with fiduciary seriousness.
That means understanding what could disrupt the enterprise. It means defining who owns the risk, where it is governed, and what triggers escalation. It means asking for evidence of readiness rather than reassurance by presentation.
Technology now sits too close to enterprise continuity, customer trust, and long-term value to be treated as a side topic.
Boards already know how to oversee consequential risk. The work now is to apply that same discipline here, with the right lens and the right questions.
The question is no longer whether technology risk belongs in enterprise oversight.
The question is whether the board has a disciplined way to govern it before an inevitable disruption forces the issue.