Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/1/2019
09:30 AM
Sam Abadir, Vice President of Industry Solutions at Lockpath
Sam Abadir, Vice President of Industry Solutions at Lockpath
Sponsored Article
50%
50%

6 Ways Effective CISOs Are Changing their Role

The new normal for forward-thinking CISOs includes coaching, increased visibility, and embracing new technology frameworks and priorities.

Read the trades, and you quickly get the impression that CISOs are stressed about cyberattacks, challenged by staffing shortages, pressured by management oversight and baffled by budgeting. 

The real story is how forward-thinking CISOs are adapting to a new normal brought about by the digital transformation and the meteoric rise in cybercrime. It’s not the kind of adaption associated with Charles Darwin that takes generations for genetic changes to appear. The new skillset equips CISOs for an evolving role.

Here are six ways CISOs are adapting to change:

1.  C also stands for coach
The acronym CISO has taken on a new definition. The "C" now also stands for coach, which means CISOs need to give advice and guidance freely and strike an optimistic tone. Research by the Ponemon Institute shows CISOs are shifting into this coaching role.

The primary driver is a demand to help business lines shore up their cybersecurity defenses.  For example, department heads are now seeking the CISO’s counsel regarding the company’s technology infrastructure in relation to issues like compliance with the company’s acceptable use policy, cybersecurity best practices and talking points for department heads to use with their teams. Some CISOs are being asked to coach executives about GDPR and data privacy and, as a result, are working closely with the chief privacy officer (CPO), or adding the CPO designation.

2.  Embrace organizational leadership
Given the increased reliance on technology as well as new regulations focused on cybersecurity and data privacy, CISOs that can deliver clear, actionable, role-based messages have seen their stature rise. Forward-thinking CISOs are taking advantage of their increased visibility, leveraging their ascension to leadership to further their initiatives.

Showcase how the CISO role benefits the organization and helps progress toward company goals. It’s the secret to securing budget and resources. Speak the company’s language, be mindful of company priorities and show how proposals impact what’s vital to the company.

To illustrate, Jeff Lowder, former CISO and CPO of OpenMarket, a leading mobile messaging company, took inspiration from his company’s mission statement and its reference to trust. An ISO 27001 information security program was labeled “Enterprise Trust Initiative” with a value proposition to “increase customer trust in OpenMarket by providing services that allow us to manage information risk to the right level at the right cost.” It made the program sound more company-centric, which resonated with company executives.

3.  Elevate information security
CISOs are challenged by what to share in the way of findings. Nobody wants to be an alarmist; then again you don’t want to feel like you’re rearranging deck chairs on the Titanic. Forward-thinking CISOs generate reports that offer a top-level view based on organizational goals and risks with supporting data. These CISOs know upper management wants to understand not just the threat level but also risks to assets, the bottom line and reputation.

Surescripts, the nation’s largest health information network, uses a technology platform to create real-time visual reports for the company’s executive leadership. The CISO aggregates and links data from multiple sources to communicate objectively with reputable information. Executives access the high-level review and can dive in deeper where necessary to make data-driven decisions.

4.  Embrace continuous monitoring
More and more, security teams are separating from IT departments and are becoming a separate business function. CISOs own information security, but IT owns asset protection. How well do they know the assets they’re protecting and their configurations? Organizations typically scan monthly or quarterly. Meanwhile, the risk of a breach occurs daily.

Forward-thinking CISOs are investing in systems that can continuously monitor and audit asset security. They are seeing ways to identify asset misconfigurations, as well as uncover unknown assets, applications, and other security risks. Periodic assessments are great for compliance, but for information security in 2019, CISOs need continuous monitoring. No waiting for scans means less stress.

5. Prioritize vulnerabilities
The CISO is ultimately responsible for addressing vulnerabilities to the network and systems. What’s challenging is determining which vulnerability to tackle first, second, third and so on.

A developing best practice among CISOs is prioritizing vulnerabilities based on criticality to the organization. For example, Plamen Martinov, CISO, of The University of Chicago Biological Sciences Division (BSD), directs a team that uses an asset value ranking system based on confidentiality, integrity and availability (CIA) to determine the criticality of the asset. BSD’s platform automatically performs a priority impact analysis that factors in the CIA score with each new vulnerability. It’s more efficient and effective.

Streamlined processes that utilize automation can make CISOs and their staffs more productive. Automation of routine tasks free up time for higher value projects.

6. Leverage frameworks
Frameworks like NIST provide controls and guidance that support the CISO’s efforts to drive information security. Are you leveraging information security frameworks? Forward-thinking CISOs do, and it’s helping them excel in complex compliance environments.

Jeff Lowder, OpenMarket's former CISO, adopted all 18 control families in the NIST SP 800-53r4 framework, plus created a 19th custom control family. Because it’s all in the same platform and following the principle of one control complies with many regulations, OpenMarket maintains compliance with 173 contracts and 254 compliance mandates. If there’s ever an issue, Lowder can use the platform to gain instant visibility into any contract or compliance mandate.

The CISO world is complicated enough. A framework provides an advanced starting point, along with essential guidance and support.

It’s easy to dwell on the negative or fall into the trap of misery loves company. It’s far harder to envision a future for CISOs that’s filled with promise. Forward-thinking CISOs in all industries are taking on coaching, embracing organizational leadership, and adopting frameworks in technology platforms designed for information security management.

As Stephen Hawking said, "Intelligence is the ability to adapt to change." If anybody can adapt to change and thrive, it’s smart CISOs.

About the Author
Sam Abadir, VP, Industry Solutions, Lockpath

Sam Abadir has over 20 years of experience helping companies realize value through improving processes, identifying performance metrics, and understanding risk. Sam has worked with software companies like Lockpath to build the tools that help companies manage risk and create value that enhance performance in a structured and efficient manner.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
The Flaw in Vulnerability Management: It's Time to Get Real
Jim Souders, Chief Executive Officer at Adaptiva,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4483
PUBLISHED: 2019-08-20
IBM Contract Management 10.1.0 through 10.1.3 and IBM Emptoris Spend Analysis 10.1.0 through 10.1.3 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X...
CVE-2019-4484
PUBLISHED: 2019-08-20
IBM Emptoris Sourcing 10.1.0 through 10.1.3, IBM Contract Management 10.1.0 through 10.1.3, and IBM Emptoris Spend Analysis 10.1.0 through 10.1.3 generates an error message that includes sensitive information that could be used in further attacks against the system. IBM X-Force ID: 164068.
CVE-2019-4485
PUBLISHED: 2019-08-20
IBM Emptoris Sourcing 10.1.0 through 10.1.3, IBM Contract Management 10.1.0 through 10.1.3, and IBM Emptoris Spend Analysis 10.1.0 through 10.1.3 generates an error message that includes sensitive information that could be used in further attacks against the system. IBM X-Force ID: 164069.
CVE-2019-7593
PUBLISHED: 2019-08-20
Metasys? ADS/ADX servers and NAE/NIE/NCE engines prior to 9.0 make use of a shared RSA key pair for certain encryption operations involving the Site Management Portal (SMP).
CVE-2019-7594
PUBLISHED: 2019-08-20
Metasys? ADS/ADX servers and NAE/NIE/NCE engines prior to 9.0 make use of a hardcoded RC2 key for certain encryption operations involving the Site Management Portal (SMP).